WEEK 13 UPDATE

Hi all,

First, this a pleasant moment for me to share with you, after completing the project closure. Let’s look back a little. I selected the various issues in social network as the Capstone Project topic. I started this work on 5th March 2017, and throughout these 13 weeks I completed the project successfully. I did the research presentation on 25 May, and uploaded the final research report on 29 May 2017.

FINAL BLOG – THE SUMMARY AND REFLECTION OF THE PROJECT

Overview

Here, I’ll give you a brief overview regarding my research. Within the last decade, the growth of social networks has increased swiftly, due to the provided facilities such as online social interactions and easy communication methods by making the correspondence faster and less expensive. This novel rival of technology accomplished a broader outlook of impact for the users from all walks of life as well as for the information systems. To the fact, the social networks namely, Facebook, Twitter, Myspace, Google plus, Orkut and so on carrying out leading roles among the existing online informal organizations with billions of users around the globe under different age and knowledge levels. Be that as it may, these users share their information, photographs, and personal stuff through the Social Networks. Subsequently, the social network has been implementing new security issues on the web. Hence, this article focuses on the different security issues among social networks by categorizing into six issues as security, privacy, ethical, bullying, trust and concluding thoughts. Further, this article will provide an in-depth treatise regarding those social network issues and analyze them to find out the count measures which will recommend, avoiding the social network issues.

Proposed Solutions

The identified issues in the SN categorized in to six areas as security, privacy, ethical, bullying, trust and concluding thoughts of youth. When comparing the issues, it is obvious that the reason for them are uploading the personal sensitive information to the SN and use the SN without general IT knowledge. Consequently, the solutions for the SN issues must cover the above factors. In other words, there should be maximum security for the uploaded sensitive information as well as, want to provide enough IT knowledge for a new user to deal with the SN websites.

  • Use a strong password and secure password recovery answers.
  • User must be careful in uploading sensitive information.
  • User should not accept unknown person’s friend requests.
  • User must log into the accounts with trustworthy devices.
  • Take necessary actions in bullying situations.
  • Delete the user account with a profile cloning attack
  • Use a safe web browser and active virus guards for the device.
  • Use the security and privacy settings provided by the social networks.
  • Obey the social networks ethics

CONCLUSION

The social network issues topic is in an active area of research. Even, this problem is becoming an issue for the society without any discrimination on age or knowledge. This research found out the above-mentioned solutions from the selected research articles. Yet, we cannot completely mitigate the social network issues due to the latest technologies. But, it is prudent to be more careful, when using a social network account. The social networks must provide maximum security for the user accounts. As well as, the provided security and privacy issues must be followed by the users. Yet, the poor knowledge regarding the settings or information technology some users are unable to use the given security facilities. The user awareness is highly expected in SNs to avoid the security issues. In addition, adults are advised to help the children or any user who got affected due to the bullying issue. Be that as it may, there are certain count measures to use in SN as solutions for the security issues. The behaviour of the user, maturity of the children and technological consideration, user awareness are required to know before step into the SNs.

FURTHER GOALS

  • By going beyond of the current research limitations, conducting real test and surveys among specific human groups.
  • The differentiate of the social network security issues in different devices. (Hood & Duffy, 2016)
  • Examines “The friend in the middle attack (Huber, Mulazzani, Kitzler, Goluch & Weippl, 2011) on the new approach named Safebook.(Cutillo, Molva & Strufe, 2009)
  • The influence of adolecence personality and risky behaviours (Gentina, Rose & Vitell, 2015) for bullying issues (Hinduja & patchin, 2015) in social networks

 

  • The effect of location related privacy in geo social networks(Vicente, Freni, Bettini &Jensen, 2011) for the privacy issues ( Zhang, Sun, Zhu & Fang, 2010) of the social network user.

 

 

REFERENCES

Ahn, G. J., Shehab, M., & Squicciarini, A. (2011). Security and privacy in SNs. IEEE Internet Computing, 15(3), 10-12.

Anantharam, P., Henson, C. A., Thirunarayan, K., & Sheth, A. P. (2010, July). Trust model for semantic sensor and SNs: A preliminary report. In Aerospace and Electronics Conference (NAECON), Proceedings of the IEEE 2010 National (pp. 1-5). IEEE.

Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009, April). All your contacts are belonging to us: automated identity theft attacks on SNs. In Proceedings of the 18th international conference on World wide web (pp. 551-560). ACM.

Chang, S. E., Liu, A. Y., & Shen, W. C. (2017). User trust in SNing services: A comparison of Facebook and LinkedIn. Computers in Human Behavior, 69, 207-217.

Cutillo, L. A., Molva, R., & Strufe, T. (2009). Safebook: A privacy-preserving online SN leveraging on real-life trust. IEEE Communications Magazine, 47(12).

Dincelli, E., & Goel, S. (2017, January). Can Privacy and Security Be Friends? A Cultural Framework to Differentiate Security and Privacy Behaviors on Online SNs. In Proceedings of the 50th Hawaii International Conference on System Sciences.

Gangopadhyay, S., & Dhar, M. D. (2014). SNing sites and privacy issues concerning youths. Article-2 Global Media Journal-Indian Edition, Summer Issue, 5(1).

Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online SNs. IEEE Internet Computing, 15(4), 56-63.

Gentina, E., Rose, G. M., & Vitell, S. J. (2016). Ethics during adolescence: A SNs perspective. Journal of Business Ethics, 138(1), 185-197.

Gil de Zúñiga, H., Jung, N., & Valenzuela, S. (2012). Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of ComputerMediated Communication, 17(3), 319-336.

Hinduja, S., & Patchin, J. W. (2015). Cyberbullying legislation and case law: Implications for school policy and practice. Cyberbullying Research Center.

Hood, M., & Duffy, A. L. (2017). Understanding the relationship between cyber-victimisation and cyber-bullying on SN Sites: The role of moderating factors. Personality and Individual Differences.

Hoyle, R., Das, S., Kapadia, A., Lee, A. J., & Vaniea, K. (2017). Viewing the Viewers: Publishers’ Desires and Viewers’ Privacy Concerns in SNs.

Jiang, W., Wang, G., Bhuiyan, M. Z. A., & Wu, J. (2016). Understanding graph-based trust evaluation in online SNs: methodologies and challenges. ACM Computing Surveys (CSUR), 49(1), 10.

Mikal, J., Hurst, S., & Conway, M. (2016). Ethical issues in using Twitter for population-level depression monitoring: a qualitative study. BMC medical ethics, 17(1), 22.

Patel, R. B. R. M. P., & Joshi, M. H. (2017). Privacy and Security Issues in Social Online Networks.

Saikumar, T., & Sriramya, P.(2016) SECURITY ISSUES IN SNS.

Shin, D. H. (2010). The effects of trust, security and privacy in SNing: A security-based approach to understand the pattern of adoption. Interacting with computers, 22(5), 428-438.

Zhang, C., Sun, J., Zhu, X., & Fang, Y. (2010). Privacy and security for online SNs: challenges and opportunities. IEEE Network, 24(4).

I hope you enjoyed the research session with me. Thank you for visiting my blog.

 

Best Wishes,

Gayan Anushka Tennakoon.

Leave a Reply