Archive of ‘WEEKLY PROGRESS’ category

WEEK 13 UPDATE

Hi all,

First, this a pleasant moment for me to share with you, after completing the project closure. Let’s look back a little. I selected the various issues in social network as the Capstone Project topic. I started this work on 5th March 2017, and throughout these 13 weeks I completed the project successfully. I did the research presentation on 25 May, and uploaded the final research report on 29 May 2017.

FINAL BLOG – THE SUMMARY AND REFLECTION OF THE PROJECT

Overview

Here, I’ll give you a brief overview regarding my research. Within the last decade, the growth of social networks has increased swiftly, due to the provided facilities such as online social interactions and easy communication methods by making the correspondence faster and less expensive. This novel rival of technology accomplished a broader outlook of impact for the users from all walks of life as well as for the information systems. To the fact, the social networks namely, Facebook, Twitter, Myspace, Google plus, Orkut and so on carrying out leading roles among the existing online informal organizations with billions of users around the globe under different age and knowledge levels. Be that as it may, these users share their information, photographs, and personal stuff through the Social Networks. Subsequently, the social network has been implementing new security issues on the web. Hence, this article focuses on the different security issues among social networks by categorizing into six issues as security, privacy, ethical, bullying, trust and concluding thoughts. Further, this article will provide an in-depth treatise regarding those social network issues and analyze them to find out the count measures which will recommend, avoiding the social network issues.

Proposed Solutions

The identified issues in the SN categorized in to six areas as security, privacy, ethical, bullying, trust and concluding thoughts of youth. When comparing the issues, it is obvious that the reason for them are uploading the personal sensitive information to the SN and use the SN without general IT knowledge. Consequently, the solutions for the SN issues must cover the above factors. In other words, there should be maximum security for the uploaded sensitive information as well as, want to provide enough IT knowledge for a new user to deal with the SN websites.

  • Use a strong password and secure password recovery answers.
  • User must be careful in uploading sensitive information.
  • User should not accept unknown person’s friend requests.
  • User must log into the accounts with trustworthy devices.
  • Take necessary actions in bullying situations.
  • Delete the user account with a profile cloning attack
  • Use a safe web browser and active virus guards for the device.
  • Use the security and privacy settings provided by the social networks.
  • Obey the social networks ethics

CONCLUSION

The social network issues topic is in an active area of research. Even, this problem is becoming an issue for the society without any discrimination on age or knowledge. This research found out the above-mentioned solutions from the selected research articles. Yet, we cannot completely mitigate the social network issues due to the latest technologies. But, it is prudent to be more careful, when using a social network account. The social networks must provide maximum security for the user accounts. As well as, the provided security and privacy issues must be followed by the users. Yet, the poor knowledge regarding the settings or information technology some users are unable to use the given security facilities. The user awareness is highly expected in SNs to avoid the security issues. In addition, adults are advised to help the children or any user who got affected due to the bullying issue. Be that as it may, there are certain count measures to use in SN as solutions for the security issues. The behaviour of the user, maturity of the children and technological consideration, user awareness are required to know before step into the SNs.

FURTHER GOALS

  • By going beyond of the current research limitations, conducting real test and surveys among specific human groups.
  • The differentiate of the social network security issues in different devices. (Hood & Duffy, 2016)
  • Examines “The friend in the middle attack (Huber, Mulazzani, Kitzler, Goluch & Weippl, 2011) on the new approach named Safebook.(Cutillo, Molva & Strufe, 2009)
  • The influence of adolecence personality and risky behaviours (Gentina, Rose & Vitell, 2015) for bullying issues (Hinduja & patchin, 2015) in social networks

 

  • The effect of location related privacy in geo social networks(Vicente, Freni, Bettini &Jensen, 2011) for the privacy issues ( Zhang, Sun, Zhu & Fang, 2010) of the social network user.

 

 

REFERENCES

Ahn, G. J., Shehab, M., & Squicciarini, A. (2011). Security and privacy in SNs. IEEE Internet Computing, 15(3), 10-12.

Anantharam, P., Henson, C. A., Thirunarayan, K., & Sheth, A. P. (2010, July). Trust model for semantic sensor and SNs: A preliminary report. In Aerospace and Electronics Conference (NAECON), Proceedings of the IEEE 2010 National (pp. 1-5). IEEE.

Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009, April). All your contacts are belonging to us: automated identity theft attacks on SNs. In Proceedings of the 18th international conference on World wide web (pp. 551-560). ACM.

Chang, S. E., Liu, A. Y., & Shen, W. C. (2017). User trust in SNing services: A comparison of Facebook and LinkedIn. Computers in Human Behavior, 69, 207-217.

Cutillo, L. A., Molva, R., & Strufe, T. (2009). Safebook: A privacy-preserving online SN leveraging on real-life trust. IEEE Communications Magazine, 47(12).

Dincelli, E., & Goel, S. (2017, January). Can Privacy and Security Be Friends? A Cultural Framework to Differentiate Security and Privacy Behaviors on Online SNs. In Proceedings of the 50th Hawaii International Conference on System Sciences.

Gangopadhyay, S., & Dhar, M. D. (2014). SNing sites and privacy issues concerning youths. Article-2 Global Media Journal-Indian Edition, Summer Issue, 5(1).

Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online SNs. IEEE Internet Computing, 15(4), 56-63.

Gentina, E., Rose, G. M., & Vitell, S. J. (2016). Ethics during adolescence: A SNs perspective. Journal of Business Ethics, 138(1), 185-197.

Gil de Zúñiga, H., Jung, N., & Valenzuela, S. (2012). Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of ComputerMediated Communication, 17(3), 319-336.

Hinduja, S., & Patchin, J. W. (2015). Cyberbullying legislation and case law: Implications for school policy and practice. Cyberbullying Research Center.

Hood, M., & Duffy, A. L. (2017). Understanding the relationship between cyber-victimisation and cyber-bullying on SN Sites: The role of moderating factors. Personality and Individual Differences.

Hoyle, R., Das, S., Kapadia, A., Lee, A. J., & Vaniea, K. (2017). Viewing the Viewers: Publishers’ Desires and Viewers’ Privacy Concerns in SNs.

Jiang, W., Wang, G., Bhuiyan, M. Z. A., & Wu, J. (2016). Understanding graph-based trust evaluation in online SNs: methodologies and challenges. ACM Computing Surveys (CSUR), 49(1), 10.

Mikal, J., Hurst, S., & Conway, M. (2016). Ethical issues in using Twitter for population-level depression monitoring: a qualitative study. BMC medical ethics, 17(1), 22.

Patel, R. B. R. M. P., & Joshi, M. H. (2017). Privacy and Security Issues in Social Online Networks.

Saikumar, T., & Sriramya, P.(2016) SECURITY ISSUES IN SNS.

Shin, D. H. (2010). The effects of trust, security and privacy in SNing: A security-based approach to understand the pattern of adoption. Interacting with computers, 22(5), 428-438.

Zhang, C., Sun, J., Zhu, X., & Fang, Y. (2010). Privacy and security for online SNs: challenges and opportunities. IEEE Network, 24(4).

I hope you enjoyed the research session with me. Thank you for visiting my blog.

 

Best Wishes,

Gayan Anushka Tennakoon.

WEEK 13 PROGRESS REPORT

 

WEEKLY PROGRESS REPORT

 

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

 

WEEK 13

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 13 DATE: 28 May 2017
 
PLANNING  
MILESTONE: PLANNED: ACTUAL: COMMENT
Do the final research presentation

 

Complete the final research report.

 

 

 

Do the presentation on 25.05.2017

 

 

 

Write the research report with the proposed solutions.

Did the research presentation on 25.05.2017?

 

More than a half of  the research report was completed.

 

 

 

At the end of the research, achieved a good knowledge regarding the subject as well as social network issues.
ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
 

Complete the project closure before the due date.

 

 

 

29.05.2017

 

Complete and upload the project closure before the due date.

 

No

 

WEEK 12.1 UPDATE

Hi all,

Now we are on the last fortnight of the session, and time is passing quickly to reach the final seminar and project evaluation. This is a very busy week with other subject assignments, the research presentation, and final report workload schedules. The presentations will be held on the day after tomorrow. I prepared the power point presentation according to the lecture’s instructions. The presentation will take nearly ten minutes. In simultaneously, the final report also going to be finished quickly. When I’m writing the final report, I felt that it is a prudent idea to select a topic related to the today’s society and generation. Because the real-life experiences make the research more familiar to me. And the latest research articles provide relevant information regarding security issues in social networks. Overall, the final tasks of the subject will be complete at the end of this week.  So, I’ll get back to my research work.

See you in the next week,

Anushka.

WEEK 12

WEEKLY PROGRESS REPORT

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

WEEK 11

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 12 DATE: 21 May 2017
 
PLANNING  
MILESTONE: PLANNED: ACTUAL: COMMENT
Prepare for the research presentation.

 

Complete the final research report.

 

 

 

The presentation will start on 25.05.2017

 

 

 

Refer more research articles and start to write the report.

Finalize the conclusion and recommendation before the presentation.

 

Follow the Annotated Bibliography again.

Presentation slides are on process.

 

The Annotated Bibliography is the base for the final report.

ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
The content of the presentation slides is not decided.

 

21.05.2017

 

Prepare the slides and get ready for the presentation. No

 

WEEK 11.1 UPDATE

Hi all,

In this week, my main target is to complete the quiz. The related topics are how to find trends with Emerging Technologies and Innovation, Research skills, Extracting information, Research Methods and Ethical Behaviour. Today I successfully complete the assessment 04, quiz and achieved full marks. Now the remaining assessment is the last and major section of the subject. With the lecture highlighted pros and cons in Annotated Bibliography, want to focus in project report(Blog) and seminar. Thereby, for the research conclusion, in user perspective, it is recommended that not to share all information with strangers, since there is a potential to access. When people are adding the friends, it need to check whether those people have met before or not. Likewise, further research is going on with below recent articles.Behaviour. Today I successfully complete the assessment 04, quiz and achieved full marks. Now the remaining assessment is the last and major section of the subject. With the lecture highlighted pros and cons in Annotated Bibliography, want to focus in project report(Blog) and seminar. Thereby, for the research conclusion, in user perspective, it is recommended that not to share all information with strangers, since there is a potential to access. When people are adding the friends, it need to check whether those people have met before or not. Likewise, further research is going on with below recent articles.major section of the subject. With the lecture highlighted pros and cons in Annotated Bibliography, want to focus in project report(Blog) and seminar. Thereby, for the research conclusion, in user perspective, it is recommended that not to share all information with strangers, since there is a potential to access. When people are adding the friends, it need to check whether those people have met before or not. Likewise, further research is going on with below recent articles.

Gentina, E., Rose, G. M., & Vitell, S. J. (2016). Ethics during adolescence: A social networks perspective. networks perspective. Journal of Business Ethics138(1), 185-197.

Mikal, J., Hurst, S., & Conway, M. (2016). Ethical issues in using Twitter for population level depression monitoring: a qualitative study. BMC medical ethics17(1), 22.

Chang, S. E., Liu, A. Y., & Shen, W. C. (2017). User trust in social networking services: A comparison of Facebook and LinkedIn. Computers in Human Behavior69, 207-217.

Jiang, W., Wang, G., Bhuiyan, M. Z. A., & Wu, J. (2016). Undrstanding graph-based trust evaluation in online social networks: methodologies and challenges. Undrstanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Computing Surveys (CSUR)49(1), 10.

 

See you in the next week,

Anushka.

WEEK 11

11 WEEKLY PROGRESS REPORT

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

WEEK 11

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 11 DATE: 14 May 2017
 
PLANNING  
MILESTONE: PLANNED: ACTUAL: COMMENT
Completion of Assessment 04

 

Find recommendations for the research.

 

 

Complete the quiz on 12.05.2017

 

 

 

Refer more research articles.

Couldn’t access the quiz assessment on the supposed date.

Conducted further research on this weekend

Want to complete the task.

 

Found more articles from year 2017.

ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
Couldn’t find information about quiz starting date.

 

 

14.05.2017

 

Complete the assessment before this week. No

 

WEEK 10

WEEKLY PROGRESS 10 REPORT

 

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

 

WEEK 10

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 10 DATE: 07 May 2017
PLANNING
MILESTONE: PLANNED: ACTUAL: COMMENT
Find information about Research Innovation and Ethical Analysis Quiz.

 

 

 

Go through regarding research methods, techniques, instruments, innovation, ethical processes, research behaviour and

management.

 

Didn’t find up with more resources. Remaining one week will be enough to complete the milestone.
ISSUES
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
Preparation for assessment 4 – Quiz. Want to clarify reading material for this assessment.

 

 

Interact 2 Test will be on 12.05.2017

 

Find requirements and quiz condition options. No

WEEK 9.1 UPDATE

WEEK 09 UPDATE

May 02

Hi all,

This week, I accomplished a major milestone of the research by completing and successfully submitting the Annotated Bibliography. Finally, after an immense attempt, I am happy to submit the report with 2% plagiarism and before the due date. The selected scholar articles gave a sufficient information regarding the security issues on social networks websites. By selecting a research topic dealing with the today’s society the understanding and the interesting towards the research increased routinely. The noteworthy worry to be memorized before step into the social networks is a security issue. Here, in this research eight social network issues are highlighted. When analyzing them in-depth it was cleared that, the issues relate to each other. The privacy issues and security issues are the major concerns in the social networks. Both are depending on each other. Nonetheless, the main reason to these issues is uploading the user’s sensitive personal information in the websites.

Regards,

Anushka

 

WEEK 9

 

WEEK 09 PROGRESS REPORT

April 30

 

 

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

WEEK 09

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 9 DATE: 30 April 2017
 
PLANNING  
MILESTONE: PLANNED: ACTUAL: COMMENT
Complete and submit the annotated bibliography. Complete the assignment 2.

 

Submit the final annotated bibliography on 28. 04. 2017

Final bibliography submitted on 28. 04. 2017 The final report had 2% of plagiarism.
ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
 

Complete the assignment on time.

 

Assignment due date on 28. 04. 2017

 

Finish writing the annotated bibliography by reading the articles carefully.

 

Yes

 

WEEK 8.1 UPDATE

WEEK 08 UPDATE

April 25,

Hi all,

This week, I was in a hurry to complete the Annotated Bibliography. Because it was essential to read the articles and take the necessary information out of them. Even, while writing the literature review I paid more attention to plagiarism as we were supposed to take details from the research articles. Meanwhile. Now I can provide a conclusion for the bibliography. Overall, it is essential to follow the facilitated security settings in the websites by all the social network users. Nowadays, the social network website developers are putting an immense effort to provide high-quality security for the user’s sensitive information. They provide the security and privacy settings to the user to maintain it as they want. Yet, the poor knowledge regarding the settings or information technology some users are unable to use the given security facilities. The user awareness is highly expected in social networks to avoid the security issues. In addition, adults are advised to help the children or any user who got affected due to the bullying issue. Be that as it may, there are certain count measures to use the social network as solutions for the security issues. The behavior of the user, maturity of the children and technological consideration, user awareness are required to know before step into the social networks.

Regards,

Anushka

1 2 3