WEEK 07 UPDATE
This week, the final set off scholar articles were confirmed after referring nearly 20 articles. When, considering about the recent years and appropriateness of the article it was some much difficult to finalize the articles. Nevertheless, the novel information takes out from the articles can be mentioned as follows.
To overcome from the security issues author Sanz and the team introduced this circle. The hierarchy of the circle; attacks, vulnerabilities, risks, countermeasures, asserts and threats. (Sanz, Loarden, Alvaez & Bringas, 2011)
WEEK 06 UPDATE
In this week, I had been identifying 14 research articles appropriate for the Annotated Bibliography. I found information regarding social networks issues with data analysing such as, the number of social networks uses, the age limits of the users and political usage in social networks websites. Further, with the immense popularity over the last years the users of the Social Networking websites gain an effortless opportunity to mingle with known and unknown people through internet. This has become an addiction to some of the youth users to maintain an account in social networks to sharing their personal stuffs with others and to find out about others’ lives. But, the way of writing the literature review is still not confirmed.
Saikumar, T., & Sriramya, P. SECURITY ISSUES IN SOCIAL NETWORKS.
WEEK 5 UPDATE
This week I was in a little bit hurry to complete several assignments. In simultaneously, I followed some journal articles within the busy schedules. Still I didn’t finalize the research articles to be used for the annotated bibliography. Hence, I followed several articles related to the topic. Then, I realized that the security issues in the social networks getting more exciting with novel research issues identified from the articles. At the beginning, there were four research issues as security issues, privacy issues, bullying issues and ethical issues. The followings are the new research issues and the scholar articles.
• Trust issues
• Political issues
• Identity theft
• Concluding thoughts of the youth
Anantharam, P., Henson, C. A., Thirunarayan, K., & Sheth, A. P. (2010, July). Trust model for semantic sensor and social networks: A preliminary report. In Aerospace and Electronics Conference (NAECON), Proceedings of the IEEE 2010 National (pp. 1-5). IEEE.
Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009, April). All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web (pp. 551-560). ACM.
Cutillo, L. A., Molva, R., & Strufe, T. (2009). Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine, 47(12).
Gangopadhyay, S., & Dhar, M. D. (2014). Social networking sites and privacy issues concerning youths. Article-2 Global Media Journal-Indian Edition, Summer Issue, 5(1).
Gil de Zúñiga, H., Jung, N., & Valenzuela, S. (2012). Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of Computer‐Mediated Communication, 17(3), 319-336.
I suggest these articles, for further interesting about social networks.
- WEEKLY PROGRESS REPORT
Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks
- WEEK 04
||Gayan Anushka Tennakoon
||Research and Investigation of various security issues in Social Networks.
||DATE: 27 March 2017
||Capstone Research topic finalized
|Complete the project proposal and plan.
Start literature review.
|Determine scope, methodology and objectives.
Read review articles about security issues in social networks, to obtain background information.
|Prepare the proposal according tothe proposal format and submited on 24th March.
Conduct literature review with further articles.
|No problems encountered.
Review articles give grounding on present status.
Need to explore more research articles.
Annotated Bibliography due on 28th April
Will conduct further literature review on this week.
Ahn, G. J., Shehab, M., & Squicciarini, A. (2011). Security and privacy in social networks. IEEE Internet Computing, 15(3), 10-12.
Arkell, H. (2013). Coroner warns of dangers of Facebook after student, 19, targeted by young women bullies online hanged himself Read more: http://www.dailymail.co.uk/news/article-2513782/Facebook-bullies-led-suicide-student-19-hanged-himself.html#ixzz4cAhyFY9B Follow us: @MailOnline on Twitter | DailyMail on Facebook. Mailonline. Retrieved from http://www.dailymail.co.uk/news/article-2513782/Facebook-bullies-led-suicide-student-19-hanged-himself.html
Borgatti, S. P., & Molina, J. L. (2003). Ethical and strategic issues in organizational social network analysis. The Journal of Applied Behavioral Science, 39(3), 337-349.
Claywell, C. (2017). Security Issues with Social Networking Sites. www.lovetoknow.com. Retrieved 23 March 2017, from http://socialnetworking.lovetoknow.com/Security_Issues_With_Social_Networking_Sites
Hinduja, S., & Patchin, J. W. (2015). Cyberbullying legislation and case law: Implications for school policy and practice. Cyberbullying Research Center.
Michelle, K. ( 2010, April 02). Bullying is serious growing problem. Fauquier Times Democret, p. A13.
Saikumar, T., & Sriramya, P. SECURITY ISSUES IN SOCIAL NETWORKS.
Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers, 22(5), 428-438.
Zhang, C., Sun, J., Zhu, X., & Fang, Y. (2010). Privacy and security for online social networks: challenges and opportunities. IEEE Network, 24(4).
In this section, we will learn about Research Issues.
In social networks, the users provide their touchy data and genuine images. The issue; is it safe giving all the personal information. This may build privacy issues throughout the social networks. The privacy of the social network user may be a threat. Because of hacking of images, image dragging, using snapping tools, image tagging, and print screen are some situations where the user gets into trouble due to uploading photos in social networks. Not only the photos but also other personal information checked in places and son on will be at risk to take by third parties.
illegal authorization of the third-party applications or another social network user may misuse the sensitive information and create a considerable destruction to the individuals. That information might include bank details, credit card details and financial information, which the attacker can commit identity stealing. Also, the medical and treatment history details, health conditions and unique body features which the attacker can generate immense harm to the whole life of that user.
Bullying is a serious arising problem to be addressed inside the social network websites. Cyber-bullying is the novel type of bullying among youngsters or even adults. By using the others texts, uploaded genuine images and emotional situations the attacker might insult, spread rumors and threaten the individuals. The major risk is that the attacker can hide his identity while bullying others. They use the social networks, cell phones or online resources for cyber-bullying. Due to bullying young children become lonely, emotionally traumatic, long-term emotional scars which may affect in adult relationships or suicide cases.
Using the Facebook, Twitter, MySpace, YouTube and so on the individuals start to connect with the personal, political, social and cultural ethics across the whole world. They build up various relationships among the social networks with family members, friends, and strangers. Then it is better to maintain good relationships with the others by considering who they are. There are some users who provide misguiding information in social networks. It is a better example for an ethical issue. In addition, once a post or image uploaded to social networks, within the just second others will drag it. The news or post with grammatical mistakes might create ethical issues. There is no worth of removing it later. Furthermore, legal issues might take place due to copyright.