Archive of ‘WEEKLY PROGRESS’ category

WEEK 08

 

WEEKLY PROGRESS REPORT

 

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

WEEK 08

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 8 DATE: 23 April 2017
 
PLANNING  
MILESTONE: PLANNED: ACTUAL: COMMENT
Complete the annotated bibliography. Complete the assignment 2 under the guidance of the lecture and submit the draft. The format of the annotated bibliography was given by the lecture. The given format made it easy to complete the assignment.
ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
 

The content of the bibliography was not in a limit to complete.

 

 

Assignment due date on 28. 04. 2017

 

Start write the annotated bibliography by reading the articles carefully.

 

No

 

WEEK 7.1 UPDATE

WEEK 07 UPDATE

 

Hi all,

This week, the final set off scholar articles were confirmed after referring nearly 20 articles. When, considering about the recent years and appropriateness of the article it was some much difficult to finalize the articles. Nevertheless, the novel information takes out from the articles can be mentioned as follows.

To overcome from the security issues author Sanz and the team introduced this circle. The hierarchy  of the circle; attacks, vulnerabilities, risks, countermeasures, asserts and threats. (Sanz, Loarden, Alvaez & Bringas, 2011)

Regards,

Anushka

WEEK 07

WEEK 07 PROGRESS REPORT

 

 

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

WEEK 07

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 7 DATE: 16 April 2017
 
PLANNING  
MILESTONE: PLANNED: ACTUAL: COMMENT
Confirm the articles about 8 issues in social network.

 

Read the articles to analyse the security issues in social networks. Read some articles and research the required fields. Selected and confirm 14 articles for the Annotated Bibliography.
ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
 

What format should follow to write the bibliography.

 

 

 

Assignment due date on 28. 04. 2017

 

Start write the introduction of the research report.

 

No

WEEK 6.2 UPDATE

WEEK 06 UPDATE

 

Hi all,

In this week, I had been identifying 14 research articles appropriate for the Annotated Bibliography. I found information regarding social networks issues with data analysing such as, the number of social networks uses, the age limits of the users and political usage in social networks websites. Further, with the immense popularity over the last years the users of the Social Networking websites gain an effortless opportunity to mingle with known and unknown people through internet. This has become an addiction to some of the youth users to maintain an account in social networks to sharing their personal stuffs with others and to find out about others’ lives. But, the way of writing the literature review is still not confirmed.

Saikumar, T., & Sriramya, P. SECURITY ISSUES IN SOCIAL NETWORKS.

 

Regards,

Anushka.

WEEK 6.1 UPDATE

WEEKLY PROGRESS REPORT

 

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

 

WEEK 06

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 6 DATE: 09 April 2017
 
PLANNING  
MILESTONE: PLANNED: ACTUAL: COMMENT
Find details about Annotated Bibliography.

 

Select articles about 8 issues in social network.

 

Search in Google to get an idea how to write the literature review.

 

 

Search in Google Scholar for relevant articles within nearby years.

Found diverse ways of writing the bibliography.

 

Searched for articles.

Want to finalize the method with the lecture.

Selected 17 articles for the Annotated Bibliography.

ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
 

What format should follow to write the bibliography.

 

 

 

Hope to start writing from next week.

 

Start write the Abstract of the research report.

 

No

WEEK 06

WEEK 5 UPDATE
April 06

Hi all,
This week I was in a little bit hurry to complete several assignments. In simultaneously, I followed some journal articles within the busy schedules. Still I didn’t finalize the research articles to be used for the annotated bibliography. Hence, I followed several articles related to the topic. Then, I realized that the security issues in the social networks getting more exciting with novel research issues identified from the articles. At the beginning, there were four research issues as security issues, privacy issues, bullying issues and ethical issues. The followings are the new research issues and the scholar articles.
• Trust issues
• Political issues
• Identity theft
• Concluding thoughts of the youth

Anantharam, P., Henson, C. A., Thirunarayan, K., & Sheth, A. P. (2010, July). Trust model for semantic sensor and social networks: A preliminary report. In Aerospace and Electronics Conference (NAECON), Proceedings of the IEEE 2010 National (pp. 1-5). IEEE.

Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009, April). All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web (pp. 551-560). ACM.

Cutillo, L. A., Molva, R., & Strufe, T. (2009). Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine, 47(12).

Gangopadhyay, S., & Dhar, M. D. (2014). Social networking sites and privacy issues concerning youths. Article-2 Global Media Journal-Indian Edition, Summer Issue, 5(1).

Gil de Zúñiga, H., Jung, N., & Valenzuela, S. (2012). Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of Computer‐Mediated Communication, 17(3), 319-336.

I suggest these articles, for further interesting about social networks.

Regards,
Anushka.

WEEK 05

WEEKLY PROGRESS REPORT

 

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

 

WEEK 05

NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

WEEK NO: 05 DATE: 02 April  2017
 
PLANNING  
MILESTONE: PLANNED: ACTUAL: COMMENT
Continue literature review – focusing on security issues in social networks.

 

 

Read and research review articles related to Social Networks.

 

Read further review articles for annotated bibliography. Review articles give foundation for finding further security issues in social networks.
ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
 

Difficult to find many more relevant research articles and continue the work on annotated bibliography.

 

 

 

 

Will commence browsing further articles and background information in this weekend.

 

Will found out extra literature reviews and write the bibliography.

 

No

 

 

WEEK 4.2 UPDATE

  1. WEEKLY PROGRESS REPORT

 

Project Title: Analysis and research of emerging technological security issues in multidisciplinary aspects of social networks

 

  1. WEEK 04
NAME: Gayan Anushka Tennakoon
PROJECT TITLE: Research and Investigation of various security issues in Social Networks.
WEEK NO: 4 DATE: 27 March 2017
 
PLANNING Capstone Research topic finalized
MILESTONE: PLANNED: ACTUAL: COMMENT
Complete the project proposal and plan.

 

 

 

Start literature review.

 

Determine scope, methodology and objectives.

 

 

Read review articles about security issues in social networks, to obtain background information.

 

Prepare the proposal according tothe proposal format and submited on 24th March.

 

Conduct literature review with further articles.

No problems encountered.

 

 

 

Review articles give grounding on present status.

ISSUES  
DESCRIPTION: DATE: ACTION/RESULTS FINISHED Y/N
 

Need to explore more research articles.

 

 

 

 

Annotated Bibliography due on 28th April

 

Will conduct further literature review on this week.

 

No

 

 

 

WEEK 4.1

 REFERENCES

 

 

Ahn, G. J., Shehab, M., & Squicciarini, A. (2011). Security and privacy in social networks. IEEE Internet Computing, 15(3), 10-12.

Arkell, H. (2013). Coroner warns of dangers of Facebook after student, 19, targeted by young women bullies online hanged himself Read more: http://www.dailymail.co.uk/news/article-2513782/Facebook-bullies-led-suicide-student-19-hanged-himself.html#ixzz4cAhyFY9B  Follow  us: @MailOnline on Twitter | DailyMail on Facebook. Mailonline. Retrieved from http://www.dailymail.co.uk/news/article-2513782/Facebook-bullies-led-suicide-student-19-hanged-himself.html

Borgatti, S. P., & Molina, J. L. (2003). Ethical and strategic issues in organizational social network analysis. The Journal of Applied Behavioral Science, 39(3), 337-349.

Claywell, C. (2017). Security Issues with Social Networking Sites. www.lovetoknow.com. Retrieved 23 March 2017, from http://socialnetworking.lovetoknow.com/Security_Issues_With_Social_Networking_Sites

Hinduja, S., & Patchin, J. W. (2015). Cyberbullying legislation and case law: Implications for school policy and practice. Cyberbullying Research Center.

Michelle, K. ( 2010, April 02). Bullying is serious growing problem. Fauquier Times Democret, p. A13.

Saikumar, T., & Sriramya, P. SECURITY ISSUES IN SOCIAL NETWORKS.

Shin, D. H. (2010). The effects of trust, security and privacy in social networking: A security-based approach to understand the pattern of adoption. Interacting with computers, 22(5), 428-438.

Zhang, C., Sun, J., Zhu, X., & Fang, Y. (2010). Privacy and security for online social networks: challenges and opportunities. IEEE Network, 24(4).

http://socialnetworking.lovetoknow.com/Security_Issues_With_Social_Networking_Sites

http://www.dailymail.co.uk/news/article-2513782/Facebook-bullies-led-suicide-student-19-hanged-himself.html

 

 

 

 

 

WEEK 4 UPDATE

WEEK 04

 

In this section, we will learn about Research Issues.

 

 

  1. Privacy Issues

In social networks, the users provide their touchy data and genuine images. The issue; is it safe giving all the personal information. This may build privacy issues throughout the social networks. The privacy of the social network user may be a threat. Because of hacking of images, image dragging, using snapping tools, image tagging, and print screen are some situations where the user gets into trouble due to uploading photos in social networks. Not only the photos but also other personal information checked in places and son on will be at risk to take by third parties.

 

  1. Security Issues

illegal authorization of the third-party applications or another social network user may misuse the sensitive information and create a considerable destruction to the individuals. That information might include bank details, credit card details and financial information, which the attacker can commit identity stealing. Also, the medical and treatment history details, health conditions and unique body features which the attacker can generate immense harm to the whole life of that user.

 

  1. Bullying Issues

Bullying is a serious arising problem to be addressed inside the social network websites. Cyber-bullying is the novel type of bullying among youngsters or even adults. By using the others texts, uploaded genuine images and emotional situations the attacker might insult, spread rumors and threaten the individuals. The major risk is that the attacker can hide his identity while bullying others. They use the social networks, cell phones or online resources for cyber-bullying. Due to bullying young children become lonely, emotionally traumatic, long-term emotional scars which may affect in adult relationships or suicide cases.

 

  1. Ethical Issues

Using the Facebook, Twitter, MySpace, YouTube and so on the individuals start to connect with the personal, political, social and cultural ethics across the whole world. They build up various relationships among the social networks with family members, friends, and strangers. Then it is better to maintain good relationships with the others by considering who they are. There are some users who provide misguiding information in social networks. It is a better example for an ethical issue. In addition, once a post or image uploaded to social networks, within the just second others will drag it. The news or post with grammatical mistakes might create ethical issues. There is no worth of removing it later. Furthermore, legal issues might take place due to copyright.

 

 

 

 

 

 

1 2 3