SlideShare a Scribd company logo
The Issues of Security and
Privacy in Social Network Users
By: Noori Sadeq
Regis University
Problem
• The use of social network is the aspect of sharing information that leads
to breaching of user privacy.
• The main challenge that lies in the social network websites accounts is
liaising with the third-party accounts that can compromise user
information.
Research Questions
• Is it safe to register with the social network account to the third-party
application?
• What are the steps and frameworks that the users and the social network
websites that need to be implemented to guarantee that security and privacy?
• What are the ideas behind the integration of users in the social network
websites and the third-party in using the social network logins?
Purpose
The purpose of the study is to examine the issues related to using of
social network users, and the applications that offered by the third-party
websites and impact of security and privacy.
Rationale
• Social networking clients are always willing to share their information
and life experiences, but they are not aware of the security issues they
might face.
• Third-party websites have granted access regarding sharing of
information to these websites which can be a vital threat to the privacy of
the user.
Supporting Citations
• Albesher and Albussain (2013), argue that the proceeded with advancement
include significant adversity to their privacy.
• Pauline and Georgios (2012), Social network clients are always willing to
share their information and life experiences, but they are not aware of the
security issues they might face.
• According to Torres and Deirdre (2014), users may have the loose mentality
for individual privacy and nearsighted assessment of the related privacy
• dangers.
Body of Knowledge
• The safety and privacy of the information might be at risk that can eventually lead to
loss of information or even hacking of the entire social network account.
• Clients need to be aware of changing privacy settings:
o First, the user should be aware of ignorance of the potential dangers which may
happen thus of this merciless.
o Second, the tedious to read and understand the privacy setting of the social network
website.
o Third, each website that needs different sorts of privacy, and that may
lead to confused so the clients need to be aware of the difference.
Surprised by Research
• The users’ need to be aware of privacy settings on the social network.
• Clients can understand the privacy setting by searching for video,
documents that help them to build a real privacy that protects their
information.
• Clients need to understand that some of the privacy settings in social
network site are not the same in another social network
Lessons Learned
Social network users must recognize the dangers of actively socializing
in the online vacuum and must either take steps to protect their online activity or
actively assume responsibility for their online actions.
References
• Albesher, A., & Alhussain, T. (September 16, 2013). Privacy and security issues in
social Networks: An evaluation of Facebook. Acm International Conference
Proceeding Series, 7-10.
• Anthonysamy, P., Rashid, A., Walkerdine, J., Greenwood, P., & Larkou, G. (May
11, 2012). Collaborative privacy management for third-party applications in online
social networks. Acm International Conference Proceeding Series.
• O'Brien, D. & Torres, A.M. (2012). Social Networking and Online Privacy:
Facebook User’s Perceptions. Irish Journal of Management, 31 (2):63-97.

More Related Content

What's hot

Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
Cyber Security Infotech
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
Ramya Nellutla
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
Novizul Evendi
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
Cyber Security
Cyber SecurityCyber Security
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
Prashant Sharma
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Mobile security
Mobile securityMobile security
Mobile security
dilipdubey5
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
HaniyaMaha
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
Mangesh Gunjal
 
Mobile security
Mobile securityMobile security
Mobile security
priyanka pandey
 
Dark web
Dark webDark web
Dark web
Safwan Hashmi
 
Computer Security
Computer SecurityComputer Security
Computer Security
AkNirojan
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
Department of Defense
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
sohaildanish
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
Parakum Pathirana
 

What's hot (20)

Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
Mobile Hacking
Mobile HackingMobile Hacking
Mobile Hacking
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Crime And Cyber Security
Cyber Crime And Cyber SecurityCyber Crime And Cyber Security
Cyber Crime And Cyber Security
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Social Networking Security Issues
Social Networking Security IssuesSocial Networking Security Issues
Social Networking Security Issues
 
Mobile security
Mobile securityMobile security
Mobile security
 
Dark web
Dark webDark web
Dark web
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 

Similar to The issues of security and privacy in social network

Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
University of South Africa (Unisa)
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010
James Williams
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
ijsptm
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
Ishfaq Majid
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
egschool
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
Social Media Ethics
Social Media EthicsSocial Media Ethics
Social Media Ethics
ronsteven22
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
Ansgar Koene
 
Reading Log
Reading Log Reading Log
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
Johan Koren
 
Common ethical issues
Common ethical issuesCommon ethical issues
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
 
Social networking
Social networkingSocial networking
Social networking
dwivedibrothers
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
Johan Koren
 
549 458-465
549 458-465549 458-465
549 458-465
idescitation
 
mil 1 - introduction to media and information literacy.pptx
mil 1 - introduction to media and information literacy.pptxmil 1 - introduction to media and information literacy.pptx
mil 1 - introduction to media and information literacy.pptx
304129
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Social media attack on privacy and peace of an Individual
Social media attack on privacy and peace of an IndividualSocial media attack on privacy and peace of an Individual
Social media attack on privacy and peace of an Individual
sangeetadhamdhere
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
Kamoru Abiodun Balogun(Bsc,MIT,CCNA,OCA,PhD inview UPM)
 

Similar to The issues of security and privacy in social network (20)

Student privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analyticsStudent privacy self-management: Implications for learning analytics
Student privacy self-management: Implications for learning analytics
 
Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010Social Networks in Health Care - Talk at ICSE 2010
Social Networks in Health Care - Talk at ICSE 2010
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
 
Social media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social NetworkingSocial media and Security: How to Ensure Safe Social Networking
Social media and Security: How to Ensure Safe Social Networking
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Social Media Ethics
Social Media EthicsSocial Media Ethics
Social Media Ethics
 
Cl15 a koene_ca_sma
Cl15 a koene_ca_smaCl15 a koene_ca_sma
Cl15 a koene_ca_sma
 
Reading Log
Reading Log Reading Log
Reading Log
 
Naughty or nice 2007 version
Naughty or nice 2007 versionNaughty or nice 2007 version
Naughty or nice 2007 version
 
Common ethical issues
Common ethical issuesCommon ethical issues
Common ethical issues
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
Social networking
Social networkingSocial networking
Social networking
 
Naughty or nice: Ethical concerns for technology
Naughty or nice:  Ethical concerns for technologyNaughty or nice:  Ethical concerns for technology
Naughty or nice: Ethical concerns for technology
 
549 458-465
549 458-465549 458-465
549 458-465
 
mil 1 - introduction to media and information literacy.pptx
mil 1 - introduction to media and information literacy.pptxmil 1 - introduction to media and information literacy.pptx
mil 1 - introduction to media and information literacy.pptx
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Social media attack on privacy and peace of an Individual
Social media attack on privacy and peace of an IndividualSocial media attack on privacy and peace of an Individual
Social media attack on privacy and peace of an Individual
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

The issues of security and privacy in social network

  • 1. The Issues of Security and Privacy in Social Network Users By: Noori Sadeq Regis University
  • 2. Problem • The use of social network is the aspect of sharing information that leads to breaching of user privacy. • The main challenge that lies in the social network websites accounts is liaising with the third-party accounts that can compromise user information.
  • 3. Research Questions • Is it safe to register with the social network account to the third-party application? • What are the steps and frameworks that the users and the social network websites that need to be implemented to guarantee that security and privacy? • What are the ideas behind the integration of users in the social network websites and the third-party in using the social network logins?
  • 4. Purpose The purpose of the study is to examine the issues related to using of social network users, and the applications that offered by the third-party websites and impact of security and privacy.
  • 5. Rationale • Social networking clients are always willing to share their information and life experiences, but they are not aware of the security issues they might face. • Third-party websites have granted access regarding sharing of information to these websites which can be a vital threat to the privacy of the user.
  • 6. Supporting Citations • Albesher and Albussain (2013), argue that the proceeded with advancement include significant adversity to their privacy. • Pauline and Georgios (2012), Social network clients are always willing to share their information and life experiences, but they are not aware of the security issues they might face. • According to Torres and Deirdre (2014), users may have the loose mentality for individual privacy and nearsighted assessment of the related privacy • dangers.
  • 7. Body of Knowledge • The safety and privacy of the information might be at risk that can eventually lead to loss of information or even hacking of the entire social network account. • Clients need to be aware of changing privacy settings: o First, the user should be aware of ignorance of the potential dangers which may happen thus of this merciless. o Second, the tedious to read and understand the privacy setting of the social network website. o Third, each website that needs different sorts of privacy, and that may lead to confused so the clients need to be aware of the difference.
  • 8. Surprised by Research • The users’ need to be aware of privacy settings on the social network. • Clients can understand the privacy setting by searching for video, documents that help them to build a real privacy that protects their information. • Clients need to understand that some of the privacy settings in social network site are not the same in another social network
  • 9. Lessons Learned Social network users must recognize the dangers of actively socializing in the online vacuum and must either take steps to protect their online activity or actively assume responsibility for their online actions.
  • 10. References • Albesher, A., & Alhussain, T. (September 16, 2013). Privacy and security issues in social Networks: An evaluation of Facebook. Acm International Conference Proceeding Series, 7-10. • Anthonysamy, P., Rashid, A., Walkerdine, J., Greenwood, P., & Larkou, G. (May 11, 2012). Collaborative privacy management for third-party applications in online social networks. Acm International Conference Proceeding Series. • O'Brien, D. & Torres, A.M. (2012). Social Networking and Online Privacy: Facebook User’s Perceptions. Irish Journal of Management, 31 (2):63-97.