Cyber Security: Medical Photography and Social Media

2020 ◽  
pp. 573-583
Author(s):  
Christopher G. Seidel
2015 ◽  
Vol 11 (2) ◽  
pp. 117-124 ◽  
Author(s):  
Katrina A. Bramstedt ◽  
Ben Ierna ◽  
Victoria Woodcroft-Brown

Social media is a valuable tool in the practice of medicine, but it can also be an area of ‘treacherous waters’ for medical students. Those in their upper years of study are off-site and scattered broadly, undertaking clinical rotations; thus, in-house (university lecture) sessions are impractical. Nonetheless, during these clinical years students are generally high users of social media technology, putting them at risk of harm if they lack appropriate ethical awareness. We created a compulsory session in social media ethics (Doctoring and Social Media) offered in two online modes (narrated PowerPoint file or YouTube video) to fourth- and fifth-year undergraduate medical students. The novelty of our work was the use of SurveyMonkey® to deliver the file links, as well as to take attendance and deliver a post-session performance assessment. All 167 students completed the course and provided feedback. Overall, 73% Agreed or Strongly Agreed the course session would aid their professionalism skills and behaviours, and 95% supported delivery of the curriculum online. The most frequent areas of learning occurred in the following topics: email correspondence with patients, medical photography, and awareness of medical apps. SurveyMonkey® is a valuable and efficient tool for curriculum delivery, attendance taking, and assessment activities.


2021 ◽  
Vol 3 (6) ◽  
pp. 12-25
Author(s):  
Rahmah Ahmad H. Osman ◽  
Luqman Zakariyah ◽  
Habeebullah Zakariyah ◽  
Abdul Rahman Ahmad Dahlan

Man has experienced a tremendous advancement in his way of communication due to the technological breakthrough which reached the apex in recent years. Specifically, the importance of social media has become significant as it spans several spectrums of human life. Thus, cybersecurity is becoming an issue of paramount importance since the amount of information and technology available in cyberspace is skyrocketing. This study was an attempt to present the Maqasidic analysis of the benefits derived from the use of Facebook use as a social media platform, as well as the security threats facing cyber users while using the application. Using the Maqasid al-Shariah (The higher objectives of Islam) as the basis, the researcher found that Facebook users derive certain benefits from their Facebook use, and this assists them to achieve Maqasid al-Shariah’s higher objectives. Nevertheless, human beings are faced with certain security threats which hamper their achievements of these Maqasid higher objectives. The researchers then proposed some guidelines and principles by which cybersecurity can be best achieved through the Maqasid al-Shariah.


2019 ◽  
Vol 9 (3) ◽  
pp. 116-133
Author(s):  
Joe Burton

AbstractThis article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts to intimidate through cyberspace, and the concept of ‘cyber swaggering’. The article moves on to explore how cyber-attacks have been used to undermine electoral process, to erode free and fair media reporting, and how manipulation of social media can constitute a ‘virtual infiltration’ and ‘virtual occupation’ of the information domain. The article then explores how cyber-attacks conducted during the conflict in Ukraine have limited or otherwise affected freedom of expression. I argue that the wider effects of cyber operations on political, civil and human rights have been underexplored in the cyber security literature; that cyber-attacks have adversely affected freedom of expression in the conflict in Ukraine and in other political disputes; and that the coercion concept is ill-suited to accounting for the socio-psychological impact of modern cyber operations.


Author(s):  
Joshua Ojo Nehinbe

Fake news and its impacts are serious threats to social media in recent time. Studies on the ontology of these problems reveal that serious cybercrimes such as character assassination, misinformation, and blackmailing that some people intentionally perpetrate through social networks significantly correlate with fake news. Consequently, some classical studies on social anthropology have profiled the problems and motives of perpetrators of fake news on political, rivalry, and religious issues in contemporary society. However, this classification is restrictive and statistically defective in dealing with cyber security, forensic problems, and investigation of social dynamics on social media. This chapter exhaustively discusses the above issues and identifies solutions to challenges confronting research community in the above domain. Thematic analysis of responses of certain respondents reveal three new classifications of fake news that people propagate on social media on the basis of mode of propagation, motives of perpetrators, and impacts on victims.


Author(s):  
Deepanjali Mishra ◽  
Chen Hong ◽  
Lee Hui Kueh ◽  
Ahmed Al-Absi ◽  
Mangal Sain
Keyword(s):  

Author(s):  
Hiep Cong Pham ◽  
Irfan Ulhaq ◽  
Minh Nguyen ◽  
Mathews Nkhoma

In a networked global economy, cyber security threats have accelerated at an enormous rate. The security infrastructure at organisational and national levels are often ineffective against these threats. As a result, academics have focused their research on information security risks and technical perspectives to enhance human-related security measures. To further extend this trend of research, this study examines the effects of three knowledge sharing methods on user security practices: security training, social media communication, and local security experts (non-IT staff). The study adopts a phenomenological method employing in-depth focus group interviews with 30 participants from eight organisations located in Ho Chi Minh city, Vietnam. The study expands on understanding factors contributing to self-efficacy and security practice through various knowledge sharing channels. Current methods of periodical training and broadcast emails were found to be less effective in encouraging participants to develop security self-efficacy and were often ignored. Security knowledge sharing through social media and local experts were identified as supplementary methods in maintaining employees’ security awareness. In particular, social media is suggested as a preferred channel for disseminating urgent security alerts and seeking peer advice. Local security experts are praised for providing timely and contextualised security advice where member trust is needed. This study suggests that provisions of contemporary channels for security information and knowledge sharing between organisations and employees can gain regular attention from employees, hence leading to more effective security practices.


Author(s):  
Maurice Dawson ◽  
Marwan Omar ◽  
Jonathan Abramson ◽  
Brian Leonard ◽  
Dustin Bessette

The threat of cyber terrorism has become a reality with recent attacks such as Stuxtnet, Flame, Sony Pictures, and North Korea's websites. As the Internet of Things (IoT) continues to become more hyperconnected it will be imperative that cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, embedded systems, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security related threats with the use of social media, mobile devices, virtual worlds, augmented reality, and mixed reality.


Sign in / Sign up

Export Citation Format

Share Document