Addressing Social Media Security and Privacy Challenges

Author(s):  
Rebecca Herold
2020 ◽  
Author(s):  
Ella Forgie ◽  
Hollis Lai ◽  
Bo Cao ◽  
Eleni Stroulia ◽  
Andrew James Greenshaw ◽  
...  

UNSTRUCTURED As many as 80% of internet users seek health information online. The social determinants of health (SDoH) are intimately related to who has access to the internet and healthcare as a whole. Those who face more barriers to care are more likely to benefit from accessing health information online, granted the information they are retrieving is accurate. Virtual communities on social media platforms are particularly interesting as venues for seeking health information online because peers have been shown to influence health behaviour more than almost anything else. Thus, it is important to recognize the potential of social media to have positive mediation effects on health, so long as any negative mediation effects are reconcilable. As a positive mediator of health, social media can be used as a direct or indirect mode of communication between physicians and patients, a venue for health promotion and health information, and a community support network. False or misleading content, social contagion, confirmation bias, and security and privacy concerns must be mitigated in order to realize full potential of social media as a positive mediator of health. In any case, it is clear that the intersections between the SDoH, social media, and health are intimate, and they must be taken into consideration by physicians. Here, we argue that a paradigm shift in the physician-patient relationship is warranted, one where physicians: a) acknowledge the impacts of the SDoH on information-seeking behaviour, b) recognize the positive and negative roles of social media as a mediator of health through the lens of the SDoH, and c) use social media to catalyze positive changes in the standard of care.


Author(s):  
Dr. J. Padmavathi ◽  
Sirvi Ashok Kumar Mohanlal

Today Social Media is an integral part of many people’s lives. Most of us are users of one or many of these such as Facebook, Twitter, Instagram, LinkedIn etc. Social media networks are the most common platform to communicate with our friends, family and share thoughts, photos, videos and lots of other information in the common area of interest. Privacy has become an important concern in social networking sites. Users are not aware of the privacy risks involved on social media sites and they share their sensitive information on social network sites. While these platforms are free and offer unrestricted access to their services, they puzzle the users with many issues such as privacy, security, data harvesting, content censorship, leaking personal information etc. This paper aims at analyzing, the major users of social media networks, namely, the college students. It was intended to assess the extent the consumers’ are aware of the risks of free usage and how to mitigate against these privacy issues.


2016 ◽  
Vol 3 (4) ◽  
pp. 1-20 ◽  
Author(s):  
Geetika Sarna ◽  
M.P.S. Bhatia

Users on the social media can share positive as well as negative information intentionally and unintentionally in the form of multimedia content without knowing its impact on other user, which threatens the security and privacy of social media. Cyberbullying is one of the risks associated with social media. Cyberbullying is an aggressive act carried out intentionally against the victim by posting harmful material on social media to harm his/her reputation. Aggressive act creates depression, anxiety in users which may lead to diversion of attention and sometimes suicidal actions. In this paper the authors have included a survey on recent algorithms which work on detection of cyberbullying. State-of-the-art studies only focus on the detection of cyberbullying but not on the preventive measures against cyberbullying. In order to tackle this problem, the authors showed how the severity of the bullying in messages helps to find the real culprit.


Author(s):  
Venetis Kanakaris ◽  
Georgios Lampropoulos ◽  
Kerstin Siakas

Nowadays, social media and social networks are increasingly used in business as they have drastically changed the way the community works, communicates, collaborates, socialises, creates content and shares knowledge and ideas. However, in particular, IT professionals and practitioners need to be aware of online security and privacy issues and the potential negative impact that they may cause on different aspects of business, such as online breaches or information theft. The use of social media inevitably leads to disclosure of personal information, with the use of open-source intelligence (OSINT) and other similar techniques. Hence, the aim of this article is twofold, namely first to show results of a survey towards future Greek IT practitioners regarding awareness and viewpoints of social media users concerning security and privacy on social media. More specifically the study was based on responses and viewpoints of 178 Greek electrical engineering and IT students to an online questionnaire. Secondly, the aim is also to show how easily a potential malicious user can anonymously track and retrieve sensitive personal information in an automated and undetectable way from popular social media platforms by using publicly available information, resources, and tools. The results of the survey show that most of the respondents are aware of the privacy settings of the social media platforms they use. However, they consider that they should be more careful concerning personal data and whom they add as friends or followers and they do not feel comfortable with the fact that a stranger might be able to access their personal information through their publications on social media platforms.The case study indicates that it is possible for malicious users to acquire sensitive personal data (e.g. user's location via tweets and instas from smartphones). In addition, the ability to map activity could allow malicious users to track the activities of unsuspected users and predict their future locations.


Author(s):  
Mohammad Tariq Banday

Social media has enormous prospectus to expand the usage of Internet and to realize full benefits of e-Governance by promoting, intensifying, improving and monitoring its offered services at reduced costs, increasing citizen usage of e-Services and e-Participation, posting job advertisements, announcing and marketing events, and seeking public feedback, opinion, cooperation and collaborate across its geographically diverse citizens and thus increase transparency and trust on government. However, at the same time using social media in e-Governance may impose diverse challenges which unless are not adequately addressed to, may hamper its successful integration with e-Governance. This chapter highlights the prospectus of social media and its current usage in e-Governance in India. It discusses the potential issues especially issues related to security and privacy of individuals, employees, infrastructure and data that may limit its benefits in e-Governance. It examines and compares social media policy of government of India with similar guidelines of some other nations in terms of employee's access, account management, acceptable use, employee conduct, content, security, legal issues and citizen conduct besides discussing emerging mobility and mobile social media policy of government of India and enumerates their merits, demerits and scope for further improvements.


2016 ◽  
pp. 666-689 ◽  
Author(s):  
Mohammad Tariq Banday

Social media has enormous prospectus to expand the usage of Internet and to realize full benefits of e-Governance by promoting, intensifying, improving and monitoring its offered services at reduced costs, increasing citizen usage of e-Services and e-Participation, posting job advertisements, announcing and marketing events, and seeking public feedback, opinion, cooperation and collaborate across its geographically diverse citizens and thus increase transparency and trust on government. However, at the same time using social media in e-Governance may impose diverse challenges which unless are not adequately addressed to, may hamper its successful integration with e-Governance. This chapter highlights the prospectus of social media and its current usage in e-Governance in India. It discusses the potential issues especially issues related to security and privacy of individuals, employees, infrastructure and data that may limit its benefits in e-Governance. It examines and compares social media policy of government of India with similar guidelines of some other nations in terms of employee's access, account management, acceptable use, employee conduct, content, security, legal issues and citizen conduct besides discussing emerging mobility and mobile social media policy of government of India and enumerates their merits, demerits and scope for further improvements.


2016 ◽  
pp. 160-181
Author(s):  
Geetika Sarna ◽  
M.P.S. Bhatia

Users on the social media can share positive as well as negative information intentionally and unintentionally in the form of multimedia content without knowing its impact on other user, which threatens the security and privacy of social media. Cyberbullying is one of the risks associated with social media. Cyberbullying is an aggressive act carried out intentionally against the victim by posting harmful material on social media to harm his/her reputation. Aggressive act creates depression, anxiety in users which may lead to diversion of attention and sometimes suicidal actions. In this paper the authors have included a survey on recent algorithms which work on detection of cyberbullying. State-of-the-art studies only focus on the detection of cyberbullying but not on the preventive measures against cyberbullying. In order to tackle this problem, the authors showed how the severity of the bullying in messages helps to find the real culprit.


Author(s):  
Yan Chen ◽  
Dennis F. Galletta ◽  
Paul Benjamin Lowry ◽  
Xin (Robert) Luo ◽  
Gregory D. Moody ◽  
...  

A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unable to address the threat and, feeling overwhelmed, focus only on controlling their emotions, merely making themselves feel better. Based on our findings, organizations can enhance their security by understanding the “tipping point” where employees’ focus likely changes from problem-solving to emotion appeasement, and instead push them into a more constructive direction.Yan Chen is an associate professor at Florida International University. She received her PhD in management information systems from University of Wisconsin–Milwaukee. Her research focuses on information security management, online fraud, privacy, and social media. She has published more than 30 research papers in refereed academic journals and conference proceedings.Dennis F. Galletta is a LEO awardee, fellow, and former president of the Association for Information Systems and professor at University of Pittsburgh since 1985. He has published 108 articles and four books. He is a senior editor at MIS Quarterly and an editorial board member at the Journal of Management Information Systems, and has been on several other boards.Paul Benjamin Lowry is the Suzanne Parker Thornhill Chair Professor in Business Information Technology at the Pamplin College of Business at Virginia Tech. He has published more than 135 journal articles. His research areas include organizational and behavioral security and privacy; online deviance and harassment, and computer ethics; human–computer interaction, social media, and gamification; and decision sciences, innovation, and supply chains.Xin (Robert) Luo is Endowed Regent’s Professor and full professor of MIS at the University of New Mexico. His research has appeared in leading information systems journals, and he serves as an associate editor for the Journal of the Association for Information Systems, Decision Sciences Journal, Information & Management, Electronic Commerce Research, and the Journal of Electronic Commerce Research.Gregory D. Moody is currently Lee Professor of Information Systems at the University of Nevada Las Vegas, and director of the cybersecurity graduate program. His interests include information systems security and privacy, e-business, and human–computer interaction. He is currently a senior editor for the Information Systems Journal and Transactions on Human-Computer Interaction.Robert Willison is a professor of management at Xi’an Jiaotong–Liverpool University. He received his PhD in information systems from the London School of Economics. His research focuses on insider computer abuse, information security policy compliance/noncompliance, software piracy, and cyber-loafing. His research has appeared in refereed academic journals such as MIS Quarterly, Journal of the Association for Information Systems, Information Systems Journal, and others.


Sign in / Sign up

Export Citation Format

Share Document