Cyber Security and Privacy in the Age of Social Networks

Author(s):  
Babar Bhatti

Social media is transforming the way we find, create, and share information during the course of our personal life and work. The rapid growth of social media and the ubiquitous sharing and access of information through various digital channels has created new vulnerabilities and cyber threats. This chapter will provide an overview of the security and privacy implications of social networks and communities. The goal of this chapter is to examine and raise awareness about cyber security threats from social media, to describe the state of technology to mitigate security risks introduced by social networks, to shed light on standards for identity and information sharing or lack thereof, and to present new research and development. The chapter will serve as a reference to students, researchers, practitioners, and consultants in the area of social media, cyber security, and Information and Communication technologies (ICT).

Cyber Crime ◽  
2013 ◽  
pp. 1711-1727
Author(s):  
Babar Bhatti

Social media is transforming the way we find, create, and share information during the course of our personal life and work. The rapid growth of social media and the ubiquitous sharing and access of information through various digital channels has created new vulnerabilities and cyber threats. This chapter will provide an overview of the security and privacy implications of social networks and communities. The goal of this chapter is to examine and raise awareness about cyber security threats from social media, to describe the state of technology to mitigate security risks introduced by social networks, to shed light on standards for identity and information sharing or lack thereof, and to present new research and development. The chapter will serve as a reference to students, researchers, practitioners, and consultants in the area of social media, cyber security, and Information and Communication technologies (ICT).


2022 ◽  
pp. 46-64
Author(s):  
Elina Ahmadi

With the advent and widespread use of information and communication technologies, the need for information has become part of the daily work of individuals. Recently, social networks are one of the most important topics in cyberspace. This study seeks to identify and rank the opportunities and threats of social media for the society. Three hundred seventy students active in social networks are selected by clustering sampling method. A conceptual model is developed based on the review of theoretical literature and five opportunities of social network including electronic learning, filling leisure time, organizing social groups, getting to know about diverse cultures, possibility of conversation, as well as five threats include sharing anti values, abusing, dissemination of misinformation, internet addiction, and malacious communication have significant effect on the students.


2021 ◽  
pp. 21-33
Author(s):  
O. Y. Zhukovskaya

The goal of the article is to analyze the new aspects of accumulation and usage, as well as the opportunities for growth of an important determinant of well-being – social capital – in connection with the active development of social networks under the conditions of digitalization and current social and economic situation. The interconnections as well as the development of social capital, social media and social networks in the context of the digital divide concept were investigated. It was suggested to distinguish digital social capital taking into account different sources and effects of this social and economic phenomenon. In addition, the econometric analysis of social capital, various social and economic indicators, as well as online activity was conducted. Based on the quantitative and qualitative aspects of modern social capital, social media and social networks, information and communication technologies (hereafter – ICT) were analysed, considering the dual nature of the Internet as well as digitalization.


Author(s):  
Tomas Brusell

When modern technology permeates every corner of life, there are ignited more and more hopes among the disabled to be compensated for the loss of mobility and participation in normal life, and with Information and Communication Technologies (ICT), Exoskeleton Technologies and truly hands free technologies (HMI), it's possible for the disabled to be included in the social and pedagogic spheres, especially via computers and smartphones with social media apps and digital instruments for Augmented Reality (AR) .In this paper a nouvel HMI technology is presented with relevance for the inclusion of disabled in every day life with specific focus on the future development of "smart cities" and "smart homes".


2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


2018 ◽  
Vol 50 ◽  
pp. 01144
Author(s):  
Liudmila Reshetnikova

The article is devoted to e-diplomacy (also known as digital diplomacy) which is a component of public diplomacy. Digital diplomacy is a one of the new tools of foreign policy that is aimed to solve the problems of international and interethnic relations. The article examines the concept and definition of digital diplomacy that concentrates on the use of social networks and digital media in the field of foreign policy. Some risks and threats of e-diplomacy are also considered. The use of opportunities of information and communication technologies for solving the problems of foreign policy and influence on mass consciousness by means of the Internet, social networks is analyzed.


Author(s):  
Latinka Ivanova Todoranova ◽  
Radka Valerieva Nacheva ◽  
Vladimir Stoyanov Sulov ◽  
Bonimir Penchev Penchev

Mobile learning can be identified as the next stage in the development of e-learning. In this regard, <strong>the purpose of this paper</strong> is to propose a model for mobile learning integration in higher education which is based on analysis of students’ expectations. То achieve this goal, a survey has been conducted among students enrolled in programs in the field of information and communication technologies. The analysis of the collected data shows that students have mobile devices, which they use not only for communication on social networks, but also for education. In addition, their expectations regarding mobile learning have been identified taking into account their study program and their previous experience with an e-learning platform.


Author(s):  
Wojciech Dudek ◽  
Wojciech Szynkiewicz

A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.


Author(s):  
Encarnación Soriano-Ayala ◽  
Adán Hermosilla-Rivera ◽  
Verónica C. Cala ◽  
Rachida Dalouh

ABSTRACT This work addresses the risk that adolescents face when they misuse the Internet. The results of an investigation carried out with 206 adolescents about the use of Internet, cyberbullying and sexting are presented. The results showed that parents of adolescents are unaware of their children's use of social networks, girls practice sexting more than boys, and there are more boys who practice cyberbullying in the role of executioner, while girls star in it as the victim.RESUMENEste trabajo aborda el riesgo que corren los adolescentes cuando hacen un mal uso de Internet. Se exponen los resultados de una investigación llevada a cabo con 206 adolescentes en los que se analiza el uso de Internet, el ciber acoso (ciberbullying) y el sexting. En los resultados señalamos que los padres de los chicos y las chicas adolescentes desconocen el uso que hacen sus hijos de las redes sociales, las chicas practican más el sexting que los chicos en la adolescencia, siendo el sexting una nueva forma de sexismo impulsado por las tecnologías, y son más los chicos que practican el ciberbullying en el rol de verdugo, mientras que las chicas lo protagonizan desde el papel de víctima.


Sign in / Sign up

Export Citation Format

Share Document