Open Access Open Access  Restricted Access Subscription Access

Design and Implementation of Privacy and Security System in Social Media


Affiliations
1 Research Scholar, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, India
2 Professor, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, India
3 Ex-Professor, Department of Information Technology, VIPS, New Delhi, India
 

Privacy and security are the main concern of any social media networking sites such as Facebook, Twitter Instagram and LinkedIn etc. The primary purpose of these sites is to allow people to share interests, activities, real-life connections. Nowadays social networking sites are the main source of communication and on the other hand these sites are the peak targets for misusing the data and information. This is the fact that the maximum numbers of users are not aware about cyber threats and their lack of knowledge leads to further increase in cyber-crimes is a major challenge. Users should aware in the concerned of security and privacy during creating the account on social media, to read the instruction and follow it. There is some setting in social media platform to secure the message and share to only authorize users. Various governments and businesses are taking a variety of steps to combat cybercrime. Despite many steps, cyber security remains a major issue for many people. This paper focuses on the issues that cyber security faces in the modern era. It also covers the most up-to-date information on cyber security tactics, ethics, and trends that are transforming the face of cyber security.

Keywords

Data privacy, cyber security, cyber crime, cyber ethics, social media, cloud computing.
User
Notifications
Font Size

  • Aimeur, E., Gambs, S., & Ho, A. (2010). Towards a Privacy-Enhanced Social Networking Site. International Conference on Availability, Reliability and Security. pp. 172-179
  • Labs, V. (2014). Majority of Global 2000 Organizations Have Not Remediated Heartbleed, Remain Vulnerable to Cyber Attacks. Venafi Labs Q3 Heartbleed Threat Research Analysis.
  • Walker, D. (2014). Experts take inventory of Sony Pictures data leak, potential costs. Available at: http://www.scmagazine.com/experts-takeinventoryof-sony-pictures-data-leak-potentialcosts/ article/386991/
  • Kitchenham, B. (2004). Procedures for performing systematic reviews. Joint Technical Report, 33(2004), pp. 1-26.
  • Das, Rituparna, and Mayank Patel. "Cyber Security for Social Networking Sites: Issues, Challenges And Solutions." International Journal for Research in Applied Science & Engineering Technology (IJRASET) 5.4,833-838 (2017).
  • Jang-Jaccard, Julian, and Surya Nepal. "A survey of emerging threats in cybersecurity." Journal of Computer and System Sciences 80.5 (2014): 973993.
  • Jabee, Roshan, and M. Afshar Alam. "Issues and challenges of cyber security for social networking sites (Facebook)." International Journal of Computer Applications 144.3 (2016): 36-40.
  • Soumya, T. R., and S. Revathy. "Survey on threats in online social media." 2018 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2018.
  • El Mrabet, Z., Kaabouch, N., El Ghazi, H., & El Ghazi, H. (2018). “Cyber-security in smart grid: Survey and challenges.” Computers & Electrical Engineering, 67, 469-482.
  • Senthilkumar, K., &Easwaramoorthy, S. (2017, November). “A Survey on Cyber Security awareness among college students in Tamil Nadu.” In IOP Conference Series Materials Science and Engineering (Vol. 263).
  • Kirichenko, L., Radivilova, T., & Carlsson, A. (2018). “Detecting cyber threats through social network analysis: short survey. “ arXiv preprint arXiv:1805.06680.
  • Kayes, I., &Iamnitchi, A. (2017). “Privacy and security in online social networks: A survey.” Online Social Networks and Media, 3, 1-21.
  • Fire, M., Goldschmidt, R., &Elovici, Y. (2014). “Online social networks: threats and solutions.” IEEE Communications Surveys & Tutorials, 16(4), 2019-2036.
  • Albladi, S. M., & Weir, G. R. (2020). “Predicting individuals’ vulnerability to social engineering in social networks.” Cyber security, 3(1), 1-19.
  • Senthil Kumar, N., Saravanakumar, K., & Deepa, K. (2016).” On privacy and security in social media–a comprehensive study.” Procedia Computer Science, 78, 114-119.
  • Gharibi, Wajeb, and MahaShaabi. "Cyber threats in social networking websites." arXiv preprint arXiv:1202.2420 (2012).
  • Kumar, Sunil, and Vikash Somani. "Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques." International Journal of Advance Research in Computer Science and Management 4.4 (2018): 125-129.
  • Al Mushayt, Omar Saeed. "Threats and antithreats strategies for social networking websites." International Journal of Computer Networks & Communications (IJCNC) Vol 5 (2013).
  • Canongia, Claudia, and Raphael Mandarino. "Cyber security: The new challenge of the information society." Handbook of Research on Business Social Networking: Organizational, Managerial, and Technological Dimensions. IGI Global, 2012. 165-184.
  • Zanero, S, D Keromytis , “ Security and privacy measurements in social networks”. Available:http://nsl.cs.columbia.edu/papers/2014/l essons.badgers14.pdf [Accessed: 25 July 2016]D Gunter , Solomon S, “The Danger of Data Exfiltration over Social Media Sites” , Western International University, Available: https://media.blackhat.com/bh-us-12/Briefings/Gunter/BH_US_12_Gunter_Sonya_S
  • NSCat_WP.pdf [Accessed: 19 July 2016
  • http://www.cybercitizenship.org/ethics/.

Abstract Views: 182

PDF Views: 0




  • Design and Implementation of Privacy and Security System in Social Media

Abstract Views: 182  |  PDF Views: 0

Authors

Ramesh Kumar
Research Scholar, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, India
Parveen Kumar
Professor, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, India
Vinay Kumar
Ex-Professor, Department of Information Technology, VIPS, New Delhi, India

Abstract


Privacy and security are the main concern of any social media networking sites such as Facebook, Twitter Instagram and LinkedIn etc. The primary purpose of these sites is to allow people to share interests, activities, real-life connections. Nowadays social networking sites are the main source of communication and on the other hand these sites are the peak targets for misusing the data and information. This is the fact that the maximum numbers of users are not aware about cyber threats and their lack of knowledge leads to further increase in cyber-crimes is a major challenge. Users should aware in the concerned of security and privacy during creating the account on social media, to read the instruction and follow it. There is some setting in social media platform to secure the message and share to only authorize users. Various governments and businesses are taking a variety of steps to combat cybercrime. Despite many steps, cyber security remains a major issue for many people. This paper focuses on the issues that cyber security faces in the modern era. It also covers the most up-to-date information on cyber security tactics, ethics, and trends that are transforming the face of cyber security.

Keywords


Data privacy, cyber security, cyber crime, cyber ethics, social media, cloud computing.

References