Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Identity Management in Online Social Networks
Social networking and privacy
Social networking and privacy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Identity Management in Online Social Networks
With the fast evolving social network technology, the anonymity network identity will ensure that the privacy of the MUs exists. The implementation of this system can help eliminate all the security and privacy problems affecting MSNs at the moment. This is because the network identity of the device plays a major role in establishing connections between devices. If the internet servers adopt this system, the security and privacy concerns in MSNs will be a problem of the past.
ComScore reports that social networking takes up about 84% of the internet users in the world. The major sites associated with these statistics include Twitter, Facebook and WhatsApp among others. The percentage takes up about 1.3 billion of all internet users. The technological advancements in networking have made it possible for Smart phones and other handsets to access the internet. Users around the world are now able to share up to date information and data in real time. The connection provided by social networks and smart phones gives the users a reliable communications platform for easy sharing of information (Liang et al., "Efficient and Secure Protocol” 175).
Smart phones play an important role in the field of social networking as they run applications that utilize various platforms to connect users. As a result, there is an increase in the number of smart phone applications that use the internet. The applications are divided into three broad categories among them being the smart phones with online social applications (OSAs). They establish a link between the mobile users (MUs) and internet service providers (ISPs). The MUs trust the ISPs; consequently, privacy and security of the former is covered by the latter. The second group comprises the positi...
... middle of paper ...
...rks: Challenges and Solutions." IEEE Wireless Communications 21.1 (2014): 33-41. Print.
Liang, Xiaohui, Zhenfu Cao, Rongxing Lu, and Liuquan Qin. "Efficient and Secure Protocol in Fair Document Exchange." Computer Standards & Interfaces 30.3 (2008): 167-176. Print.
Najaflou, Yashar, Behrouz Jedari, Feng Xia, Laurence T. Yang, and Mohammad S. Obaidat. "Safety Challenges and Solutions in Mobile Social Networks." IEEE Systems Journal PP.99 (2013): 1-21. Print.
Sapuppo, Antonio. "Privacy Analysis in Mobile Social Networks: The Influential Factors for Disclosure of Personal Data." International Journal of Wireless and Mobile Computing 5.4 (2012): 315-326. Print.
Zhang, Kuan, Xiaohui Liang, Xuemin Shen, and Rongxing Lu. "Exploiting Multimedia Services In Mobile Social Networks From Security And Privacy Perspectives." IEEE Communications Magazine 52.3 (2014): 58-65. Print.
The issue on privacy is extremely controversial in today’s world. As the United States’ use of the internet, a global web of interconnected computer networks, expands, so does its problem with privacy invasion. With the U.S. pushing for new laws governing internet use, citizens are finding their privacy being pulled right from underneath them. Web users are buying and selling personal information online as well as hacking users for more information. One may argue that there is no such thing as privacy on the internet, but privacy is a right among Americans, and should be treated as such.
Social medias have become a big part of our society now, they are being used in all aspects of our life. We are connected twenty-four hours a day, at work, school, home, shopping etc. There is a necessity, a need to be connected to these social media’s, to feel like you are a part of society. With these growing numbers in being connected to social media’s on the web, there comes a growing desire for privacy and safety. In this paper I will discuss and analyze the social media’s themselves, the dangers that arise from them, and how all these correlate to privacy.
Social Networking sites play an essential role in today’s culture as they provide people with the ability to interact, blog, share pictures and videos, flirt, and date without having to move an inch. People pour their minds and hearts into the world of cyber communication; it is an easier way for them to clear their heads without having a face-to-face confrontation. Undoubtedly, this is advantageous to certain people. It helps establish connections with people, friends and family from any corner of the world, but one cannot ignore the extensive privacy breach that occurs in the universe of online social media.
Sephton, Guy. "Social Networks Are An Invasion of Privacy." The Daily Touch RSS. N.p., 27 Oct. 2012. Web. 22 Apr. 2014.
Mitrano, T. (2006, April). CIT: Thoughts on Facebook. CIT: Computing at Cornell. Retrieved June 6, 2011, from http://www.cit.cornell.edu/policies/socialnetworking/facebook.cfm
This paper describes the basic threats to the network security and the basic issues of interest for designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers
In this era when the Internet provides essential communication between tens of millions of people and is being increasingly used as a tool for security becomes a tremendously important issue to deal with, So it is important to deal with it. There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. Cryptography is the science of writing in secret code and is an ancient art; In the old age people use to send encoded message which can be understand by the receiver only who know the symbolic and relative meaning of that encoded message .The first documented use of cryptography in writing dates back to circa 1900 B.C. Egyptian scribe used non-standard hieroglyphs in an inscription. After writing was invented cryptography appeared spontaneously with applications ranging from diplomatic missives to war-time battle plans. It is no surprise, then, that new forms of cryptography came soon after the widespread development of computer communications. In telecommunications and data cryptography is necessary when communicating in any untrusted medium, which includes any network, particularly the Internet [1].Within the context of any application-to-application communication, there are some security requirements, including:
The Popularity of Social Networking Sites In recent years, social networking sites have rapidly gained popularity among people of all ages. A large number of people have registered and become members of some social networking sites, such as Facebook, Twitter, and WeChat. Also, people spend a lot of time on these sites chatting, playing games, and making friends. Social networking sites have become a part of people’s lives.
Today technology has created new styles of communication on the internet for us all. This technology has made great impact on everyday life in today’s society. Cyber communications have become hugely popular in the last decade, especially those websites that help people to find new or old friends, keep in touch with families, and even help people to find potential dates! The numbers of people using cyber social networking are growing in millions every year. Cyber social networks have helped people link to each other with common interests, and expand personal ideas and support worldwide. But people are getting too friendly with this technology. Dangers are slowly appearing, and there still have a lot of hidden threats. Cyber social networks are threats to our personal social lives, lead into new addictions, and compromise the security of privacy issues.
Many social networks will tell you that the more you put into them (your information), the more you get out of them (connections, recommendations, etc.). However, despite the aura of privacy they try to engender, one must keep in mind that social network takes place in essentially public space, with only the barest of mechanisms providing any semblance of privacy. Even seemingly innocuous data shared with the world can be dangerous in the wrong hands.
Social networks are now widespread in our world; with existing social networks expanding, social networking sites are being created for educators, medical professionals all accessible 24 hours a day via computer, tablet, smart phone, and Internet-enabled devices. Challengers of social networking say that the sites prevent face-to-face communication, waste time on frivolous activity and spread false and potentially dangerous information. Social networks have become a substantial part of our modern civilization. It is a defining trait of how integrated our social interactions have become. Social networks have become an important source of news.
Today internet privacy has become a major issue in day to day life with the introduction of social media. Personal information like photos, videos should be maintained securely in social media accounts. Moreover, internet surfing has become dangerous with the hackers. Information in websites can be hack if the necessary steps are not taken thus privacy of data will not ensure.
Technology has advanced tremendously over the past decade, and appears to be advancing at a rapid pace each and every day. The social media is growing just as rapidly. Social media is an interaction between individuals that want to exchange information, photographs, and ideas in different types of networks. Social media users include people of all ages. These people have various experiences, have different cultures, and have various technical skills. (Brandtzaeg 1008) The social media depend on net-based technologies to generate the network for users to share. Social media includes everything that has to do with the Internet. By using the Internet, users can communicate with people locally and worldwide. People are no longer required to travel across the world to experience another culture. This can be done with social networking. The types of social media today come with many different types of communication such as social blogs, wall-postings, songs, photographs, and podcasts. The communication between users is informational, interactive, and also educational. However, unfortunately, most social networking sites keep track of all the interactions that take place, and this is a concern about Internet privacy for Facebook, Twitter, Google, and other social media users. Not only do they keep track of all interactions by the users, they also own all the content, including pictures that the users upload. The social network keeps this information on the user, even if the user deactivates their account with that particular site. Most users do not have any idea that the operator of the networking service keeps this information, and has access to all pictures and tags. By not having adequate security...
Nowadays, we are living in the “ technology world”, digital’s century, science and technology are being devolopped like a rain-storm, people try their best effect to serve for human’s infiniti demand. Internet in general and social network in particular are exceedingly funtional tools. Indeed, with over 1.3 billion active users in June,2014 ( Wikipedia), there is no suprise that Facebook has been becoming a leading social network in the world, “Facebook was not originally created to be a company. It was built to accomplish a social mission - to make the world more open and connected” – CEO of Facebook: Mark Zuckerberg (google). Facebook truthly brought many useful; however, it is still “ a double-edged sword”.
Internet has become a vital element in people daily lifestyles. People use smart phones, tablets, laptops or computers to access Internet. By the first decade of the 21st century, many Internet users use faster broadband Internet access technologies. As the Internet users grow, one of the Internet phenomenons that can be seen is social networking. Basically, people use social media to interact among people where they create, share or exchange information in virtual communities and networks.