Social and privacy threats in social networks, challenges and the most critical issues
Keywords:
social network, threat, privacy, architecture, securityAbstract
Online social networks are permeating every aspect of our daily lives. With their incomparable popularity, social networks have evolved from platforms for news distribution and communication and social interaction to essential tools for online content distribution, professional networking, social recommendations, marketing, and more. Due to their heterogeneous nature and complexity, there are many technical and social challenges that need to be addressed. Specifically, security and privacy are among the most critical issues in online social networks. This paper identifies the characteristic features of social networks and the impact they have on their users. The main objective is to contribute to the discussion about privacy and security by identifying potential threats and challenges in this dimension of cyberspace.
Downloads
References
"How Secure is Social Media Really?," DIGITAL INFORMATION WORLD, 2018. [Online]. Available: https://www.digitalinformationworld.com/2018/09/how-secure-is-social-media-really.html. [Accessed 17 May 2022].
"Key Social Media Privacy Issues for 2020," 2020. [Online]. Available: https://sopa.tulane.edu/blog/key-social-media-privacy-issues-2020. [Accessed May 2022].
"Preventing XSS with Content Security Policy," MST Solutions, 2021. [Online]. Available: https://www.mstsolutions.com/technical/preventing-xss-with-%E2%80%8Bcontent-security-policy/. [Accessed 10 May 2022].
"Security Weak Points: Social Media," 9 Nov. 2017. [Online]. Available: https://www.n-able.com/blog/security-weak-points-social-media. [Accessed 28 May 2022].
"Social Media Security Threats," December 2015. [Online]. Available: https://en.paperblog.com/social-media-security-threats-infographic-1369843/. [Accessed May 2022].
"Synopsys- Clickjacking," [Online]. Available: https://www.synopsys.com/glossary/what-is-clickjacking.html#:~:text=Clickjacking%20is%20an%20attack%20that,describes%20what%20is%20going%20on. [Accessed 2022].
"The Emerging Need for Social Media Security, KING University," 11 September 2018. [Online]. Available: https://online.king.edu/news/social-media-security/. [Accessed 2022].
A. Barkworth, L. McDonald, S. Khosravi, MIU Haq and AhmedAbueletta, Security and Privacy in Online Social Networks, 2021.
A. Hoxha, MEDIA LANDSCAPE IN KOSOVO, SEENPM, Tirana, Peace Institute, Ljubljana and Kosovo 2.0, Prishtina, 2020.
AK Jain, SR Sahoo and J. Kaubiyal, "Online social networks security and privacy: comprehensive review," in Complex & Intelligent Systems , 2021.
C. Zhang, J. Sun, X. Zhu and Y. Fang, "Privacy and Security for Online Social: Challenges and Opportunities," [Online]. Available: http://www.diit.unict.it/users/spalazzo/materiale/05510913.pdf. [Accessed 2022].
G.-J. Ahn, M. Shehab and A. Squicciarini, Security and Privacy in Social Networks, IEEE Internet Computing, 2011.
M. Salama, M. Panda, Y. Elbarawy, AE Hassanien and a. A. Abraham, Computational Social Networks: Security and Privacy, Series in Computer Communications and Networks, 2012.
Mr. e. K. pt D. e. Information, "PRIVACY AND SECURITY OF PERSONAL DATA," 2016. [Online]. Available: https://www.idp.al/wp-content/uploads/2017/02/Studimi_privatesia_dhe_siguria_e_te_dhenave_botim_2016.pdf. [Accessed May 2022].
NS Kumar, K. Saravanakumar and K. Deepa, "On Privacy and Security in Social Media – A Comprehensive Study," in International Conference on Information Security & Privacy , India, 2016.
Social media and their use by Albanian media, Albanian Media Institute, 2015.
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.