Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2016 | 2(7) Obrona Terytorialna i jej rola we współczesnych systemach bezpieczeństwa | 381-389

Article title

SOCIAL MEDIA SECURITY RISKS AND COMMUNICATION SECURITY SYSTEMS

Content

Title variants

Languages of publication

PL EN

Abstracts

EN
The article reveals the idea that popularity of social networking sites has increased at astonishing levels. There is no arguing the usefulness of sites such as Facebook, Twitter and LinkedIn. They can be used for professional networking and job searches, as a means to increase sales revenue, as a tool to keep the public informed of safety and other issues or as a way to reconnect with friends from way-back-when. Social networking has changed the way we interact with friends and associates. While social networks, like Facebook, Twitter, YouTube, FourSquare, and Google+, play a significant role in our lives, they are also a high risk for security threats. With hundreds of millions of users online, these tools not only attract friends and family wanting to stay in touch, but they also attract people wanting to know about you for the wrong reasons. Be aware of the security threats currently out there to help you stay safe online. In Europe, concerns about privacy linked to security are particularly acute, as evidenced by proposals for a new cyber security directive that link privacy and security. The proposals aim to impose EU-wide reporting requirements on companies that run large databases, including social networking firms. Although the final wording of the directive remains to be seen, the proposals are a good indication of just how seriously European authorities view data security breaches

Contributors

References

  • Ayofe A. N., Irwin B., Cyber security: challenges and the way forward, “Computer Sciences and Telecommunications”, 2010, No. 6
  • Boyd D. M., Ellison N. B., Social network sites: Definition, history, and scholarship, “Journal of Computer Mediated Communication”, 2007, 13(1)
  • Pallis G., Zeinalipour-Yazti D., Dikaiakos M. D., Online Social Networks: Status and Trends. New Directions in Web Data Management 1, “Studies in Computational Intelligence”, Volume 331, 2011
  • Speer D. L., Redefining borders: the challenges of cybercrime, “Crime, Law and Social Change”, 2011, Т. 34, No. 3
  • Sternberg J. L., Misbehavior in cyber places: the regulation of online conduct in virtual communities on the Internet, Lanham 2012
  • Weizenbaum J., ELIZA – a Computer Program for the Study of Natural Language Communication Between Man and Machine, “Communications of the ACM”, 1966, Vol. 9, No. 1
  • 2013 Cisco Annual Security Report, <https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2013_ASR.pdf> (10.12.2016)

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-946a191a-cea2-4a6d-8034-4349caf44bef
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.