Improving Security and Privacy on Social Networks
Autor: mware • March 2, 2016 • Research Paper • 587 Words (3 Pages) • 1,050 Views
Improving Security and Privacy in Social Networks
Name
Institution
Improving Security and Privacy in Social Networks
Purpose of the Research
Security on social networks is a primary concern due to the recent cases of cyber crime and online intimidation by other social network users. The increases in the number of social network sites in the recent years have come with increased security and privacy concerns. This research, therefore, will explore the various existing social networks and the methods they use to ensure secure usage and privacy are maximized. The research will also examine the different ways in which these social sites can use to improve their security and privacy of the users. The main purpose of this research is to examine the various methods of security and privacy used by the existing social networks and find out the best ways we can improve security and privacy in the social networks.
Research Problem
The recent reports showed that the rate of cyber crime has gone up in the last decade with most of them contributed by the social networks. Cybercrime and cyber-bullying are common among social network users, and this has lead to many problems ranging from homicide and suicide cases especially in the United States and other countries across the world. The report also indicated that inadequate security and privacy methods used by the social networks to keep the user’s personal information are the primary cause of this problem. This research will examine the various security and privacy systems used by these social networks and identify the loophole in these systems that make them inefficient. The research will offer recommendations on the best methods to be adopted by the media social users to improve their security and privacy. This research is also expected to identify some of the social network user’s behaviors that make them vulnerable to an online security breach and give a recommendation of the best practices that will keep them safe from information theft.
...