Cybersecurity Challenges in Social Media Erdal Ozkaya



Yüklə 1,17 Mb.
Pdf görüntüsü
səhifə68/73
tarix10.12.2023
ölçüsü1,17 Mb.
#139643
1   ...   65   66   67   68   69   70   71   72   73
13755 Zeebaree 2020 E R (1)

Facebook's new security settings speak a simple language

CNNMoney

Retrieved 21 February 2018, from 
http://money.cnn.com/2017/05/31/technology/facebook-new-security-settings-
page/index.html 
Lior, J. S. (2005). A social networks theory of privacy. The University of Chicago Law 
Review, 72(3), 919-988. Retrieved 23 February 2018, from 
https://search.proquest.com/docview/214807827 
Liptak, A. (2018). The WannaCry ransomware attack has spread to 150 countries. The Verge. 
Retrieved 14 February 2018, from 
https://www.theverge.com/2017/5/14/15637888/authorities-wannacry-ransomware-
attack-spread-150-countries 
Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011, November). Analyzing 
facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 
ACM SIGCOMM conference on Internet measurement conference (pp. 61-70). ACM. 
Locklear, M. (2018). 
Facebook clarifies its security settings to curb confusion

Engadget

Retrieved 21 February 2018, from https://www.engadget.com/2017/05/31/facebook-
clarifies-security-settings/ 
Loeffler, C. (2012). Privacy issues in social media. The IP Litigator : Devoted to Intellectual 
Property Litigation and Enforcement, 18(5), 12-18. Retrieved 1 February 2018, from 
http://search.proquest.com/docview/1082016549.
Luo, X., Brody, R., Seazzu, A., & Burd, S. (2011). Social engineering: The neglected human 
factor for information security management. Information Resources Management 


134 
Journal, 24(3), 1. Retrieved 5 January 2018, from 
https://search.proquest.com/docview/892604242.
Madden, M. (2016). Public Perceptions of Privacy and Security in the Post-Snowden Era. 
Pew Research Center: Internet, Science & Tech. Retrieved 3 November 2016, from 
http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/ 
Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M. 
(2013). Teens, social media, and privacy. Pew Research Center, 21, 2-86. 
Magno, G., Comarela, G., Saez-Trumper, D., Cha, M., & Almeida, V. (2012, November). 
New kid on the block: Exploring the google+ social graph. In Proceedings of the 2012 
ACM conference on Internet measurement conference (pp. 159-170). ACM. 
Malik, A., Hiekkanen, K., Dhir, A., & Nieminen, M. (2016). Impact of privacy, trust and user 
activity on intentions to share facebook photos. Journal of Information, 
Communication & Ethics in Society, 14(4), 364-382. Retrieved 13 December 2017, 
from https://search.proquest.com/docview/1844292056. 
Martin, K. (2016). Understanding privacy online: Development of a social contract approach 
to privacy.
 Journal of Business Ethics, 137
(3), 551-569. 
http://dx.doi.org/10.1007/s10551-015-2565-9
Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why 
consumers read (or don't read) online privacy notices. Journal of Interactive 
Marketing, 18(3), 15-29. 
Mital, M., & Sarkar, S. (2011). Multihoming behavior of users in social networking web 
sites: A theoretical model. Information Technology & People, 24(4), 378-392. 
http://dx.doi.org/10.1108/09593841111182250


135 
Mouton, Francois & Leenen, Louise & Venter, H.s. (2016). Social engineering attack 
examples, templates and scenarios. Computers & Security. 59. 186 - 209. 
10.1016/j.cose.2016.03.004. 
Mouton, F., Malan, M. M., Kimppa, K. K., & Venter, H. S. (2015). Necessity for ethics in 
social engineering research. Computers & Security, 55, 114. Retrieved 25 February 
2018, from https://search.proquest.com/docview/1733195513.
Musthaler, L. (2006). How social engineering sinks security. Network World, 23(39), 45. 
Retrieved from https://search.proquest.com/docview/215993673.
Nemati, H., Wall, J. D., & Chow, A. (2014). Privacy coping and information-sharing 
behaviors in social media: A comparison of chinese and U.S. users. Journal of Global 
Information Technology Management, 17(4), 228-249. Retrieved 28 February 2018, 
from http://search.proquest.com/docview/1674426345 
Oder, U. T. (2008). Two-factor authentication. Hoboken, NJ: John Wiley and Sons. 
Papic, M., & Noonan, S. (2011). Social media as a tool for protest. Retrieved 15 February 
2018, from https://www.stratfor.com/weekly/20110202-social-media-tool-protest 
Parker, D. (2002, Dec 16). A fraudster's tricks of the trade: BOOK REVIEW THE ART OF 
DECEPTION: An ex-con reveals how clever manipulation can make employees the 
weakest link in a company's security, writes D: Financial Times Retrieved 3 March 
2018, from https://search.proquest.com/docview/249487841.
Peltier, T. R. (2006). Social engineering: Concepts and solutions. Information Systems 
Security, 15(5), 13-21. 
Perri, F. S., & Brody, R. G. (2012). The optics of fraud: Affiliations that enhance offender 
credibility. Journal of Financial Crime, 19(4), 355-370. 
http://dx.doi.org/10.1108/13590791211266359


136 
Roberts, J. J. (2015). Who owns your face? Weak laws give power to Facebook. Retrieved 15 
September 2016, from http://fortune.com/2015/06/17/facebook-moments-privacy-
facial-recognition/ 
Robertson, S. (2018). Digital ‘totalitarian marketing’ threatens privacy and security, former 
advertising executive says. The Globe and Mail. Retrieved 24 February 2018, from 
https://www.theglobeandmail.com/report-on-business/industry-
news/marketing/digital-totalitarian-marketing-threatens-privacy-and-
security/article37009003/ 
Russell, R., & Stutz, M. (2014). SOCIAL MEDIA: WHAT EMPLOYERS NEED TO 
KNOW. Journal of Internet Law, 17(8), 3-6. Retrieved 25 February 2018, from 
https://search.proquest.com/docview/1501615784. 
Sableman, M. (2017). Social media privacy: It's a reasonable expectations game.

Yüklə 1,17 Mb.

Dostları ilə paylaş:
1   ...   65   66   67   68   69   70   71   72   73




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin