Cybersecurity Challenges in Social Media Erdal Ozkaya



Yüklə 1,17 Mb.
Pdf görüntüsü
səhifə27/73
tarix10.12.2023
ölçüsü1,17 Mb.
#139643
1   ...   23   24   25   26   27   28   29   30   ...   73
13755 Zeebaree 2020 E R (1)

2.3
 
Conclusion 
This chapter has gone through six related researches that have been done by other 
researchers on the same topic. The first literature by Loeffler has looked at the prevailing 
privacy issues on social media. The reason why this work was picked is because it focuses on 
the infrastructure of social media platforms that have led to the current privacy issues. The 
second work of literature that has been discussed is by Heyman, Wolf, and Pierson. They 
have helped solve the conundrum surrounding the definition of privacy. They take a unique 
approach that this research adapts; they view privacy from two perspectives.
The third work is a real-life comparison of privacy between users of two different 
regions, the US and China. This research is only picked due to its real-life approach to this 
topic. The researchers have conducted a research on two types of users and they share their 
findings. The researchers do a good job trying to explain the distinct characteristics between 
the two groups of users that lead them to show the observed behavior on social media.
The fourth work of literature that this research has discussed is by Bryan Hammer 
who discusses social media privacy using a very interesting approach. Instead of approaching 
the topic from a singular viewpoint, Hammer breaks his research into three, where each part 
views privacy from a different lens. The last two pieces of literature give short but important 
contributions to this topic of social media privacy. The first of these two looks at the direct 
impacts of increased user awareness on social media content sharing. The second literature is 
on the legal side of the discussion about social media privacy. It examines the legality of the 
ways that organizations can use to protect themselves from social media privacy and security 
risks. 


45 

Yüklə 1,17 Mb.

Dostları ilə paylaş:
1   ...   23   24   25   26   27   28   29   30   ...   73




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin