Broad Scan
This topic has been chosen for review since issue of security and trust on the social networking websites is a noteworthy one and contemporary to the present situation. After picking the topic, I have utilized different search keywords, for example, protection, information assurance, web security, person to person communication, Facebook, MySpace and searched utilizing the Google Scholar and the Library of Vitoria University. Several pertinent journals have been found and ten of them has been discovered apt for the following stride. Out of the supply of apt data, just two journal articles have been finalized for reviewing.
Date |
Task |
Action |
Comment |
01/05/17 |
Looking for topics to review |
Picking some pertinent topic |
Finalizing one of them |
02/05/17 |
Some journals are finalized from Google Scholar and Vitoria University Library |
Some of the articles are read as well as reviewed. |
Created a folder to collect the articles that I want to refer to later on |
03/05/17 |
Reading |
Reading and understanding three articles from my folder |
Have a good article to follow up |
04/05/17 |
Reading |
Reading three other articles |
Information gathered from these articles is not suitable. |
05/05/17 |
Selecting five articles |
Reading these articles in detail |
Picking two of the articles to review |
06/05/17 |
Staritng the literature review |
Starting with list of reference books |
Oncluding all citations that are pertinent to this assignment |
07/05/17 |
Starting with the review of the first article |
Reading this first article |
Highlighting the crucial points and comments |
09/05/17 |
Reading the second article |
Making notes for some essential information |
Highlighting the essential information and reviewing it. |
10/05/17 |
Reviewing the second article |
Reading this article |
Reviewing some crucial part of the author’s work |
12/05/17 |
Writing this assignment |
Writing this assignment based on data gathered from these two articles |
Conclusion of the assignment done |
Source |
Used keywords |
Number of Returned Literature |
Number of Collected Literature |
Google scholar |
Social network Privacy in Social network Trust and social network Cyber security and social network |
2340000 2120000 1230000 550000 |
2 3 1 1 |
Vitoria University library |
Social network Social network and privacy |
3434000 3250000 |
2 1 |
Bott, E. and Spillius, E.B., 2014. Family and social network: Roles, norms and external relationships in ordinary urban families. Routledge.
Caliskan Islam, A., Walsh, J. and Greenstadt, R., 2014, November. Privacy detective: Detecting private information and collective privacy behavior in a large social network. In Proceedings of the 13th Workshop on Privacy in the Electronic Society (pp. 35-46). ACM.
Chen, H.T. and Kim, Y., 2013. Problematic use of social network sites: The interactive relationship between gratifications sought and privacy concerns. Cyberpsychology, Behavior, and Social Networking, 16(11), pp.806-812.
Chewae, M., Hayikader, S., Hasan, M.H. and Ibrahim, J., 2015. How much privacy we still have on social network?. International Journal of Scientific and Research Publications (ISSN 2250-3153).
Dwyer, C., Hiltz, S. and Passerini, K., 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. AMCIS 2007 proceedings, p.339.
Ellison, N.B. and Boyd, D.M., 2013. Sociality through social network sites. In The Oxford handbook of internet studies.
Hamelink, C.J., 2000. The ethics of cyberspace. Sage.
Litt, E., 2013. Understanding social network site users’ privacy tool use. Computers in Human Behavior, 29(4), pp.1649-1656.
Plaisance, P.L., 2013. Media ethics: Key principles for responsible practice. Sage Publications.
Tambe, P. and Vora, D., 2016, May. Privacy preservation on social network using data sanitization. In Recent Trends in Electronics, Information & Communication Technology (RTEICT), IEEE International Conference on (pp. 751-753). IEEE.
Wang, Y., Nepali, R.K. and Nikolai, J., 2014, February. Social network privacy measurement and simulation. In Computing, Networking and Communications (ICNC), 2014 International Conference on (pp. 802-806). IEEE.
Out of the selected literatures, two has been finalized for the purpose of literature review. The other articles were utilized as references.
Trust and Privacy Matter within Social Networking Websites: An Assessment of Facebook and Myspace
With the advancement of person to person communication destinations, for example, Facebook and Myspace, individuals have been pulled in to these websites and are utilizing them in an extensive manner (Dwyer et al. 2007). Subsequently they are sharing different individual subtle elements in these destinations. In any case, the security and protection of these locales could be addressed, since the data utilized as a part of these destinations is available to all (Dwyer et al. 2007). It has been highlighted that more than 47 million Americans visit Myspace consistently, though Facebook is gone by 15 million Americans consistently. With such an enormous number of guests consistently, it is inconceivable for these destinations to keep up the protection and respectability of the considerable number of clients. Alongside the essential data of the clients, for example, the name, date of birth, email address, telephone number, and other individual data is likewise shared (Dwyer et al. 2007). These incorporate the purchasing of another auto, or festivity of an occasion. These data and individual pictures may be utilized by programmers and could be utilized for cyber bulling.
Research Journal
An in depth investigation of the present situation exposed how the users consider the issues of belief and privacy in the social networking websites in particular Facebook and Myspace (Dwyer et al. 2007).
The improvement of new rapport in the social networking sites (Dwyer et al. 2007).
From the above outcomes is it unmistakably highlighted that the Facebook users reveals a more data than he Myspace users (Dwyer et al. 2007). It however has likewise been uncovered that the new connections that have developed in Myspace keeps going longer than those fostered utilizing Facebook (Dwyer et al. 2007). Nonetheless, in both these destinations, fake profiles may escape the genuine clients and they are probably going to fall in the trap of these fake profiles, posturing to be genuine ones.
Conclusion
This way, it may be inferred that the social media sites are a fundamental part of the social existences of the general population. However, the users should be enough cautious as they exchange their delicate and confidential data (Dwyer et al. 2007). This writing survey highlights the realities that however individuals tend to share delicate data and in addition to that grow new connections in the social networking sites, yet it can never be trusted.
Social networking sites are a vital piece of the population and social lives (Barnes 2006). Expanding number of guests in the long range interpersonal communication destinations is observer of the way that these locales are winding up plainly more prominent (Barnes 2006). Notwithstanding, these popular sites can be considered as a protection paradox.
The general population particularly the clients of the interpersonal interaction destinations are to be made mindful of the hindering impacts of the absence of security of the person to person communication locales (Barnes 2006). There are three unmistakable arrangements, that the clients may look for assistance from. These incorporate the general public, innovation and the enactment. The guardians and the schools need to step up to such an extent that the kids could be made mindful of the security issues of the social media sites alongside the damage that may be brought about to them (Barnes 2006). The impacts of inappropriate activities in the person to person communication locales and the instances of cyber bulling must be passed on to the standard users of the interpersonal interaction destinations. Parents need to invest quality energy with their children and guide them towards what is correct (Barnes 2006). They should know about the exercises of the youngsters with the end goal that they could demonstrate the correct way to their children.
Alongside the parents, the social media networking sites have a key part to play as well. The clients ought to be given an unmistakable rule with respect to the protection approaches and a statutory wring ought to likewise be given to them. The profiles of the users should be checked frequently by the long range interpersonal communication destinations, and the users with wrong conduct or posts ought to be restricted and hindered from all the social networking sites. In this way, not just the parents, the social networking organizations additionally need to take their accountability (Barnes 2006).
The government has a crucial part to play. The administration has issues boycott against kids less than 18 years old to join the social media sites (Barnes 2006). Be that as it may, a large portion of children input a false date of birth and get enlisted in the social media networking sites even at the age much under 18 years. A strict confirmation is basic where the users need to present their age verification, before effective enlistment
Final sketch of the Literature re-examination Chapter
Trust and Privacy anxiety within Social Networking Sites
This report showcases the trust and protection issues that emerge among the users of the social networking sites, for example, Facebook and Myspace. social networking sites undergoes different issues. Be that as it may, I have revealed some insight upon the issues of trust and security specifically. Out of many shortlisted journals, I have chosen two for a broad writing survey. The review of the primary article highlights the review comes about because of various informal community users. The survey of the second article highlights the protection issues alongside some viable arrangements. The issues of security and trusts have been obviously highlighted and the dangers that may emerge from these protection issues are additionally specified. The part of the general population, parents, schools, government has been unmistakably characterized to make individuals particularly the kids mindful of the trust and protection issues. The arrangements proposed in the second article assessed are commonsense and ought to be executed at the earliest opportunity. The social networking sites have vast effects and significance in the general public. Hence it ought to be utilized for the advantage of the population and not for bulling and bugging individuals.
References
Barnes,S 2006, A privacy paradox: Social networking in the United States, https://firstmonday.org/ojs/index.php/fm/article/view/1394/1312#author
Dwyer,J, Hiltz,S, Passerini,K 2007, Trust and Privacy Concern within Social Networking Sites: A Comparison of Facebook and Myspace , AIS Electronic Library (AISeL)