Post 2: Scholarly secondary sources

Social Networks – Problems of Security and Data Privacy

Fraser is the Managing Director of Croft Information Security UK, a company whose area of profession is Information Security, Privacy and Data Protection consultancy. As a professional in the field, Fraser’s contribution to the Council of European Professional Informatics Societies contains reliable information. The paper written by Les Fraser can be seen as a general breakdown of online security in relation to social networks. Fraser references multiple social networking sites and categorises them into four categories including Contact sites, Social Networking sites, Visual Information Sharing sites and Game and Interaction sites, he then breaks down general examples of issues that arise from these sites. These issues are malicious use of mobile phone tech (camera), cyber bullying, identity theft, psychological trauma, fraud and cyber-crimes. The main risks that come from these issues are personal information and intellectual property. The paper is written from a neutral standpoint in order to create discussion among its readers; facts are placed in front of the audience in an easily digestible format.

Fraser, L. (2008) Social Networks – Problems of Security and Data Privacy. <http://www.cepis.org/files/cepis/20090901104132_CEPIS%20social%20network%20statement.pdf.&gt;

On Privacy and Security in Social Media – A Comprehensive Study

The paper is written in collaboration with De Montfort University academics of the School of Computer Science and Informatics; Mark Evans, Leandros A. Maglaras, Ying He, and Helge Janicke. With two computer science lecturers, PhD student, Head of the Cyber Security Centre and Software Technology Research Laboratory in the line-up of authors the paper is written with extensive research into the topic. The paper aims to draw upon this research “in order to identify areas of weakness, and propose areas of further research”. A proposal that the paper makes to combat the increasing number of security breaches is the implementation of human reliability assessments in cyber industries. HRA involves techniques that assess a human’s ability to perform tasks without making incompetent mistakes, it has already been used in other industries such as nuclear and aviation. The biggest takeaway from this paper is that human behaviour is responsible for half the incidents in cyber security breaches.

Evans, M., Maglaras, L.A., He, Y. and Janicke, H. (2016) Human Behaviour as an aspect of Cyber Security Assurance. <https://arxiv.org/ftp/arxiv/papers/1601/1601.03921.pdf.&gt;