Cybersecurity in social networks
Autor(a) principal: | |
---|---|
Data de Publicação: | 2022 |
Tipo de documento: | Dissertação |
Idioma: | eng |
Título da fonte: | Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
Texto Completo: | http://hdl.handle.net/10362/133016 |
Resumo: | Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business Intelligence |
id |
RCAP_7d615a881c25c8f1c6e72c7469b04a26 |
---|---|
oai_identifier_str |
oai:run.unl.pt:10362/133016 |
network_acronym_str |
RCAP |
network_name_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository_id_str |
7160 |
spelling |
Cybersecurity in social networksSocial NetworksSecurity Best PracticesUser BehaviorCybersecurityDefense SolutionsDissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business IntelligenceIn recent years, the use of social networks has been increasing substantially. As we know, platforms such as Facebook, Twitter, Google +, Pinterest, LinkedIn or Instagram allow millions of individuals to create online profiles and share personal information with several friends through social networks – and, often, it’s possible to do the same with a large amount of strangers. By itself, social networks should not be considered a cyber threat. However, there are several issues related to maintaining the user’s data security and privacy, especially when they upload personal information, photos and / or videos. The large majority of users ignores the security best practices, which sometimes facilitates the hackers’ attacks. The main goal of this research is to understand patterns of information that are revealed on online social networks and their privacy implications. The goal is to map people behaviour on social networks and understand if they care about the security of their data exposed on the Internet. This research also aims to understand the impact of cybersecurity in social networks and a comparison of which social network is most concerned with the exposure of its user. It will be also addressed the current defence solutions that can protect social network users from these kinds of threats.Santos, Vitor Manuel Pereira Duarte dosRUNGonçalves, Ricardo Jorge Girante2022-02-16T17:39:34Z2022-01-172022-01-17T00:00:00Zinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/masterThesisapplication/pdfhttp://hdl.handle.net/10362/133016TID:202942651enginfo:eu-repo/semantics/openAccessreponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos)instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãoinstacron:RCAAP2024-03-11T05:11:43Zoai:run.unl.pt:10362/133016Portal AgregadorONGhttps://www.rcaap.pt/oai/openaireopendoar:71602024-03-20T03:47:40.980495Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informaçãofalse |
dc.title.none.fl_str_mv |
Cybersecurity in social networks |
title |
Cybersecurity in social networks |
spellingShingle |
Cybersecurity in social networks Gonçalves, Ricardo Jorge Girante Social Networks Security Best Practices User Behavior Cybersecurity Defense Solutions |
title_short |
Cybersecurity in social networks |
title_full |
Cybersecurity in social networks |
title_fullStr |
Cybersecurity in social networks |
title_full_unstemmed |
Cybersecurity in social networks |
title_sort |
Cybersecurity in social networks |
author |
Gonçalves, Ricardo Jorge Girante |
author_facet |
Gonçalves, Ricardo Jorge Girante |
author_role |
author |
dc.contributor.none.fl_str_mv |
Santos, Vitor Manuel Pereira Duarte dos RUN |
dc.contributor.author.fl_str_mv |
Gonçalves, Ricardo Jorge Girante |
dc.subject.por.fl_str_mv |
Social Networks Security Best Practices User Behavior Cybersecurity Defense Solutions |
topic |
Social Networks Security Best Practices User Behavior Cybersecurity Defense Solutions |
description |
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business Intelligence |
publishDate |
2022 |
dc.date.none.fl_str_mv |
2022-02-16T17:39:34Z 2022-01-17 2022-01-17T00:00:00Z |
dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
dc.type.driver.fl_str_mv |
info:eu-repo/semantics/masterThesis |
format |
masterThesis |
status_str |
publishedVersion |
dc.identifier.uri.fl_str_mv |
http://hdl.handle.net/10362/133016 TID:202942651 |
url |
http://hdl.handle.net/10362/133016 |
identifier_str_mv |
TID:202942651 |
dc.language.iso.fl_str_mv |
eng |
language |
eng |
dc.rights.driver.fl_str_mv |
info:eu-repo/semantics/openAccess |
eu_rights_str_mv |
openAccess |
dc.format.none.fl_str_mv |
application/pdf |
dc.source.none.fl_str_mv |
reponame:Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) instname:Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação instacron:RCAAP |
instname_str |
Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
instacron_str |
RCAAP |
institution |
RCAAP |
reponame_str |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
collection |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) |
repository.name.fl_str_mv |
Repositório Científico de Acesso Aberto de Portugal (Repositórios Cientìficos) - Agência para a Sociedade do Conhecimento (UMIC) - FCT - Sociedade da Informação |
repository.mail.fl_str_mv |
|
_version_ |
1799138079497256960 |