Talwar et al., 2022 - Google Patents
Encryption Policies of Social Media Apps and Its Effect on User's PrivacyTalwar et al., 2022
- Document ID
- 13081808928519458765
- Author
- Talwar A
- Chaudhary A
- Kumar A
- Publication year
- Publication venue
- 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)
External Links
Snippet
The motive behind this research paper is to outline recently introduced social media encryption policies and the impact that they will have on user privacy. With close to no Data Protection Laws in the country, all social media platforms pose a threat to one's privacy. The …
- 230000000694 effects 0 title description 4
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zeebaree et al. | Social media networks security threats, risks and recommendation: A case study in the kurdistan region | |
Cooper et al. | Privacy considerations for internet protocols | |
Van Slyke et al. | E-business technologies | |
Al-Turjman et al. | Security in social networks | |
Talwar et al. | Encryption Policies of Social Media Apps and Its Effect on User's Privacy | |
AlMudahi et al. | Social media privacy issues, threats, and risks | |
Cooper et al. | RFC 6973: Privacy considerations for Internet protocols | |
Efe et al. | How privacy is threatened from social media communication? | |
Adu Michael et al. | Mitigating cybercrime and online social networks threats in Nigeria | |
Volini | A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues | |
Al Mushayt | Threats and anti-threats strategies for social networking websites | |
Okyere-Agyei | The dark web—a review | |
Kizza et al. | Ethical, privacy, and security issues in the online social network ecosystems | |
Sunhare et al. | Study of security vulnerabilities in social networking websites | |
Cremonini et al. | Privacy on the Internet | |
Kundu et al. | Analysis of security and privacy in social media platforms | |
Molok et al. | Online social networking: a source of intelligence for advanced persistent threats | |
Arora et al. | Threats to Security and privacy of Information due to growing use of social media in India | |
Khudhair | Competence in cybercrime: A review of existing laws | |
Alsmadi et al. | IT Risk and Security Management | |
Mandujano | Towards the preservation of a key feature of the internet: Policy and technology for cyberspace anonymity | |
Gonzalez | Dating Apps: User Security Protections, Data Breaches, and Game Theory | |
Chika et al. | ISSUES IN CYBER-SECURITY ADMINISTRATION: LESSONS FROM DEVELOPING COUNTRY LIKE NIGERIA | |
Funk et al. | Technical Foundations–how the Internet works and why technical remedies are of limited use | |
Misata et al. | A taxonomy of privacy-protecting tools to browse the world wide web |