[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Talwar et al., 2022 - Google Patents

Encryption Policies of Social Media Apps and Its Effect on User's Privacy

Talwar et al., 2022

Document ID
13081808928519458765
Author
Talwar A
Chaudhary A
Kumar A
Publication year
Publication venue
2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)

External Links

Snippet

The motive behind this research paper is to outline recently introduced social media encryption policies and the impact that they will have on user privacy. With close to no Data Protection Laws in the country, all social media platforms pose a threat to one's privacy. The …
Continue reading at ieeexplore.ieee.org (other versions)

Similar Documents

Publication Publication Date Title
Zeebaree et al. Social media networks security threats, risks and recommendation: A case study in the kurdistan region
Cooper et al. Privacy considerations for internet protocols
Van Slyke et al. E-business technologies
Al-Turjman et al. Security in social networks
Talwar et al. Encryption Policies of Social Media Apps and Its Effect on User's Privacy
AlMudahi et al. Social media privacy issues, threats, and risks
Cooper et al. RFC 6973: Privacy considerations for Internet protocols
Efe et al. How privacy is threatened from social media communication?
Adu Michael et al. Mitigating cybercrime and online social networks threats in Nigeria
Volini A Deep Dive into Technical Encryption Concepts to Better Understand Cybersecurity & Data Privacy Legal & Policy Issues
Al Mushayt Threats and anti-threats strategies for social networking websites
Okyere-Agyei The dark web—a review
Kizza et al. Ethical, privacy, and security issues in the online social network ecosystems
Sunhare et al. Study of security vulnerabilities in social networking websites
Cremonini et al. Privacy on the Internet
Kundu et al. Analysis of security and privacy in social media platforms
Molok et al. Online social networking: a source of intelligence for advanced persistent threats
Arora et al. Threats to Security and privacy of Information due to growing use of social media in India
Khudhair Competence in cybercrime: A review of existing laws
Alsmadi et al. IT Risk and Security Management
Mandujano Towards the preservation of a key feature of the internet: Policy and technology for cyberspace anonymity
Gonzalez Dating Apps: User Security Protections, Data Breaches, and Game Theory
Chika et al. ISSUES IN CYBER-SECURITY ADMINISTRATION: LESSONS FROM DEVELOPING COUNTRY LIKE NIGERIA
Funk et al. Technical Foundations–how the Internet works and why technical remedies are of limited use
Misata et al. A taxonomy of privacy-protecting tools to browse the world wide web