Information Security


Effect of Data Breaching on Socio-economic Condition of Countries from Social Networking Sites

Article Number: QOH996879 Volume 01 | Issue 01 | January - 2019 ISSN: UA
18th Sep, 2018
12th Oct, 2018
24th Dec, 2018
22nd Jan, 2019

Authors

Nitin Sharma

Abstract

It is an incident in which sensitive, protected or confidential data is imitated, transmitted, viewed, stolen or disclosed or used by an individual unauthorized to do so. Data breach can cause a massive impact on social and economic condition of any country. Drawing upon Cambridge Analytica as a case study, a countries election is the spine of democracy, once it gets jeopardize the very essence of justice and equality gets hampered. The forensic application is helpful in determining whether the incident has occurred or not as well the one who involve in the particular breach. This present review paper focuses on the steps and ideas to prevent data breach and how social networking sites are responsible for data breaching. Keywords: Data Breaching, unauthorized access, Cambridge Analytica

Introduction

Information Security is considered as one of the important part these days to any user of a computer or to any organization that are having computers installed in their daily operations. In the modern time, the information technology authorized the storage and the collection of huge amount of the personal data of an individual. The evidence collected from the data breach plays a very significant role and also poses many unique challenges both legally as well as technically. The present review contains the data in chronological order on how, from time to time personal data had been stored by companies and its leak have led to massive social-economic downfall of a country. Information Security is categorize into three of the major parts refers as CIA of information security which are confidentiality, integrity and availability. Availability is ensuring that the assessment of information is done and where it is supposed. This protects the information in the form of storage, transmission and processing (Hiatt and Choi 2016).

All these application which are web based provide users to connect to each other, communicate, and interact and the sharing the web information. There are number of social networking sites which are Twitter, Facebook etc. and all connects the people to each other. The personal profile that contains information for different sites of social network is created by the individuals to share their photos, videos, ideas, e-mails, instant messaging (Vadisala and Vatsavayi 2017).

References

Acquisti. Privacy and security of personal information: Economic incentives and technological solutions. In Jean Camp and Stephen Lewis, editors, The Economics of Information Security, 2004

Alessandro Acquisti Carnegie Mellon University acquisti@andrew.cmu.edu Allan Friedman Harvard University allan_friedman@ksgphd.harvard.edu Rahul Telang Carnegie Mellon University rtelang@ andrew.cmu.edu, Is there a cost to privacy breaches? An event study.

Anderson, K.B., E. Durbin, and M.A. Salinger, 2008. “Identity Theft,” Journal of Economic Perspectives 22, 171-192.

Biscoe, Chloe. “Six Steps to Help Prevent a Data Breach.” IT Governance Blog, 2 Nov. 2017, www.itgovernance.co.uk/blog/six-steps-to-help-prevent-a-data-breach/.

Breaking the Target: An Analysis of Target Data Breach and Lessons Learned Xiaokui Shu, Ke Tian*, Andrew Ciambrone* and Danfeng (Daphne) Yao, Member, IEEE

Bygrave, Lee a. Legal and privacy challenges of social networking sites. University of Oslo, 2012, www.duo.uio.no/bitstream/handle/10852/22928/CvetankaxTrichkovskaxThesis.pdf?sequence=1.

Hiatt, David, and Young B Choi. “Role of Security in Social Networking.” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 7, no. 2, 2016, pp. 12–15.

ITRC breach report, http://www.idtheftcenter.org/images/ breach/ITRC Breach Report 2014.pdf.

Spinelli, Christopher F. “Social Media: No ‘Friend’ of Personal Privacy.” The Elon Journal of Undergraduate Research in Communications, vol. 1, ser. 2, 59AD, pp. 59–69. 2.

Vadisala, Jyothi, and Valli Kumari Vatsavayi. “Challenges in Social Network Data Privacy.” International Journal of Computational Intelligence Research, vol. 13, ser. 5, 2017, pp. 965–979. 5.

William Roberds Stacey L. Schreft Federal Reserve Bank of Atlanta the Mutual Fund Research Centre, LLC This revision: April 8, 2009 Data Breaches and Identity Theft

Wuest , Candid. “The Risks of Social Networking.” Symantec. pp. 1–32.

How to cite this article?

APA StyleSharma, N. (2019). Effect of Data Breaching on Socio-economic Condition of Countries from Social Networking Sites . Academic Journal of Information Security, 1(1), 21-25.
Chicago Style
MLA Style
DOI
URL

Create Your Password

We've sent a link to create password on your registered email, Click the link in email to start using Xournal.

Sign In

Forgot Password?
Don't have an account? Create Account

Create Account

Already have an account? Sign In

Forgot Password

Do you want to try again? Sign In

Publication Tracking