Herramientas de seguridad digital respecto de las garantías de la privacidad en las redes sociales

dc.contributor.advisorMorales Zapata, Daniel Alfonso
dc.contributor.authorOsorio Ramírez, Germán Andrés
dc.contributor.authorMoreno Cuesta, Alexander
dc.coverage.spatialPereiraspa
dc.creator.emailgerman-osorior@unilibre.edu.cospa
dc.date.accessioned2023-12-20T20:20:59Z
dc.date.available2023-12-20T20:20:59Z
dc.date.created2023-09-21
dc.description.abstractHoy en día, las redes sociales son una parte integral de la vida de todos. A medida que crece la reputación de estos sitios, también aumentan las amenazas. El número de usuarios crece a gran escala cada año. Por tanto, se convierte en una necesidad proteger la información compartida por ellos en estas redes. Existen numerosos problemas de seguridad digital y privacidad relacionados con la información compartida por el usuario, especialmente cuando se trata de fotos, vídeos y audios. Para abordar esta situación, este documento presenta una revisión literaria de las diferentes amenazas de seguridad digital y privacidad y se presentan algunas soluciones para los usuarios, más precisamente engloba las amenazas convencionales a las que recurren los ciberdelincuentes. Para ello se han clasificado las soluciones en dos categorías, a saber: soluciones de operadores de redes sociales y soluciones legales del Ministerio de Tecnologías de la Información y las Comunicaciones. Asimismo, este análisis arroja luz sobre los desafíos predominantes y los problemas que deben discutirse para mejorar la confiabilidad de las redes sociales bajo un marco legal más robusto.spa
dc.description.abstractenglishToday, social networks are an integral part of everyone's life. As the reputation of these sites grows, so do the threats. The number of users is growing on a large scale every year. Therefore, it becomes a necessity to protect the information shared by them in these networks. There are numerous digital security and privacy issues related to the information shared by the user, especially when it comes to photos, videos and audios. To address this situation, this document presents a literary review of the different digital security and privacy threats and presents some solutions for users, more precisely, it encompasses the conventional threats used by cybercriminals. To this end, the solutions have been classified into two categories, namely: solutions from social network operators and legal solutions from the Ministerio de Tecnologías de la Información y las Comunicaciones. Likewise, this analysis sheds light on the prevailing challenges and the problems that must be addressed to improve the reliability of social networks under a more robust legal framework.spa
dc.description.sponsorshipUniversidad Libre Seccional Pereira -- Facultad de Derecho, Ciencias Políticas y Sociales -- Especialización derecho administrativospa
dc.formatPDFspa
dc.identifier.urihttps://hdl.handle.net/10901/27937
dc.relation.referencesAlbladi, S.M. and Weir, G.R.S. (2018). A semi-automated security advisory system to resist cyber-attack in social networks. En Thanh, N. et al. (Eds.), Computational Collective Intelligence (pp. 146-156). New York, USA: Springer.spa
dc.relation.referencesBhatia, S. (2020). Social Media Marketing for Businesses: Decoding Discussion Forums. Recuperado de https://razorpay.com/learn/discussion-forums-quora-reddit-for-business/.spa
dc.relation.referencesBenson, V. et al. (2015). The role of security notices and online consumer behaviour: an empirical study of social networking users. International Journal of Human-Computer Studies, 80, 36-44.spa
dc.relation.referencesCampanile, L. et al. (2021). Designing a GDPR Compliant Blockchain-Based IoV Distributed Information Tracking System. Information Processing and Management, 58(3), 102511.spa
dc.relation.referencesColicev, A. et al. (2018). Improving consumer mindset metrics and shareholder value through social media: The different roles of owned and earned media. Journal of Marketing, 82(1), 37-56.spa
dc.relation.referencesCONPES. (2016). Documento CONPES 3854. Bogotá, Colombia: Departamento Nacional de Planeación.spa
dc.relation.referencesCornejo, M. y Tapia, M.L. (2011). Redes sociales y relaciones interpersonales en internet. Fundamentos en Humanidades, XII(24), 219-229.spa
dc.relation.referencesCosta, C. (2015). Comunicación de crisis, redes sociales y reputación corporativa. Un estudio sobre el uso de las redes sociales como un discurso contrario a una campaña publicitaria (tesis de posgrado). Facultad de Ciencias de la Información, Universidad Complutense de Madrid, Madrid, España.spa
dc.relation.referencesDataReportal. (Sin fecha). Global Social Media Statistics. Recuperado de https://datareportal.com/social-media-users.spa
dc.relation.referencesDe Cristofaro, E. et al. (2012). Hummingbird: Privacy at the Time of Twitter. Recuperado de https://eprint.iacr.org/2011/640.pdf.spa
dc.relation.referencesDel Pino, S. (2016). Delitos informáticos: generalidades. Recuperado de https://www.oas.org/juridico/spanish/cyb_ecu_delitos_inform.pdf.spa
dc.relation.referencesDwivedi, Y.K. et al. (2021). Setting the future of digital and social media marketing research: Perspectives and research propositions. International Journal of Information Management, 59, 102168.spa
dc.relation.referencesGillis, A. (Sin fecha). What is phishing? Recuperado de https://www.techtarget.com/searchsecurity/definition/phishing.spa
dc.relation.referencesHerrera, H. (2012). Las redes sociales: una nueva herramienta de difusión. Reflexiones, 91(2), 121-128.spa
dc.relation.referencesHiggins, M. (2007, junio 10). Snapshots That Do More Than Bore Friends. The New York Times. Recuperado de https://www.nytimes.com/2007/06/10/travel/10pracphoto.html.spa
dc.relation.referencesJain, A.K. and Gupta, B.B. (2018). Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation. International Journal of Information and Computer Security, 10(4), 398-417.spa
dc.relation.referencesJain, A.K. and Gupta, B.B. (2021). A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Information Systems, 16(1), 1-39.spa
dc.relation.referencesJakobsson, M. (2018). Two-factor inauthentication—the rise in SMS phishing attacks. Computer Fraud & Security, 6, 6-8.spa
dc.relation.referencesKaspersky. (2022). Cybercriminals attack users with 400,000 new malicious files daily – that is 5% more than in 2021. Recuperado de https://www.kaspersky.com/about/press-releases/2022_cybercriminals-attack-users-with-400000-new-malicious-files-daily---that-is-5-more-than-in-2021.spa
dc.relation.referencesLiu, F. and Xu, D. (2018). Social roles and consequences in using social media in disasters: A structurational perspective. Information Systems Frontiers, 20(4): 693-711.spa
dc.relation.referencesMalekhosseini, R., Hosseinzadeh, M. and Navi, K. (2018). An Investigation into the Requirements of Privacy in Social Networks and Factors Contributing to Users’ Concerns about Violation of Their Privacy. Social Network Analysis and Mining, 8(1). https://doi.org/10.1007/s13278-018-0518-x.spa
dc.relation.referencesMusial, K. and Kazienko, P. (2012). Social networks on the Internet. World Wide Web. Internet and Web Information Systems, 16(1), 31-72.spa
dc.relation.referencesNabeel, M. and Bertino, E. (2014). Privacy Preserving Delegated Access Control in Public Clouds. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2268-2280.spa
dc.relation.referencesOCDE. (2015). Digital Security Risk Management for Economic and Social Prosperity. Paris, France: OCDE.spa
dc.relation.referencesOukemeni, H. et al. (2019). Privacy Analysis on Microblogging Online Social Networks a Survey. ACM Computing Surveys, 52(3), 1-36.spa
dc.relation.referencesParrack, D. (2022). 7 Positive Effects Social Media Is Having on Society. Recuperado de https://www.makeuseof.com/tag/positive-impact-social-networking-sites-society-opinion/.spa
dc.relation.referencesPersia, F. and D’Auria, D. (2017). A Survey of Online Social Networks: Challenges and Opportunities. En IEEE International Conference on Information Reuse and Integration (IRI), San Diego, California, USA.spa
dc.relation.referencesQuevedo, J. (2017). Investigación y prueba del ciberdelito (tesis de posgrado). Programa de Doctorado en Derecho y Ciencia Política, Universidad de Barcelona, Barcelona, España.spa
dc.relation.referencesRaji, F. et al. (2013). DEFF: A New Architecture for Private Online Social Networks. Security and Communication Networks, 6(12), 1460-1470.spa
dc.relation.referencesRathore, S. et al. (2017). Social Network Security: Issues, Challenges, Threats, and Solutions. Information Sciences, 421, 43-69.spa
dc.relation.referencesSahoo, S.R. and Gupta, B.B. (2020). Fake profile detection in multimedia big data on online social networks. International Journal of Information and Computer Security, 12(2-3), 303-331.spa
dc.relation.referencesSahoo, S.R. and Gupta, B.B. (2021). Multiple features based approach for automatic fake news detection on social networks using deep learning. Applied Soft Computing, 100, 106983spa
dc.relation.referencesSchneier, B. (2020). Haz clic aquí para matarlos a todos. Un manual de supervivencia. Ciudad de México, México: Titivillus.spa
dc.relation.referencesvan Schaik, P. et al. (2018). Security and Privacy in Online Social Networking: Risk Perceptions and Precautionary Behaviour. Computers in Human Behavior, 78, 283-297.spa
dc.relation.referencesZeroFOX. (2019). What is Social Media Security. Recuperado de https://www.zerofox.com/social-media-security/.spa
dc.relation.referencesZhu, Y. et al. (2013). A survey of social-based routing in delay tolerant networks: positive and negative social effects. IEEE Communications Surveys & Tutorials, 15(1), 387-401.spa
dc.rights.accessrightsinfo:eu-repo/semantics/openAccessspa
dc.rights.coarhttp://purl.org/coar/access_right/c_abf2spa
dc.rights.licenseAtribución-NoComercial-SinDerivadas 2.5 Colombiaspa
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/2.5/co/spa
dc.subjectamenazas digitalesspa
dc.subjectciberdelincuentesspa
dc.subjectredes socialesspa
dc.subjectprivacidadspa
dc.subjectseguridad digitalspa
dc.subjectticspa
dc.subject.subjectenglishDigital threatsspa
dc.subject.subjectenglishcybercriminalsspa
dc.subject.subjectenglishsocial networksspa
dc.subject.subjectenglishprivacyspa
dc.subject.subjectenglishdigital securityspa
dc.subject.subjectenglishICTspa
dc.titleHerramientas de seguridad digital respecto de las garantías de la privacidad en las redes socialesspa
dc.type.driverinfo:eu-repo/semantics/bachelorThesisspa
dc.type.hasversioninfo:eu-repo/semantics/acceptedVersionspa
dc.type.localTesis de Especializaciónspa

Archivos

Bloque original

Mostrando 1 - 2 de 2
Cargando...
Miniatura
Nombre:
AUTORIZACION PARA LA PUBLICACION DIGITAL DE OBRAS EN EL REPOSITORIO.pdf
Tamaño:
466.12 KB
Formato:
Adobe Portable Document Format
Descripción:
Cargando...
Miniatura
Nombre:
Artículo de reflexión.pdf
Tamaño:
274.81 KB
Formato:
Adobe Portable Document Format
Descripción:

Bloque de licencias

Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
license.txt
Tamaño:
1.71 KB
Formato:
Item-specific license agreed upon to submission
Descripción: