Herramientas de seguridad digital respecto de las garantías de la privacidad en las redes sociales
| dc.contributor.advisor | Morales Zapata, Daniel Alfonso | |
| dc.contributor.author | Osorio Ramírez, Germán Andrés | |
| dc.contributor.author | Moreno Cuesta, Alexander | |
| dc.coverage.spatial | Pereira | spa |
| dc.creator.email | german-osorior@unilibre.edu.co | spa |
| dc.date.accessioned | 2023-12-20T20:20:59Z | |
| dc.date.available | 2023-12-20T20:20:59Z | |
| dc.date.created | 2023-09-21 | |
| dc.description.abstract | Hoy en día, las redes sociales son una parte integral de la vida de todos. A medida que crece la reputación de estos sitios, también aumentan las amenazas. El número de usuarios crece a gran escala cada año. Por tanto, se convierte en una necesidad proteger la información compartida por ellos en estas redes. Existen numerosos problemas de seguridad digital y privacidad relacionados con la información compartida por el usuario, especialmente cuando se trata de fotos, vídeos y audios. Para abordar esta situación, este documento presenta una revisión literaria de las diferentes amenazas de seguridad digital y privacidad y se presentan algunas soluciones para los usuarios, más precisamente engloba las amenazas convencionales a las que recurren los ciberdelincuentes. Para ello se han clasificado las soluciones en dos categorías, a saber: soluciones de operadores de redes sociales y soluciones legales del Ministerio de Tecnologías de la Información y las Comunicaciones. Asimismo, este análisis arroja luz sobre los desafíos predominantes y los problemas que deben discutirse para mejorar la confiabilidad de las redes sociales bajo un marco legal más robusto. | spa |
| dc.description.abstractenglish | Today, social networks are an integral part of everyone's life. As the reputation of these sites grows, so do the threats. The number of users is growing on a large scale every year. Therefore, it becomes a necessity to protect the information shared by them in these networks. There are numerous digital security and privacy issues related to the information shared by the user, especially when it comes to photos, videos and audios. To address this situation, this document presents a literary review of the different digital security and privacy threats and presents some solutions for users, more precisely, it encompasses the conventional threats used by cybercriminals. To this end, the solutions have been classified into two categories, namely: solutions from social network operators and legal solutions from the Ministerio de Tecnologías de la Información y las Comunicaciones. Likewise, this analysis sheds light on the prevailing challenges and the problems that must be addressed to improve the reliability of social networks under a more robust legal framework. | spa |
| dc.description.sponsorship | Universidad Libre Seccional Pereira -- Facultad de Derecho, Ciencias Políticas y Sociales -- Especialización derecho administrativo | spa |
| dc.format | spa | |
| dc.identifier.uri | https://hdl.handle.net/10901/27937 | |
| dc.relation.references | Albladi, S.M. and Weir, G.R.S. (2018). A semi-automated security advisory system to resist cyber-attack in social networks. En Thanh, N. et al. (Eds.), Computational Collective Intelligence (pp. 146-156). New York, USA: Springer. | spa |
| dc.relation.references | Bhatia, S. (2020). Social Media Marketing for Businesses: Decoding Discussion Forums. Recuperado de https://razorpay.com/learn/discussion-forums-quora-reddit-for-business/. | spa |
| dc.relation.references | Benson, V. et al. (2015). The role of security notices and online consumer behaviour: an empirical study of social networking users. International Journal of Human-Computer Studies, 80, 36-44. | spa |
| dc.relation.references | Campanile, L. et al. (2021). Designing a GDPR Compliant Blockchain-Based IoV Distributed Information Tracking System. Information Processing and Management, 58(3), 102511. | spa |
| dc.relation.references | Colicev, A. et al. (2018). Improving consumer mindset metrics and shareholder value through social media: The different roles of owned and earned media. Journal of Marketing, 82(1), 37-56. | spa |
| dc.relation.references | CONPES. (2016). Documento CONPES 3854. Bogotá, Colombia: Departamento Nacional de Planeación. | spa |
| dc.relation.references | Cornejo, M. y Tapia, M.L. (2011). Redes sociales y relaciones interpersonales en internet. Fundamentos en Humanidades, XII(24), 219-229. | spa |
| dc.relation.references | Costa, C. (2015). Comunicación de crisis, redes sociales y reputación corporativa. Un estudio sobre el uso de las redes sociales como un discurso contrario a una campaña publicitaria (tesis de posgrado). Facultad de Ciencias de la Información, Universidad Complutense de Madrid, Madrid, España. | spa |
| dc.relation.references | DataReportal. (Sin fecha). Global Social Media Statistics. Recuperado de https://datareportal.com/social-media-users. | spa |
| dc.relation.references | De Cristofaro, E. et al. (2012). Hummingbird: Privacy at the Time of Twitter. Recuperado de https://eprint.iacr.org/2011/640.pdf. | spa |
| dc.relation.references | Del Pino, S. (2016). Delitos informáticos: generalidades. Recuperado de https://www.oas.org/juridico/spanish/cyb_ecu_delitos_inform.pdf. | spa |
| dc.relation.references | Dwivedi, Y.K. et al. (2021). Setting the future of digital and social media marketing research: Perspectives and research propositions. International Journal of Information Management, 59, 102168. | spa |
| dc.relation.references | Gillis, A. (Sin fecha). What is phishing? Recuperado de https://www.techtarget.com/searchsecurity/definition/phishing. | spa |
| dc.relation.references | Herrera, H. (2012). Las redes sociales: una nueva herramienta de difusión. Reflexiones, 91(2), 121-128. | spa |
| dc.relation.references | Higgins, M. (2007, junio 10). Snapshots That Do More Than Bore Friends. The New York Times. Recuperado de https://www.nytimes.com/2007/06/10/travel/10pracphoto.html. | spa |
| dc.relation.references | Jain, A.K. and Gupta, B.B. (2018). Detection of phishing attacks in financial and e-banking websites using link and visual similarity relation. International Journal of Information and Computer Security, 10(4), 398-417. | spa |
| dc.relation.references | Jain, A.K. and Gupta, B.B. (2021). A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterprise Information Systems, 16(1), 1-39. | spa |
| dc.relation.references | Jakobsson, M. (2018). Two-factor inauthentication—the rise in SMS phishing attacks. Computer Fraud & Security, 6, 6-8. | spa |
| dc.relation.references | Kaspersky. (2022). Cybercriminals attack users with 400,000 new malicious files daily – that is 5% more than in 2021. Recuperado de https://www.kaspersky.com/about/press-releases/2022_cybercriminals-attack-users-with-400000-new-malicious-files-daily---that-is-5-more-than-in-2021. | spa |
| dc.relation.references | Liu, F. and Xu, D. (2018). Social roles and consequences in using social media in disasters: A structurational perspective. Information Systems Frontiers, 20(4): 693-711. | spa |
| dc.relation.references | Malekhosseini, R., Hosseinzadeh, M. and Navi, K. (2018). An Investigation into the Requirements of Privacy in Social Networks and Factors Contributing to Users’ Concerns about Violation of Their Privacy. Social Network Analysis and Mining, 8(1). https://doi.org/10.1007/s13278-018-0518-x. | spa |
| dc.relation.references | Musial, K. and Kazienko, P. (2012). Social networks on the Internet. World Wide Web. Internet and Web Information Systems, 16(1), 31-72. | spa |
| dc.relation.references | Nabeel, M. and Bertino, E. (2014). Privacy Preserving Delegated Access Control in Public Clouds. IEEE Transactions on Knowledge and Data Engineering, 26(9), 2268-2280. | spa |
| dc.relation.references | OCDE. (2015). Digital Security Risk Management for Economic and Social Prosperity. Paris, France: OCDE. | spa |
| dc.relation.references | Oukemeni, H. et al. (2019). Privacy Analysis on Microblogging Online Social Networks a Survey. ACM Computing Surveys, 52(3), 1-36. | spa |
| dc.relation.references | Parrack, D. (2022). 7 Positive Effects Social Media Is Having on Society. Recuperado de https://www.makeuseof.com/tag/positive-impact-social-networking-sites-society-opinion/. | spa |
| dc.relation.references | Persia, F. and D’Auria, D. (2017). A Survey of Online Social Networks: Challenges and Opportunities. En IEEE International Conference on Information Reuse and Integration (IRI), San Diego, California, USA. | spa |
| dc.relation.references | Quevedo, J. (2017). Investigación y prueba del ciberdelito (tesis de posgrado). Programa de Doctorado en Derecho y Ciencia Política, Universidad de Barcelona, Barcelona, España. | spa |
| dc.relation.references | Raji, F. et al. (2013). DEFF: A New Architecture for Private Online Social Networks. Security and Communication Networks, 6(12), 1460-1470. | spa |
| dc.relation.references | Rathore, S. et al. (2017). Social Network Security: Issues, Challenges, Threats, and Solutions. Information Sciences, 421, 43-69. | spa |
| dc.relation.references | Sahoo, S.R. and Gupta, B.B. (2020). Fake profile detection in multimedia big data on online social networks. International Journal of Information and Computer Security, 12(2-3), 303-331. | spa |
| dc.relation.references | Sahoo, S.R. and Gupta, B.B. (2021). Multiple features based approach for automatic fake news detection on social networks using deep learning. Applied Soft Computing, 100, 106983 | spa |
| dc.relation.references | Schneier, B. (2020). Haz clic aquí para matarlos a todos. Un manual de supervivencia. Ciudad de México, México: Titivillus. | spa |
| dc.relation.references | van Schaik, P. et al. (2018). Security and Privacy in Online Social Networking: Risk Perceptions and Precautionary Behaviour. Computers in Human Behavior, 78, 283-297. | spa |
| dc.relation.references | ZeroFOX. (2019). What is Social Media Security. Recuperado de https://www.zerofox.com/social-media-security/. | spa |
| dc.relation.references | Zhu, Y. et al. (2013). A survey of social-based routing in delay tolerant networks: positive and negative social effects. IEEE Communications Surveys & Tutorials, 15(1), 387-401. | spa |
| dc.rights.accessrights | info:eu-repo/semantics/openAccess | spa |
| dc.rights.coar | http://purl.org/coar/access_right/c_abf2 | spa |
| dc.rights.license | Atribución-NoComercial-SinDerivadas 2.5 Colombia | spa |
| dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/2.5/co/ | spa |
| dc.subject | amenazas digitales | spa |
| dc.subject | ciberdelincuentes | spa |
| dc.subject | redes sociales | spa |
| dc.subject | privacidad | spa |
| dc.subject | seguridad digital | spa |
| dc.subject | tic | spa |
| dc.subject.subjectenglish | Digital threats | spa |
| dc.subject.subjectenglish | cybercriminals | spa |
| dc.subject.subjectenglish | social networks | spa |
| dc.subject.subjectenglish | privacy | spa |
| dc.subject.subjectenglish | digital security | spa |
| dc.subject.subjectenglish | ICT | spa |
| dc.title | Herramientas de seguridad digital respecto de las garantías de la privacidad en las redes sociales | spa |
| dc.type.driver | info:eu-repo/semantics/bachelorThesis | spa |
| dc.type.hasversion | info:eu-repo/semantics/acceptedVersion | spa |
| dc.type.local | Tesis de Especialización | spa |
Archivos
Bloque original
1 - 2 de 2
Cargando...
- Nombre:
- AUTORIZACION PARA LA PUBLICACION DIGITAL DE OBRAS EN EL REPOSITORIO.pdf
- Tamaño:
- 466.12 KB
- Formato:
- Adobe Portable Document Format
- Descripción:
Cargando...
- Nombre:
- Artículo de reflexión.pdf
- Tamaño:
- 274.81 KB
- Formato:
- Adobe Portable Document Format
- Descripción:
Bloque de licencias
1 - 1 de 1
Cargando...
- Nombre:
- license.txt
- Tamaño:
- 1.71 KB
- Formato:
- Item-specific license agreed upon to submission
- Descripción: