Encryption in Social Media Platforms
Location
Session 2 (Room 1308)
Session Format
Paper Presentation
Academic Unit
Department of Information Technology
Research Area Topic:
Computer Science - Computer Security
Co-Presenters and Faculty Mentors or Advisors
Kirsten Waters
Mario Lanza
Benjamin Chapman
Abstract
Social media is used daily by billions of people around the world. People use social media for many purposes from keeping up with family and friends, making business connections, marketing, and much more. Sharing information digitally makes it vulnerable for hacking and interception. End-to-end encryption provides a more secure way to transmit data and information. Location-based mobile social network services have been growing and increasing in activities in the past several years. There are a few attacked that can be used to cheat GPS verification. Location verification techniques and mitigation can limit location information accessed. We will discuss the security issues and solutions in social media platforms.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Presentation Type and Release Option
Presentation (Open Access)
Start Date
4-20-2022 1:00 PM
End Date
4-20-2022 2:00 PM
Recommended Citation
Waters, Kirsten; Lanza, Mario; and Chapman, Benjamin, "Encryption in Social Media Platforms" (2022). GS4 Georgia Southern Student Scholars Symposium. 64.
https://digitalcommons.georgiasouthern.edu/research_symposium/2022/2022/64
Encryption in Social Media Platforms
Session 2 (Room 1308)
Social media is used daily by billions of people around the world. People use social media for many purposes from keeping up with family and friends, making business connections, marketing, and much more. Sharing information digitally makes it vulnerable for hacking and interception. End-to-end encryption provides a more secure way to transmit data and information. Location-based mobile social network services have been growing and increasing in activities in the past several years. There are a few attacked that can be used to cheat GPS verification. Location verification techniques and mitigation can limit location information accessed. We will discuss the security issues and solutions in social media platforms.