Explore chapters and articles related to this topic
Securing Your Computers
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
The privacy settings of the browser should also be restricted to high level of privacy. Your location, personal information, login and passwords, and other information should also be not configured to show or save for every user on the computer. You should also set separate user group for accessing the computer resources. It is always recommended not to use the administrator account for normal activities such as emailing, Internet surfing, normal home or office work, or other such routine activities.
Students’ Secured and Unsecured Behaviours
Published in Abbas Moallem, Cybersecurity Awareness Among Students and Faculty, 2019
The following questions were asked in regard to privacy: Do you participate in online surveys, promotions in hopes of receiving goodies, gift cards, or prizes?Which of the following permissions are you most likely to give to third-party apps services online?Do you grant all permissions to every application while installing?Which of the following personal information are you willing to submit to applications/services that ask for such information?Is Google location service and/or other location services active on your phone (global positioning system [GPS] enabled)?On social media platforms like Facebook, do you give permissions to entertainment-based apps like “Which Game of Thrones character are you”?How likely are you to accept app/game invites on Facebook?Do you give permission to use your location to apps on your phone?What are the privacy settings on your favourite browser?Do you know what cookies are on the Internet and what they do?Do you accept cookies when browsing on the Internet?
Cybersecurity for children: an investigation into the application of social media
Published in Enterprise Information Systems, 2023
Victor Chang, Lewis Golightly, Qianwen Ariel Xu, Thanaporn Boonmee, Ben S. Liu
Privacy settings can be found on every social media application and are designed to give the users the ability to govern who can see their profile, what content they can see on their profile and if they have the ability to contact them (for example, call them or instant message). Privacy settings differ depending on what social media platform users are on, although they are typically unified with the same focus and intent in recent times. In addition to the effects on children, the digital footprint can also have a long-lasting and potentially damaging effect on adults once they start looking for career opportunities.