Analyzing Facebook Cambridge Analytical Attack and Sony PlayStation Network Outage
VerifiedAdded on 2023/01/20
|11
|3452
|29
AI Summary
This article analyzes the Facebook Cambridge Analytical attack and the Sony PlayStation network outage, discussing the causes, impact, and preventive measures.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
IT Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT SECURITY
1
Table of Contents
Part A.....................................................................................................................................................2
Introduction.......................................................................................................................................2
Question 1: Facebook Cambridge analytical attack...........................................................................2
Conclusion.........................................................................................................................................4
Question 2: asynchronous I/O activities............................................................................................4
Part B.....................................................................................................................................................5
Introduction.......................................................................................................................................5
Sony PlayStation network outage case..............................................................................................6
What was the problem?................................................................................................................6
Who were affected and how?.......................................................................................................6
How was the attack carried out?...................................................................................................7
What could have been done to prevent the attack?.....................................................................7
Conclusion.........................................................................................................................................8
References.............................................................................................................................................9
1
Table of Contents
Part A.....................................................................................................................................................2
Introduction.......................................................................................................................................2
Question 1: Facebook Cambridge analytical attack...........................................................................2
Conclusion.........................................................................................................................................4
Question 2: asynchronous I/O activities............................................................................................4
Part B.....................................................................................................................................................5
Introduction.......................................................................................................................................5
Sony PlayStation network outage case..............................................................................................6
What was the problem?................................................................................................................6
Who were affected and how?.......................................................................................................6
How was the attack carried out?...................................................................................................7
What could have been done to prevent the attack?.....................................................................7
Conclusion.........................................................................................................................................8
References.............................................................................................................................................9
IT SECURITY
2
Part A
Introduction
The term security breach is defined as the cyber-threat which impact on the computer
devices and networks. The fundamental concept of security breach breaks the security
of the computer devices by using malware software and enters into the individual’s
peripheral devices for accessing their personal information and data [1]. The key
objective of this study is to examine the principle of computer security breaches and
critically analyse the Facebook Cambridge analytical case
Question 1: Facebook Cambridge analytical attack
It is observed that Facebook is one of the largest social media which is used by many
companies for communicating with users and stakeholders. In the year 2018 Facebook
was suffered from the data breach and cyber-attack related problem due to which
numbers of users lost their private details and information [1]. The researchers and IT
team designed and implemented an application which is called an open graph that
contained the personal information of users along with their friends and family
members. The main problem of this attack was the Cambridge analytia collected the
information and data sets of users and developers implemented an application with less
security due to which numbers of consumers were faced the data breach and security
related issues.
Furthermore, the application also harvested the information of user’s friends due to the
open graph platform. Cambridge analytical obtained personal details of users, for
example, name, address, profile and mobile numbers and used these data in the field of
politics. In the year 2017, it was identified that the personal data of 50 million Facebook
users were harvested by Cambridge analytical [2]. Such kind of data breach problem has
occurred due to lack of security and open graph application implemented by the
Facebook organization. This information was provided by blower Christopher that also
identified that these data were used in Ted Cruz’s campaign and they were responsible
for the defeat of Hillary Clinton. According to the recent investigation, Facebook
Cambridge analytica was occurred due to lack of security and it was a mistake of
2
Part A
Introduction
The term security breach is defined as the cyber-threat which impact on the computer
devices and networks. The fundamental concept of security breach breaks the security
of the computer devices by using malware software and enters into the individual’s
peripheral devices for accessing their personal information and data [1]. The key
objective of this study is to examine the principle of computer security breaches and
critically analyse the Facebook Cambridge analytical case
Question 1: Facebook Cambridge analytical attack
It is observed that Facebook is one of the largest social media which is used by many
companies for communicating with users and stakeholders. In the year 2018 Facebook
was suffered from the data breach and cyber-attack related problem due to which
numbers of users lost their private details and information [1]. The researchers and IT
team designed and implemented an application which is called an open graph that
contained the personal information of users along with their friends and family
members. The main problem of this attack was the Cambridge analytia collected the
information and data sets of users and developers implemented an application with less
security due to which numbers of consumers were faced the data breach and security
related issues.
Furthermore, the application also harvested the information of user’s friends due to the
open graph platform. Cambridge analytical obtained personal details of users, for
example, name, address, profile and mobile numbers and used these data in the field of
politics. In the year 2017, it was identified that the personal data of 50 million Facebook
users were harvested by Cambridge analytical [2]. Such kind of data breach problem has
occurred due to lack of security and open graph application implemented by the
Facebook organization. This information was provided by blower Christopher that also
identified that these data were used in Ted Cruz’s campaign and they were responsible
for the defeat of Hillary Clinton. According to the recent investigation, Facebook
Cambridge analytica was occurred due to lack of security and it was a mistake of
IT SECURITY
3
developers that produced the open graph application and he had failed to secure the
data or information of consumers.
It has occurred because the open graph application obtained the personal information
of consumers and also accessed their friend’s profiles. A recent study identified the
more than 50 million users were affected due to this cyber-attack and many companies
were lost their markets and stakeholders [3]. It also affected the value of Facebook
along with their share market and Facebook accounts of consumers. After this cyber-
attack they corporation and government transferred notifications and messages to
users for removing their accounts for devices and also notified them related to the
gathered data and information. The major problem of this attack was that victims
obtained the personal details of users without their permission and developers
developed the less efficient website. It is observed that a fine of £500,000 was forced on
Facebook by the ICO for the failure of the administration to control and maintain
transparency and privacy of consumer’s data and profiles.
Moreover, Facebook is one of the biggest platforms which produce a profit of $500000
in each five and a half minute but this is the largest fine that can be applied by
information commissioner’s office on third parties [4]. Recent investigation has
identified that in September 2018, Facebook was included in another scandal where
hackers and criminals stole login data of over 50 million users. There are several
possible solutions that used by Facebook for improving security of computer devices
and reducing security breaches, for example, blocked open graph platform, changed the
entire security and network devices, sent notification to users for improving the
security of user’s accounts, developers suggested users adopt the high level security
password and biometric systems.
By using all these steps and techniques Facebook secured networks and accounts of
other users and also identified the risk factors linked with this cyber-crime. Therefore, it
is suggested that users should ensure that they use their accounts in only authentic
servers and networks and avoid the use of third party application because they are
developed by hackers for obtaining their private details [5]. There are several steps
developed and implemented by Facebook for analysing the Cambridge analytica case
3
developers that produced the open graph application and he had failed to secure the
data or information of consumers.
It has occurred because the open graph application obtained the personal information
of consumers and also accessed their friend’s profiles. A recent study identified the
more than 50 million users were affected due to this cyber-attack and many companies
were lost their markets and stakeholders [3]. It also affected the value of Facebook
along with their share market and Facebook accounts of consumers. After this cyber-
attack they corporation and government transferred notifications and messages to
users for removing their accounts for devices and also notified them related to the
gathered data and information. The major problem of this attack was that victims
obtained the personal details of users without their permission and developers
developed the less efficient website. It is observed that a fine of £500,000 was forced on
Facebook by the ICO for the failure of the administration to control and maintain
transparency and privacy of consumer’s data and profiles.
Moreover, Facebook is one of the biggest platforms which produce a profit of $500000
in each five and a half minute but this is the largest fine that can be applied by
information commissioner’s office on third parties [4]. Recent investigation has
identified that in September 2018, Facebook was included in another scandal where
hackers and criminals stole login data of over 50 million users. There are several
possible solutions that used by Facebook for improving security of computer devices
and reducing security breaches, for example, blocked open graph platform, changed the
entire security and network devices, sent notification to users for improving the
security of user’s accounts, developers suggested users adopt the high level security
password and biometric systems.
By using all these steps and techniques Facebook secured networks and accounts of
other users and also identified the risk factors linked with this cyber-crime. Therefore, it
is suggested that users should ensure that they use their accounts in only authentic
servers and networks and avoid the use of third party application because they are
developed by hackers for obtaining their private details [5]. There are several steps
developed and implemented by Facebook for analysing the Cambridge analytica case
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IT SECURITY
4
and improve the security of the computer system [6]. All of these steps are described
below:
Critically evaluates all application that accessed the private data of consumers
Use only authentic servers and networks during the communication process
Turning off application access to users which can help to reduce the traffic
signals
Altering the login password of Facebook so requests can only see the operators
name and photo [7].
Conclusion
From the above discussion it has been concluded that lack of security and use of
unauthentic servers are very common problems that increase cyber-attacks and data
breach issues. This report highlighted the data breach related cases and critically
evaluated the impact of cyber-attacks on the user's personal data or information.
Moreover, this study also discussed Facebook Cambridge analytical.
Question 2: asynchronous I/O activities
The term asynchronous input and output is defined as the process that permits various
data processing methods to continue before the transmission has completed. It is
identified that the fundamental working of input and output process is very slow as
compared to the data processing system which is one of the largest issues with memory
protection approach [8]. Mainly, the I/O system initially accesses the data or
information and takes several times for execution but asynchronous input output
system block the programming process at the time of communication.
In the case of the asynchronous system once the process read or write the computer
code then the process cells are returned in the main device if the input and output code
has been executed effectively. The key benefit of an operating system with a fence
register is the capability to relocate which is very significance in the multiuser
environment. Moreover, the relocation register resolves the issue by delivering the base
or starting address. Mainly, the fence register delivers a lower bound rather than upper
bound and it is analysed that an upper bound is very useful for identifying the total
space required for performing source code [9]. For huge computer severs it cannot be
utilized because it produces several issues with the memory protection system. In order
4
and improve the security of the computer system [6]. All of these steps are described
below:
Critically evaluates all application that accessed the private data of consumers
Use only authentic servers and networks during the communication process
Turning off application access to users which can help to reduce the traffic
signals
Altering the login password of Facebook so requests can only see the operators
name and photo [7].
Conclusion
From the above discussion it has been concluded that lack of security and use of
unauthentic servers are very common problems that increase cyber-attacks and data
breach issues. This report highlighted the data breach related cases and critically
evaluated the impact of cyber-attacks on the user's personal data or information.
Moreover, this study also discussed Facebook Cambridge analytical.
Question 2: asynchronous I/O activities
The term asynchronous input and output is defined as the process that permits various
data processing methods to continue before the transmission has completed. It is
identified that the fundamental working of input and output process is very slow as
compared to the data processing system which is one of the largest issues with memory
protection approach [8]. Mainly, the I/O system initially accesses the data or
information and takes several times for execution but asynchronous input output
system block the programming process at the time of communication.
In the case of the asynchronous system once the process read or write the computer
code then the process cells are returned in the main device if the input and output code
has been executed effectively. The key benefit of an operating system with a fence
register is the capability to relocate which is very significance in the multiuser
environment. Moreover, the relocation register resolves the issue by delivering the base
or starting address. Mainly, the fence register delivers a lower bound rather than upper
bound and it is analysed that an upper bound is very useful for identifying the total
space required for performing source code [9]. For huge computer severs it cannot be
utilized because it produces several issues with the memory protection system. In order
IT SECURITY
5
to avoid such kind of problems, users can adopt the operating system along with the
fence register which is one of the effective processes. It is observed that the fence
register has the potential to relocate the device and it can be utilized in the field of the
multi consumer. Generally, the relocation approach decreases the issue by delivering a
base address and all IP addresses are offset from the main station.
It is observed that the term fence register is defined as a base register that delivers a
low bound system. Therefore, with the help of this approach consumers can protect and
secure their computer systems and reduce issues linked with the asynchronous input
and output system [8]. It is analysed that when any consumer changes the source code
of the system them the operating system also change the information of the centre
station. At that time, the bound register delivers a platform for reflecting the address
space of users networks. So, by combining both the bound system and base station
users can protect the personal data or information in an effective manner and they can
reduce the risks associated with the computer networks.
It is suggested that users can use the upper bound system along with the fence register
because it has the ability for determining how much space is required for saving source
code in the memory [9]. However, users can use variable fence register in order to
control and manage the memory security and improve the overall performance of the
system. It is suggested that consumers should ensure that they use only authentic
severs and select the effective operating system because there are many third party
used that provide less effective systems. Due to which consumers can lose their private
details and information. So, by using the upper bound system and fence register
problems and limitations linked with the asynchronous input and output system can be
monitored.
Part B
Introduction
In the year 2011 Sony were suffered from the cyber-attack and hacking and PlayStation
network outage was the result of external intrusion on the Sony organization. At that
time Sony has faced the problem of cyber hacking and data breaching due to which
around 77 million user’s accounts were hackers by the criminals [10]. The aim of this
5
to avoid such kind of problems, users can adopt the operating system along with the
fence register which is one of the effective processes. It is observed that the fence
register has the potential to relocate the device and it can be utilized in the field of the
multi consumer. Generally, the relocation approach decreases the issue by delivering a
base address and all IP addresses are offset from the main station.
It is observed that the term fence register is defined as a base register that delivers a
low bound system. Therefore, with the help of this approach consumers can protect and
secure their computer systems and reduce issues linked with the asynchronous input
and output system [8]. It is analysed that when any consumer changes the source code
of the system them the operating system also change the information of the centre
station. At that time, the bound register delivers a platform for reflecting the address
space of users networks. So, by combining both the bound system and base station
users can protect the personal data or information in an effective manner and they can
reduce the risks associated with the computer networks.
It is suggested that users can use the upper bound system along with the fence register
because it has the ability for determining how much space is required for saving source
code in the memory [9]. However, users can use variable fence register in order to
control and manage the memory security and improve the overall performance of the
system. It is suggested that consumers should ensure that they use only authentic
severs and select the effective operating system because there are many third party
used that provide less effective systems. Due to which consumers can lose their private
details and information. So, by using the upper bound system and fence register
problems and limitations linked with the asynchronous input and output system can be
monitored.
Part B
Introduction
In the year 2011 Sony were suffered from the cyber-attack and hacking and PlayStation
network outage was the result of external intrusion on the Sony organization. At that
time Sony has faced the problem of cyber hacking and data breaching due to which
around 77 million user’s accounts were hackers by the criminals [10]. The aim of this
IT SECURITY
6
report is to analyse the Sony PlayStation outage case and risk factors linked with this
cyber-attack.
Sony PlayStation network outage case
It is observed that it is one of the largest attacks in the history that affected numbers of
user’s accounts along with their private details. Such kind of problem has been occurred
in the Sony networks due to use of unauthentic servers and applications. This cyber-
attack occurred between 17 and 19 April 2011 and during this time Sony turned off
their computer networks and PlayStation servers for reducing the impact of cyber-
attack and data breach.
What was the problem?
A recent study identified that hackers and criminals obtained the data and information
of 77 million users and Sony identified that the lack of security is one of the biggest
concern due to which they faced the issue of hacking. Moreover, they also lost their
value in the market and numbers of users because they did not protect accounts and
profiles of users [11]. After this malware attack, the management team of Sony
developed and implemented the PlayStation 3 firmware as a privacy system that
required users to change their passwords for improving the security of their data or
information.
It is analysed that hackers used malware and malicious networks for breaking the
security of Sony’s networks and collected personal details of users, for example, login
ID, user name, profile, mobile number and so on [12]. Sony stated that hackers and
criminals transfer the traffic signals and unwanted linked on their computer servers
due to which their computer system did not work properly. Moreover, criminals
entered into their servers and collected the accounts of users along with their private
details.
The major problem of this attack was hackers transferred the unwanted signals on
networks and servers of Sony and they were suffered from data breaching issues.
Moreover, users also faced the same issue because they were connected with the Sony
PlayStation and allowed their personal information to PlayStation.
6
report is to analyse the Sony PlayStation outage case and risk factors linked with this
cyber-attack.
Sony PlayStation network outage case
It is observed that it is one of the largest attacks in the history that affected numbers of
user’s accounts along with their private details. Such kind of problem has been occurred
in the Sony networks due to use of unauthentic servers and applications. This cyber-
attack occurred between 17 and 19 April 2011 and during this time Sony turned off
their computer networks and PlayStation servers for reducing the impact of cyber-
attack and data breach.
What was the problem?
A recent study identified that hackers and criminals obtained the data and information
of 77 million users and Sony identified that the lack of security is one of the biggest
concern due to which they faced the issue of hacking. Moreover, they also lost their
value in the market and numbers of users because they did not protect accounts and
profiles of users [11]. After this malware attack, the management team of Sony
developed and implemented the PlayStation 3 firmware as a privacy system that
required users to change their passwords for improving the security of their data or
information.
It is analysed that hackers used malware and malicious networks for breaking the
security of Sony’s networks and collected personal details of users, for example, login
ID, user name, profile, mobile number and so on [12]. Sony stated that hackers and
criminals transfer the traffic signals and unwanted linked on their computer servers
due to which their computer system did not work properly. Moreover, criminals
entered into their servers and collected the accounts of users along with their private
details.
The major problem of this attack was hackers transferred the unwanted signals on
networks and servers of Sony and they were suffered from data breaching issues.
Moreover, users also faced the same issue because they were connected with the Sony
PlayStation and allowed their personal information to PlayStation.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
IT SECURITY
7
Who were affected and how?
Such kind of data breach issue occurred due to use of third party networks and fewer
security devices. Moreover, many users and employees access their personal accounts
in unauthentic networks which are developed by the hackers for gathering the personal
information of consumers [13]. At that time, many consumers were tried to connect
their accounts but they received an error notification that indicated undergoing
maintenance. The IT team of Sony suggested that they were not able to secure the
private details of users and hackers gathered around 70 million user's accounts from
the computer server.
During this cyber-attack numbers of users and their family were suffered from hacking
and data breach related problems and lost personal information of their accounts. The
recent investigation identified that more than 50 million consumers were affected due
to this cyber-attack because they are linked with the Sony PlayStation network and
logged in their personal accounts in the PlayStation [14].
How was the attack carried out?
Such kind of attack was carried out by sending the traffic signals to networks of Sony
PlayStation. Moreover, hackers designed and implemented malware programmes for
producing unauthentic signals and they blocked the computer servers of Sony for
accessing their personal accounts [14]. After that, they entered into their servers and
broken the security and privacy systems of Sony in order to obtain the private details of
the user's accounts. Mainly, criminals detected the IP address and kind of network used
by Sony and transferred that huge amount of traffic signals. Moreover, the login ID and
passwords of PlayStation were exposed by using unauthentic networks and servers. It is
observed that the key issue of Sony PlayStation is that they store the credit or debit card
facts of customers in order to play game and admission their services. In which hackers
obtained the personal information of users where most of the consumers were lost bank
details like credit or debit card numbers [16].
What could have been done to prevent the attack?
After this attack, Sony transferred a notification to users for removing their accounts
from their computer devices and change passwords of their accounts. Moreover, many
users changed their accounts details and removed their banking details like debit card
7
Who were affected and how?
Such kind of data breach issue occurred due to use of third party networks and fewer
security devices. Moreover, many users and employees access their personal accounts
in unauthentic networks which are developed by the hackers for gathering the personal
information of consumers [13]. At that time, many consumers were tried to connect
their accounts but they received an error notification that indicated undergoing
maintenance. The IT team of Sony suggested that they were not able to secure the
private details of users and hackers gathered around 70 million user's accounts from
the computer server.
During this cyber-attack numbers of users and their family were suffered from hacking
and data breach related problems and lost personal information of their accounts. The
recent investigation identified that more than 50 million consumers were affected due
to this cyber-attack because they are linked with the Sony PlayStation network and
logged in their personal accounts in the PlayStation [14].
How was the attack carried out?
Such kind of attack was carried out by sending the traffic signals to networks of Sony
PlayStation. Moreover, hackers designed and implemented malware programmes for
producing unauthentic signals and they blocked the computer servers of Sony for
accessing their personal accounts [14]. After that, they entered into their servers and
broken the security and privacy systems of Sony in order to obtain the private details of
the user's accounts. Mainly, criminals detected the IP address and kind of network used
by Sony and transferred that huge amount of traffic signals. Moreover, the login ID and
passwords of PlayStation were exposed by using unauthentic networks and servers. It is
observed that the key issue of Sony PlayStation is that they store the credit or debit card
facts of customers in order to play game and admission their services. In which hackers
obtained the personal information of users where most of the consumers were lost bank
details like credit or debit card numbers [16].
What could have been done to prevent the attack?
After this attack, Sony transferred a notification to users for removing their accounts
from their computer devices and change passwords of their accounts. Moreover, many
users changed their accounts details and removed their banking details like debit card
IT SECURITY
8
number [15]. Sony PlayStation adopted an IT security team in order to manage data
breaching and hacking problems. Sony also designed and implemented several security
strategies and strategies for improving the privacy of their accounts and networks. It is
observed that they included few techniques and steps in their security programmes
which are described below:
Removed unwanted signals and networks
Turned on security steps and tools
Adopted firewall and high level antiviruses in order to detect the traffic signals
Suggested users to adopt high level passwords rather than simple and use only
authentic networks
Used backup plans for securing the personal data and information of users
Conclusion
It is concluded that use of unauthentic servers and networks increased the problem of a
data breach and Sony PlayStation was suffered from the cyber-attack. This report
critically reviewed the Sony PlayStation outage case and identified numbers of users
that affected due to this data breach. It is suggested that users should use only authentic
servers and networks in order to improve the security of their data and avoid unwanted
signals or mails by using a firewall or antivirus software.
8
number [15]. Sony PlayStation adopted an IT security team in order to manage data
breaching and hacking problems. Sony also designed and implemented several security
strategies and strategies for improving the privacy of their accounts and networks. It is
observed that they included few techniques and steps in their security programmes
which are described below:
Removed unwanted signals and networks
Turned on security steps and tools
Adopted firewall and high level antiviruses in order to detect the traffic signals
Suggested users to adopt high level passwords rather than simple and use only
authentic networks
Used backup plans for securing the personal data and information of users
Conclusion
It is concluded that use of unauthentic servers and networks increased the problem of a
data breach and Sony PlayStation was suffered from the cyber-attack. This report
critically reviewed the Sony PlayStation outage case and identified numbers of users
that affected due to this data breach. It is suggested that users should use only authentic
servers and networks in order to improve the security of their data and avoid unwanted
signals or mails by using a firewall or antivirus software.
IT SECURITY
9
References
[1]. M., Kaakinen, A. Oksanen and, P., Räsänen, “Did the risk of exposure to online
hate increase after the November 2015 Paris attacks?” A group relations
approach. Computers in Human Behavior, vol. 78, no. 12, pp.90-97, 2018.
[2]. B., Rieder, “Studying Facebook via data extraction: the Netvizz application.”
In Proceedings of the 5th annual ACM web science conference, vol. 12, no. 2, pp.
346-355, 2013.
[3]. C.R. Groom and, F.H., Allen, “The Cambridge Structural Database in retrospect
and prospect,” Angewandte Chemie International Edition, vol. 53, no. 3, pp.662-
671, 2014.
[4]. C.A., Auracher, “Getting Platform Envelopment Right to Emerge as the Ecosystem
Platform Leader-A Case Study on Facebook and LinkedIn-(2006-2013) (Bachelor's
thesis, University of Twente)”, 2016.
[5]. M.E., Reding, C.M., Ranger, J.B. Oliver and, P.B., Schultz, “Monitoring attack and
flight activity of Xylosandrus spp.(Coleoptera: Curculionidae: Scolytinae): The
influence of temperature on activity,” Journal of economic entomology, vol. 106,
no. 4, pp.1780-1787, 2013.
[6]. A.A., Berger, “Media and communication research methods: An introduction to
qualitative and quantitative approaches,” Sage Publications, vol. 12, no. 2, pp. 12-
14, 2018.
[7]. M., Hamrita, “A critical discourse analysis of the representation of Islamists on
Facebook pages in post-revolution Tunisia,” Bulletin of the Transilvania
University of Braşov, Series IV: Philology & Cultural Studies, vol. 9, no. 2, pp.5-21,
2016.
[8]. K., Arya, Y. Baskakov and, A., Garthwaite, “Tesseract: reconciling guest I/O and
hypervisor swapping in a VM,” In Acm Sigplan Notices, Vol. 49, No. 7, pp. 15-28,
2014.
[9]. H., Luu, B., Behzad, R. Aydt and, M., Winslett, “A multi-level approach for
understanding I/O activity in HPC applications,” In 2013 IEEE International
Conference on Cluster Computing (CLUSTER), vol. 10, no. 7, pp. 1-5, 2013.
9
References
[1]. M., Kaakinen, A. Oksanen and, P., Räsänen, “Did the risk of exposure to online
hate increase after the November 2015 Paris attacks?” A group relations
approach. Computers in Human Behavior, vol. 78, no. 12, pp.90-97, 2018.
[2]. B., Rieder, “Studying Facebook via data extraction: the Netvizz application.”
In Proceedings of the 5th annual ACM web science conference, vol. 12, no. 2, pp.
346-355, 2013.
[3]. C.R. Groom and, F.H., Allen, “The Cambridge Structural Database in retrospect
and prospect,” Angewandte Chemie International Edition, vol. 53, no. 3, pp.662-
671, 2014.
[4]. C.A., Auracher, “Getting Platform Envelopment Right to Emerge as the Ecosystem
Platform Leader-A Case Study on Facebook and LinkedIn-(2006-2013) (Bachelor's
thesis, University of Twente)”, 2016.
[5]. M.E., Reding, C.M., Ranger, J.B. Oliver and, P.B., Schultz, “Monitoring attack and
flight activity of Xylosandrus spp.(Coleoptera: Curculionidae: Scolytinae): The
influence of temperature on activity,” Journal of economic entomology, vol. 106,
no. 4, pp.1780-1787, 2013.
[6]. A.A., Berger, “Media and communication research methods: An introduction to
qualitative and quantitative approaches,” Sage Publications, vol. 12, no. 2, pp. 12-
14, 2018.
[7]. M., Hamrita, “A critical discourse analysis of the representation of Islamists on
Facebook pages in post-revolution Tunisia,” Bulletin of the Transilvania
University of Braşov, Series IV: Philology & Cultural Studies, vol. 9, no. 2, pp.5-21,
2016.
[8]. K., Arya, Y. Baskakov and, A., Garthwaite, “Tesseract: reconciling guest I/O and
hypervisor swapping in a VM,” In Acm Sigplan Notices, Vol. 49, No. 7, pp. 15-28,
2014.
[9]. H., Luu, B., Behzad, R. Aydt and, M., Winslett, “A multi-level approach for
understanding I/O activity in HPC applications,” In 2013 IEEE International
Conference on Cluster Computing (CLUSTER), vol. 10, no. 7, pp. 1-5, 2013.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
IT SECURITY
10
[10]. S., Goode, H., Hoehle, V. Venkatesh and, S.A., Brown, “User compensation
as a data breach recovery action: An investigation of the Sony PlayStation
Network breach,” MIS Quarterly, vol. 41, no. 3, pp. 10-15, 2017.
[11]. P., Galison, “The pyramid and the ring: A physics indifferent to ontology,”
In Research objects in their technological setting, vol. 12, no. 15, pp. 27-38, 2017.
[12]. C., Milburn, “Long live play: The PlayStation Network and technogenic
life,” In Research Objects in their Technological Setting, vol. 4, no. 6, pp. 117-134,
2017.
[13]. G., D’Angelo, S. Ferretti and, M., Marzolla, “Cloud for
Gaming,” Encyclopedia of Computer Graphics and Games, vol. 7, no, 8, pp.1-6,
2015.
[14]. L.R.R., Mattos, V. Varadharajan and, R., Nallusamy, “Data protection and
privacy preservation using searchable encryption on outsourced databases,”
In International Conference on Security in Computer Networks and Distributed
Systems, vol. 12, no. 5, pp. 178-184, 2012.
[15]. E. Woon and, A., Pang, “’Explicating the information vacuum: stages,
intensifications, and implications,” Corporate Communications: An International
Journal, vol. 22, no. 3, pp.329-353, 2017.
[16]. B.A., Olaniran, A., Potter, K.A. Ross and, B., Johnson, “A Gamer’s Nightmare:
An Analysis of the Sony PlayStation Hacking Crisis,” Journal of Risk Analysis and
Crisis Response, vol. 4, no. 3, pp.151-159, 2014.
10
[10]. S., Goode, H., Hoehle, V. Venkatesh and, S.A., Brown, “User compensation
as a data breach recovery action: An investigation of the Sony PlayStation
Network breach,” MIS Quarterly, vol. 41, no. 3, pp. 10-15, 2017.
[11]. P., Galison, “The pyramid and the ring: A physics indifferent to ontology,”
In Research objects in their technological setting, vol. 12, no. 15, pp. 27-38, 2017.
[12]. C., Milburn, “Long live play: The PlayStation Network and technogenic
life,” In Research Objects in their Technological Setting, vol. 4, no. 6, pp. 117-134,
2017.
[13]. G., D’Angelo, S. Ferretti and, M., Marzolla, “Cloud for
Gaming,” Encyclopedia of Computer Graphics and Games, vol. 7, no, 8, pp.1-6,
2015.
[14]. L.R.R., Mattos, V. Varadharajan and, R., Nallusamy, “Data protection and
privacy preservation using searchable encryption on outsourced databases,”
In International Conference on Security in Computer Networks and Distributed
Systems, vol. 12, no. 5, pp. 178-184, 2012.
[15]. E. Woon and, A., Pang, “’Explicating the information vacuum: stages,
intensifications, and implications,” Corporate Communications: An International
Journal, vol. 22, no. 3, pp.329-353, 2017.
[16]. B.A., Olaniran, A., Potter, K.A. Ross and, B., Johnson, “A Gamer’s Nightmare:
An Analysis of the Sony PlayStation Hacking Crisis,” Journal of Risk Analysis and
Crisis Response, vol. 4, no. 3, pp.151-159, 2014.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.