Security and privacy issues in social media
Gather information from publications and existing technologies related to the chosentopic. In general, youll read around 10 – 15 papers (2016 and newer). At the end of this phase, you have a clear understanding of the current state of research on the chosen topic, the existing security technology, and the need for additional security capabilities. … Read more