Zobrazeno 1 - 4
of 4
pro vyhledávání: '"Phillip Nyoni"'
Autor:
Phillip Nyoni, Mthulisi Velempini
Publikováno v:
South African Journal of Science, Vol 114, Iss 5/6, Pp 5-5 (2018)
Users’ privacy on social media platforms continues to be important as users face numerous threats to their personal data. Social media sites such as Facebook store large amounts of users’ personal data which make such sites prime targets for hack
Externí odkaz:
https://doaj.org/article/4cc5c164dc534961a0e0508e53f9a942
Autor:
Phillip Nyoni, Mthulisi Velempini
Publikováno v:
South African Journal of Information Management, Vol 17, Iss 1, Pp e1-e10 (2015)
Background: Social networks have changed the way people communicate. Business processes and social interactions revolve more in the cyber space. However, as these cyber technologies advance, users become more exposed to privacy threats. Regulatory fr
Externí odkaz:
https://doaj.org/article/fcb67a006dae4756a7a59ffc26dbda91
Autor:
Mthulisi Velempini, Phillip Nyoni
Publikováno v:
South African Journal of Science, Volume: 114, Issue: 5-6, Pages: 1-5, Published: JUN 2018
South African Journal of Science, Vol 114, Iss 5/6, Pp 5-5 (2018)
South African Journal of Science, Vol 114, Iss 5/6, Pp 5-5 (2018)
Users’ privacy on social media platforms continues to be important as users face numerous threats to their personal data. Social media sites such as Facebook store large amounts of users’ personal data which make such sites prime targets for hack
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d3f4a8d2d11662efaa6aa7dcdf0fc8ae
http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S0038-23532018000300009&lng=en&tlng=en
http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S0038-23532018000300009&lng=en&tlng=en
Autor:
Mthulisi Velempini, Phillip Nyoni
Publikováno v:
2013 Pan African International Conference on Information Science, Computing and Telecommunications (PACT).
Social networks have revolutionized the way people communicate and keep in touch. However, as these new technologies advance, users become more exposed to cyber security threats. There is a need to explore and evaluate these threats for their potenti