Final project post:

Network Information Security of PLN Worthy of Teenager’s Attention

Peiran Xu:V00990421

Xushi Lai:V00990212

Liu Qing: V00920386 

Prof: Jesse miller

EDCI 338 A02

3 Dec. 2021

Introduction:

People should properly protect their personal information from exposure in the network, but not all the information can be hidden. The security of personal privacy on the Internet is always a worrisome problem. The security of personal information becomes more important for teenagers. Easy exposure of personal information on the Internet may result in blackmail and cyberbullying. Meanwhile, as teenagers’ psychology is not as stable as that of adults, cyberbullying victims may tend to solve problems they meet with extreme measures.  In the article “ Blaming the Victim: The Effects of Extraversion and Information Disclosure on Guilt Attributions in Cyberbullying”, Mathias (2013) maintain that In the network, people tend to think that the objects in the network are virtual, so they do not think that their remarks are wrong. And when cyber-bullying happens, most people will look at it from the perspective of a bystander, and they rarely provide help for the victims of cyber-bullying. Therefore, this is also one of the main reasons for the continuous occurrence of tragedies in various countries. However, it is often difficult to communicate on the Internet without exposing too much personal information. Through the form of argument, whether teenagers should protect their personal information from disclosure on the Internet is discussed in this paper.

Liu: 

       Teenagers should protect their personal information to avoid cyber bullying

It’s very popular for people to share their daily lives on Twitter and Facebook. It can not only record your life and share your travel experiences, but also allows others to know you better. Moreover, when you work in the future, enterprises can also use these applications to learn about your personal experience. In other words, in today’s society, young people displaying their abilities has become an assessment of employers. At the same time, the popularity of the Internet enables people to make friends more easily through it. But it is believed that exposing personal information on the Internet is dangerous. When you deliberately conceal your personal information, you may be seen as a viritua person by others during communication, thus you may be hard to make real friends on the Internet. Some functions such as friend recommendation can avoid network users from exposure of private information in cyber space. In Twitter and Facebook, friend Recommendation is a very useful function. In the article “Social Friend recommendation based on multiple network correlation”,Huang (2016) mention that this function can push some of your friends in reality to you and help internet users with cyber communication, because you and your friends well know about who that is. However, friend recommendation is advantageous on the one hand and also disadvantageous on the other hand. Some of those in the list of friend recommendation are already good friends with you in the real world. It is therefore disadvantageous for your circle of friends to expand. Due to the COVID-19 pandemic, PLN has become an important way for people to learn knowledge, which not only make it easy for people to learn, but also allows people to save more time. In the article “ Encouraging Teacher Development of a Personal Learning Network (PLN) in Twitter”, Oliver (2016) said that PLN can also help people protect their personal information. PLN has a special website to protect people’s privacy, and everyone will register with their real names when signing up for an account. Users can choose whether they want their information to be viewed. Besides, if people make negative comments on the Internet, they can easily be blamed. In this way, people will always be vigilant about what they say online. PLN also has a dedicated online regulator to screen topics and comments, so as to prevent people’s opinions from hurting others to the greatest extent. Therefore, PLN could help teenage to protect their private information on the internet.

Lai:

Teenagers should pay attention to property information and personal information

“Social media is a big part of many teens’ lives. A 2018 Pew Research Center survey of nearly 750 13- to 17-year-olds found that 45% are online almost constantly and 97% use a social media platform, such as YouTube, Facebook, Instagram or Snapchat.”(Teens and social media use: What’s the impact?)

       With the development of networking, more and more teenagers tend to create their PLNs and use online social media to share their ideas and life. But most of them do not realize the importance of personal networking information. “In 2020, the United States saw approximately 1,100 reported data breaches, according to a report published by the Identity Theft Resource Center. Included in that tally are the more than 300 million individuals who were affected by publicly reported data breaches.”(The relevance and importance of network security) From that, we know how important the security of personal information is when people use networking. As a result, I believe teenagers are definitely worth attaching importance to personal information and protecting. Firstly, if teenagers have their personal information stolen while using their PLN, they cannot know who obtained their information and do not know what others will do with their information. The most likely threat they face is the sale of personal information. According to “Your Data Is Shared and Sold…What’s Being Done About It?”, it is not difficult for these companies to know what you did and what you want through buying information from the public. (Pasternack) In that case, these people who obtain teenagers’ privacy may publicize the privacy of these stolen youths online or threaten them for fun or money. For example, I have a friend who was defrauded of 2000 dollars due to internet fraud. These scam gangs purchased my friend’s personal information through Wechat and contacted him through Wechat and fabricated lies to defraud him of his personal property. These lies all sound very true. This is because the lies are written based on my friend’s personal information. They even knew his Id. Also, These teenagers may fall into personal safety after their address is stolen. Especially for women among teenagers, for instance, a girl sent a tweet on Twitter or Facebook. This tweet roughly means that she has only one person at home and her family will not be back tonight. At this time, some people may find a way to steal her personal information and go to her home to cause life threats. Therefore, these behaviors that do not pay attention to the security of their PLN information or the lack of self-protection awareness of PLN information may cause serious threats to the property and personal life of the relatives and teenagers. I think that the reason why young people lack the protection of personal privacy is that most people think that the Internet is no substantial harm to them and feel that things on the Internet are very far away from them. But it is too late when they are truly in danger. Also, education and publicity for personal information protection are not enough, and most young people lack this knowledge. Therefore, we should strengthen the awareness of young people to protect their personal information when they are using PLN and make them aware of the importance of protecting personal information.

Xu:

Views and suggestions on information security when teenagers play games.

In the current big data environment, network information security is very important, “Cybersecurity is a widely used term that speaks to the security of systems and data but has many different definitions. Examples include “ prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation. “(Matt Bishop et al. 5). Especially young people need to pay more attention because now there are many criminals who use the big data environment to seek illegitimate interests and use the theft of personal information for fraud and Induced purchases, but many teenagers have not established cognition in this regard, and social software, game software, and shopping software now occupy most of the youth’s online space and extend their social life through this software, so they will use this software Leave complete personal information on the website, and criminals will use this information to commit fraud.” While most cyber experiences are extremely positive, many young people appear to go on “auto-pilot” when they are online, not thinking twice about broadcasting intimate details about themselves on various websites. Regrettably, this has resulted in abuses and unanticipated consequences ranging from cyberbullying, identity theft, and stalking, to school expulsions and future job prospects being ruined by indiscretions posted online.” (A Cavoukian 1) For example, I saw a piece of news before that a teenager was defrauded of gaming equipment worth thousands of dollars for leaking game account information.” Identity fraud cost Americans a total of about $56 billion last year, with about 49 million consumers falling victim. “(Leonhardt)so     I think we must disable the in-game charging items because many teenagers and even adults have gradually become accustomed to playing games through their mobile terminals in their leisure time, but there are several points when playing games. Notice. First of all, don’t associate a bank card with an account. Sometimes inadvertent clicks may cause irreparable deductions, so we must cut off the problem of deductions from the root cause. Secondly, go to the official store to download the game. You can check the comments before downloading. If you find that the game has similar problems, it is recommended not to install it. Many fee deduction codes are built into the game, and the fee is directly deducted without going through user review. After being maliciously deducted, the user will not receive the prompt message, but can only know it by querying the phone consumption record, which is unknown to the user who generally does not query the bill. And I think young people should be cautious in online shopping because while enjoying the convenience of online shopping, don’t forget the following points: Be sure to pay through a third-party transaction platform; carefully check the seller’s creditworthiness, and don’t be confused by the high reputation that is brushed out; Don’t be fooled by low prices, keep in mind that there will be no pie in the sky; keep the bills and chat records; open the confirmation in person after receiving the goods. Therefore, it is hoped that young people can build their cognition on the safety of network information, and that network knowledge literacy is a new content of modern family education. To protect the rights and interests of minors, we should scientifically and systematically promote minors’ new media literacy education.

Discussion:

Lai

For Liu’s idea, I’m interested in the part of friend Recommendation. Because when I use social apps with my PLN, I find that these social apps generally recommend friends to me in two ways. First, recommend people who are using this app to me through the address book. Most of these people I know, but in this way, there is no change in my social circle. The other is to recommend people nearby, either in the same city or in the same university. I prefer the second method, which is the most efficient if I want to make new friends. But I think this method is also dangerous, even if Liu said in her article that the current app requires real-name registration and various personal information. Therefore, we still have to be cautious about making friends through social apps. 

For Xu’s idea, I am interested in the in-game charging part. Because this is a way to deceive gamers, many games use free as a gimmick to attract gamers to play, but various items in the game still need to be recharged to obtain. What’s more, some mobile games use free-to-play publicity methods to attract gamers and then push low-priced gift packages to players in the game to induce players to consume. Many minors may recharge in this game by using a credit card bound to their parent’s mobile phone. Therefore, for “free” games, you should carefully check the game’s information and not be easily induced to consume.

Xu:

       I don’t agree that Liuqing has a dedicated website about PLN to protect people’s privacy. Everyone will register with their real name when registering an account. Users can choose whether to view their information because although there are special websites that supervise these, current criminals can still use the real information of others to register accounts, so this information is false for others, so when you create an account Later, if you check the real information of others, it is very likely to use this information to conduct criminal activities. Many teenagers do not have the awareness of prevention in this aspect, so even if there is a special website supervision condition, it is still necessary to establish this aspect for the teenagers. Cognition, on how to build cognition, I think schools and society can offer some lectures on network information security, which can not only teach young people but also allow their parents to learn these so that they can teach their children back because parents Are the best teacher for children.

I really like the story shared by Lai Xushi about a girl who was at home by herself but posted a tweet showing that she was at home by herself, and her personal safety was endangered by the stolen information. It is not difficult to see her own PLN from the story shared by Lai Xushi. How important is safety? In today’s network-developed world, every teenager regards social media as a very important part of their lives. For example, many people take a photo and post it on social media to share no matter what happens. Now, although this kind of thing is sometimes good and allows more people to pay attention to it, sometimes it is not very good. We can share our lives on social media, but it’s best to share it. Time to protect your own information, such as location information and so on.

Liu:

From my perspective, Lai’s idea is really interesting. Network fraud has become a very seriously problem. If teenagers do not protect their personal privacy, they are easy to be cheated of money on the Internet. Many teenager are not aware of dangers of the internet. I think Lai’s idea can help teenagers protect themselves on the Internet. However, PLN also have limitation. For example, If you don’t expose your information on internet, your friends may question your identity. Thus, teenager also will lose a great deal of opportunity of communication with their friend.

       For Xu’s idea, Online games are a tool to kill time. It is not only that teenagers like to play, but Also adults like to play online games in their free time. Therefore, online games have the function of communication. This will expose people’s personal information on the internet. I think people should improve teenagers’ awareness of network security. In this way, they can avoid being cheated in online games.

Conclusion:

       Through this method of argumentation, we separately elaborated our views and ideas and verified these views through discussion. Liu Qing mentioned that professional websites can protect personal privacy through real-name authentication, and Lai Xushi mentioned that the protection of personal privacy and property privacy should be strengthened on the youth network. Security, Xu Peiran mentioned strengthening the awareness of youth game network information security. With the views of the three of us, they agreed that the personal information security of young people should improve their awareness. All other factors cannot ensure that young people can well protect the security of personal information. Therefore, we recommend that young people use formal and Safe websites and software, and minimize the leakage of personal information and location information when sharing life with social software, and at the same time reduce the investment in-game property and increase the protection of payment information in online games.

Reference

Cavoukian, A., 2021. Online Privacy: Make Youth Awareness and Education a Priority. [online] Ipc.on.ca. Available at: <https://www.ipc.on.ca/wp-content/uploads/resources/youthonline.pdf> [Accessed 24 November 2021].

Dodge, Ronald C., Lynn Futcher, and SpringerLink (Online service). Information Assurance and Security Education and Training: 8th IFIP WG 11.8 World Conference on Information Security Education, WISE 8, Auckland, New Zealand, July 8-10, 2013, Proceedings, WISE 7, Lucerne Switzerland, June 9-10, 2011, and WISE 6, Bento Gonçalves, RS, Brazil, July 27-31, 2009, Revised Selected Papers. vol. 406, Springer Berlin Heidelberg, Berlin, Heidelberg, 2013.

Huang, S., Zhang, J., Wang, L., & Hua, X.-S. (2016). Social Friend recommendation based on multiple network correlation. IEEE Transactions on Multimedia18(2), 287–299. https://doi.org/10.1109/tmm.2015.2510333 

Leonhardt, Megan. “Consumers Lost $56 Billion to Identity Fraud Last Year-Here’s What to Look out For.” CNBC, CNBC, 23 Mar. 2021, https://www.cnbc.com/2021/03/23/consumers-lost-56-billion-dollars-to-identity-fraud-last-year.html.

Oliver, K. (2016, March 21). Encouraging teacher development of a personal learning network (PLN) in Twitter. Encouraging Teacher Development of a Personal Learning Network (PLN) in Twitter – Learning & Technology Library (LearnTechLib). Retrieved November 26, 2021, from https://www.learntechlib.org/p/171763/. 

Pasternack, Alex. “Here Are the Data Brokers Quietly Buying and Selling Your Personal Information.” Fast Company, Fast Company, 28 May 2019, https://www.fastcompany.com/90310803/here-are-the-data-brokers-quietly-buying-and-selling-your-personal-information.

“Teens and Social Media Use: What’s the Impact?” Mayo Clinic, Mayo Foundation for Medical Education and Research, 21 Dec. 2019, https://www.mayoclinic.org/healthy-lifestyle/tween-and-teen-health/in-depth/teens-and-social-media-use/art-20474437.

“The Relevance and Importance of Network Security.” Consolidated Technologies, Inc., 27 Apr. 2021, https://consoltech.com/blog/why-network-security-is-more-important-than-ever/

Weber, M. Ziegele, M. (n.d.). Blaming the victim: The effects of extraversion and information disclosure on guilt attributions in cyberbullying. Cyberpsychology, behavior and social networking. Retrieved November 25, 2021, from https://pubmed.ncbi.nlm.nih.gov/23441684/. 

Leave a Reply

Your email address will not be published. Required fields are marked *