Technical Security and Privacy Issues

*Security and Privacy From a Legal, Ethical, and Technical Perspective*

[27] People First. Does what you do define who you are. 15 September 2012. Retrieved from: https://blog. peoplefirstps.com/connect2lead/

[28] Dreyfus E. Does what you do define who you are. Psychologically Speaking. 2010. Retrieved from: https://www.edwarddreyfusbooks. com/psychologically-speaking/

[29] Business Ethics Briefing. The Ethical Challenges and Opportunities of Social Media Use. (Issue 66). 2019. Retrieved from: https://www.ibe.org.uk/ userassets/briefings/ibe\_social\_media\_

[30] Staff Writer. The consequences of oversharing on social networks. Reputation Defender. 2018. Retrieved from: https://www.reputationdefender. com/blog/social-media/consequences-

[31] Business Ethics Briefing. The Ethical Challenges of Social Media. (Issue 22). 2011. Retrieved from: https:// www.ibe.org.uk/userassets/briefings/ ibe\_briefing\_22\_the\_ethical\_challenges\_

oversharing-social-networks

of\_social\_media.pdf

briefing.pdf

does-what-you-do-define-who-you-are/

what-you-do-define-you

Congreso Argentino de Ciencias de la

[20] Barrett-Maitland N, Barclay C, Osei-Bryson KM. Security in social networking services: A value-focused thinking exploration in understanding users' privacy and security concerns.

[21] Van Der Velden M, El Emam K. "Not all my friends need to know": A qualitative study of teenage patients, privacy, and social media. Journal of the American Medical Informatics Association. 2013;**20**(1):16-24

[22] Bolton RN, Parasuraman A, Hoefnagels A, Migchels N, Kabadayi S,

Gruber T, et al. Understanding Generation Y and their use of social media: A review and research agenda. Journal of Service Management.

[23] Cohn C. Social Media Ethics and Etiquette. CompuKol

[24] Nates C. The Dangers of Oversharing of Social Media. Pure Moderation. 2018. Retrieved from: https://www.puremoderation. com/single-post/The-Dangers-of-Oversharing-on-Social-Media

Communication LLC. 20 March 2010. Retrieved from: https://www.compukol. com/social-media-ethics-and-etiquette/

[25] Berger J, Milkman K. What makes online content go viral. Journal of Marketing Research. 2011;**49**(2):192-205

[26] The Social Media Hat. How to Find Amazing Content for Your Social Media Calendar (And Save Yourself Tons of Work). 29 August 2016. Retrieved from: https://www.thesocialmediahat.com/ blog/how-to-find-amazing-content-foryour-social-media-calendar-and-save-

yourself-tons-of-work/

2013;**24**(3):245-267

Information Technology for Development. 2016;**22**(3):464-486

Computación. 2009

**62**

**65**

ensuring security.

**Chapter 4**

**Abstract**

**1. Introduction**

effective.

Security and Privacy in Three

In regard to computational context, information can be in either of three states at a time: in transit, in process, or in storage. When the security and privacy of information is of concern, each of these states should be addressed exclusively, i.e., network security, computer security, and database/cloud security, respectively. This chapter first introduces the three states of information and then addresses the security as well as privacy issues that relate to each state. It provides practical examples for each state discussed, introduces corresponding security and privacy algorithms for explaining the concepts, and facilitates their implementation whenever needed. Moreover, the security and privacy techniques pertaining to the three states of information are combined together to offer a more comprehensive and realistic

**Keywords:** information in transit, information in process, information in storage,

The world is living in an era of information outburst thanks to rapid speed of technological developments in computational domain. Many factors contribute to the immense amount of data available online: Mobile devices are becoming more accessible to everyone with their decreasing cost, underlying network technologies are facilitating data transfer by providing faster and more reliable communication, data processing methods (such as editing, compressing) are helping customize data format, and increasing data storage capacities are turning bulk data storage more

With all technology and convenience so easily reachable, an ordinary user is allured further to handle even more information by either transferring, processing, or storing them. Yet, the issues of security and privacy are often taken for granted, and unfortunately this ignorance may cause a destructive consequence by totally

In this chapter, three fundamental states of information, i.e., information in transit, information in process, and information in storage, are defined first. Then the chapter addresses security and privacy of information in each state by giving examples. It should be noted that as information is the processed form of data, these two terms, i.e., information and data, are used interchangeably throughout the text. The chapter then provides algorithms to achieve privacy and security of information in these three states and how they apply to particular states of information for

violating the security and privacy of information, as well as its owner.

network security, computer security, database security, cloud security

States of Information

consideration of everyday security practices.

*Ebru Celikel Cankaya*
