The General Data Protection Regulation (GDPR) is the toughest privacy and security law in the world. Though it was drafted and passed by the European Union (EU), it imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU.
China Internet Security Law
Cybersecurity is recognized as a basic law. This puts the law at the top of the pyramid structure of cybersecurity law. The law is an evolution of the previously existing cybersecurity rules and regulations of different levels, and assimilates them to create a structured law at the macro level.
Ethics of social media research
Over the last decade, social media platforms have become a very popular channel of communication. This popularity has sparked an increasing interest among researchers to investigate the social media communication. Many studies have been done that collected the publicly available social media communication data to unearth significant patterns. However, one significant concern raised over such practice is the privacy of the individual’s social media communication data. As such it is important that specific ethical guidelines are in place for future researches on social media sites.
Link: Study of Amir Manzoor
Nettiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior. Similarly, online ethics focuses on the acceptable use of online resources in an online social environment. Both phrases are frequently interchanged and are often combined with the concept of a ’netizen’ which itself is a contraction of the words internet and citizen and refers to both a person who uses the internet to participate in society, and an individual who has accepted the responsibility of using the internet in productive and socially responsible ways.
You might be wondering what the purpose of this seemingly useless exercise is, so I’ll get right to it. While looking to enhance your productivity or just for some fun, you will most likely overlook a key issue: your online safety.
The fact of the matter is that we, as Internet users, are simply not doing enough to keep safe online. And there’s no scarcity when it comes to cyber threats and cyber attacks that come in all shapes, sizes and outcomes.
Read here about the 15+ habits that are compromising your online safety.
Link: 15+ online habits
Ethical Hacking sometimes called as Penetration Testing is an act of intruding/penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users. Ethical hackers report all vulnerabilities and weakness found during the process to the management.
Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network.
Citizens are key to develop trustability criteria
Our goal is creating a trustable online environment built by a dedicated and responsible community, in collaboration with renowned experts and industries. Online transparency and reliability are currently being “touted” by the major tech giants (Apple, Google, Microsoft, Amazon, Facebook). “It’s like asking the butcher to inspect his own meat.” There is currently no yardstick for determining trustability based on both independent scientific research and supported by citizens. We take up the challenge to develop criteria for independent analysis and assessment of online trustability.