1. Introduction: Social networking sites are web-based services (websites) that serve as a medium for young people to share their social activities or to share their interest in a particular topic with their friends, colleagues and family. These social networking sites have both positive and negative impacts on students. Most students use smartphones to access social media and all other online activities. This paves the way for two types of security issues, such as social media security issues and smartphone security issues. We must therefore eradicate smartphone and social network threats by implementing the centralized cybersecurity and device management system (CCSDMS). In this project we use the Graph Model for Conflict Resolution (GMCR II) software tool, for effective implementation of centralized cybersecurity and device management system.2. Social Networking Sites (SNS): There are thousands of social networking sites across the world with various technological advancements, supporting a wide range of activities. Some sites offer services to a diverse audience, while others draw people into a common community such as radical, sexual and religious, or shared nationality-based identities with a common language. Some sites work on different communication tools such as mobile connectivity, blogging and photo sharing [1]. The most popular sites are Facebook, Twitter, Instagram, Google+, LinkedIn, Instagram, YouTube and Myspace. The other less used sites are Friendster, Cyworld, Flickr, Tumblr, Pinterest, Myspace, etc. [1]Members of Social Networking sites create a public or semi-public online profile with personal details, photos and any other information they choose to ...... middle of paper ......bbc.com/news /world-europe-26151425[6] J. Lewis. How Spies used Facebook to steal NATO chiefs' details. The telegraph. 2012. [Online; accessed September 8, 2013.[7] http://chinhdangvu.blogspot.ca/2012/03/chinese-spies-used-fake-facebook.html[8] Lenhart A. Teens and sexting. Washington, DC: Pew Research Center; 2009. Available[9] http://www.mobileshop.eu/blog/actual/top-10-smartphones-2013/[10] http://www.droidmatters.com/news/infographic-the-growing-threat -of-mobile-malware/[11] http://time.com/35932/ukraine-russia-putin-spies-kgb/[12] DM Kilgour, KW Hipel and L. Fang, The graphical model for conflicts, Automatica 23 (1987), 41-55.[13] http://www.sciencedirect.com/science/article/pii/S102630981100054X[14] Lenhart, A., Ling, R., Campbell, S., & Purcell, K. (2010a). Teenagers and cell phones. Washington, DC: Pew Internet and American Life Project.[15] Google.com
tags