{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T20:12:12Z","timestamp":1762114332987,"version":"build-2065373602"},"reference-count":9,"publisher":"Breda Publishing Press","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Network Security"],"published-print":{"date-parts":[[2021,5]]},"abstract":"<jats:p> One of the most noticeable effects of the Covid-19 pandemic from the technology perspective has been the significant uptake of online meeting platforms, which many have suddenly found to be a necessary alternative to face-to-face meetings in all manner of contexts. From relatively casual meetings that may have taken place among co-workers in the office, through to the staging of full conference events, online platforms have essentially come to the rescue when in-person gatherings were no longer an option. <\/jats:p><jats:p> There has been a significant uptake of online meeting platforms for everything from casual meetings to full conference events. In many cases, this has been driven by a rapid transition to home working. <\/jats:p><jats:p> However, with a significant number of people becoming first-time users, it caught a user population that was unprepared and unaware of what good security looked like. Additionally, with home working, they may have had no easy option to turn to for support. Reinhardt Botha and Steven Furnell examine the challenges that have arisen and how they can be addressed. <\/jats:p>","DOI":"10.1016\/s1353-4858(21)00052-0","type":"journal-article","created":{"date-parts":[[2021,5,26]],"date-time":"2021-05-26T03:44:47Z","timestamp":1622000687000},"page":"7-13","source":"Crossref","is-referenced-by-count":1,"title":["Facing up to security and privacy in online meetings"],"prefix":"10.70985","volume":"2021","author":[{"given":"Reinhardt","family":"Botha","sequence":"first","affiliation":[{"name":"Nelson Mandela University"}]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[{"name":"Nelson Mandela University and University of Nottingham"}]}],"member":"51855","reference":[{"key":"bib1","first-page":"6","author":"Furnell S","year":"2020","journal-title":"Computer Fraud & Security"},{"key":"bib2","unstructured":"\u2018Top Online Meeting Software to Know\u2019; TechFunnel; 31 Jul 2020: \nwww.techfunnel.com\/information-technology\/11-best-virtual-meeting-platforms-for-business\/ accessed May 2021"},{"volume-title":"\u2018In the Matter of Zoom Video Communications, Inc., a corporation, d\/b\/a Zoom\u2019. Decision and Order Docket No. C-4731","year":"2021","key":"bib3"},{"journal-title":"Zoom Blog","year":"2020","author":"Lee E","key":"bib4"},{"key":"bib5","unstructured":"C Hoffman   \u2018Can Zoom hosts really see all your private messages?\u2019; \n26 Aug 2020: \nHow-To Geek>\nwww.howtogeek.com\/687148\/can-zoom-hosts-really-see-all-your-private-messages\/"},{"key":"bib6","unstructured":"J Spataro   \u2018Custom backgrounds in Microsoft Teams make video meetings more fun, comfortable, and personal\u2019; \n12 Jun 2020: \nMicrosoft>\nwww.microsoft.com\/en-us\/microsoft-365\/blog\/2020\/06\/12\/custom-backgrounds-microsoft-teams-video-meetings-fun-comfortable-personal\/ accessed May 2021"},{"key":"bib7","unstructured":"\u2018Change your background in Google Meet\u2019. Google Meet Help; \nhttps:\/\/support.google.com\/meet\/answer\/10058482 accessed May 2021"},{"key":"bib8","unstructured":"\u2018Adobe Connect application for desktop\u2019. Adobe Connect User Guide; \nhttps:\/\/helpx.adobe.com\/adobe-connect\/using\/user-guide.html\/adobe-connect\/using\/adobe-connect-application-for-desktop.ug.html accessed May 2021"},{"issue":"3","key":"bib9","doi-asserted-by":"crossref","first-page":"130","DOI":"10.1016\/j.cose.2008.11.001","volume":"28","author":"Botha RA","year":"2009","journal-title":"Computers & Security"}],"container-title":["Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485821000520?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1353485821000520?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.magonlinelibrary.com\/doi\/pdf\/10.1016\/S1353-4858%2821%2900052-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T22:21:18Z","timestamp":1733264478000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.magonlinelibrary.com\/doi\/10.1016\/S1353-4858%2821%2900052-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":9,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["10.1016\/S1353-4858(21)00052-0"],"URL":"https:\/\/doi.org\/10.1016\/s1353-4858(21)00052-0","relation":{},"ISSN":["1353-4858","1872-9371"],"issn-type":[{"type":"print","value":"1353-4858"},{"type":"electronic","value":"1872-9371"}],"subject":[],"published":{"date-parts":[[2021,5]]}}}