Information Security Threats on Social Network Sites: a Security Readiness and Mindfulness among IT and Non-IT Postgraduate Students

  • Authors

    • Somia Moh. T. L. Ashafee
    • Nur Haryani Zakaria
    • Hatim Mohamad Tahir
    • Norliza Katuk
    • Mohd Nizam Omar
    2018-11-27
    https://doi.org/10.14419/ijet.v7i4.19.22097
  • Information security, Security readiness, Security mindfulness, Social network sites
  • Abstract

    The concept of security and privacy in Social Networks Sites (SNS) are becoming very popular and the number of users are increasing rapidly. These issues run from unapproved access to individual data to digital harassing. Past researchers have been applying alternate points of view including specialized tools and law to ponder protection and security issues. The issues of security and protection is by all accounts continuous. In perspective of the security dangers and protection issues of students utilizing SNS, this investigation embarks to analyst the security mindfulness, readiness towards digital assaults and security practices among IT and Non-IT postgraduate understudies. A total of 400 postgraduate students were studied utilizing a self-directed poll. The discoveries announced in this examination uncovered that IT understudies have altogether high security mindfulness and conduct when contrasted with Non-IT students. Be that as it may, there is no critical contrast between the readiness towards digital attacks of both IT and Non-IT students. This investigation exhibits that there is a critical connection between readiness towards digital attacks and security practices. The hypothetical and common-sense ramifications of this investigation feature the significance of security mindfulness and comprehension of specialized know how in seizing security assaults among SNS clients.

     

     

  • References

    1. [1] E. Kritzinger, S. von S.-C. & Security, and undefined 2010, “Cyber security for home users: A new way of protection through awareness enforcement,†Elsevier.

      [2] A. Sattikar and R. Kulkarni, “A Review of Security and Privacy Issues in Social Networking,†Int. J. Comput. Sci. Inf. Technol., vol. 2, no. 6, pp. 2784–2787, 2011.

      [3] H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen, “Security Issues in Online Social Networks,†Internet Comput. IEEE, vol. 15, no. 4, pp. 56–63, 2011.

      [4] R. Ajami, N. Ramadan, and N. Mohamed, “Security Challenges and Approaches in Online Social Networks: A Survey,†Ijcsns, vol. 11, no. 8, pp. 1–12, 2011.

      [5] R. Jabee and M. A. Alam, “Issues and Challenges of Cyber Security for Social Networking Sites (Facebook),†Int. J. Comput. Appl., vol. 144, no. 3, pp. 975–8887, 2016.

      [6] R. Beach, Aaron and Gartrell, Mike and Han, “Solutions to security and privacy issues in mobile social networking,†in International Conference on Computational Science and Engineering, 2009. CSE’09., 2009, pp. 1036--1042.

      [7] J. S. Sherif, R. Ayers, and T. G. Dearmond, “Intrusion detection: the art and the practice. Part I,†Inf. Manag. Comput. Secur., vol. 11, no. 4, pp. 175–186, Oct. 2003.

      [8] E. B. Kim, “Information Security Awareness Status of Business College: Undergraduate Students,†Inf. Secur. J. A Glob. Perspect., vol. 22, no. 4, pp. 171–179, Jul. 2013.

      [9] D. Hiatt and Y. B. Choi, “Role of Security in Social Networking,†IJACSA) Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 2, pp. 12–15, 2016.

      [10] Q. Beye, M., Jeckmans, A., Erkin, Z., Hartel, P., Lagendijk, R., Tang, “Literature Overview-Privacy in Online Social Networks,†2010. [Online]. Available: http://doc.utwente.nl/74094/1/literaturereview.pdf. [Accessed: 03-Jan-2018].

      [11] H. Krasnova, O. Günther, … S. S.-I. in the I., and undefined 2009, “Privacy concerns and identity in online social networks,†Springer.

      [12] H. Krasnova, O. Günther, S. Spiekermann, and K. Koroleva, “Privacy concerns and identity in online social networks,†Identity Inf. Soc., vol. 2, no. 1, pp. 39–63, Dec. 2009.

      [13] A. Acquisti and R. Gross, “Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook,†2006, pp. 36–58.

      [14] Y. Orito, Y. Fukuta, and K. Murata, “I Will Continue to Use This Nonetheless: Social Media Survive Users’ Privacy Concerns,†Int. J. Virtual Worlds Hum. Comput. Interact., 2014.

      [15] M. A. Harris, S. Furnell, and K. Patten, “Comparing the Mobile Device Security Behavior of College Students and Information Technology Professionals,†J. Inf. Priv. Secur., vol. 10, no. 4, pp. 186–202, Oct. 2014.

      [16] D. Koloseni and Z. Omary, “Towards using social networks and internet-enabled mobile devices for learning: Students’ preparedness,†in Communications in Computer and Information Science, 2011, vol. 251 CCIS, no. PART 1, pp. 13–21.

      [17] D. Koloseni, “Security, Privacy Awareness vs. Utilization of Social Networks and Mobile Apps for Learning: Students’ Preparedness,†Adv. Comput. Sci. an Int. J., vol. 4, no. 3, pp. 111–117, 2015.

      [18] Candiwan, P. K. Sari, and N. Nurshabrina, Assessment of information security management on Indonesian higher education institutions, vol. 362. 2016.

      [19] P. K. Sari, Candiwan, and N. Trianasari, “Information security awareness measurement with confirmatory factor analysis,†in 2014 International Symposium on Technology Management and Emerging Technologies, 2014, pp. 218–223.

      [20] R. J. Mejias and P. A. Balthazard, “A Model of Information Security Awareness for Assessing Information Security Risk for Emerging Technologies,†J. Inf. Priv. Secur., vol. 10, no. 4, pp. 160–185, Oct. 2014.

      [21] H. A. Kearney and W. Kruger, “A prototype for assessing information security awareness,†Elsevier, vol. 25, no. 4, pp. 289–296, 2006.

      [22] G. Shepherd, M. M., Mejias, R. J., & Klein, “A longitudinal study to determine the effects of non-technical deterrence on reducing employee internet abuse frequency,†Proc. 47th Hawaii Int. Conf. Syst. Sci., pp. 3159–3168, 2014.

      [23] W. Hong and J. Y. L. Thong, “Internet Privacy Concerns: An Integrated Conceptualization and Four Empirical Studies,†MIS Q., vol. 37, no. 1, pp. 275–298, 2013.

      [24] B. Bulgurcu, H. Cavusoglu, and I. Benbasat, “Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,†Manag. Inf. Syst. Q., vol. 34, pp. 523–548, 2010.

      [25] Y. Chen, K. Ramamurthy, and K.-W. Wen, “Organizations’ Information Security Policy Compliance: Stick or Carrot Approach?,†J. Manag. Inf. Syst., vol. 29, no. 3, pp. 157–188, Jan. 2012.

      [26] P. Meso, Y. Ding, and S. Xu, “Applying Protection Motivation Theory to Information Security Training for College Students,†J. Inf. Priv. Secur., vol. 9, no. 1, pp. 47–67, Jan. 2013.

      [27] L. Slusky and P. Partow-Navid, “Students Information Security Practices and Awareness,†J. Inf. Priv. Secur., vol. 8, no. 4, pp. 3–26, Oct. 2012.

      [28] L. Bilge, T. Strufe, D. Balzarotti, E. Kirda, and S. Antipolis, “All Your Contacts Are Belong to Us : Automated Identity Theft Attacks on Social Networks,†WWW 2009, pp. 551–560, 2009.

      [29] M. Chewae, S. Hayikader, M. H. Hasan, and J. Ibrahim, “How Much Privacy We Still Have on Social Network ?,†academia.edu, vol. 5, no. 1, pp. 1–5, 2015.

      [30] S. Gangopadhyay and D. Dhar, “Social networking sites and privacy issues concerning youths,†Glob. Media J. - Indian Ed., vol. 5, no. 1, pp. 1–7, 2014.

      [31] and M. H. Tuunainen, Virpi Kristiina, Olli Pitkänen, “Users’ awareness of privacy on online social networking sites-case Facebook,†in 22nd Bled eConference eEnablement: Facilitating an Open., 2009, p. 42.

      [32] D. Hiatt and Y. B. Choi, “Role of Security in Social Networking,†IJACSA) Int. J. Adv. Comput. Sci. Appl., vol. 7, no. 2, pp. 12–15, 2016.

  • Downloads

  • How to Cite

    Moh. T. L. Ashafee, S., Haryani Zakaria, N., Mohamad Tahir, H., Katuk, N., & Nizam Omar, M. (2018). Information Security Threats on Social Network Sites: a Security Readiness and Mindfulness among IT and Non-IT Postgraduate Students. International Journal of Engineering & Technology, 7(4.19), 378-383. https://doi.org/10.14419/ijet.v7i4.19.22097

    Received date: 2018-11-28

    Accepted date: 2018-11-28

    Published date: 2018-11-27