...The use of social networks by students: the possible risks and implications Claire Wright B.A. (Hons) Business and Marketing – Digital Economy module, 2010, Level 5 |Keywords:Social Network Sites, Facebook, Student Usage, Implications | Introduction This paper focuses upon the use of social network sites by students, and the affect they have on education and the personal life of users. The majority of the study will be focusing on the use of Facebook, as it is the most popular and well known social network site available, however other sites will be addressed in the study to ensure it has a comprehensive view of social network sites today. It is widely acknowledged that social networks are a big part of modern day society and are widely used, with almost half of children aged 8-17 having an active profile on at least one social network site. (Bicen and Cavus, 2010. p.17) There are many discussions and arguments as to the impact that social networks have had on the lives and the education of students and young people that will be identified in this review. With social networks playing an important part in the lives of students, a full understanding of their usage, or non-usage is needed in order to examine the impact that such sites have on the lives of their users. The Advantages of Social Network Sites Social networking sites improve the confidence of students due to the social interaction...
Words: 3681 - Pages: 15
...International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 ISSN 2250-3153 1 Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks WorawitBinden*, MaheedeenJormae**, ZakariaZain***, Jamaludin Ibrahim**** worawit.inter@gmail.com*, maheedeen@gmail.com**, zakariazain13@gmail.com***, jamal55@gmail.com**** Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia ABSTRACT-Use of Online Social Networking Sites (OSNs) has become ubiquitous nowadays. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper we analyze the influence of social media interactivity features on the exposure of personal data of average Internet user and present techniques to implement information security awareness to minimize overexposure on OSNs. Index Terms-Online Social Networking, Information Security Awareness, Social Network Interactivity Features I. INTRODUCTION nformation is vital to communication and a critical resource for performing work in organizations. It is also important to individuals, and therefore the need to proper manage it well, is growing rapidly. Protecting data is as important as protecting cash as it is asset – and requires just as much care and planning. Now more than ever, people need...
Words: 4473 - Pages: 18
...described. Social Networking Hewson, et al., [1] asserts that social networking may be considered as an internet based social platform which allows people to make connection and communication with each other and to share their views and contents. In the present world social networking is very crucial to keep pace with the fast moving world. Social networking help to sustain contacts and networks overcoming the issues regarding time and distance. To function social networking a social networking site is required. There are so many sites are available but of them Facebook, Twitter, MySapce, Google Plus etc. are very popular. Particularly, Facebook is one of the most famous social networking which started its journey in 2004 and till third quarter of 2014 Facebook found more than 1.35 billion users. Facebook was establish in February, 2004 by Mark Zuckerberg along with Eduardo Saverin, Andrew McCollum, Dustin Moskovitz and Chris Hughes. Mark Zuckerberg is also the CEO of Facebook. Facebook basically functions through open-source software and servers. User can use Facebook through computer, mobile, tablets etc. with an internet connection. To start using face one need to sign up first with an email and a few basic information as in age, sex, date of birth, address etc. after signing up the user is offered an account with profile where he can log in with email ID and password. Thereafter, user can build up profile with pictures, videos and other information such as profession...
Words: 3742 - Pages: 15
...than websites and the textbook) with at least 5 references that are scholarly journal articles on the topic from UMUC’s online library databases. | ABSTRACT This paper will discuss the impact of cyber crimes on organization supply chain functions, and steps taken to improve supply chain security. Cyber crimes include, but are not limited to, piracy, implanting viruses, netspionage, and credit card fraud. During these times, it is getting easier and easier for computer hackers and frauds to gain access to confidential information from anybody. It could be passwords and social security numbers of individuals, to databases and network systems of large corporations. For businesses, the main supply chain areas at risk are the processes and controls for various departments, such as human resources, finance and accounting, procurement, and marketing. One of the processes at bigger risk is procurement. Majority of companies use other businesses outside their own, like manufacturers and distributors, as part of their purchasing process. All this information is stored in the company’s computer system, and “the need to procure materials…through a network…exposes an organization to network risk” (Smith, Watson, Baker, and Pokorski, 2007). This kind of risk can cause serious damage to the company’s assets, transactions, and reputation. Even worse, a company “may lose the confidence of customers who worry about the...
Words: 5220 - Pages: 21
...are addicted to Facebook”: The text is written by Elizabeth Cohen. The text is about how people use more time on Facebook than on social activities. Newton has a daughter on 12 years old. Newton cannot help her daughter with the homework, because she spends too much time on Facebook. Another example is Paula Pile, who is a therapist. Paula has three clients with different Facebook issues. That conclude that Facebook leads people from the real world into the network world, because people enjoy more time on Facebook than in real life. Newton checks her Facebook-site many times in a day, for social updates about her friends, she checks Facebook everywhere at work and home. Facebook can give people a wrong understanding of what identity means. Joanna Lipari is psychologist and expert in social network, sees Facebook a kind like the movie “The Truman Show”. Joanna thinks Facebook is like a world without boundaries. 2. An outline of the positive and negative sides of social networking presented in the three texts: In the first text “What is social networking?”, we hear about how social networks has an effect to make it easier to get new online friends over social networks, examples as Facebook, Skype and Twitter. Now a day, we can have difference friends among the world from Denmark to USA and easy learn each other’s traditions, religion, culture and language. Negatives sites of social networks are, that it is easy for hackers and bad people to get into your computer system and give...
Words: 766 - Pages: 4
...crime types of the century and includes criminal activity involving computers and the internet. Hacking a computer is not the only thing considered a cybercrime. Downloading movies and music illegally is also a cybercrime. Once thought as something that only the military or other government officials had to worry about, it is now on the rise since everyone has a computer and it is easy to find out how to hack into computer systems. With the rise of internet usage among businesses and private users, the risk of being a victim of cybercrime is huge. The Security Tracking Study performed by the Pomemon Institute states that 83 percent of multinational companies feel that within the past 12 months they have been a target of a cybercrime. Price Water House Coopers states that the number of businesses having a security breach is more along the lines of 92 percent. Cybercrimes are attacks on computer hardware and software, downloading illegal movies and music, online fraud involving financial crimes and corruption with an organization, crimes against children and the elderly, cyber bullying and fraudulent telemarketing events for charitable donations. What was once something only “hackers” did is now something anyone can do. The term hacker was originally described as “any technical effort to manipulate the normal behavior of network connections and connected systems.” The managing director of Accenture’s security practice, Alastair MacWillson, notes that hackers have changed a...
Words: 8856 - Pages: 36
...Facebook began in the dorm room on Mark Zuckerburg, along with the help of classmates. The original idea was to create a social network for students of Harvard, where he attended. Once the site was up and its popularity was apparent, it was expanded to other universities. A high school version was later added, and finally access was granted to anyone over the age of thirteen that had a valid email address. There are currently nearly seven hundred million users of facebook, with a recent survey stating that nearly 40 percent of Americans have a facebook account (Wikipedia). Facebook is also a major source for businesses to market to their audience. By setting up a facebook page, companies can utilize the targeted audience gathered there to promote their brand in a direct way, with the added effect of being able to reach all 700 million users as well. Sixty nine percent of small business owners said that they currently use social media for their company or business (Protalinski, 2011). Of those that responded that they do not use social media, forty one percent indicated that they would start using social media in the next three months (Protalinski, 2011). The ability to reach the companies’ customers in new and direct ways makes Facebook nearly essential to the business owner. Purchasing ads on Facebook is one way to take advantage of the large number of users, but creating a page on the site itself allows customers to be kept abreast of new products or services, as well...
Words: 1188 - Pages: 5
...10 Computer Threats You Didn't Know About 1. Fake Tech-Support Calls You might get an unsolicited phone call from a tech-support representative claiming to be from Microsoft or another big-name IT corporation. But the caller won't be who he claims to be. After warning you that "suspicious activity" has been detected on your computer, he'll offer to help once you give him the personal information he requires to get his job done. That job isn't fixing your computer. In fact, he's really just after your personal information. If you receive a call like this, hang up, call the company the bogus technician claimed to be from, and report the incident to a legitimate representative. If there really is a problem, they'll be able to tell you; if not, you just thwarted a data thief. 2. DNS Redirection Internet service providers (ISPs) such as Time Warner Cable and Optimum Online claim they're trying to help with DNS redirection, but the reality seems to come down to money. Domain Name System (DNS) redirection overrides your browser's normal behavior when you can't reach a webpage. Instead of displaying the normal 404 "File Not Found" error, the ISP sends you to a page of the ISP's choosing usually a page full of paid advertising and links. Innocent though that practice may be, computer viruses can do the same thing,redirecting your browser to a hostile page the first time you misspell a domain. With ISPs, you can opt out of their DNS redirection (you'll find links below all the ads);...
Words: 1447 - Pages: 6
...person imposing the threat is a network security expert, a white hat hacker. Network Threat A security expert by the name of Eric Butler decided to release a free hacking tool called Firesheep, onto the Internet. Firesheep is an add-on of Mozilla Firefox, which means a Firefox browser has to be installed, to use this software. What is so intriguing about this tool is, no hacking experience is required, and anyone that downloaded this software will be able to hijack login information on an open wireless network. Threat materialized Firesheep was basically designed to targeted sites like Facebook, Twitter, Flicker, Amazon, eBay, etc. Sites that didn’t fully implemented HTTPS. HTTPS stands for Hypertext Transfer Protocol Secure, it is a communication protocols that provides encryption communications between its sender and its receiver. Websites that don’t support HTTPS or doesn’t fully use HTTPS are at risk of exposing their users’ information during their session with the site. Firesheep nourished on websites without HTTPS. Because it provided Firesheep users with no limitation to amount of account logins they can obtained in a single day. Although Firesheep is mainly a threat to unsecured open wireless networks, however it can also become very much of a threat in secured networks as well. If a user really wanted to, he or she can easily downloaded free Wi-Fi hacking software, to crake and obtain Wi-Fi passwords from secured networks. There are also high-powered...
Words: 1132 - Pages: 5
...BTM8102-8 | Kris Iyer, PhD | | | Business Research Methodology | GreenTBTM8102-2 | | | <Add Learner comments here> ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- <Faculty comments here> ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- <Faculty Name> <Grade Earned> <Writing Score> <Date Graded> Locating Topics of Interest The privacy dilemma (personal & professional) posed by the over reliance on in Facebook as a medium for communications....
Words: 2699 - Pages: 11
...authentication is the password and pin approach. Internet usage and online application are experiencing spectacular growth worldwide; there are over a billion internet users at present which utilises the use of the internet. Authentication is necessary in our everyday business because it will cut down the rate of identity theft and also stabilize confidentiality. User authentication faces a major problem as many security geniuses came out to proof that no single security completely protects users from theft. This essay will describe the limitations that can occur in practice of authenticating a user. It will help improve the reader’s knowledge on issue with authentication process, which is done according to the level of authentication. It will review the state of practice of a user authentication; also evaluate the authentication process with three website such as Facebook, Barclays bank and Yahoo. The future of user authentication will also be discussed. HOW IS USER AUTHENTICATION DONE There is always a tool or administrator who controls networks with secure computers, and also set privilege, role with policies and restriction. This IT expert’s uses authentication process which prompt a user who want to gain access to a secure website or device. A typical IT user who...
Words: 3317 - Pages: 14
...MIS535 Week 7 Discussion How phishing attacks have compromised major systems? Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks. In a typical phishing attack, the attacker puts up a Web site that looks nearly identical to the victim's Web site. Technology changes fast, our genetic code and learned behaviors not so. As security professionals, we must concentrate not on technical measures, but on education, education, education. Phishers often set up the fake sites several days before sending out phishing e-mails. One way to stop them from swindling customers is to find and shut down these phishing sites before phishers launch their e-mail campaigns. Companies can outsource the search to a fraud alert service. These services use technologies that scour the Web looking for unauthorized uses of your logo or newly registered domains that contain your company's name, either of which might be an indication of an impending phishing attack. This will give your company time to counteract the strike Phishing attacks bring with them other risks and costs as well; including the direct IT costs to locate the source of data loss. Organizations should establish a cross-functional anti-phishing team and develop a response plan so that they're ready to deal with any attack. Ideally, the team should include representatives from IT, internal audit...
Words: 2248 - Pages: 9
...INTRODUCTION Social networking consists of wide and diverse issues which concern the lives of individuals resulting to the blast of online socializing. Due to the impacts it caused to the public, this research paper tackled about the effects of social networking and its influence to the society. It also includes the issues about the threats and security of the social networks as well as the changing behaviours of people caused by the growing popularity of social networking. Remember the early days before the online interaction all over the world knocks on the door of every being when everything is basic and simple. The ability to communicate and stay connected across the planet has fostered and altered the existence of every individual. This research aims to know and to stay focus on what is life in the world of social networking. Despite the thousands of miles being apart people still manage to keep in touch by just logging in to a social site. Online social networks are the reason behind the connections and interactions between people based on common interests. However, more people were complaining about the threats and security of social networking. Others were complementing about what it could offer. From own personal purposes to school activities, to business promoting to politics campaign, social networking is always involve. This research will also cover the impacts of social networking to our society. This is conducted to be able to know its harmful and beneficial effects...
Words: 7170 - Pages: 29
...Social Media and Business Social media has always been a threat to not only security but also reputation of a business. Employees today have access to all kinds of social network sites to include Facebook, Myspace, Twitter, Instagram, online blogs, and many more. These sites are easily accessible to the user from their computer, tablets, and cellphones through various types of applications. Through my research I was able to find a trend in users using these media outputs to accidently leak information unintentionally and even intentionally. I found that any business can be susceptible to having data leaked and reputations tarnished from employees not handling social media correctly. I will cover this area of expertise, technology involved, future trends, security issues, some businesses involved, regulatory issues that arise, what business can do to handle social media, and global implications. When you consider what technology is being used most users will think of physical equipment. While this is the case that is the access medium that is used when thinking of social networking. Social media can be accessed in various ways to include your home computer, office computer if they allow you to view such sites, tablets, and your phone that could not be regulated depending on if it is a company phone. These access mediums must be regulated and users educated on the proper use of these devices. There are different types of online technologies that can be used to access social...
Words: 3437 - Pages: 14
...quickly share information and create online connections with other users. Despite the benefits, social networking can negatively effect us socially and can lead to undeveloped social skills and social alienation. Our intimate relationships can be negatively effected because social networking users can quickly find and communicate discreetly with others which can potentially lead to infidelity. Information posted on social networking sites can also have negative effects on current or potential employment opportunities. Social networks are intended to share information with everyone; this lack of protection can increase security risks such as identity theft, cyberbullying and computer viruses. Although each of these social networking sites offers attractive incentives and overwhelming popularity, research indicates that social networking can actually be detrimental because it has negative effects on social skills, relationships, employment, and security. Since their creation, social networking are rapidly changing the way we communicate, discover and share information and has become a crucial part of not only our personal lives but our professional lives. Social networking can be seen almost everywhere we go from retail stores to doctor’s offices and even in schools. People are taking advantage of the free, fast-paced options for quickly communicating information. Businesses are hiring Social Media Specialists to use social networking to increase brand awareness and sell...
Words: 2864 - Pages: 12