Volume 11, Issue 2 (9-2024)                   Human Information Interaction 2024, 11(2): 123-143 | Back to browse issues page

XML Persian Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

akar K, kiani M R, sangari M. Security and privacy of social network users: investigation of individual factors. Human Information Interaction 2024; 11 (2)
URL: http://hii.khu.ac.ir/article-1-3139-en.html
Department of Knowledge and Information Science, Faculty of Education and Psychology, University of Birjand, Birjand, Iran.
Abstract:   (3951 Views)
Introduction
Online social networks are new and innovative media that have made changes in the social, cultural, economic and political structures of societies. These networks have not only changed the rules and regulations governing communication and interaction between humans, but also our thinking and attitude towards ourselves, others and the world. With the rapid development of technology, online social networks have become very popular in the current decade.
With the development of virtual space and the use of social networks, privacy is at risk more than ever, and in the meantime, social networks have a privileged status in terms of obtaining, collecting and using personal information. There are several security and privacy issues related to shared user information, especially when a user uploads personal content such as photos, videos, and audio files.

Methods and Materoal
This descriptive survey used a Researcher-made questionnaire on a sample of students of University of Birjand (375 participants). For questionnaire’s validity, the experts’ opinions was used, and Cronbach's alpha was used for questionnaire’s reliability (0.876).
Resultss and Discussion
The increasing daily use of online social networks around the world leads to more problems regarding the security and privacy behavior of users in this attractive environment. While users can enjoy many benefits by using the service, at the same time they have many concerns about the privacy of their information. Despite privacy concerns, users continue to use these platforms and continue to share or self-disclose more personal information. Now, in order to deal with these threats, it is necessary to know what factors affect the security and privacy in social networks. According to many researches that have been conducted in this field, there are many factors that influence, but the factors that the current research focused on (after examining the level of awareness and importance of users to the two categories of security and privacy), two factors are individual factors and social engineering. was Individual factors being the factors that caused users to fail to use private settings, and social engineering was actually the abuse of trust or the deception of human agents to access confidential information and then abuse this information.
The results showed that although the respondents attached great importance to topics related to security and privacy, they admitted that they were less aware of many of these topics than expected. The results of the next questions showed that the behaviors related to individual factors were less than expected among the respondents, while the behaviors related to social engineering were within the expected range and even beyond. Examining the demographic variables showed that women received a higher score than men in all the investigated variables. Also, the scores of undergraduate students from two levels higher than theirs were higher in all variables.

Conclusion
In today's interconnected world, many relationships and interactions with others are virtual and they have provided easy conditions for exchanging information, news, events with the ability to comment and share information with a wide audience and even create content. Therefore, social media has attracted more and more attention. This volume of information exchange has put the security and privacy of users in social networks at risk. To deal with these threats, users must know what factors affect security and privacy. Among the broad factors that have been mentioned in previous studies, the most important factors have been discussed in the current research, which can be called individual factors and social engineering. Now, considering the need to clarify the issue, in this research, the role of individual factors and social engineering in the behaviors related to the security and privacy of users in social networks has been discussed.
The results of the questions confirmed that students, as active members of the society, are not as aware of issues related to security and privacy as they should be, and the percentage of this awareness was less than expected, but contrary to their relatively low awareness, fortunately, security and privacy are very important. They were private in social networks. Although it was expected that students, as an informed and cultured segment of the academic community, would have acceptable knowledge in the field of security and privacy, but unfortunately, the result of the present study was the opposite, and this is an alarm for all university and government officials who think about education and to inform the students.
On the other hand, it is true that students attach great importance to their security and privacy in social networks, but certainly to realize this issue and actually its prerequisite, to be familiar with the rules of the privacy policy and how to make security and privacy settings. It is that until this important thing is not done correctly, the issue of giving importance to security and privacy cannot be given proper attention, even though this issue is important for students
Full-Text [PDF 618 kb]   (1846 Downloads)    
Type of Study: Research | Subject: Special

References
1. Ahmed Mahmoud Ragab, S., & Abdelmaksoud, H. (2023). Awareness of digital privacy among users of new media. Journal of Research in the Fields of Specific Education, 9(44), 2495-2522. https://doi.org/10.21608/jedu.2022.166154.1755 [DOI:10.21608/jedu.2022.166154.1755.]
2. Al Hasib, A. (2009). Threats of online social networks. IJCSNS International Journal of Computer Science and Network Security, 9(11), 288-93.
3. Alabdulatif, A., Alturise, F. (2020). Awareness of data privacy on social networks by students at Qassim University. International Journal of Advanced Computer Research, 10(50), 194. http://dx.doi.org/10.19101/IJACR.2020.1048094. [DOI:10.19101/IJACR.2020.1048094]
4. Alani, M. M. (2017). Android Users Privacy Awareness Survey. International Journal of Interactive Mobile Technologies, 11(3), 130-144.. https://doi.org/10.3991/ijim.v11i3.6605 [DOI:10.3991/ijim.v11i3.6605.]
5. Albladi, S. M., & Weir, G. R. (2018). User characteristics that influence judgment of social engineering attacks in social networks. Human-centric Computing and Information Sciences, 8(1), 1-24. https://doi.org/10.1186/s13673-018-0128-7 [DOI:10.1186/s13673-018-0128-7. (In Persian).]
6. Albladi, S. M., & Weir, G. R. (2020). Predicting individuals' vulnerability to social engineering in social networks. Cybersecurity, 3(1), 1-19. https://doi.org/10.1186/s42400-020-00047-5 [DOI:10.1186/s42400-020-00047-5.]
7. Ali, S., Islam, N., Rauf, A., Din, I. U., Guizani, M., & Rodrigues, J. J. (2018). Privacy and security issues in online social networks. Future Internet, 10(12), 114. https://doi.org/10.3390/fi10120114 [DOI:10.3390/fi10120114. (In Persian).]
8. Aljedaani, B., Ahmad, A., Zahedi, M., & Babar, M. A. (2023). End-users' knowledge and perception about security of clinical mobile health apps: A case study with two Saudi Arabian mHealth providers. Journal of Systems and Software, 195, 111519. https://doi.org/10.1016/j.jss.2022.111519 [DOI:10.1016/j.jss.2022.111519.]
9. Arain, M. A., Tarraf, R., & Ahmad, A. (2019). Assessing staff awareness and effectiveness of educational training on IT security and privacy in a large healthc. Journal of Multidisciplinary Healthcare, 12 (2019), 73-81. https://doi.org/10.2147/JMDH.S183275 [DOI:10.2147/JMDH.S183275.]
10. Bhatnagar, N., & Pry, M. (2020). Student Attitudes, Awareness, and Perceptions of Personal Privacy and Cybersecurity in the Use of Social Media: An Initial Study. Information Systems Education Journal, 18(1), 48-58.
11. Boenisch, F., Battis, V., Buchmann, N., & Poikela, M. (2021). "I Never Thought About Securing My Machine Learning Systems": A Study of Security and Privacy Awareness of Machine Learning Practitioners. In Proceedings of Mensch und Computer 2021, 520-546. https://doi.org/10.1145/3473856.3473869 [DOI:10.1145/3473856.3473869.]
12. Choi, S. (2023). Privacy literacy on social media: Its predictors and outcomes. International Journal of Human-Computer Interaction, 39(1), 217-232. https://doi.org/10.1080/10447318.2022.2041892 [DOI:10.1080/10447318.2022.2041892.]
13. Coluccia, A., Pozza, A., Ferretti, F., Carabellese, F., Masti, A., & Gualtieri, G. (2020). Online romance scams: Relational dynamics and psychological characteristics of the victims and scammers. A scoping review. Clinical practice and epidemiology in mental health: CP & EMH, 16, 24. https://doi.org/10.2174/1745017902016010024 [DOI:10.2174%2F1745017902016010024.]
14. Frik, A., Kim, J., Sanchez, J. R., & Ma, J. (2022, April). Users' expectations about and use of smartphone privacy and security settings. In Proceedings of the 2022 CHI Conference on Human Factors in Computing System, 407, 1-24. https://doi.org/10.1145/3491102.3517504 [DOI:10.1145/3491102.3517504.]
15. Gee, D. (2016). Rethinking Security: A discussion paper. Ammerdown Group.
16. Gerber, N., Reinheimer, B., & Volkamer, M. (2018). Home sweet home? Investigating users' awareness of smart home privacy threats. In Proceedings of An Interactive Workshop on the Human aspects of Smarthome Security and Privacy (WSSP).
17. Gupta, B. B., Arachchilage, N. A., & Psannis, K. E. (2018). Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommunication Systems, 67(2), 247-267. https://doi.org/10.1007/s11235-017-0334-z [DOI:10.1007/s11235-017-0334-z.]
18. Hu, X., Hu, D., Zheng, S., Li, W., Chen, F., Shu, Z., & Wang, L. (2018). How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control. Multimedia Tools and Applications, 77, 18163-18185. https://doi.org/10.1007/s11042-017-4402-x [DOI:10.1007/s11042-017-4402-x.]
19. Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge Analytica, and privacy protection. Computer, 51(8), 56-59. https://doi.org/10.1109/MC.2018.3191268 [DOI:10.1109/MC.2018.3191268.]
20. Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177. https://doi.org/10.1007/s40747-021-00409-7 [DOI:10.1007/s40747-021-00409-7.]
21. Kanampiu, M. (2018). A Study of Security and Privacy in Online Social Networks Using Social Network Analysis and Human Factors Perspectives (Doctoral dissertation, North Carolina Agricultural and Technical State University).
22. Khan, M. S. R., & Kadoya, Y. (2023). Who Became Victims of Financial Frauds during the COVID-19 Pandemic in Japan?. Sustainability, 15(4), 2865. [DOI:10.3390/su15042865]
23. Korir, M., Slade, S., Holmes, W., Héliot, Y., & Rienties, B. (2023). Investigating the dimensions of students' privacy concern in the collection, use and sharing of data for learning analytics. Computers in human behavior reports, 9, 100262. https://doi.org/10.1016/j.chbr.2022.100262 [DOI:10.1016/j.chbr.2022.100262.]
24. Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering attacks. Journal of Information Security and applications, 22, 113-122. https://doi.org/10.1016/j.jisa.2014.09.005 [DOI:10.1016/j.jisa.2014.09.005.]
25. Mamonov, S., & Benbunan-Fich, R. (2018). The impact of information security threat awareness on privacy-protective behaviors. Computers in Human Behavior, 83, 32-44. https://doi.org/10.1016/j.chb.2018.01.028 [DOI:10.1016/j.chb.2018.01.028.]
26. Martínez-Navalón, J. G., Fernández-Fernández, M., & Alberto, F. P. (2023). Does privacy and ease of use influence user trust in digital banking applications in Spain and Portugal?. International Entrepreneurship and Management Journal, 19(2), 781-803. https://doi.org/10.1007/s11365-023-00839-4 [DOI:10.1007/s11365-023-00839-4.]
27. Mittal, N. (2023). User Perceptions of Privacy and Security in Online Social Networks. International Journal of Innovative Science and Research Technology.1(8), 91-94.
28. Nawaz, N. A., Ishaq, K., Farooq, U., Khalil, A., Rasheed, S., Abid, A., & Rosdi, F. (2023). A comprehensive review of security threats and solutions for the online social networks industry. PeerJ Computer Science, 9, e1143. https://doi.org/10.7717/peerj-cs.1143 [DOI:10.7717/peerj-cs.1143.]
29. Nedeljko, M., Bogataj, D., & Kaučič, B. M. (2021). The use of ICT in older adults strengthens their social network and reduces social isolation: Literature Review and Research Agenda. IFAC-PapersOnLine, 54(13), 645-650. https://doi.org/10.1016/j.ifacol.2021.10.524 [DOI:10.1016/j.ifacol.2021.10.524.]
30. Nifakos, S., Chandramouli, K., Nikolaou, C. K., Papachristou, P., Koch, S., Panaousis, E., & Bonacina, S. (2021). Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors, 21(15), 5119. https://doi.org/10.3390/s21155119 [DOI:10.3390/s21155119.]
31. Nyoni, P., & Velempini, M. (2018). Privacy and user awareness on Facebook. South African Journal of Science, 114(5-6), 1-5. http://dx.doi.org/10.17159/sajs.2018/20170103. [DOI:10.17159/sajs.2018/20170103]
32. Obar, J. A., & Oeldorf-Hirsch, A. (2020). The biggest lie on the internet: Ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society, 23(1), 128-147. https://doi.org/10.1080/1369118X.2018.1486870 [DOI:10.1080/1369118X.2018.1486870.]
33. Okokpujie, K., Kennedy, C. G., Nnodu, K., & Noma-Osaghae, E. (2023). Cybersecurity Awareness: Investigating Students' Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study of a Nigerian Leading University). International Journal of Sustainable Development & Planning, 18(1). 255-263. https://doi.org/10.18280/ijsdp.180127 [DOI:10.18280/ijsdp.180127.]
34. Pensa, R. G., & Di Blasi, G. (2017). A privacy self-assessment framework for online social networks. Expert Systems with Applications, 86, 18-31. https://doi.org/10.1016/j.eswa.2017.05.054 [DOI:10.1016/j.eswa.2017.05.054.]
35. Reichel, J., Peck, F., Inaba, M., Moges, B., Chawla, B. S., & Chetty, M. (2020). 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and {WhatsApp}. In 29th USENIX Security Symposium (USENIX Security 20) (pp. 1949-1966).
36. Saeed, S. (2023). A customer-centric view of E-commerce security and privacy. Applied Sciences, 13(2), 1020. https://doi.org/10.3390/app13021020 [DOI:10.3390/app13021020.]
37. Sani, A. A. Examining Journalists'privacy Behaviour on WhatsaPP Status Updates in Kano State, nigeria. Zaria Journal of Communication, 7(1), 118-130.
38. Saura, J. R., Palacios-Marqués, D., & Ribeiro-Soriano, D. (2023). Privacy concerns in social media UGC communities: Understanding user behavior sentiments in complex networks. Information Systems and e-Business Management, 21(2), 1-21. https://doi.org/10.1007/s10257-023-00631-5 [DOI:10.1007/s10257-023-00631-5.]
39. Schroeder, C. (2019). Susceptibility to Social Engineering: Human Vulnerabilities (Doctoral dissertation, Utica College). Utica College.
40. Steiert, D. (2019). Privacy Preservation in Mobile Social Networks (Doctoral dissertation, University of Missouri-Columbia).
41. Steiert, D. (2019). Privacy Preservation in Mobile Social Networks (Doctoral dissertation, University of Missouri-Columbia).
42. Tang, Y., & Ning, X. (2023). Understanding user misrepresentation behavior on social apps: The perspective of privacy calculus theory. Decision Support Systems, 165, 113881. https://doi.org/10.1016/j.dss.2022.113881 [DOI:10.1016/j.dss.2022.113881.]
43. Van der Schyff, K., & Flowerday, S. (2021). Mediating effects of information security awareness. Computers & Security, 106, 102313. https://doi.org/10.1016/j.cose.2021.102313 [DOI:10.1016/j.cose.2021.102313.]
44. Van der Schyff, K., & Flowerday, S. (2021). Mediating effects of information security awareness. Computers & Security, 106, 102313. https://doi.org/10.1016/j.cose.2021.102313 [DOI:10.1016/j.cose.2021.102313.]
45. Van Schaik, P., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78, 283-297. https://doi.org/10.1016/j.chb.2017.10.007 [DOI:10.1016/j.chb.2017.10.007.]
46. Wang, Q. (2020). Towards the Understanding of Private Content-Content-based Privacy Assessment and Protection in Social Networks (Doctoral dissertation, University of Kansas).
47. Wei, L., Gong, J., Xu, J., Abidin, N. E. Z., & Apuke, O. D. (2023). Do social media literacy skills help in combating fake news spread? Modelling the moderating role of social media literacy skills in the relationship between rational choice factors and fake news sharing behaviour. Telematics and Informatics, 76, 101910. https://doi.org/10.1016/j.tele.2022.101910 [DOI:10.1016/j.tele.2022.101910.]
48. Yi, Y., Zhu, N., He, J., Jurcut, A. D., Ma, X., & Luo, Y. (2023). A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. Computer Communications, 200, 149-160. [DOI:10.1016/j.comcom.2023.01.010]
49. Yisa, V. L., Anaraky, R. G., Knijnenburg, B. P., & Orji, R. (2023). Investigating Privacy Decision-Making Processes Among Nigerian Men and Women. Proceedings on Privacy Enhancing Technologies, 1, 294-308. https://doi.org/10.56553/popets-2023-0018 [DOI:10.56553/popets-2023-0018.]
50. Yoro, R. E., Aghware, F. O., Akazue, M. I., Ibor, A. E., & Ojugo, A. A. (2023). Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian. International Journal of Electrical and Computer Engineering (IJECE), 13(2), 1943-1953. DOI: 10.11591/ijece.v13i2.pp1943-1953. [DOI:10.11591/ijece.v13i2.pp1943-1953]
51. Zhang, Z., Jing, J., Wang, X., Choo, K. K. R., & Gupta, B. B. (2020). A crowdsourcing method for online social networks security assessment based on human-centric computing. Human-centric Computing and Information Sciences, 10, 1-19. https://doi.org/10.1186/s13673-020-00230-0 [DOI:10.1186/s13673‑020‑00230‑0.]
52. Zulfahmi, M., Elsandi, A., Apriliansyah, A., Anggreainy, M. S., Iskandar, K., & Karim, S. (2023). Privacy protection strategies on social media. Procedia Computer Science, 216, 471-478. https://doi.org/10.1016/j.procs.2022.12.159 [DOI:10.1016/j.procs.2022.12.159.]

Add your comments about this article : Your username or Email:
CAPTCHA

Send email to the article author


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

© 2025 CC BY-NC 4.0 | Human Information Interaction

Designed & Developed by : Yektaweb