Premium Essay

Employing Information Security Awareness to Minimize over-Exposure of Average Internet User on Social Networks

In: Computers and Technology

Submitted By worawitinter
Words 4473
Pages 18
International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 ISSN 2250-3153

1

Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks
WorawitBinden*, MaheedeenJormae**, ZakariaZain***, Jamaludin Ibrahim**** worawit.inter@gmail.com*, maheedeen@gmail.com**, zakariazain13@gmail.com***, jamal55@gmail.com**** Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia

ABSTRACT-Use of Online Social Networking Sites (OSNs) has become ubiquitous nowadays. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper we analyze the influence of social media interactivity features on the exposure of personal data of average Internet user and present techniques to implement information security awareness to minimize overexposure on OSNs. Index Terms-Online Social Networking, Information Security Awareness, Social Network Interactivity Features

I. INTRODUCTION nformation is vital to communication and a critical resource for performing work in organizations. It is also important to individuals, and therefore the need to proper manage it well, is growing rapidly. Protecting data is as important as protecting cash as it is asset – and requires just as much care and planning. Now more than ever, people need to understand the critical role information plays in so many aspects of business and life. It drives our communication, our decision-making, and our reactions to the entire environment. Information has been valuable since the dawn of mankind. As access to computer stored data has increased, Information Security has become correspondingly important. In the past, most corporate assets were “hard”…...

Similar Documents

Premium Essay

The Impact of Social Networks on Internet Marketing

...Impact of Social Networks on Internet Marketing Research Problem: The general lack of knowledge about the impacts of social networks on internet marketing There is a noticeable lack of knowledge about how social networks can enhance internet marketing in different departments such as product creation, advertisement, sales, etc. The main area of focus: Advertisement Research questions: What are the impacts of social networks on internet marketing? How can social networks improve internet marketing and how they play a role in enhancing advertisement? Objective of the research: Finding the impacts of social networks on internet marketing, especially on the area of advertisement. Summary: Social networks are one of the latest and most recent trends that have attracted many visitors and users worldwide. They connect individuals with all types of different interests, as well as businesses where the social networks by providing the services needed to support the company’s products or -most importantly- their customer relations. Inevitably, large companies and businesses had to seize the opportunity of the large numbers of people visiting these social networks in search of potential customers and started placing online ads, and providing services to the global internet community, and by doing so they stimulate even a larger number of web surfers from all around the world. In this research we will be revealing the advantages of advertising on social networks and how......

Words: 2740 - Pages: 11

Premium Essay

Security on the Internet

... Security on the Internet The Internet has had security problems since its earliest days as a pure research project. Today, after several years and orders of magnitude of growth, is still has security problems. It is being used for a purpose for which it was never intended: commerce. It is somewhat ironic that the early Internet was design as a prototype for a high-availability command and control network that could resist outages resulting from enemy actions, yet it cannot resist college undergraduates. The problem is that the attackers are on, and make up apart of, the network they are attacking. Designing a system that is capable of resisting attack from within, is still growing and evolving at a fast pace, is probably impossible. Changes are needed, and once you have achieved a certain amount of size, the sheer inertia of the installed base may make it impossible to apply fixes. The challenges for the security industry are growing. With the electronic commerce spreading over the Internet, there are issues such as nonrepudiation to be solved. Financial institutions will have both technical concerns, such as the security of a credit card number or banking information, and legal concerns for holding individuals responsible for their actions such as their purchases or sales over the Internet. Issuance and management of encryption keys for millions of users will pose a new type of challenge. While some......

Words: 2435 - Pages: 10

Premium Essay

Information Security

...production from the worm outbreak last month, and they directed us to improve the security of our technology. Gladys says you can help me understand what we need to do about it.” “To start with,” Charlie said, “instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are some other things that are part of the process as well, but these would be a good start.” “Sounds expensive,” said Fred. Charlie looked at Gladys, then answered, “Well, there will be some extra expenses for specific controls and software tools, and we may have to slow down our product development projects a bit, but the program will be more of a change in our attitude about security than a spending spree. I don’t have accurate estimates yet, but you can be sure we’ll put cost-benefit worksheets in front of you before we spend any money.” Fred thought about this for a few seconds. “OK. What’s our next step?” Gladys answered, “First, we need to initiate a project plan to develop our new information security program. We’ll use our usual systems development and project management approach. There are a few differences, but we can easily adapt our current models. We’ll need to appoint or hire a person to be responsible for information security.” The Need for Security Our bad neighbor makes us early stirrers, Which is both healthful and good......

Words: 24411 - Pages: 98

Premium Essay

Computer Network & Information Security

...Media has focused on computer security of big businesses and how they have been breached, yet individuals do not stop and think about their own personal computer safety. Information can be stolen or damaged, access of personal computers can be gained without permission, viruses and worms can enter creating problems for a user, and our computers may be susceptible to cyber-attacks from hackers. Yet most computer users are new to the technology or do not realize the dangers at hand. This is why users need to learn how to keep their personal computer safe. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data integrity, content protection, etc. Information security can be obtained using methods such as cryptography and network protocols. Computer security is the process of detecting unauthorized use of your computer or PC. As the old saying goes “prevention is better than cure”, according to this we realize that if we learn about the possible loopholes in the security, then we can prevent it from occurring in the first place. But the big question is 'why should I care about my computer security?’. We use computers for everything from banking and investing to shopping and communicating with others through email or chat programs. Although we may not consider our communication a 'top secret', but you don’t want others to eavesdrop on you conversations, read your mails, use your computer to......

Words: 1454 - Pages: 6

Premium Essay

Internet Security

...Internet Security Embry-Riddle Aeronautical University Table of Contents Abstract 3 Discussion 4 Background 4 Analysis 5 Conclusion 7 References 8 Abstract This paper focuses on five major areas of security issues on the Internet. Security concerns relate useful information to the average web surfer at home. There are tips on safeguarding one’s security and privacy over a network connection, plus some definitions of typical security problems individuals will come into contact with. The second focus of this paper includes the initial internet security measures. It will discuss the early security protocols and how technology has increased the security of the internet numerous times. Invention of internet security is the third topic of this project and focuses the invention and its impact on the Internet. The forth topic deals with the legal measures which have taken place regarding internet security issues. Finally, the fifth topic deals with the consumer privacy concerns, for the most part, people are becoming aware of internet security as online activities continue to skyrocket. As the technology becomes more available and easy to use, people seem to accept security risks in exchange for the convenience. Internet Security Since the early 1990’s, the solitary thing most people knew about internet security that there was a colossal computer network that had been inundated by a computer virus. Today it is difficult for anyone, to remember......

Words: 1424 - Pages: 6

Premium Essay

Trust and Social Networks

...Is it feasible to be able to trust everyone in a network of millions of people that you may be associated with? Many are evidently signing up to social networking sites and, as such, revealing much information about themselves. Does trust play a role in the use of social networking sites? Discuss and contrast. It could be said that online social privacy is harder to guarantee, so should one consider a higher level of concern for internet privacy and do you believe a lack of trust affects the popularity of social networking sites? According to the Oxford Advanced Learner’s dictionary, trust is defined as [1]: “the belief that somebody or something is good, sincere, honest, etc. and will not try to harm or trick you.” If this definition is adopted - as this essay will clearly show - it is clearly not feasible to trust everyone in a network of millions of people one might have contact with. Trust has always played a crucial role in determining the depth of human relationships. This is valid even more now that social networking tools enable people to connect with others in ways that were not possible before their invention. As a consequence, the essay will show that a lack of trust can seriously affect the popularity of such tools. A social network based on the Internet technology can be conceived as a social structure composed of individuals connected by some type of mutual interests. Technology developments brought major breakthroughs like the elimination of barriers of......

Words: 2215 - Pages: 9

Premium Essay

Information Technology/Network Security Threats

...password, policy, to educate the users. SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE. Each information security environments unique, unless modified to adapt to meet the organization’s needs. The System Development Life Cycle (SDLC) the system development life cycle starts with the initiation of the system planning process, and continues through system acquisition and development, implementation, operations and maintenance, and ends with disposition of the system. Service decisions about security made in each of these phases to assure that the system is secure. The initiation phase begins with a determination of need for the system. The organization develops its initial definition of the problem that solved through automation. This followed by a preliminary concept for the basic system that needed, a preliminary definition of requirements, and feasibility and technology assessments. Also during this early phase, the organization starts to define the security requirements for the planned system. Management approval of decisions reached is important at this stage. The information developed in these early analyses used to estimate the costs for the entire life cycle of the system, including information system security. An investment analysis determine the appropriate strategy for achieving the system requirements, while taking mission needs and budget constraints into account. Expenditures for security before the system built. It......

Words: 1444 - Pages: 6

Premium Essay

Network Security

...CHAPTER Firewall Fundamentals 2 T o some network administrators, a firewall is the key component of their infrastructure’s security. To others, a firewall is a hassle and a barrier to accomplishing essential tasks. In most cases, the negative view of firewalls stems from a basic misunderstanding of the nature of firewalls and how they work. This chapter will help dispel this confusion. This chapter clearly defines the fundamentals of firewalls. These include what a firewall is, what a firewall does, how it performs these tasks, why firewalls are necessary, the various firewall types, and filtering mechanisms. Once you understand these fundamentals of firewalls, you will be able to look beyond the unschooled opinions, common mythology, and marketing hype surrounding them, and the crucial benefits of effective firewall architecture will become clear. Like any tool, firewalls are useful in solving a variety of problems and in supporting essential network security. Chapter 2 Topics This chapter covers the following topics and concepts: • What a firewall is • Why you need a firewall • How firewalls work and what they do • What the basics of TCP/IP are • What the types of firewalls are • What ingress and egress filtering is • What the types of firewall filtering are • What the difference between software and hardware firewalls is • What dual-homed and triple-homed firewalls are • What the best placement of a firewall is 43 Chapter 2 Goals When you......

Words: 15367 - Pages: 62

Premium Essay

Internet Technology, Marketing and Security

...Assignment #4 Internet Technology, Marketing and Security Professor Demetrius Carolina, Sr. Bus 508-Contemporary Business March 2, 2013 An online presence is vital for today’s businesses the use of internet and social networking in the workplace has grown substantially over the last few decades. Because of this, individuals are now using the internet in various ways. Technologies such as social networking sites, blog sites and other innovations give individuals a chance to interact with one another. With that being said, having a social media marketing strategy is vital for a business to determine how you’ll communicate utilizing the internet. The purpose of this assignment is to determine the impact of social media and social media marketing on businesses today. Evaluate the reasons Social Media Marketing has become exceedingly popular among businesses of all sizes. Social media marketing is a new advertising strategy that businesses can use to appeal to a much wider and far more relevant market audience. This concept began as one that would promote social interaction but has now extended into the business sphere as social media marketing. When the social media craze first began, it was viewed primarily as a way for people to have fun online by communicating with one another about a diverse variety of topics. It didn’t take long for companies to realize the opportunities available for using social media for business. The participation in social......

Words: 3233 - Pages: 13

Premium Essay

Information Systems Security Policy

...MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 ________________________________________________________________________ 1 MICROS Systems, Inc. Enterprise Information Security Policy Version 8.0 Public Table of Contents Overview – Enterprise Information Security Policy/Standards: I. Information Security Policy/Standards – Preface……………....5 I.1 Purpose …………….……………………………………………...5 I.2 Security Policy Architecture ………………….………………….6 I.3 Relation to MICROS Systems, Inc. Policies……………………..6 I.4 Interpretation………………………………………………….…..7 I.5 Violations…………………………………………………….….....7 I.6 Enforcement…………………………………………….................7 I.7 Ownership………………………………………………................7 I.8 Revisions…………………………………………………………..7 II. Information Security Policy - Statement………………………..8 MICROS Enterprise Information Security Policy (MEIP): 1. Information Security Organization Policy (MEIP-001)...……....9 2. Access Management Policy (MEIP-002)…………………………10 3. Systems Security Policy (MEIP-003)...…….…………………......11 4. Network Security Policy (MEIP-004)…………………………….12 ________________________________________________________________________ 2 MICROS Systems, Inc. Enterprise Information Security Policy Version 8.0 Public 5. Application Security Policy (MEIP-005)…..………………………13 6. Data Security/Management Policy (MEIP-006)……………….14-15 7. Security Incident Handling......

Words: 4971 - Pages: 20

Premium Essay

Effectiveness of Social Network in Marketing Campaign

...Effectiveness of Social Network in Marketing Campaign Section I Introduction to the Study Introduction In an era where technology prevails, entrepreneurs as well as marketers see the need to keep up with the fast pace of change or risk being outdated. It is practically impossible to design a marketing strategy without considering social networks. Social network or social media had become really important factor in today’s marketing mix and in promotion mix. Adapting some form of marketing online through social media is a key node for all businesses, especially in an industry where trends constantly change such as fashion and handicrafts. Social network as a marketing tool and an effort has been made to analyze the extent social media helps consumers in buying decision making. Social network is a must in effective marketing campaigns. It is really effective as a marketing channel in terms of brand recognition. With social networking, marketers find it easy to determine and gather the feedbacks for certain products or services offered based on customer's comments without sacrificing much costs and time compared to other marketing channels. Social network also improved customer insights. By the reaction and comments posted by customers, you can gather information about what your customers are interested in. It also directly helps of what they think of your business which will give you an opportunity to improve a certain areas of your product or services. In this stage...

Words: 3198 - Pages: 13

Premium Essay

Computer Network Security for Social Networking

...Computer Network Security for Social Networking McCray C. Devin Undergraduate Business, Leadership, Information System Technology Security Regent University 1000 Regent University dr. Virginia Beach, VA 23464 e-mail: devimcc@mail.regent.edu Abstract In this paper, I will address the security issues, flaws, and problems that social networking sites are faced with in retrospect to information that the sites hold. The Information is not protected from the public in any way, why is this a normal operation about the popular social media sites. Lastly I want to address the simplicity of gaining someone vital information through a protected individual’s social network profile. 1. Introduction In today’s society almost everyone has some type of social networking service that they hold an account with. These social networking sites are a great way to communicate, network, and interact with fellow colligates and friends. Facebook, Twitter, and Google plus are just a few social networking sites to mention. These sites all have a one factor authentication system for the user to log into their account (Beaver) .This simplistic authentication systems is very easy and efficient for the users accessing there accounts. The idea arose if it is this easy for me to log into my account how easy would it be for an outside party to gain access within my account. Companies are faced with the problem of convenience over security. (McCHale 12) In this paper I would like to......

Words: 2048 - Pages: 9

Premium Essay

Internet Technology, Marketing and Security

...Internet Technology, Marketing and Security ------------------------------------------------- BUS508029VA016-1122-001 Prof. Etido Akpan Internet Technology, Marketing and Security An online presence is vital for today’s businesses. Many major corporations use social networking and the Internet to market and sell products, which requires the collection of data in order to facilitate these purchases. Unfortunately this can leave these corporations vulnerable to security breaches in an attempt to steal the information contained in these databases. One major corporation that suffered a security breach recently was Sony Corporation, which had two database security breaches in 2011. Sony Corporation was founded in May of 1946 and is headquartered in Tokyo, Japan with a U.S. Division called Sony Corporation of America. They have approximately 168,000 employees worldwide. Their major product lines are audio, video, televisions, information and communications, semiconductors, and electronic components. In 2010 global consolidated sales and operating revenue were $7,181,300 billion Yen or approximately $89.8 million US dollars (Sony Corporation, 2012). Sony Corporation has two websites, www.sony.com for the U.S. business lines and www.sony.net for the global corporate site. Each website is very similar in its offerings. Product information is available with detailed specs, and there are options to purchase some products online or links to purchase from a Sony......

Words: 1790 - Pages: 8

Premium Essay

Internet Security

...Internet Security. Abstract Online users today are faced with multitude of problems and issues. A typical online user is vulnerable to virus, worms, bugs, Trojan horses etc.; he/she is also exposed to sniffers, spoofing their private sessions; and they are also vulnerable to phishing of financial information. Not only this but users are also constantly subjected to invasion of privacy with the multitude of spy ware available for monitoring their surfing behaviours. If this is not all, users are also subjected to malwares that stop or totally destroy their machines render them helpless. These instances only indicate that the Internet is not a safe place for online users. Users are constantly vulnerable to hacked sessions, attacks and phishes that make them wary of going online. However, the trend does not stop at that. In fact corporations and government sector organizations are also faced with the same problems. Corporate information are being hacked; emails are read; government secret information are subject to security risks and banks are being hacked and millions stolen. Some of the reasons behind such attacks include the weaknesses inherent in the networks of the companies and government organizations; other reasons include carelessness of users. Whichever the case internet security issues have become one of the major concerns for technologists and users alike. There is a great need for understanding the nature of the attacks, the attackers, the networks, the loop holes...

Words: 10693 - Pages: 43

Premium Essay

Internet Technology, Marketing, and Security

...Internet Technology, Marketing, and Security Michael Hawkins Dr. Daniel Sersland BUS 508 – Contemporary Business July 26, 2012 Marketing has changed and businesses need to employ a variety of Digital Media tools in a marketing plan to be successful. Social Media is one of these tools. Social Media Examiner and CompTIA researched the benefits of Social Media Marketing and found many reasons why businesses should be marketing with Social Media. In addition to improving communication and fostering relationships with potential clients and business partners, five reasons to use Social Media include to: 1. Increase Exposure 85% of marketers said that they saw increased exposure for their businesses with Social Media. (Stelzner, 2012) Nearly all marketers surveyed said that using Social Media for a year or longer saw an increase in the exposure of their business. 2. Generate Leads just by spending as few as 6 hours a week using Social Media 61% of marketers saw the benefits of generating leads. This number increases 10% with at least 3 years of marketing with Social Media. Small Business saw an even greater increase in lead generation. 3. Save Money 51% of businesses saw cost savings with using Social Media to market. (CompTIA) According to HubSpot, inbound marketing costs 62% less than traditional outbound marketing. There is no other marketing avenue where you can get the daily exposure for your business than on Social Media. 4. Improve Search......

Words: 3775 - Pages: 16