Premium Essay

Employing Information Security Awareness to Minimize over-Exposure of Average Internet User on Social Networks

In: Computers and Technology

Submitted By worawitinter
Words 4473
Pages 18
International Journal of Scientific and Research Publications, Volume 4, Issue 1, January 2014 ISSN 2250-3153

1

Employing Information Security Awareness to Minimize Over-Exposure of Average Internet User on Social Networks
WorawitBinden*, MaheedeenJormae**, ZakariaZain***, Jamaludin Ibrahim**** worawit.inter@gmail.com*, maheedeen@gmail.com**, zakariazain13@gmail.com***, jamal55@gmail.com**** Department of Information Systems, Kulliyyah of Information and Communication Technology, International Islamic University Malaysia

ABSTRACT-Use of Online Social Networking Sites (OSNs) has become ubiquitous nowadays. In the era of a million user social networking sites throughout the world, it becomes increasingly difficult for people to control what they are exposing to whom. In this paper we analyze the influence of social media interactivity features on the exposure of personal data of average Internet user and present techniques to implement information security awareness to minimize overexposure on OSNs. Index Terms-Online Social Networking, Information Security Awareness, Social Network Interactivity Features

I. INTRODUCTION nformation is vital to communication and a critical resource for performing work in organizations. It is also important to individuals, and therefore the need to proper manage it well, is growing rapidly. Protecting data is as important as protecting cash as it is asset – and requires just as much care and planning. Now more than ever, people need to understand the critical role information plays in so many aspects of business and life. It drives our communication, our decision-making, and our reactions to the entire environment. Information has been valuable since the dawn of mankind. As access to computer stored data has increased, Information Security has become correspondingly important. In the past, most corporate assets were “hard”...

Similar Documents

Premium Essay

Essentials of Management Information Systems

...They continually sign onto the Internet and...

Words: 21009 - Pages: 85

Premium Essay

Urban Outfitters

...5.2.11 Internal Audit Team 16 5.2.12 User Assistance Team 16 5.3 Data Communications 16 5.4 Backups 16 5.4.1 Vital Records/Documentation 17 5.5 Office Equipment, Furniture and Supplies 19 5.6 Recommended Testing Procedures 19 6 Recommended Strategies 20 6.1 Critical Issues 20 6.1.1 Power 20 6.1.2 Diversification of Connectivity 20 6.1.3 Offsite Backup...

Words: 17323 - Pages: 70

Premium Essay

Quality Control Plan

...Facilities Team 16 5.2.10 System Software Team 16 5.2.11 Internal Audit Team 16 5.2.12 User Assistance Team 16 5.3 Data Communications 16 5.4 Backups 16 5.4.1 Vital Records/Documentation 17 5.5 Office Equipment, Furniture and Supplies 19 5.6 Recommended Testing Procedures 19 6 Recommended Strategies 20 6.1 Critical Issues 20 6.1.1 Power 20 6.1.2...

Words: 17284 - Pages: 70

Free Essay

Dfdgfg

...BOOKMARK THIS PAGE | PRINT THIS PAGE | CLOSE Internet Security Threat Report Volume 17 Custom Report SHARE THIS PAGE Symantec blocked a total of over 5.5 billion malware attacks in 2011, an 81% increase over 2010. Web based attacks increased by 36% with over 4,500 new attacks each day. 403 million new variants of malware were created in 2011, a 41% increase of 2010. SPAM volumes dropped by 34% in 2011 over rates in 2010. 39% of malware attacks via email used a link to a web page. Mobile vulnerabilities continued to rise, with 315 discovered in 2011. Only 8 zero-day vulnerabilities were discovered in 2011 compared with 14 in 2010. 50% of targeted attacks were aimed at companies with less than 2500 employees. Overall the number of vulnerabilities discovered in 2011 dropped 20%. Only 42% of targeted attacks are aimed at CEOs, Senior Managers and Knowledge Workers. In 2011 232 million identities were exposed. An average of 82 targeted attacks take place each day. Mobile threats are collecting data, tracking users and sending premium text messages. You are more likely to be infected by malware placed on a legitimate web site than one created by a hacker. Introduction Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 64.6 million attack sensors and records thousands of events per second....

Words: 44470 - Pages: 178

Premium Essay

Main Paper

...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document....

Words: 52755 - Pages: 212

Premium Essay

Netwrk Security

...Fundamentals of Network Security John E. Canavan Artech House Boston • London http://www.artechhouse.com Library of Congress Cataloging-in-Publication Data Canavan, John E. Fundamentals of network security / John E. Canavan. p. cm.—(Artech House telecommunications library) Includes bibliographical references and index. ISBN 1-58053-176-8 (alk. paper) 1. Computer security. 2. Computer networks—Security measures. I. Title. II. Series. QA76.9.A25 C364 2000 005.8—dc21 00-050810 CIP British Library Cataloguing in Publication Data Canavan, John E. Fundamentals of network security.—(Artech House telecommunications library) 1. Computer networks—Security measures I. Title 005.8 1-58053-176-8 Cover design by Yekaterina Ratner Microsoft ® screen shots reprinted by permission from Microsoft Corporation. Netscape Communicator browser window © 1999 Netscape Communications Corporation. Used with permission. Netscape Communications has not authorized, sponsored, endorsed, or approved this publication and is not responsible for its content. Permission to reproduce screen shots from the PGP and Sniffer products has been provided by Network Associates, Inc. Network Associates, PGP, Pretty Good Privacy Sniffer, and Distributed Sniffer System are registered trademarks of Network Associates, Inc. and/or its affiliates in the U.S. and/or other countries. MIT screen shots used with permission. Qualcomm's Eudora screen shots used with permission....

Words: 95027 - Pages: 381

Premium Essay

Paper

...No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher. For product information and technology assistance, contact us at Professional Group Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or...

Words: 229697 - Pages: 919

Premium Essay

Starbucks E-Marketing

...E-Marketing BM012-3-2-EMKT Individual Assignment | Table of Contents 1.0 INTRODUCTION 3 2.0 STRATEGY IDENTIFICATION 4 2.1Marketing Mix 4 2.11 Product 4 2.12 Price 4 2.13 Place 5 2.13 Promotion 5 3.0 ENVIRONMENTAL ANALYSIS 8 3.1 SWOT Analysis for Starbucks 8 3.2 PEST Analysis for Starbucks 10 3.21 Political 10 3.22 Economic 10 3.23 Social 11 3.24 Technological 11 4.0 E_MARKETING PLAN 14 4.1 E-Marketing Strategic Planning 14 4.11 Segmentation 14 4.12 Targeting 15 4.13 Differentiation 15 4.14 Positioning 16 4.2 Objectives 18 4.3 E-marketing Strategy 18 4.4 E-marketing Tactics 19 5.0 IMPLEMENTATION 22 5.1 Implementation Plan 22 5.2 Evaluation 24 6.0 CONCLUSION 25 7.0 REFERENCES 26 8.0 APPENDIX 30 1.0 INTRODUCTION Starbucks is a well known brand established 1971 at Seattle by Jerry Baldwine, Zev Seigle and Gorden Bawker. The company operates in approximately in 17,000 retail stores over 49 different countries including Malaysia. With the mission statement of “to inspire and nurture the human spirit-one person, one cup and one neighbourhood at a time” Starbucks have been expanding rapidly. Other than the world premium coffee Starbucks offers tea, cold beverages, complementary foods such as sandwiches and salads. (A. Mettlach, 2010) Starbucks has invested highly on IT to target their products and services to market segments....

Words: 7559 - Pages: 31

Premium Essay

Impotent Music

...INFORMATION RESOURCE GUIDE Computer, Internet and Network Systems Security An Introduction to Security i Security Manual Compiled By: S.K.PARMAR, Cst N.Cowichan Duncan RCMP Det 6060 Canada Ave., Duncan, BC 250-748-5522 sunny@seaside.net This publication is for informational purposes only. In no way should this publication by interpreted as offering legal or accounting advice. If legal or other professional advice is needed it is encouraged that you seek it from the appropriate source. All product & company names mentioned in this manual are the [registered] trademarks of their respective owners. The mention of a product or company does not in itself constitute an endorsement. The articles, documents, publications, presentations, and white papers referenced and used to compile this manual are copyright protected by the original authors. Please give credit where it is due and obtain permission to use these. All material contained has been used with permission from the original author(s) or representing agent/organization....

Words: 134858 - Pages: 540

Premium Essay

E-Enabled Relationship Management in the Banking Sector

...THESIS ON E-ENABLED RELATIONSHIP MANAGEMENT IN BANKING SECTOR IN INDIA EXECUTIVE SUMMARY Relationship banking may be defined as the provision of financial services by a financial intermediary on the basis of long-term investment in obtaining firm or customer specific information through multiple interactions with diverse financial services (Boot, 2000). E- Enabled Relationship banking system refers to use of Information Technology and especially the internet. Customers could get connected by a network service provider directly to a host computer system of a bank such that customer service requests can be processed automatically without need for intervention by customer service representatives. Most of these systems are capable of distinguishing between those customer service requests which are capable of automated fulfillment and those requests which require handling by a customer service representative. Marketing is different from selling mainly in terms of orientation. In selling the efforts are product centred where as customer centric is the key to marketing. Marketing starts with target market and earns through customer satisfaction. Bank credit is a service product and not a physical product like soap....

Words: 19932 - Pages: 80

Premium Essay

Forces of Change & Accompanying Values

...FORCES OF CHANGE AND THEIR ACCOMPANYING VALUES FORCES OF CHANGE & ACCOMPANYING VALUES Turbulence Intellectual capital, Intellectual propert, ,information sharing Networking, innovation, R&D INFORMATION AGE K-Economy GLOBALIZATION DEVELOPMENT Autonomy, Pride, Dignity Independence, Indigenization “CultureBound” Customer Focus; Speed, Responsiveness; Continuous Learning; Accurate & Up-To-Date Information Quality; Value Added; Cost Effectiveness; Humanization; Ecological Specialisation; Objectivity; Materialism; SystemsOrientation MODERNIZATION WESTERNIZATION Individualism; Secularism; Freedom Of Expression; Consumerism INDUSTRIALIZATION Mechanization; Rational Thinking; Bureaucracy; Efficiency; Productivity; Mobility; Discipline; Mechanical Time Orientation; Reliability Stable 1800 AGRICULTURAL Revolution Time line Simple division of labor, labor intensive, Collectivism, sharing 2000 FORCES OF CHANGE & ACCOMPANYING VALUES Turbulence Intellectual capital, Intellectual propert, ,information sharing Networking, innovation, R&D INFORMATION AGE K-Economy GLOBALIZATION DEVELOPMENT Autonomy, Pride, Dignity Independence, Indigenization “CultureBound” Customer Focus; Speed, Responsiveness; Continuous Learning; Accurate & Up-To-Date Information Quality; Value Added; Cost Effectiveness; Humanization; Ecological Specialisation; Objectivity; Materialism; SystemsOrientation MODERNIZATION WESTERNIZATION Individualism; Secularism;......

Words: 23543 - Pages: 95

Premium Essay

Security

...Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Computer Security Requires a Comprehensive and Integrated Approach. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Computer Security Should Be...

Words: 93588 - Pages: 375

Free Essay

Ebusiness

...At first glance, it would seem that Sarasota is an ideal location for year round farming, with plenty of sunshine, and only a few days of frost (if any) in an average year. Rain is seasonal, with summer being the...

Words: 13245 - Pages: 53

Premium Essay

The Handbook

...Legal Foundation for Federal Computer Security Programs . 3 3 4 5 7 Chapter 2 ELEMENTS OF COMPUTER SECURITY 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 Computer Security Supports the Mission of the Organization. 9 Computer Security is an Integral Element of Sound Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Computer Security Should Be Cost-Effective. . . . . . . . . . . . . . . . 11 Computer Security Responsibilities and Accountability Should Be Made Explicit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Systems Owners Have Security Responsibilities Outside Their Own Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Computer Security Requires a Comprehensive and Integrated Approach. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ....

Words: 93564 - Pages: 375

Premium Essay

Unesco

...However, UNESCO recognizes that the principle of freedom of expression must apply not only to traditional media, but also to the Internet. Providing an unprecedented volume of resources for information and knowledge, the Internet opens up new opportunities for expression and participation and holds enormous potential for development. This comprehensive research publication examines the changing legal and regulatory ecology that has shaped the Internet over the years. The researchwas...

Words: 39228 - Pages: 157