Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2978178.2978187acmconferencesArticle/Chapter ViewAbstractPublication PagesiteConference Proceedingsconference-collections
research-article

The Paradox of Social Media Security: Users' Perceptions versus Behaviors

Published: 28 September 2016 Publication History

Abstract

Social networking sites have become major targets for cyber-security attacks due to their massive user base. Many studies investigated the security vulnerabilities and privacy issues of social networking sites and made recommendations on how to mitigate security risks. Users are an integral part of any security mix. In this paper, we explore the relationship between users' security perceptions and their actual behavior on social networking sites. Protection motivation theory (PMT), initially was developed to study fear appeals, and has been widely used to examine people's behavior in information security domains. We propose that PMT theory can also be adapted to explain and predict social media users' behaviors that have security implications. We plan to use a web-based survey to measure users' security awareness on social networking sites and collect data on their actual behavior. The research design and plan are presented in accordance to our research

References

[1]
D. M. Boyd and N. B. Ellison, "Social Network Sites: Definition, History, and Scholarship," J. Comput.-Mediat. Commun., vol. 13, no. 1, pp. 210--230, Nov. 2007.
[2]
Kaplan, A. M., and Haenlein, M. 2010. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons (53:1), pp. 59--68.
[3]
Internet World Stats 2015. World Internet Usage and Population Statistics. November 30, 2015 - Update. http://www.internetworldstats.com/stats.htm, Retrieved on: May 3, 2016.
[4]
Perrin, A. 2015. Social Media Usage: 2005--2015. October 8, 2015. Pew Research Center. Available at: http://www.pewinternet.org/2015/10/08/2015/Social-Networking-Usage-2005-2015/, Retrieved on: May 3, 2016.
[5]
Duggan, M., Ellison, N.B., Lampe, C., Lenhart, A., and Madden, M. 2015. Social Media Update 2014. Pew Research Center. Available at: http://www.pewinternet.org/2015/01/09/social-media-update-2014/, Retrieve on: May 3, 2016.
[6]
C. Oehri and S. Teufel, "Social media security culture - The Human Dimension in Social Media Management," Inf. Secur. South Afr., vol. 4, no. 1, pp. 1--5.
[7]
Internet Crime Complaint Center, "Internet Crime Report 2014," Internet Crime Complaint Center (IC3), 2014.
[8]
Press Association, "Social media-related crime reports up 780% in four years," The Guardian, Dec-2012. {Online}. Available: http://www.theguardian.com/media/2012/dec/27/social-media-crime-facebook-twitter. {Accessed: 18-May-2016}.
[9]
National White Collar Crime Center, "Criminal Use of Social Media (2013)," The National White Collar Crime Center (NW3C), 2013.
[10]
National Cyber Security Alliance, "2011 NCSA / McAfee Internet Home Users Survey," National Cyber Security Alliance, Oct. 2011.
[11]
National Cyber Security Alliance, "2012 NCSA / McAfee Online Safety Survey," National Cyber Security Alliance, Oct. 2012.
[12]
W. Ashford, "Social media: A security challenge and opportunity," ComputerWeekly, 2013. {Online}. Available: http://www.computerweekly.com/feature/Social-media-a-security-challenge-and-opportunity. {Accessed: 20-Apr-2016}.
[13]
R. W. Rogers, "A Protection Motivation Theory of Fear Appeals and Attitude Change," J. Psychol., vol. 91, no. 1, p. 93, Sep. 1975.
[14]
E. Fokes and L. Li, "A survey of security vulnerabilities in social networking media," Proc. 3rd Annu. Conf. Res. Inf. Technol., p. 57, Oct. 2014.
[15]
H. Nemati, J. D. Wall, and A. Chow, "Privacy Coping and Information-Sharing Behaviors in Social Media: A Comparison of Chinese and U.S. Users," J. Glob. Inf. Technol. Manag., vol. 17, no. 4, p. 228, Oct. 2014.
[16]
C. Wueest, "The risks of social networking," Symantec Corporation, 2010.
[17]
J. Zhao and S. Y. Zhao, "Security and Vulnerability Assessment of Social Media Sites: An Exploratory Study," J. Educ. Bus., vol. 90, no. 8, pp. 458--466, Jan. 2015.
[18]
J. Pagliery, "Two million Facebook, Gmail and Twitter passwords stolen in massive hack," CNN, Dec-2013. {Online}. Available: http://money.cnn.com/2013/12/04/technology/security/passwords-stolen/. {Accessed: 18-May-2016}.
[19]
L. Whitney, "More cyberattacks hitting social networks," CNET, Aug-2011. {Online}. Available: http://www.cnet.com/news/more-cyberattacks-hitting-social-networks/. {Accessed: 31-May-2016}.
[20]
D. Popescul and M. Georgescu, "Social Networks Security in Universities: Challenges and Solutions," Sci. Ann. Alexandru Ioan Cuza Univ. Iasi Econ. Sci. Ser., vol. 62, pp. 53--63, Dec. 2015.
[21]
P. Gundecha, G. Barbier, and H. Liu, "Exploiting vulnerability to secure user privacy on a social networking site," Proc. 17th ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., p. 511, Aug. 2011.
[22]
H. Liu and P. Maes, "InterestMap: Harvesting Social Network Profiles for Recommendations," Pers.-IUI, pp. 56--66, 2005.
[23]
Y. Li, "Theories in online information privacy research: A critical review and an integrated framework," Decis. Support Syst., vol. 54, pp. 471--481, Dec. 2012.
[24]
Sangmi Chai, C. Morrell, S. Bagchi-Sen, H. r. Rao, and S. J. Upadhyaya, "Internet and online information privacy: an exploratory study or preteens and early teens," IEEE Trans. Prof. Commun., no. 2, p. 167, 2009.
[25]
Kaspar, K. 2015. An embodiment perspective on protection motivation theory: the impact of incidental weight sensations on threat-appraisal, coping-appraisal, and protection motivation. Studia Psychologica: Journal for Basic Research in Psychological Sciences. 4 (2015), 301.
[26]
S. R. Boss, D. F. Galletta, P. B. Lowry, G. D. Moody, and P. Polak, "What Do Systems Users Have to Fear" Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors, Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 2607190, Dec. 2015.
[27]
J. L. Jenkins, M. Grimes, J. G. Proudfoot, and P. B. Lowry, "Improving Password Cyber-Security Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals," Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 2292761, Apr. 2014.
[28]
A. C. Johnston and M. Warkentin, "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Q., vol. 34, no. 3, pp. 549--A4, Sep. 2010.
[29]
T. Herath and H. R. Rao, "Protection motivation and deterrence: a framework for security policy compliance in organisations," Eur. J. Inf. Syst., vol. 18, no. 2, pp. 106--125, Apr. 2009.
[30]
F. D. Davis, "Perceived usefulness, perceived ease of use, and user acceptance of information technology," MIS Q., vol. 13, no. 1, pp. 319--340, 1989.
[31]
T. Chenoweth, R. Minch, and T. Gattiker, "Application of protection motivation theory to adoption of protective technologies," in Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS, 2009.
[32]
M. Siponen, S. Pahnila, and A. Mahmood, "Factors Influencing Protection Motivation and IS Security Policy Compliance," in 2006 Innovations in Information Technology, 2006, pp. 1--5.
[33]
H. S. Tsai, M. Jiang, S. Alhabash, R. LaRose, N. J. Rifon, and S. R. Cotten, "Understanding online safety behaviors: A protection motivation theory perspective," Comput. Secur., vol. 59, pp. 138--150, Jun. 2016.

Cited By

View all
  • (2020)Online Expression, Personal Cybersecurity Costs, and the Specter of CybercrimeEncyclopedia of Criminal Activities and the Deep Web10.4018/978-1-5225-9715-5.ch067(990-1002)Online publication date: 2020

Index Terms

  1. The Paradox of Social Media Security: Users' Perceptions versus Behaviors

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    RIIT '16: Proceedings of the 5th Annual Conference on Research in Information Technology
    September 2016
    66 pages
    ISBN:9781450344531
    DOI:10.1145/2978178
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 September 2016

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. behavior
    2. perceptions
    3. protection motivation theory
    4. social media security

    Qualifiers

    • Research-article

    Conference

    SIGITE/RIIT 2016
    Sponsor:

    Acceptance Rates

    RIIT '16 Paper Acceptance Rate 9 of 20 submissions, 45%;
    Overall Acceptance Rate 51 of 116 submissions, 44%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)22
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 13 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2020)Online Expression, Personal Cybersecurity Costs, and the Specter of CybercrimeEncyclopedia of Criminal Activities and the Deep Web10.4018/978-1-5225-9715-5.ch067(990-1002)Online publication date: 2020

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media