A CAUTION IN SOCIALIZATION: A PRELIMINARY IDENTIFICATION OF PERSONAL SECURITY JEOPARDIZING HABITS AMONG SOCIAL MEDIA USERS IN MALAYSIA
Keywords:Social media ethics, information security, personal information, privacy issues
AbstractSocial media is playing an important role to most people these days. People are using it to be connected among peers, updated with the latest information and also for e-commerce purposes. However, apart from its benefits there are others who would use the information obtained from social media in a malicious way such as harvesting personal information for black mailing, information manipulation and tele-marketing. This threat coupled with unsafe social media practice could expose the social media users to being manipulate into sharing sensitive and revealing information about them. In this paper, a preliminary investigation to identify distinct characterizations of unsafe social media habits is presented. For this study, we focused on one particular social engineering attack known as gatekeeper friending. In this attack, a would--be attacker or manipulator of information could exploit information shared over a social network and how an unsafe social media habits could expose its users to such attacks and exploitation. By identifying this habits we hope that a more secure and cautious code of conduct could be established to prevent unwanted disclosure of private information for malicious intention.
Suruhanjaya Komunikasi dan Multimedia. 2013. MCMC Annual Report 2013.
Kemp, S. 2014. 2014. Asia Pacific Digital Overview. Retrieved January 15, 2014, from Wearesocial.net.
Junior, D. 2015. Malaysia Social Media Statistic 2014. Retrieved March 2, 2015 from http://blog.malaysia-asia.my/2015/03/malaysia-social-media-statistics-2014.html.
Putchala, S. K., Bhat, K. and Anitha, R. 2014. Information Security Challenges in Social Media Interactions. British Telecommunications Engineering. 17: 291-295.
Jaakkola, H., Linna P., Henno. J. and Makela, J. 2011. (Social) Networking is Comingâ€“Are We Ready? MIPRO 2011, May 23-27, Opatija, Croatia.
Foster, J. 2015. A Match Made in Heaven: Fraud and Social Media. Security Week.
Dâ€™onfro, J. 2015. Strangers on the Social Media. Business Insider. Retrieved November 19, 2013 from http://www.businessinsider.com/jack-vale-social-media-experiment-2013-11?IR=T&.
Prince, B. 2009. Using Facebook to Social Engineer Your Way Around Security. E-Week Editorâ€™s Pick. Retrieved June 17, 2015 from http://www.eweek.com/c/a/Security/Social-Engineering-Your-Way-Around-Security-With-Facebook-277803
Foster, J. 2015. A CISOâ€™s Nightmare: Digital Social Engineering. Security Week.
How to Cite
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.