A CAUTION IN SOCIALIZATION: A PRELIMINARY IDENTIFICATION OF PERSONAL SECURITY JEOPARDIZING HABITS AMONG SOCIAL MEDIA USERS IN MALAYSIA

Authors

  • Md. Nabil Ahmad Zawawi Centre of Information and Network Security, College of Computer Science and Information Technology, Universiti Tenaga Nasional, Malaysia

DOI:

https://doi.org/10.11113/jt.v77.6541

Keywords:

Social media ethics, information security, personal information, privacy issues

Abstract

Social media is playing an important role to most people these days. People are using it to be connected among peers, updated with the latest information and also for e-commerce purposes. However, apart from its benefits there are others who would use the information obtained from social media in a malicious way such as harvesting personal information for black mailing, information manipulation and tele-marketing. This threat coupled with unsafe social media practice could expose the social media users to being manipulate into sharing sensitive and revealing information about them. In this paper, a preliminary investigation to identify distinct characterizations of unsafe social media habits is presented. For this study, we focused on one particular social engineering attack known as gatekeeper friending. In this attack, a would--be attacker or manipulator of information could exploit information shared over a social network and how an unsafe social media habits could expose its users to such attacks and exploitation. By identifying this habits we hope that a more secure and cautious code of conduct could be established to prevent unwanted disclosure of private information for malicious intention.

References

Suruhanjaya Komunikasi dan Multimedia. 2013. MCMC Annual Report 2013.

Kemp, S. 2014. 2014. Asia Pacific Digital Overview. Retrieved January 15, 2014, from Wearesocial.net.

Junior, D. 2015. Malaysia Social Media Statistic 2014. Retrieved March 2, 2015 from http://blog.malaysia-asia.my/2015/03/malaysia-social-media-statistics-2014.html.

Putchala, S. K., Bhat, K. and Anitha, R. 2014. Information Security Challenges in Social Media Interactions. British Telecommunications Engineering. 17: 291-295.

Jaakkola, H., Linna P., Henno. J. and Makela, J. 2011. (Social) Networking is Coming–Are We Ready? MIPRO 2011, May 23-27, Opatija, Croatia.

Foster, J. 2015. A Match Made in Heaven: Fraud and Social Media. Security Week.

D’onfro, J. 2015. Strangers on the Social Media. Business Insider. Retrieved November 19, 2013 from http://www.businessinsider.com/jack-vale-social-media-experiment-2013-11?IR=T&.

Prince, B. 2009. Using Facebook to Social Engineer Your Way Around Security. E-Week Editor’s Pick. Retrieved June 17, 2015 from http://www.eweek.com/c/a/Security/Social-Engineering-Your-Way-Around-Security-With-Facebook-277803

Foster, J. 2015. A CISO’s Nightmare: Digital Social Engineering. Security Week.

Downloads

Published

2015-11-30

How to Cite

A CAUTION IN SOCIALIZATION: A PRELIMINARY IDENTIFICATION OF PERSONAL SECURITY JEOPARDIZING HABITS AMONG SOCIAL MEDIA USERS IN MALAYSIA. (2015). Jurnal Teknologi (Sciences & Engineering), 77(19). https://doi.org/10.11113/jt.v77.6541