scholarly journals PENGUKURAN KESADARAN KEAMANAN INFORMASI DAN PRIVASI DALAM SOSIAL MEDIA

Author(s):  
Hendro Gunawan

The development of information technology and the internet has changed the way humans communicate. One of them is the development of social media, social media has become a part of their lives to obtain or share news online. Social media is one of the most powerful media today, because it provides the convenience and speed that allows someone to create and distribute content. With the development of social media, information security and privacy issues are also of importance today. Social media as a source of leaking classified information has become common today. The purpose of this study is to see how the views of students who are included in the millennial generation see information security and privacy in using social media. The object of this research is the students of the Information Systems Study Program, Faculty of Industrial Technology, Atma Jaya University, Yogyakarta, the data is obtained by distributing questionnaires. Based on questionnaires from respondents, it can be seen that UAJY Information Systems Study Program students understand the importance of information security (85%) but their behavior does not reflect information security, passwords are not changed regularly (75%) and like to access social media in unknown public places. level of system security. In terms of privacy, UAJY Information Systems Study Program students still include personal information on social media, where many social media accounts are open to the public (40.6%), they also do not apply privacy settings (54.9%) so that information important is not publicly accessible. Keywords: information security; social media; privacy AbstrakPerkembangan teknologi informasi dan internet saat ini telah mengubah cara manusia dalam melakukan komunikasi. Salah satunya adalah perkembangan media sosial, media sosial sudah menjadi bagian dari kehidupan mereka untuk memperoleh atau membagikan berita online. Media sosial merupakan salah satu media yang sangat kuat saat ini, karena menyediakan kemudahan dan kecepatan yang memungkinkan seseorang membuat dan mendistribusikan sebuah konten. Semakin berkembangnya media sosial maka masalah keamanan informasi dan privasi juga menjadi hal yang penting saat ini. Media sosial sebagai salah satu sumber bocornya informasi rahasia sudah menjadi hal yang umum saat ini. Tujuan dari penelitian ini melihat bagaimana pandangan mahasiswa yang termasuk dalam generasi millennial melihat keamanan informasi dan privasi dalam menggunakan media sosial. Yang menjadi objek dalam penelitian ini adalah mahasiswa Program Studi Sistem Informasi Fakultas Teknologi Industri Universitas Atma Jaya Yogyakarta, data diperoleh dengan cara menyebarkan kuesioner. Berdasarkan kuesioner dari responden maka dapat dilihat bahwa mahasiswa Prodi Sistem Informasi UAJY memahami pentingnya keamanan informasi (85%) akan tetapi perilaku mereka tidak mencerminkan keamanan informasi, password tidak diganti secara berkala (75%) dan suka mengakses media sosial di tempat publik yang belum diketahui tingkat keamanan sistemnya. Dari segi privasi, mahasiswa Prodi Sistem Informasi UAJY masih mencantumkan informasi pribadi di media sosial, yang akun media sosialnya masih banyak yang dibuka untuk umum (40,6%), mereka juga tidak menerapkan pengaturan privasi (54,9%) sehingga informasi-informasi penting tidak bisa diakses secara umum.

Author(s):  
Yan Chen ◽  
Dennis F. Galletta ◽  
Paul Benjamin Lowry ◽  
Xin (Robert) Luo ◽  
Gregory D. Moody ◽  
...  

A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unable to address the threat and, feeling overwhelmed, focus only on controlling their emotions, merely making themselves feel better. Based on our findings, organizations can enhance their security by understanding the “tipping point” where employees’ focus likely changes from problem-solving to emotion appeasement, and instead push them into a more constructive direction.Yan Chen is an associate professor at Florida International University. She received her PhD in management information systems from University of Wisconsin–Milwaukee. Her research focuses on information security management, online fraud, privacy, and social media. She has published more than 30 research papers in refereed academic journals and conference proceedings.Dennis F. Galletta is a LEO awardee, fellow, and former president of the Association for Information Systems and professor at University of Pittsburgh since 1985. He has published 108 articles and four books. He is a senior editor at MIS Quarterly and an editorial board member at the Journal of Management Information Systems, and has been on several other boards.Paul Benjamin Lowry is the Suzanne Parker Thornhill Chair Professor in Business Information Technology at the Pamplin College of Business at Virginia Tech. He has published more than 135 journal articles. His research areas include organizational and behavioral security and privacy; online deviance and harassment, and computer ethics; human–computer interaction, social media, and gamification; and decision sciences, innovation, and supply chains.Xin (Robert) Luo is Endowed Regent’s Professor and full professor of MIS at the University of New Mexico. His research has appeared in leading information systems journals, and he serves as an associate editor for the Journal of the Association for Information Systems, Decision Sciences Journal, Information & Management, Electronic Commerce Research, and the Journal of Electronic Commerce Research.Gregory D. Moody is currently Lee Professor of Information Systems at the University of Nevada Las Vegas, and director of the cybersecurity graduate program. His interests include information systems security and privacy, e-business, and human–computer interaction. He is currently a senior editor for the Information Systems Journal and Transactions on Human-Computer Interaction.Robert Willison is a professor of management at Xi’an Jiaotong–Liverpool University. He received his PhD in information systems from the London School of Economics. His research focuses on insider computer abuse, information security policy compliance/noncompliance, software piracy, and cyber-loafing. His research has appeared in refereed academic journals such as MIS Quarterly, Journal of the Association for Information Systems, Information Systems Journal, and others.


Author(s):  
Max Z. Li ◽  
Megan S. Ryerson

Community outreach and engagement efforts are critical to an airport’s role as an ever-evolving transportation infrastructure and regional economic driver. As online social media platforms continue to grow in both popularity and influence, a new engagement channel between airports and the public is emerging. However, the motivations behind and effectiveness of these social media channels remain unclear. In this work, we address this knowledge gap by better understanding the advantages, impact, and best practices of this newly emerging engagement channel available to airports. Focusing specifically on airport YouTube channels, we first document quantitative viewership metrics, and examine common content characteristics within airport YouTube videos. We then conduct interviews and site visits with relevant airport stakeholders to identify the motivations and workflow behind these videos. Finally, we facilitate sample focus groups designed to survey public perceptions of the effectiveness and value of these videos. From our four project phases, to maximize content effectiveness and community engagement potential, we synthesize the following framework of action items, recommendations, and best practices: (C) Consistency and community; (O) Organizational structure; (M) Momentum; (B) Branding and buy-in; (A) Activity; (T) Two-way engagement; (E) Enthusiasm; and (D) Depth, or as a convenient initialism, our COMBATED framework.


2012 ◽  
Vol 9 (4) ◽  
pp. 378-393 ◽  
Author(s):  
Alice Marwick

People create profiles on social network sites and Twitter accounts against the background of an audience. This paper argues that closely examining content created by others and looking at one’s own content through other people’s eyes, a common part of social media use, should be framed as social surveillance. While social surveillance is distinguished from traditional surveillance along three axes (power, hierarchy, and reciprocity), its effects and behavior modification is common to traditional surveillance. Drawing on ethnographic studies of United States populations, I look at social surveillance, how it is practiced, and its impact on people who engage in it. I use Foucault’s concept of capillaries of power to demonstrate that social surveillance assumes the power differentials evident in everyday interactions rather than the hierarchical power relationships assumed in much of the surveillance literature. Social media involves a collapse of social contexts and social roles, complicating boundary work but facilitating social surveillance. Individuals strategically reveal, disclose and conceal personal information to create connections with others and tend social boundaries. These processes are normal parts of day-to-day life in communities that are highly connected through social media.


Author(s):  
Daniel J. Seigler

Based on the importance of citizen participation and the collaborative potential of online social media tools, this study tests four proposed influences on administrators who are deciding whether or not to adopt these tools to engage citizens. A survey of 157 department managers from large U.S. cities shows that 82% report using some form of social media to engage citizens and that perceived organizational influences and administrator preconceptions have the strongest impact on the respondentsʼ decision to adopt social media. Possible explanations for the results are that the use of online social media in the public sector may be following a similar path of adoption as earlier forms of e-government or managers may be operating in a rational environment when deciding whether or not to adopt online social media tools.


2021 ◽  
Vol 6 (5) ◽  
Author(s):  
Kumaran Kanapathipillaii

<p>Social media such as Facebook has become an essential strategic tool for organisations. Facebook is a platform where a large pool of consumers would use to make purchase decisions. Organisations are designing and maintaining their Facebook account to expand their social networks and build relationships with the public. This research explains current situations regarding the influence of online social media technology with reference to Facebook on employees' work performance in Malaysia. The problem statement focuses on both the public and private sectors in Malaysia. Additionally, various literature was reviewed, indicating the relationship between social media (usage at work, sociability, and trust) and work performance. The mediating role of the organisational framework on the relationship between online social media technology (Facebook) and work performance was also scrutinised to formulate the research hypothesis. The findings of this research established a significant relationship between online social media (Facebook) and organisational framework and work performance. Conclusively, the hypothesis depicted that the organisational framework fully mediates the relationship between online social media technology (Facebook) and employees' work performance in public and private sectors in Malaysia. This study also verifies that both the public and private sector organisations that incorporate Facebook can enhance networking and information sharing, influencing employees' work performance, creating a stable organisational framework, generating value for customers, and improving employee relationships with all stakeholders. In conclusion, work performance can be heightened by a well planned and structured organisational framework. Additionally, through a well planned and implemented online social media technology such as Facebook, an organisation would have a smooth operating organisational framework and a workforce with enhanced performance.</p><p> </p><p><strong> Article visualizations:</strong></p><p><img src="/-counters-/edu_01/0854/a.php" alt="Hit counter" /></p>


2015 ◽  
Vol 4 (4) ◽  
pp. 47-58 ◽  
Author(s):  
Nico Martins ◽  
Adéle da Veiga

An information security culture is influenced by various factors, one being regulatory requirements. The United Kingdom (UK) has been regulated through the UK Data Protection Act since 1995, whereas South Africa (SA) only promulgated the Protection of Personal Information Act (PoPI) in 2013. Both laws stipulate requirements from an information security perspective with regard to the processing of personal information, however in the UK this has been regulated for a longer period. Consequently, it is to be expected that the information security culture for organisations in the UK will be significantly different from that of SA. This raises the question as to whether the same information security culture assessment (ISCA) instrument could be used in an organisation with offices in both jurisdictions, and whether it might be necessary to customise it according the particular country’s enforcement of information security and privacy-related conditions. This is reviewed, firstly from a theoretical perspective, and secondly a factorial invariance analysis was conducted in a multinational organisation with offices in both the UK and SA, using data from an ISCA questionnaire, to determine possible factorial invariances in terms of the ISCA.


Author(s):  
Dr. J. Padmavathi ◽  
Sirvi Ashok Kumar Mohanlal

Today Social Media is an integral part of many people’s lives. Most of us are users of one or many of these such as Facebook, Twitter, Instagram, LinkedIn etc. Social media networks are the most common platform to communicate with our friends, family and share thoughts, photos, videos and lots of other information in the common area of interest. Privacy has become an important concern in social networking sites. Users are not aware of the privacy risks involved on social media sites and they share their sensitive information on social network sites. While these platforms are free and offer unrestricted access to their services, they puzzle the users with many issues such as privacy, security, data harvesting, content censorship, leaking personal information etc. This paper aims at analyzing, the major users of social media networks, namely, the college students. It was intended to assess the extent the consumers’ are aware of the risks of free usage and how to mitigate against these privacy issues.


2015 ◽  
Author(s):  
◽  
Jennifer Spitulnik

The occupational folk group of Broadway musical theater performers uses folklore in public spaces as a kind of representational strategy for the group as a whole. This strategy is significant in representing the group’s identity to itself as well as to outsiders who are invested in knowing more about them, such as Broadway enthusiasts. That is, the group can and does tell the story of itself, representing itself ethnographically, by way of its individual members. Social media technologies provide a platform for Broadway performers to present these native ethnographies both to the public and to other members of the folk group. I argue that these native, self-conscious ethnographic works by musical theater performers are both concerned with representing themselves as individuals, and with representing the cultural group of musical theater performers as a whole. Exploring the folklore and folk identities performed by members of this group in online social media suggests new ways of understanding the politics and practices of ethnography, particularly on social network sites in our postmodern global economy of attention. In this project, the first in any field to consider musical theater performers as a cultural or folk group, I investigate actors’ recognition of and group use of vernacular creative expressionsâ€"folkloreâ€"as a representational strategy. Through this work, I explore the ways in which self-representation on the part of the ethnographic participants claims voice and authority for the group, while simultaneously performing group membership and identity for multiple audiences.


2017 ◽  
Vol 8 (2) ◽  
pp. 1-25
Author(s):  
Christos Kalloniatis ◽  
Argyri Pattakou ◽  
Evangelia Kavakli ◽  
Stefanos Gritzalis

Pervasiveness of information systems is well underway, redefining our social and economic relationships. This technological revolution has generated enormous capabilities, but also enabled the creation of new vulnerabilities and threats. A major challenge in the field of information systems is therefore, to ensure the trustworthiness of the underlying technologies that make possible the generation, collection, storage, processing and transmission of user data at rates more intensive than ever before. Trust in information systems depends on different aspects, one of which is the security of user's data. Data security is referred as the protection of user's data from corruption and unauthorized access. Another important aspect of trust is the protection of user's privacy. Protecting privacy is about complying with user's desires when it comes to handling personal information. Without security to guarantee data protection, appropriate uses of that data cannot be realized. This implies that security and privacy issues are inherently intertwined and should be viewed synergistically. The aim of this paper is to elevate modern practices for ensuring security and privacy during software systems analysis and design. To this end, the basic security and privacy requirements that should be considered are introduced. Additionally, a number of well known methods in the research area of requirements engineering which focus on eliciting and modeling security and privacy requirements are described. Finally, a comparative analysis between these methods is presented.


Author(s):  
Venetis Kanakaris ◽  
Georgios Lampropoulos ◽  
Kerstin Siakas

Nowadays, social media and social networks are increasingly used in business as they have drastically changed the way the community works, communicates, collaborates, socialises, creates content and shares knowledge and ideas. However, in particular, IT professionals and practitioners need to be aware of online security and privacy issues and the potential negative impact that they may cause on different aspects of business, such as online breaches or information theft. The use of social media inevitably leads to disclosure of personal information, with the use of open-source intelligence (OSINT) and other similar techniques. Hence, the aim of this article is twofold, namely first to show results of a survey towards future Greek IT practitioners regarding awareness and viewpoints of social media users concerning security and privacy on social media. More specifically the study was based on responses and viewpoints of 178 Greek electrical engineering and IT students to an online questionnaire. Secondly, the aim is also to show how easily a potential malicious user can anonymously track and retrieve sensitive personal information in an automated and undetectable way from popular social media platforms by using publicly available information, resources, and tools. The results of the survey show that most of the respondents are aware of the privacy settings of the social media platforms they use. However, they consider that they should be more careful concerning personal data and whom they add as friends or followers and they do not feel comfortable with the fact that a stranger might be able to access their personal information through their publications on social media platforms.The case study indicates that it is possible for malicious users to acquire sensitive personal data (e.g. user's location via tweets and instas from smartphones). In addition, the ability to map activity could allow malicious users to track the activities of unsuspected users and predict their future locations.


Sign in / Sign up

Export Citation Format

Share Document