scholarly journals Security Threat and Data Consumption as Mojor Nuisance of Social Media on Wi-Fi Network

Author(s):  
Fuseini Inusah ◽  
Ibrahim Mohammed Gunu ◽  
Gaddafi Abdul-Salaam

Significance Articles containing the bogus quotes were shared across social media globally. The case illustrates how disinformation is created and spread for malign influence, and its ease of entry into social media discourse, which makes it so difficult to untangle and counter. Impacts Political polarisation within the United States is impeding a 'whole of society' response. Russian and Chinese disinformation campaigns will claim the two nations are falsely accused victims of bullying by envious foes. Artificial intelligence-created synthetic media such as deepfakes will enable a step-change in the sophistication of 'infowars'.


Media File Jacking (MFJ) is one security threat that affects media file usages within apps. Media files include image files, voice/audio files, video files and document files like pdf, docs, excel sheets, text files, etc. and these files easily find its place within our devices. The primary symptom of a Media File Jacking attack is that it will manipulate the media files, on transferring between users or apps. This type of malwares mainly targets mobile devices. The researchers from Symantec reported that this vulnerability has already found its way into the two top social media messaging apps namely, WhatsApp and Telegram. Not just limited to this, media file jacking can easily target mobile functioning’s whilst managing affected media files and its managed media chat apps. This analysis in detail tries to understand the vulnerabilities that devices are left exposed to via Media file jacking and how can protect Android based mobile devise with the help of existing, upcoming, configurable or programmable features. We try to cover in detail on i.) What Media file jacking attack is? ii.) How this vulnerability is created? iii.) Under which scenario this will happen iv.) What are the different types of attacks? iv.) What are the implications of this attack? v.) what are precautionary measures and how we can mark safe our mobile devices from this attack. This study mainly help to Android media app users and app develops to get a glance about the precautionary measures from media file jacking attack


2020 ◽  
Vol 10 (1) ◽  
pp. 17-34
Author(s):  
Antony Lee

As one of the countries in the world with the highest growth of internet users, Indonesia is experiencing a rapid growth in social media usage. Some use social media for networking but some others use it to spread hoaxes, fake information, or disinformation. During presidential election in Indonesia in the period from 2017 to 2019, hoaxes and disinformation were widely circulated through social media and instant messaging. This phenomenon has triggered heated public debates on the nexus between digital spaces and security, which include how the online disinformation has threatened Indonesian security. For example, hoaxes were represented in the public sphere as an existential threat to Indonesian unity. Immediate question regarding this phenomenon is:why are online hoaxes and fake information represented in public spheres as a security threat? This paper argues that as a response toward the increase of online hoaxes, there were securitizing moves made by political elites and special agencies in Indonesia before and in the aftermath of the 2019 Indonesian presidential election. Employing discourse analysis of selected relevant news articles around the period of 2017-2019, this paper analyses the dynamic of the securitization of online hoaxes in Indonesia. Grounded within Securitization Theory, this paper analyses; the facilitating condition; the triumvirates of securitizations, which are the securitizing actors, the threats posed by hoaxes, and the audiences; as well as extraordinary measures executed to handle the threats; internet throttling and internet shutdown when necessary. 


2019 ◽  
Vol 7 (2) ◽  
pp. 77
Author(s):  
Kingsley L. Ngange ◽  
Vera T. Fonkem ◽  
Stephen N. Ndode

Social media provide a platform through which societies can either be constructed or destabilized. In view of the ongoing bloody conflicts in Cameroon, this study examines the extent to which social media could pose as a security threat (with particular focus on community security) amongst adolescents in Buea, capital of the South West Region in Cameroon. The study uses a quantitative approach, through the collection of data from adolescents in four communities in Buea (Muea, Bomaka, Mile 16, and Molyko). These four areas are selected because the current socio-political crisis rocking the two Anglophone regions of the country – Northwest and Southwest, is particularly severe in these communities. Social media (notably Facebook and WhatsApp) spread dangerous content, and adolescents are vulnerable to such content. Findings indicate that there is a high rate of social media use (Facebook and WhatsApp) amongst adolescents surveyed. Also, the most discussed items on social media are socio-cultural issues (68%), as opposed to political issues (17.8%). Respondents were receptive to discussions on socio-cultural issues like dressing, language and relationships. Results also show that though adolescents come across violent content on social media, they have distanced themselves from being involved in the production, consumption, and dissemination (for instance, share information as received) of such violent content, partly because of the judicial consequences of doing so, as contained in the country’s Terrorism Law of December 2014. The implication here is that, since the adolescents are not yet intoxicated (whether advertently or inadvertently) with destructive social media content, need exists for the effective education of the adolescents, to enable this vulnerable and younger population to continue desisting from negative social media content. Emphasis should be on the consumption of positive social media content that helps in the moral and psychological growth of adolescents.


2017 ◽  
Vol 10 (1) ◽  
pp. 35-62 ◽  
Author(s):  
Ignas Kalpokas

Abstract Employing a perspective informed by brand management, this article aims at understanding information warfare operations in social media. The state, seen as brand, must project an image of itself to both internal and foreign audiences to unite the domestic audience and/or attract global support. However, in constructing a brand, states are vulnerable to ‘sofa warriors’ – ordinary individuals who have been unwittingly recruited by hostile actors to disseminate (over social media or other platforms) a counter-brand, harmful to the state concerned. These new threats are investigated in light of recent tendencies in online branding, elucidating their status as a national security threat, with the potential to significantly disrupt life in political communities.


ASHA Leader ◽  
2015 ◽  
Vol 20 (7) ◽  
Author(s):  
Vicki Clarke
Keyword(s):  

ASHA Leader ◽  
2013 ◽  
Vol 18 (5) ◽  

As professionals who recognize and value the power and important of communications, audiologists and speech-language pathologists are perfectly positioned to leverage social media for public relations.


2013 ◽  
Vol 44 (1) ◽  
pp. 4
Author(s):  
Jane Anderson
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document