Even though social network sites (SNS) are still popular, more and more young users are abandoning traditional social network sites. In 2018, less than half of people aged 12–17 used Facebook monthly. These changes can be attributed to the fact that young users are looking for other options such as Anonymous Social network (ASNS) platforms …
We all have questions, but who are the people with the answers for Cybersecurity. In this series we sat down with academics and experts to ask them about how they got started, what they are researching now, their lessons for us and the future. In this new series, Michelle Mazurek, Assistant Professor in the Computer …
The rapid and vast adoption of social media changed the way individuals interact. For a lot of people, social media platforms are often used to maintain a sense of connection. As of now, Facebook is the largest social media platform in the world, with 2.4 billion users1. Previous research has shown that people who experience …
Password authentication is a widely used method of authentication. Most often, users choose passwords that are easy to remember, but that are also weak. Many service providers instruct users to create strong passwords with requirements such as password must have a minimum number of characters, must include uppercase letters or digits, or it must include …
Due to the public grown awareness and concerns over privacy, social networking services have enhanced their privacy setting options. However, these enhancements and changes are not always easy to follow or implement, and many people do not use them to their full potential. For users of social networking platforms, too much privacy will limit self-presentation. …
When it comes to cybersecurity, it is important to consider human behaviour as a part of a group as individuals play a significant role in creating and preventing incidents. Culture and interactions in work environments can participate in determining human behaviour. Information Security Awareness (ISA) is essential for organizations, primarily to mitigate risks. ISA refers …
Smartphone features and usage have changed significantly over the past few years. The increasing amount of personal and private data on those devices makes them a popular target for theft. There have been several studies on smartphone user’s awareness and concerns regarding security. Some studies have revealed that due to a low level of security …
The information and communication technologies are essential resources for organizations nowadays, and, with vast amounts of information circulating every day, protection becomes a priority. Various methodologies of information security risk analysis study and evaluate the security measures used to protect data. Traditional methods base their risk calculations on historical data, using threat- occurrence frequency as …
Numerous and various interconnected Internet of Things (IoT) devices continue to increase on the market. Smart home devices are marketed as providing multiple benefits to make consumers’ life more manageable and, as such, are a significant part of the loT consumer market. Media and researchers have raised questions about the security of smart home technology, …
Phishing is a deceptive form that involves attempts to solicit personal or sensitive information through social engineering methods. Phishing is commonly conducted via email. An attacker acts as a reputable or trusted source to influence recipients to click on a link or to open an attachment within an email. Social influence refers to change in …