2014
DOI: 10.4102/sajim.v16i1.607
|View full text |Cite
|
Sign up to set email alerts
|

Developing a secured social networking site using information security awareness techniques

Abstract: Background: Ever since social network sites (SNS) became a global phenomenon in almost every industry, security has become a major concern to many SNS stakeholders. Several security techniques have been invented towards addressing SNS security, but information security awareness (ISA) remains a critical point. Whilst very few users have used social circles and applications because of a lack of users’ awareness, the majority have found it difficult to determine the basis of categorising friends in a meaningful … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…This is because there are attestations that suggest that mortal vulnerabilities are decreasingly exploiting information systems [33]. Some experimenters have noted a number of reasons for this, such as problems with the usability of information systems [5], [13], and [21], compromised opinions by druggies [12] and limited capability to misbehave with Knowledge Management Systems or instructions [6], and [29]. Still, [9] epitomized and distributed these miscalculations into four orders processes ( operation process and specialized design operation methodologies), people involved in a design, product design size, and urgency, including its pretensions, performance, robustness, and trustability), and technology (IS failures performing from the use and abuse of ultramodern technology).…”
Section: Analysis and Conflation Of Previous Explorationmentioning
confidence: 99%
See 1 more Smart Citation
“…This is because there are attestations that suggest that mortal vulnerabilities are decreasingly exploiting information systems [33]. Some experimenters have noted a number of reasons for this, such as problems with the usability of information systems [5], [13], and [21], compromised opinions by druggies [12] and limited capability to misbehave with Knowledge Management Systems or instructions [6], and [29]. Still, [9] epitomized and distributed these miscalculations into four orders processes ( operation process and specialized design operation methodologies), people involved in a design, product design size, and urgency, including its pretensions, performance, robustness, and trustability), and technology (IS failures performing from the use and abuse of ultramodern technology).…”
Section: Analysis and Conflation Of Previous Explorationmentioning
confidence: 99%
“…Other good practices included methodologies that impact the assessment of crucial elements and applications that identifies and criticality examines the business processes in relation to confidentiality, availability, and integrity of data. In a social network site (SNS) for instance, some of the technical controls implemented are customization of access controls based on the users' groups and information type, setting privacy in a user-friendly way to make for flexibility, integrating with a user-friendly interface that is easily understood by any typical SNS user; and customized search implemented to further enhance the preservation of the user's privacy [21].…”
Section: Developing More Effective Information Security Technical Con...mentioning
confidence: 99%
“…This is because there is evidence that suggests that human vulnerabilities are increasingly exploiting information systems (Stewart & Lacey, 2012). Some researchers have noted a number of reasons for this, ranging from problems with the usability of information systems (Hartzog & Stutzman, 2013;Cristian & Volkamer, 2013;Okesola & Grobler, 2014), compromised decisions by users (Greavu-Serban & Serban, 2014) and limited ability to comply with Knowledge Management Systems or instructions (Shehata, 2015;de Albuquerque & dos Santos, 2015). However, Dwivedi, et al (2015) summarized and categorized these mistakes into four categories: process (management process and technical project management methodologies), people involved in a project, product (project size and urgency, including its goals, performance, robustness, and reliability), and technology (IS failures resulting from the use and misuse of modern technology).…”
Section: Analysis and Synthesis Of Prior Researchmentioning
confidence: 99%