Skip to main content

Information Security in Virtual Social Networks: A Survey in Higher Education

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 570))

Abstract

Nowadays, a high number of the world’s online population uses social networks such as Facebook, MySpace, and Twitter to stay in touch with friends. Is well known the ability that students have to access to the Internet and social networks. However, the use of virtual social networks leads users exposed to several Information Security risks. So, it is important to understand the level of preoccupation, of university students, with the security of information and the security measures they adopt. On this basis, we proposed to develop a study to consider the extent to which students understand the importance of security policies in the virtual social networks. To the development of this study, we use the survey technique as we can get clear, direct and objective answers. Besides, as the data sample is composed of 290 students, the use of this investigation method is the more appropriate. The results are discussed based on the collected data from the surveys.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Veríssimo, J., Macias, M., Rodrigues, S.: Implicações Jurídicas das Redes Sociais na Internet: Um novo conceito de privacidade? Direito da Comunicação, Universidade de Direito da Universidade Nova de Lisboa (2012)

    Google Scholar 

  2. Dhillon, G., Backhouse, J.: Information system security management in the New Millennium. Commun. ACM 43(7), 125–128 (2000)

    Article  Google Scholar 

  3. Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22, 594–597 (1979)

    Article  Google Scholar 

  4. Lopes, I., Oliveira, P.: Implementation of information systems security policies: a survey in small and medium sized enterprises. In: Rocha, A., Correia, A.M., Costanzo, S., Reis, L.P. (eds.) New Contributions in Information Systems and Technologies. AISC, vol. 353, pp. 459–468. Springer, Cham (2015). doi:10.1007/978-3-319-16486-1_45

    Chapter  Google Scholar 

  5. Peltier, T.R., Peltier, J., Blackley, J.: Information Security fundamentals. Auerbach Publications – A CRC Press Company, Boca Raton (2005)

    Google Scholar 

  6. Hung, H., Yuen, S.C.: Educational use of social networking technology in higher education. Teach. Higher Educ. 15(6), 703–714 (2010)

    Article  Google Scholar 

  7. Palo Alto Networks: Top 10 Social Networking Threats, NetworkWorld, 12 July 2010

    Google Scholar 

  8. Won, K., Ok-Ran, J., Sang-Won, L.: On social websites. Inf. Syst. 35, 215–236 (2010)

    Article  Google Scholar 

  9. ESET: Guia de Segurança em Redes Sociais. www.eset.com.br

  10. Graribi, W., Shaabi, M.: Cyber threats in social networking websites. Int. J. Distrib. Parallel Syst. 3(1), 119–126 (2012)

    Article  Google Scholar 

  11. Cisco, What Is the Difference: Viruses, Worms, Trojans and Bots? http://www.cisco.com/c/en/us/about/security-center/virus-differences.html

  12. Myers, M.D.: Qualitative research in information systems. ACM Comput. Surv. (CSUR) (1997). MISQ Discovery

    Google Scholar 

  13. Obercom: A Internet em Portugal – Sociedade em Rede 2014, Publicações OberCom (2014)

    Google Scholar 

  14. Study UM’s WAVE, Research into the phenomenal growth of social media is the most robust data set in the world. www.universalmccann.bitecp.com/wave4/Wave4.pdf

  15. Lopes, I.M., Pereira, J.P.: De que forma as Redes Sociais podem ser utilizadas na criação de conhecimento, Atas do Congresso Mundial de Estilos de Aprendizagem (2016)

    Google Scholar 

Download references

Acknowledgments

UNIAG, R&D unit funded by the FCT – Portuguese Foundation for the Development of Science and Technology, Ministry of Science, Technology and Higher Education. Project no. UID/GES/4752/2016.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Isabel Maria Lopes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Lopes, I.M., Pereira, J.P. (2017). Information Security in Virtual Social Networks: A Survey in Higher Education. In: Rocha, Á., Correia, A., Adeli, H., Reis, L., Costanzo, S. (eds) Recent Advances in Information Systems and Technologies. WorldCIST 2017. Advances in Intelligent Systems and Computing, vol 570. Springer, Cham. https://doi.org/10.1007/978-3-319-56538-5_78

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-56538-5_78

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-56537-8

  • Online ISBN: 978-3-319-56538-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics