Analysis of the behaviour of social media users in the context of security risk reduction in the digital environment

  • Ana M. Slavković Academy of Applied Technical Studies Belgrade, Polytechnic Department, Belgrade Branch, Belgrade (Serbia)
  • Nikola M. Slavković Academy of Applied Technical Studies Belgrade, Computer and Mechanical Engineering Department, Belgrade (Serbia)
  • Dane R. Subošić University of Criminal Investigation and Police Studies, Criminal Investigation Department, Police Science Chair, Zemun (Serbia)
Keywords: cybersecurity, social media, data protection, gender, behaviour patterns

Abstract


This paper deals with the issues of the analysis of the behaviour of social media users in the context of security risk reduction in the digital environment. In this respect, the subject of this paper is the behaviour of social media users (mainly millennials, from the population of university students, attending studies in the field of security) depending on the gender. The aim of the research is to identify recommendations for a safer use of social media. To this end, the research was conducted on the basis of an anonymous survey comprising 15 questions (3 of demographic and 12 questions of essential significance). The survey covered 333 university students (undergraduate and graduate students of both genders) attending study programmes in the field of security. With the use of the Mann-Whitney test, contingency tables, the Kruskal-Wallis test, as well as the Spearman’s rank correlation test, it has been established that the behaviour patterns of men and women who use social media are very similar, but that there is a substantial statistical difference in certain scenarios. In addition to this, this survey has shown that, irrespective of the gender, risks of being attacked are consciously taken when sharing personal information, along with a reckless use of devices, passwords, and passcodes. By comparing the above-mentioned conclusions with the position of the general hypothesis: “There are similarities and differences between men and women in terms of the behaviour patterns on social media and in the cyberspace in general”, so the conclusion is that it is verified. One of the solutions to the identified problems in the behaviour of social media users is to raise their awareness regarding the risks of doing business and/or accessing entertainment content on social media, as well as their continuous training for the purpose of protecting their own data.

References

Akyazi U., van Eeten M., Gañán C. H. (2021). Measuring Cybercrime as a Service (CaaS) Offerings in a Cybercrime Forum, WEIS 2021, June 28–29, 2021, Online Conference https://weis2021.econinfosec.org/wp-content/uploads/sites/9/2021/06/weis21-akyazi.pdf
/>Avast antivirus (2022).
https://support.avast.com/en-my/article/use-antivirus-password-protection/#pc
/>Cost of Cybercrime Study in Financial Services: Report (2019). www.slideshare.net/accen-ture/cost-of-cybercrime-study-in-financial-services-2019-report
Cybersecurity Threats in the Banking Sector (2021).
https://www.packetlabs.net/bank-ing-andcybersecurity/
/>Federal Office for Information Security, Republic of France (2021). Fourth edition of the Franco-German Common Situational Picture..
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/D-F_Reports/Common_Situational_Picture_2021.pdf?_blob=publicationFile&v=3
/>IBM (2022). Identity and access management (IAM) solutions,
https://www.ibm.com/secu-rity/identity-access-management/privileged-access-management
/>IBM (2022). Security X-Force Research Hub, IBM,
https://www.ibm.com/security/xforce/research-hub
/>IBM Security (2021). The Cost of Insider Threats 2021,
https://www.ibm.com/security/digital-assets/services/cost-of-insider-threats/
/>IBM (2022). X Force Threat Intelligence Index 2022,
https://www.ibm.com/security/da-ta-breach/threat-intelligence
/>IBM (2022). Zero Trust Security Strategy,
https://www.ibm.com/security/zero-trust
/>Kumar, S., Somani, V. (2018). Cyber Threats and Risks Prevention and Mitigation Techniques, IJSART - Volume 4 Issue 4 – April 2018 ISSN [online]: 2395-1052:125, www.ijsart.com
Menezes, A. J., van Oorschot, P. C., Vanstone, S. A. (1997). Handbook of Applied Cryptography (1st ed..). CRC Press.
https://doi.org/10.1201/9780429466335
/>Necić, N., Milosavljević I. (2022) . Commenting on the Internet – Attitudes and Habits of Serbian Citizens. Sociološki pregled, 56 (2), 559–581. DOI: 10.5937/socpreg56-36652.
Nordpass Research (2022). Top passwords used by business executives..
https://nordpass.com/business-executive-passwords/
/>Samtani, S., Kantarcioglu, M., Chen, H. (2021). A Multi-Disciplinary Perspective for Conducting Artificial Intelligence-enabled Privacy Analytics: Connecting Data, Algorithms, and Systems.. ACM Trans.. Manage.. Manage.. Syst.. 12, 1, Article 1 (March 2021),
https://doi.org/10.1145/3447507
/>SpyCloud Report (2021). Breach Exposure of the Fortune 1000,
https://spycloud.com/2021-report-breach-exposure-of-the-fortune-1000/#:~:text=Across%20all%20indus-tries%2C%20nearly%2026,%25%20increase%20from%20last%20year
/>Trend Micro, Exploits as a Service (2021). Cybercrime-as-a-Service Series
https://documents.trendmicro.com/assets/guides/executive-brief-exploits-as-a-service.pdf
/>The World Bank (2021). World Development Report..
https://wdr2021.worldbank.org/stories/crossing-borders/#:~:text=By%202022%2C%20yearly%20total%20internet,as%20dazzling%20as%20the%20volume.
/>World Bank Development Report (2021). Data for Better Lives,
https://www.worldbank.org/en/publication/wdr2021
/>Zoom-Security-White-Paper (2021). Security Guide.
https://explore.zoom.us/docs/doc/Zoom-Security-White-Paper.pdf
/>

Published
2023/07/20
Section
Original scientific paper