262 resultados para Social Networking Sites (SNSs)

em Queensland University of Technology - ePrints Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Young people are increasingly using social networking sites (SNSs), like Myspace and Facebook, to engage with others. The use of SNSs can have both positive and negative effects on the individual; however, few research studies identify the types of people who frequent these Internet sites. This study sought to predict young adults’ use of SNSs and addictive tendency towards the use of SNSs from their personality characteristics and levels of self-esteem. University students (N = 201), aged 17 to 24 years, reported their use of SNSs and addictive tendencies for SNSs use, and completed the NEO Five-Factor Personality Inventory 1 and the Coopersmith Self-Esteem Inventory.2 Multiple regression analyses revealed that, as a group, the personality and self-esteem factors significantly predicted both level of SNS use and addictive tendency but did not explain a large amount of variance in either outcome measure. The findings indicated that extraverted and unconscientious individuals reported higher levels of both SNS use and addictive tendencies. Future research should attempt to identify which other psychosocial characteristics explain young people’s level of use and propensity for addictive tendencies for these popular Internet sites.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The popularity of social networking sites (SNSs) among adolescents has grown exponentially, with little accompanying research to understand the influences on adolescent engagement with this technology. The current study tested the validity of an extended theory of planned behaviour model (TPB), incorporating the additions of group norm and self-esteem influences, to predict frequent SNS use. Adolescents (N = 160) completed measures assessing the standard TPB constructs of attitude, subjective norm, perceived behavioural control (PBC), and intention, as well as group norm and self-esteem. One week later, participants reported their SNS use during the previous week. Support was found for the standard TPB variables of attitude and PBC, as well as group norm, in predicting intentions to use SNS frequently, with intention, in turn, predicting behaviour. These findings provide an understanding of the factors influencing frequent engagement in what is emerging as a primary tool for adolescent socialisation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large numbers of users and large information base, seem to be perfect breeding grounds for exploiting the vulnerabilities of people, the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” While technology-based security has been addressed by research and may be well understood, social engineering is more challenging to understand and manage, especially in new environments such as SNSs, owing to some factors of SNSs that reduce the ability of users to detect the attack and increase the ability of attackers to launch it. This work will contribute to the knowledge of social engineering by presenting the first two conceptual models of social engineering attacks in SNSs. Phase-based and source-based models are presented, along with an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

While social engineering represents a real and ominous threat to many organizations, companies, governments, and individuals, social networking sites (SNSs), have been identified as among the most common means of social engineering attacks. Owing to factors that reduce the ability of users to detect social engineering tricks and increase the ability of attackers to launch them, SNSs seem to be perfect breeding ground for exploiting the vulnerabilities of people, and the weakest link in security. This work will contribute to the knowledge of social engineering by identifying different entities and subentities that affect social engineering based attacks in SNSs. Moreover, this paper includes an intensive and comprehensive overview of different aspects of social engineering threats in SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credibility in the virtual environment of SNSs. In this paper, we quantitatively investigate source credibility dimensions in terms of social engineering on Facebook, as well as the source characteristics that influence Facebook users to judge an attacker as credible, therefore making them susceptible to victimization. Moreover, in order to predict users’ susceptibility to social engineering victimization based on their demographics, we investigate the effectiveness of source characteristics on different demographic groups by measuring the consent intentions and behavior responses of users to social engineering requests using a role-play experiment.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Technology has provided consumers with the means to control and edit the information that they receive and share effectively, especially in the online environment. Although previous studies have investigated advertising avoidance in traditional media and on the Internet, there has been little investigation of advertising on social networking sites. This exploratory study examines the antecedents of advertising avoidance on online social networking sites, leading to the development of a model. The model suggests that advertising in the online social networking environment is more likely to be avoided if the user has expectations of a negative experience, the advertising is not relevant to the user, the user is skeptical toward the advertising message, or the consumer is skeptical toward the advertising medium.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The use of social networking sites (SNS) by online citizens to share photos, update friends, play games and to connect with the world has exploded, with SNS and blogs now eclipsing email traffic (eMarketer 2009). Just one popular application on one SNS, (Farmville on Facebook) acquired more than 63 million users since its launch in June 2009 (Marketing 2009. The major global social networks are Facebook, Twitter, YouTube and MySpace, with Facebook claiming that it passed 350 million users in November (Marketing 2009). As usage increases and competition intensifies, the major sites must strategically position themselves to develop a competitive advantage in order to maintain or grow their share of the pie. So how do the major SNS position their brands, and do users perceive significant differences among the big players? This presentation answers these questions by reporting the results of an empirical study of SNS usage by Australian adults. Like other brands, aligning brand positioning strategies with user knowledge and perceptions of SNS is an important ingredient to achieving success (Keller 1993). Furthermore we compare the types of value for three different SNS to identify the relationships between the value derived by users and the stated positioning of the site.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article examines the social networking phenomenon that has been so readily embraced by school-age adolescents, in the context of its potential to contribute further to the mechanisms for and incidence of cyberbullying amongst school students. Cyberbullying in these online for a, as a misuse of technology to harass, intimidate, tease, threaten, abuse or otherwise terrorise peers, teachers and/or the school in general, is discussed from both the psychological perspective and in terms of its legal ramifications (both criminal and civil) in Australia. Some recommendations for proactive and preventative measures, education and policy adoptions are provided, together with general advice to parents, schools and adolescents on awareness of the risks involved and how young people might better protect themselves in light of that knowledge.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We explored common reasons for non-use of the rapidly growing popularity of social networking sites among a sample of Australian adolescents (N = 69). Transcripts were coded by grouping responses along similar themes for non-use that had been commonly stated by participants. The primary reasons offered by adolescents were: lack of motivation, poor use of time, preference for other forms of communication, preference for engaging in other activities, cybersafety concerns, and a dislike of self-presentation online. The identification of these themes allows for a greater understanding of teenagers' decisions not to engage in the popular medium of communication and points to possible strategies that could be utilised by Web site developers in efforts to appeal to a wider teenage audience.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Purpose – This paper aims to provide insights into the moral values embodied by a popular social networking site (SNS), Facebook. Design/methodology/approach – This study is based upon qualitative fieldwork, involving participant observation, conducted over a two-year period. The authors adopt the position that technology as well as humans has a moral character in order to disclose ethical concerns that are not transparent to users of the site. Findings – Much research on the ethics of information systems has focused on the way that people deploy particular technologies, and the consequences arising, with a view to making policy recommendations and ethical interventions. By focusing on technology as a moral actor with reach across and beyond the internet, the authors reveal the complex and diffuse nature of ethical responsibility and the consequent implications for governance of SNS. Research limitations/implications – The authors situate their research in a body of work known as disclosive ethics, and argue for an ongoing process of evaluating SNS to reveal their moral importance. Along with that of other authors in the genre, this work is largely descriptive, but the paper engages with prior research by Brey and Introna to highlight the scope for theory development. Practical implications – Governance measures that require the developers of social networking sites to revise their designs fail to address the diffuse nature of ethical responsibility in this case. Such technologies need to be opened up to scrutiny on a regular basis to increase public awareness of the issues and thereby disclose concerns to a wider audience. The authors suggest that there is value in studying the development and use of these technologies in their infancy, or if established, in the experiences of novice users. Furthermore, flash points in technological trajectories can prove useful sites of investigation. Originality/value – Existing research on social networking sites either fails to address ethical concerns head on or adopts a tool view of the technologies so that the focus is on the ethical behaviour of users. The authors focus upon the agency, and hence the moral character, of technology to show both the possibilities for, and limitations of, ethical interventions in such cases.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

It is of course recognised that technology can be gendered and implicated in gender relations. However, it continues to be the case that men’s experiences with technology are underexplored and the situation is even more problematic where digital media is concerned. Over the past 30 years we have witnessed a dramatic rise in the pervasiveness of digital media across many parts of the world and as associated with wide ranging aspects of our lives. This rise has been fuelled over the last decade by the emergence of Web 2.0 and particularly Social Networking Sites (SNS). Given this context, I believe it is necessary for us to undertake more work to understand men’s engagements with digital media, the implications this might have for masculinities and the analysis of gender relations more generally. To begin to unpack this area, I engage theorizations of the properties of digital media networks and integrate this with the masculinity studies field. Using this framework, I suggest we need to consider the rise in what I call networked masculinities – those masculinities (co)produced and reproduced with digitally networked publics. Through this analysis I discuss themes related to digital mediators, relationships, play and leisure, work and commerce, and ethics. I conclude that as masculinities can be, and are being, complicated and given agency by advancing notions and practices of connectivity, mobility, classification and convergence, those engaged with masculinity studies and digital media have much to contribute.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The design of applications for dynamic ridesharing or carpooling is often formulated as a matching problem of connecting people with an aligned set of transport needs within a reasonable interval of time and space. This problem formulation relegates social connections to being secondary factors. Technology assisted ridesharing applications that put the matching problem first have revealed that they suffer from being unable to address the factor of social comfort, even after adding friend features or piggybacking on social networking sites. This research aims to understand the fabric of social interactions through which ridesharing happens. We take an online observation approach in order to understand the fabric of social interactions for ridesharing that is happening in highly subscribed online groups of local residents. This understanding will help researchers to identify design challenges and opportunities to support ridesharing in local communities. This paper contributes a fundamental understanding of how social interactions and social comfort precede rideshare requests in local communities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The progress of technology has led to the increased adoption of energy monitors among household energy consumers. While the monitors available on the market deliver real-time energy usage feedback to the consumer, the form of this data is usually unengaging and mundane. Moreover, it fails to address consumers with different motivations and needs to save and compare energy. This master‟s thesis project presents a study that seeks to inform design guidelines for differently motivated energy consumers. The focus of the research is on comparative feedback supported by a community of energy consumers. In particular, the discussed comparative feedback types are explanatory comparison, temporal self-comparison, norm comparison, one-on-one comparison and ranking, whereby the last three support exploring the potential of socialising energy-related feedback in social networking sites, such as Facebook. These feedback types were integrated in EnergyWiz – a mobile application that enables users to compare with their past performance, neighbours, contacts from social networking sites and other EnergyWiz users. The application was developed through a theory-driven approach and evaluated in personal, semi-structured interviews which provided insights on how motivation-related comparative feedback should be designed. It was also employed in expert focus group discussions which resulted in defining opportunities and challenges before mobile, social energy monitors. The findings have unequivocally shown that users with different motivations to compare and to conserve energy have different preferences for comparative feedback types and design. It was established that one of the most influential factors determining design factors is the people users compare to. In addition, the research found that even simple communication strategies in Facebook, such as wall posts and groups can contribute to engagement with energy conservation practices. The concept of mobility of the application was evaluated as positive since it provides place and time-independent access to the energy consumption data.