Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users

Saridakis, George, Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Ezingeard, Jean-Noel and Tennakoon, Hemamali (2015) Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users. Technological Forecasting and Social Change, 102. pp. 320-330. ISSN 0040-1625

[thumbnail of Victimisation Paper_170515_no changes marked.docx] Microsoft Word
Victimisation Paper_170515_no changes marked.docx - Accepted Version

Download (239kB)

Abstract

While extant literature on privacy in social networks is plentiful, issues pertaining to information security remain largely unexplored. This paper empirically examines the relationship between online victimisation and users' activity and perceptions of personal information security on social networking services (SNS). Based on a survey of active users, we explore how behavioural patterns on social networks, personal characteristics and technical efficacy of users impact the risk of facing online victimisation. Our results suggest that users with high-risk propensity are more likely to become victims of cybercrime, whereas those with high perceptions of their ability to control information shared on SNS are less likely to become victims. The study shows that there is a negative and statistically significant association between multipurpose dominant SNS (e.g. Facebook, Google+) usage and victimisation. However, activity on the SNS for knowledge exchange (e.g. LinkedIn, Blogger) has a positive and statistically significant association with online victimisation. Our results have implications for practice as they inform the social media industry that protection of individual information security on SNS cannot be left entirely to the user. The importance of user awareness in the context of social technologies plays an important role in preventing victimisation, and social networking services should provide adequate controls to protect personal information.

Item Type: Article
Identifier: 10.1016/j.techfore.2015.08.012
Subjects: Computing > Information security > Cyber security
Depositing User: Users 3908 not found.
Date Deposited: 08 May 2018 11:09
Last Modified: 06 Feb 2024 15:57
URI: https://repository.uwl.ac.uk/id/eprint/4935

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu