Engagement of Young People in Social Networks: Awareness and Security

Numerous threats have been identified when using social networks. The question is whether young people are aware of these negative impacts of online and mobile technologies. Will they identify threats when needed? Will they know where to get help? Students and school children were part of a survey where their behavior and use of Facebook and an instant messaging application - MXit were studied. This paper presents some of the results. It can be concluded that awareness on security and privacy issues should be raised. The benefit of doing such a survey is that it may help to direct educational efforts from a young age. In this way children – with their parents – can strive towards more secure behavior. Educators can focus their lessons towards the areas that need attention resulting in safer cyber interaction and ultimately more responsible online use.





References:
<p>[1] Y. Poullet, &ldquo;e-Youth before its judges, Legal protection of minors in Cyberspace,&rdquo; in Computer Law &amp; Security Review 27, 6-20, 2011.
[2] L. Drevin, L &amp; G.R. Drevin, &ldquo;Young People: How safe are they when using social networks,&rdquo; Extended abstract. in Proc. of the 7th World conference on Information Security education, Lucern, Switzerland, 2011.
[3] M. Langheinrich, &amp; G. Karjoth, &ldquo;Social networking and the risk to companies and institutions,&rdquo; Information Security Technical Report 15, 51-56, 2010.
[4] MXit. http://www.mxitlifestyle.com/ Online: Date of access 21 Aug 2013.
[5] M. Valcke, T. Schellens, H. Van Keer, &amp; M. Gerarts, &ldquo;Primary school children&rsquo;s safe and unsafe use of the Internet at home and at school: An exploratory study,&rdquo; Computers in Human Behavior 23, 2838&ndash;2850, 2007.
[6] D. Rosenblum, &ldquo;What anyone can know, the privacy risks of social networking sites,&rdquo; IEEE Security &amp; Privacy, May-June, 40-49, 2007.
[7] Osterman Research, Inc. &ldquo;The risks of social media and what can be done to manage them&rdquo;, 2011.
[8] C. Pfleeger &amp; S. Pfleeger, Security in Computing. Upper Saddle River, NJ.: Prentice Hall, 2007.</p>

<p> </p>