An Assessment of IT Students' Awareness in the Field of Instant Messengers Security
Article Sidebar
Open full text
Issue Vol. 14 (2020)
-
Perfomance analysis of relational databases MySQL, PostgreSQL, MariaDB and H2
Katarzyna Krocz, Oleksandra Kizun, Maria Skublewska-Paszkowska1-7
-
Applications supporting utilization of agile methods in software development process
Tomasz Bławucki, Siarhei Ramanovich, Maria Skublewska-Paszkowska8-13
-
An assessment of portal to learn foreign languages
Marek Szmit, Paweł Wojtaszko, Grzegorz Kozieł14-18
-
Functional and performance analysis of selected message brokers in a distributed application
Tobiasz Kaciuczyk, Tomasz Korga, Jakub Smołka19-25
-
Comparative analysis of Windows Presentation Foundation and Windows Forms
Michał Pasztaleniec, Maria Skublewska-Paszkowska26-30
-
Impact of the cloud application programming language on the performance of its implementation in selected serverless environments
Krzysztof Bezrąk, Sławomir Przyłucki31-36
-
Application of support vector machine in a traffic lights control
Artur Całuch, Adam Cieślikowski, Małgorzata Plechawska-Wójcik37-42
-
Comparison of GreenDao and Room ORM Systems
Maciej Lewiński43-47
-
An Assessment of IT Students' Awareness in the Field of Instant Messengers Security
Paweł Stręciwilk, Grzegorz Kozieł48-54
-
Methods of determining indicators of similarity of 3D motion
Piotr Flisiak, Marcin Kuszyk55-58
-
Perfomance analysis of frameworks Angular and Vue.js
Roman Baida, Maksym Andriienko, Małgorzata Plechawska-Wójcik59-64
-
Possibility analysis of applying serious game to learn the first aid procedures
Klaudia Zaborek, Małgorzata Plechawska-Wójcik65-72
-
Comparison of the performance of tools for creating a SPA application interface - React and Vue.js
Krzysztof Boczkowski, Beata Pańczyk73-77
-
Comparative analysis of view technologies for the Spring application
Vadym Borys, Roman Slezenko, Beata Pańczyk78-81
-
Performance analysis of selected tools for building a Single Page Application
Yehor Timanovskyi, Małgorzata Plechawska-Wójcik82-87
-
Analysis of selected usability assessment methods in the process of creating web applications
Krzysztof Nowak, Daniel Samolej88-93
-
Performance analysis of selected database systems: MySQL, MS SQL, PostgerSQL in the context of web applications
Katarzyna Lachewicz94-100
-
Methods of creating realistic spaces – 3D scanning and 3D modelling
Aleksandra Salwierz, Tomasz Szymczyk101-108
Main Article Content
DOI
Authors
pawel.streciwilk@pollub.edu.pl
Abstract
Instant Messengers, though being around for decades, only in recent years they have managed to gain much more popularity. Today, they are the most common way of communicating, especially among young people. However, where information is being transferred there is a potential risk of it being intercepted, manipulated or disrupted. Thus, Security of Instant Messengers became a matter of high importance comprising of not only protecting the users’ sensitive information but also privacy. Also important is the awareness of the users. Are they aware of the dangers that come with directing sensitive information in this manner? Are they taking the necessary steps to shield themselves from breach attempts? This article was written to present and evaluate the awareness of IT students in the field of instant messengers security.
Keywords:
References
[2] Holt T., Freilich J., Chermak S., ,,Exploring the Subculture of Ideologically Motivated Cyber-Attackers”, 2017,
[3] Mitnick K., Simon W., Wozniak S., ,,Sztuka podstępu. Łamałem ludzi, nie hasła.”, 2001, Wydawnictwo Helion,
[4] Karbowski M. „Podstawy Kryptografii.”, 2006, Wydawnictwo Helion,
[5] Erickson J., ,,Hacking: The Art Of Exploitation, 2nd Edition”, 2008, No Starch Press,US,
[6] Stallings W., Brown L., ,,Computer Security: Principles and Practice, Global Edition”, 2018, Pearson Education Limited,
[7] Easttom W., ,,Computer Security Fundamentals”, 2016, Pearson Education (US),
[8] Goodrich M., Tamassia R., ,,Introduction to Computer Security: Pearson New International Edition”, 2013, Pearson Education Limited,
[9] Gunasekera S., ,,Android Apps Security”, 2012. Apress,
[10] Szeliga M., Mendrala D., ,,Bezpieczeństwo Twojego komputera”, 2004 , Wydawnictwo Helion.
Article Details
Abstract views: 333
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
