A Researching users' knowledge in the Field of Instant Messengers Security
Nowadays, many people contact other people through various types of social networks and instant messaging. However, these platforms are often not a secure way to exchange information among people. In recent times, most people have started to pay attention to the level of security offered by communicators and the technologies used in them, which results in the emergence of communicators focused primarily on safe communication. However, the question arises: "Are user actions not negatively affecting security?" Do users consciously choose instant messaging? Do they use modern methods to protect accounts? The conducted study confirmed the relationship between the user's actions and the security of com-munication. Additionally, the aspects most influencing the choice of communicator were found.
security; instant messengers, privacy
J. Botha, C. Van‘t Wout, L. Leenen, A comparison of chat applications in terms of security and privacy, 18th European Conference on Cyber Warfare and Security (2019) 55-62.
S. Prabhune, S. Sharma, End-to-end encryption for chat app with dynamic encryption key, 3rd International Con-ference on Advances in Computing Communication Con-trol and Networking (2021) 1361-1366.
J. Farnden, B. Martini, K. R. Choo, Privacy risks in mobile dating apps, 21st Americas Conference on Infor-mation Systems (2015) 118635-118647.
S. Chng, H. Y. Lu, A. Kumar, D. Yau, Hacker types, motivations and strategies: A comprehensive framework, Computers in Human Behavior Reports 5 (2022) 100167 – 100175.
K. Owen, M. Head, Motivation and demotivation of hackers in selecting a hacking task, Journal of Computer Information Systems 1 (2022) 1-15.
D. Jacobson, J. Idziorek, Computer security literacy: Staying safe in a digital world, CRC Press, US, 2016.
W. Stallings, L. Brown, Computer Security: Principles and Practice, Global Edition, Pearson Education Limited, 2018.
A. Kovacevic, N. Putnik, O. Toskovic, Factors related to cyber security behawior, IEEE Access 8 (2020) 125140-125148.
M. Karbowski, Podstawy Kryptografii, Wydawnictwo Helion, 2006.
Z. Fang, W. Han, Y. Li, Permission based android securi-ty: Issues and countermeasures, Computers and Security 43 (2014) 205-218
Wyniki badania popularności komunikatorów za czerwiec 2022, https://pbi.org.pl/badanie-mediapanel/wyniki-badania-mediapanel-za-czerwiec-2022/, [29.09.2022].
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.