A Researching users' knowledge in the Field of Instant Messengers Security
Yevhenii Tsyliurnyk
yevhenii.tsyliurnyk@pollub.edu.plpollub (Poland)
Oleksandr Tomenchuk
(Poland)
Grzegorz Kozieł
Lublin University of Technology (Poland)
Abstract
Nowadays, many people contact other people through various types of social networks and instant messaging. However, these platforms are often not a secure way to exchange information among people. In recent times, most people have started to pay attention to the level of security offered by communicators and the technologies used in them, which results in the emergence of communicators focused primarily on safe communication. However, the question arises: "Are user actions not negatively affecting security?" Do users consciously choose instant messaging? Do they use modern methods to protect accounts? The conducted study confirmed the relationship between the user's actions and the security of com-munication. Additionally, the aspects most influencing the choice of communicator were found.
Keywords:
security; instant messengers, privacyReferences
J. Botha, C. Van‘t Wout, L. Leenen, A comparison of chat applications in terms of security and privacy, 18th European Conference on Cyber Warfare and Security (2019) 55-62.
Google Scholar
S. Prabhune, S. Sharma, End-to-end encryption for chat app with dynamic encryption key, 3rd International Con-ference on Advances in Computing Communication Con-trol and Networking (2021) 1361-1366.
DOI: https://doi.org/10.1109/ICAC3N53548.2021.9725597
Google Scholar
J. Farnden, B. Martini, K. R. Choo, Privacy risks in mobile dating apps, 21st Americas Conference on Infor-mation Systems (2015) 118635-118647.
Google Scholar
S. Chng, H. Y. Lu, A. Kumar, D. Yau, Hacker types, motivations and strategies: A comprehensive framework, Computers in Human Behavior Reports 5 (2022) 100167 – 100175.
DOI: https://doi.org/10.1016/j.chbr.2022.100167
Google Scholar
K. Owen, M. Head, Motivation and demotivation of hackers in selecting a hacking task, Journal of Computer Information Systems 1 (2022) 1-15.
DOI: https://doi.org/10.1080/08874417.2022.2081883
Google Scholar
D. Jacobson, J. Idziorek, Computer security literacy: Staying safe in a digital world, CRC Press, US, 2016.
DOI: https://doi.org/10.1201/b13707
Google Scholar
W. Stallings, L. Brown, Computer Security: Principles and Practice, Global Edition, Pearson Education Limited, 2018.
Google Scholar
A. Kovacevic, N. Putnik, O. Toskovic, Factors related to cyber security behawior, IEEE Access 8 (2020) 125140-125148.
DOI: https://doi.org/10.1109/ACCESS.2020.3007867
Google Scholar
M. Karbowski, Podstawy Kryptografii, Wydawnictwo Helion, 2006.
Google Scholar
Z. Fang, W. Han, Y. Li, Permission based android securi-ty: Issues and countermeasures, Computers and Security 43 (2014) 205-218
DOI: https://doi.org/10.1016/j.cose.2014.02.007
Google Scholar
Wyniki badania popularności komunikatorów za czerwiec 2022, https://pbi.org.pl/badanie-mediapanel/wyniki-badania-mediapanel-za-czerwiec-2022/, [29.09.2022].
Google Scholar
Authors
Oleksandr TomenchukPoland
Authors
Grzegorz KoziełLublin University of Technology Poland
Statistics
Abstract views: 112PDF downloads: 155
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.