A Researching users' knowledge in the Field of Instant Messengers Security
Article Sidebar
Open full text
Issue Vol. 26 (2023)
-
Augmenting The Cloud Environment Security Through Blockchain Based Hash Algorithms
RAVI KANTH MOTUPALLI1-6
-
Comparison of an effectiveness of artificial neural networks for various activation functions
Daniel Florek, Marek Andrzej Miłosz7-12
-
Performance analysis of user interface implementation methods in mobile applications
Jakub Szczukin13-17
-
Comparative analysis of web applications implemented in: PHP and Python
Jakub Zborowski, Maciej Pańczyk18-22
-
Comparative analysis of social media accessibility
Bartosz Bocheński23-28
-
Comparative analysis of transfer protocols asynchronous messages on systems queuing
Grzegorz Derlatka, Piotr Kopniak29-32
-
Usability analysis of advertising websites interfaces with the use of the universal design principles
Jan Marciniec, Dominik Kondraciuk33-41
-
A comparative analysis of contemporary integrated java environments
Cezary Kaczorowski42-47
-
Choosing the optimal database system to create a CRM system
Łukasz Szwałek, Jakub Smołka48-53
-
Analysis of the usability and accessibility of public transport online timetables in selected cities in Poland
Piotr Wójtowicz, Mariusz Dzieńkowski54-62
-
Analysis of configuration distribution methods in service application environments
Arkadiusz Bryczek, Piotr Kopniak63-67
-
A Researching users' knowledge in the Field of Instant Messengers Security
Yevhenii Tsyliurnyk, Oleksandr Tomenchuk, Grzegorz Kozieł68-74
-
Performance analysis of working with databases with Spring and Symfony
Ewa Wieleba, Bartłomiej Wieleba75-82
-
The analysis of Blender open-source software cloth simulation capabilities
Wojciech Kogut83-87
-
Comparative analysis of selected programming frameworks dedicated to SPA applications
Kinga Dybowska, Małgorzata Plechawska-Wójcik88-92
-
Comparative analysis of code execution time by C and Python based on selected algorithms
Paweł Rysak93-99
Main Article Content
DOI
Authors
yevhenii.tsyliurnyk@pollub.edu.pl
Abstract
Nowadays, many people contact other people through various types of social networks and instant messaging. However, these platforms are often not a secure way to exchange information among people. In recent times, most people have started to pay attention to the level of security offered by communicators and the technologies used in them, which results in the emergence of communicators focused primarily on safe communication. However, the question arises: "Are user actions not negatively affecting security?" Do users consciously choose instant messaging? Do they use modern methods to protect accounts? The conducted study confirmed the relationship between the user's actions and the security of com-munication. Additionally, the aspects most influencing the choice of communicator were found.
Keywords:
References
J. Botha, C. Van‘t Wout, L. Leenen, A comparison of chat applications in terms of security and privacy, 18th European Conference on Cyber Warfare and Security (2019) 55-62.
S. Prabhune, S. Sharma, End-to-end encryption for chat app with dynamic encryption key, 3rd International Con-ference on Advances in Computing Communication Con-trol and Networking (2021) 1361-1366. DOI: https://doi.org/10.1109/ICAC3N53548.2021.9725597
J. Farnden, B. Martini, K. R. Choo, Privacy risks in mobile dating apps, 21st Americas Conference on Infor-mation Systems (2015) 118635-118647.
S. Chng, H. Y. Lu, A. Kumar, D. Yau, Hacker types, motivations and strategies: A comprehensive framework, Computers in Human Behavior Reports 5 (2022) 100167 – 100175. DOI: https://doi.org/10.1016/j.chbr.2022.100167
K. Owen, M. Head, Motivation and demotivation of hackers in selecting a hacking task, Journal of Computer Information Systems 1 (2022) 1-15. DOI: https://doi.org/10.1080/08874417.2022.2081883
D. Jacobson, J. Idziorek, Computer security literacy: Staying safe in a digital world, CRC Press, US, 2016. DOI: https://doi.org/10.1201/b13707
W. Stallings, L. Brown, Computer Security: Principles and Practice, Global Edition, Pearson Education Limited, 2018.
A. Kovacevic, N. Putnik, O. Toskovic, Factors related to cyber security behawior, IEEE Access 8 (2020) 125140-125148. DOI: https://doi.org/10.1109/ACCESS.2020.3007867
M. Karbowski, Podstawy Kryptografii, Wydawnictwo Helion, 2006.
Z. Fang, W. Han, Y. Li, Permission based android securi-ty: Issues and countermeasures, Computers and Security 43 (2014) 205-218 DOI: https://doi.org/10.1016/j.cose.2014.02.007
Wyniki badania popularności komunikatorów za czerwiec 2022, https://pbi.org.pl/badanie-mediapanel/wyniki-badania-mediapanel-za-czerwiec-2022/, [29.09.2022].
Article Details
Abstract views: 191
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
