Mahdi Darvishi MFSKSM2013
Mahdi Darvishi MFSKSM2013
Mahdi Darvishi MFSKSM2013
MAHDI DARVISHI
Faculty of Computing
Universiti Teknologi Malaysia
JANUARY 2013
iii
ACKNOWLEDGEMENT
I wish to express my deepest appreciation to all those who helped me, in one
way or another, to complete this project. First and foremost I thank God almighty
who provided me with strength, direction and purpose throughout the project.
Special thanks to my project supervisor Dr. Imran Ghani for all her patience,
guidance and support during the execution of this project. Through his expert
guidance, I was able to overcome all the obstacles that I encountered in these
enduring ten months of my project. In fact, he always gave me immense hope every
time I consulted with him over problems relating to my project.
v
ABSTRACT
ABSTRAK
TABLE OF CONTENTS
ACKNOWLEDGEMENT iv
ABSTRACT v
ABSTRAK vi
TABLE OF CONTENTS vii
LIST OF TABLES xi
LIS OF FIGURES xiii
LIST OF ABBREVIATIONS xiv
LIST OF APPENDICE xv
1 INTRODUCTION 1
1.1 Introduction 1
1.2 Background of Problem 2
1.3 Problem Statement 2
1.4 Research Questions 3
1.5 Research Objectives 3
1.6 Scope and Limitations 4
1.7 Significance of the Proposed Work 4
1.8 Organization of the Research 5
2 LITERATURE REVIEW 6
2.1 Introduction 6
2.2 Social Network Sites 6
2.3 Threats in social networks 7
viii
3 RESEARCH METHODOLOGY 30
3.1 Introduction 30
3.2 Research Location 30
3.3 Justification of selected variables 31
3.4 Operational Framework 31
3.4.1 Phase 1: Project Initial planning and Literature Review 34
3.4.1.1 Project Initial Planning 34
3.4.1.2 Literature Review 34
3.4.2 Phase 2: Data Collection and Analysis 34
3.4.2.1 Target population and sample size 35
3.4.2.2 Instrumentation Design 36
ix
4 Framework Implementation 40
4.1 Introduction 40
4.2 Proposed Framework 40
4.2.1 Audience Perspective 43
4.2.2 Model’s Variables 43
4.2.3 Measurement Method Perspective 43
4.2.4 Data Perspective 44
4.2.5 Theoretical model 45
4.3 Chapter Summary 47
7 REFERENCES 76
8 APPENDIX A 83
xi
LIST OF TABLES
5.4: Nationality 52
5.16: Correlations 63
LIS OF FIGURES
3.1: Framework 32
5.4: Nationality 52
LIST OF ABBREVIATIONS
LIST OF APPENDICE
A Questionnaire 83
1
CHAPTER 1
INTRODUCTION
1.1 Introduction
The problem is that the private information is shared by most social network
users. There are some kinds of personal information that are shared by users such as
contact information, images, demographic information, videos, comments, etc.
Unfortunately, a large number of users publish their information without and
considerations and this problem leads social network to become a big sensitive data
loggers. Furthermore, social network users interest to rely on other social network
users by accepting their friend requests and sharing personal items.
Due to the rapid growth in popularity of the social networking sites such as
Myspace and Facebook, information security issues have arisen because of the
personal information disclosure in the various social networks, which could probably
be misused by the computer criminals for identity theft or impersonation. However,
with the high vulnerability of information security, the social networking sites
remain as an open platform to communicate with one another. Many users today are
not so serious about their personal data and information, which perhaps are disclosed
in such social networks and many of them are less aware of the consequences of
revealing the sensitive information during the communication in the social
3
networking sites. With realizing this issue of security dilemma, this research inspects
the necessity of creating user-awareness before and after joining the social networks.
What are the impacts of privacy policy (PP), Self-efficacy (SE), Security
practice care behavior (SPCB), Intention to practice privacy protection and Security
practice technology (SPT) on information security awareness?
This work intends to explore why security unawareness may lead to the
information security vulnerably. This study inspects the necessity of creating user-
awareness for the social networks, and also examines the user behavior in that
networks particularly in the context of UTM university in order to find out whether
those users are aware of their activities in such social networks. The methodology of
the study mainly involves a quantitative survey framework for data collection of the
Facebook users.
REFERENCES
Adams, A., Sasse, M.A., and Lunt, P. (1997). Making passwords secure andusable.
People and Computers, 1-20.
Alavi, M & Leidner, D.E 1999, Knowledge management system s: issues,
challenges, and benefits, Communications of the AIS, 1(2es).
Anderson, C. L., Agarwal, R. (2010). Practicing safe computing: a multimedia
empirical examination of home computer user security behavioral intentions. Mis
Quarterly. 34(3), 613-643.
Arora, A., D. Hall, et al. (2004). "Measuring the risk-based value of IT security
solutions." IT Professional 6(6): 35-42.
Bandura, A. (1997). toward a unifying theory of behavioral change. P
sychological review. 84(2), 191.
Bandura, A(1991). Social cognitive theory of self-regulation. Organizational
Behaviour and Human Decision Processes.
Boyd D.(2004). Friendster and publicly articulated social networking .in the
Proceeding of Conference on Human Factors and Computing Systems.
Brace, I. (2008). Questionnaire design: How to plan, structure and write survey
material for effective market research, Kogan Page Ltd.
Bryman, A., and Becker, S. (2008). Quality criteria for quantitative, qualitative an
mixed methods research: The view from social policy, International Journal
of Social Research Methodology.
Bulgurcu, B., Cavusoglu, H., and Benbasat, I. (2010). Information security policy
compliance: an empirical study of rationality-based beliefs and information
security awareness. MIS Quarterly.84(4), 415-643.
Cavusoglu, H., Mishra, B., and Raghunathan S. (2004). A model for evaluating IT
security investments. Communications of the ACM. 47(7), 87-92.
77
Carpenter, J., et al. (2001). Continuing Threats to Home Users. CERT Advisory
CA-2001-20.
Chan, M. Woon., and Kankanhalli, A. (2005). Perceptions of information security
in the workplace: linking information security climate to compliant behavior.
Journal of information privacy and security. 1(3), 18-41.
Compeau, D. R., and Higgins, C. A. (1995). Computer self-efficacy: development of
a measure and initial test. MIS Quarterly.
Goettke R. and Christiana J.(2007). Privacy and Online Social Networking Websites.
Govani, T., and Pashley, H.(2005) Student Awareness of the Privacy Implications
whileUsing Facebook.
Exploitation—Social Networks Malware, ISACA
Journal,http://www.rkmingenieria.com/ifol/wpcontent/uploads/2011/03/ISAC
A_JAN_2011_ChainExploitation.pdf
Cranor L., Gudruru P. and Arjula M. (2006). User Interfaces for Privacy Agents.
ACM Transactions on Computer-Human Interaction, Vol. 13, No. 2, June
pp.135- 178.
Gross, R. and Acquisti. (2005). Information Revelation and Privacy in Online Social
Networks(The Facebook case), in the Proceedings of the 2005 ACM
workshop on Privacy in the electronic society. pp. 71 – 80.
G. Hogben. Security Issues and Recommendations for Online Social Networks.
Position paper, ENISA, European Network and Information Security Agency,
Octoeu/doc/pdf/deliverables/enisa_ppsocial_networks.pdf.
Herath, T., and Rao, H. R. (2009a). Protection motivation and deterrence: a
framework for security policy compliance in organisations. European Journal
of Information Systems. 18(2), 106-125.
Herath, T., and Rao, HR. ( 2009b). Encouraging information security behaviors in
organizations: Role of penalties, pressures and perceived effectiveness.
Decision Support Systems. 47(2), 154-165.
Hyeun, S., Cheongtag, K., and Young, U. (2009). Self-efficacy in information
security: Its influence on end users' information security practice behavior.
computers and security. 28(8), 816-826.
78
Ng ,B.Y., Kankanhalli, A., and Xu YC. (2009). Studying users’ computer security
behaviour: a health belief perspective. Decision Support Systems.
Ng, B. Y., and Rahim, M. A. (2005). A socio-behavioral study of home computer
users' intention to practice security 7-10.
Oppenheim, A. (1992). Questionnaire Design, Interviewing and Attitude
Measurement, London, Pinter.
Ozer, E., and Bandura, A. (1990). Mechanisms governing empowerment effects: A
self-efficacy analysis. Journal of Personality and Social Psychology.
Pahnila, S., Siponen, M., and Mahomood, A. (2007). Employees’ behaviour
towards IS security policy compliance. In: Proceedings of the 40th Hawaii
International Conference on System Sciences, January 3e6, Los Alamitos,
CA.
Pechmann, C., Zhao, G., Goldberg, M., and Reibling, E.T. (2003). What to convey
in antismoking advertisements of adolescents: the use of protection
motivation theory to identify effective message themes. Journal of Marketing.
Peterson , S. J., and Luthans, F. ( 2006 ). The impact of fi nancial and nonfi
nancial incentives on business - unit outcomes over time . Journal of Applied
Psychology.
Proctor, R.W and Proctor, J.D. (2006). Handbook of Human Factors and
Ergonomics 3rd ed., John Wiley and Sons, New York.
Rabii, T. and K. Ward (2010). "Risky Business at Wireless Hot Spots ".
Rhodes, K. (2001). Operations security awareness: the mind has no firewall.
Computer Security Journal.
Richardson, R. (2007). CSI Computer Crime and Security Survey. Computer
Security Institute. From: retrieved November 16, 2007.
Rogers, R. W. (1983). Cognitive and physiological processes in fear appeals and
attitude change: A revised theory of protection motivation. In J. Cacioppo and
R. Petty ,Social Psychophysiology. New York: Guilford Press.
Sasse, M. A., Brostoff, S., and Weirich, D. (2004). Transforming the weakest link
e a human/computer interaction approach to usable and effective security. BT
Technology Journal.
Saunders, M., Lewis, P., and Thornhill, A. (2007). Research Methods for Business
Students 3rd edition Harlow: Prentice Hall.
81