Online Social Networks Risks to Organisations A Literature Review

被引:0
作者
Ekandjo, Talitakuum A. T. [1 ]
Jazri, Hussin [2 ]
Peters, Anicia [1 ]
机构
[1] Namibia Univ Sci & Technol, Dept Comp Sci, Windhoek, Khomas, Namibia
[2] Namibia Univ Sci & Technol, Dept Informat, Winhoek, Khomas, Namibia
来源
PROCEEDINGS OF THE SECOND AFRICAN CONFERENCE FOR HUMAN COMPUTER INTERACTION: THRIVING COMMUNITIES (AFRICHI) | 2018年
关键词
online social networks; social media risks; social networks risks; DARK;
D O I
10.1145/3283458.3283465
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The use of online social networks (OSNs) is increasing exponentially - leading to soaring risks for organisations. Organisations need to regulate employees' use of OSNs to minimise the impacts of OSNs related threats. The aim of this paper is to identify organisational security risks emanating from the use of OSNs by employees. A review and analysis of existing literature on OSNs was done to develop a taxonomy of OSNs' organisational risks. The review revealed that OSNs and employees are the current weakest security links in organisations and engender dreadful information security risks. In addressing OSNs security threats, there are challenges that organisations might encounter. For organisations to implement effective security management programs, it is recommended that future research should look at identifying critical success and failure factors for implementing OSNs security control mechanisms.
引用
收藏
页码:176 / 179
页数:4
相关论文
共 28 条
  • [1] An Intelligent Model for Vulnerability Analysis of Social Media User
    Abubaker, Firya Rashid
    Boluk, Pinar Sarisaray
    [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 258 - 263
  • [2] Malicious accounts: Dark of the social networks
    Adewole, Kayode Sakariyah
    Anuar, Nor Badrul
    Kamsin, Amirrudin
    Varathan, Kasturi Dewi
    Razak, Syed Abdul
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 79 : 41 - 67
  • [3] Ahmad A., 2013, DISCLOSURE, V6, P18
  • [4] Social Engineering in Social Networking Sites: The Art of Impersonation
    Algarni, Abdullah
    Xu, Yue
    Chan, Taizan
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, : 797 - 804
  • [5] Aula Pekka, 2010, Strategy & Leadership, V38, P43, DOI 10.1108/10878571011088069
  • [6] Australian Competition and Consumer Commission, 2018, TARG SCAMS REP ACCC
  • [7] Bawazir MA, 2016, INT CONF INFORM COMM, P228, DOI [10.1109/ICT4M.2016.49, 10.1109/ICT4M.2016.054]
  • [8] Social Network Sites: Definition, History, and Scholarship
    Boyd, Danah M.
    Ellison, Nicole B.
    [J]. JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01): : 210 - 230
  • [9] Braun Richard, 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2013), P267, DOI 10.1109/EDOC.2013.37
  • [10] Cavico F., 2013, J LAW POLICY GLOBALI, V12, P1