The Risks in the Social Networks - an Exploratory Study

被引:0
作者
Tiganoaia, Bogdan [1 ]
Cernian, Alexandra [1 ]
Niculescu, Andrei [1 ]
机构
[1] Univ Politehn Bucuresti, Splaiul Independentei St 313, Bucharest, Romania
来源
PROCEEDINGS OF THE 2017 9TH IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS (IDAACS), VOL 2 | 2017年
关键词
risks; social networks; research; questionnaire;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
While social networking has gone on almost as long as societies themselves have existed, the unparalleled potential of the Web to facilitate such connections has led to an exponential and ongoing expansion of that phenomenon. In addition to social media platforms, the capacity for social interaction and collaboration is increasingly built into business applications [1]. The risks in the online space and particularly in social networks represent one of the most important and opened issue of our time. The paper is an exploratory study with the focus point related to an original research based on a questionnaire with more that 300 of respondents. Topics about the risks in the social networks such as: the security in the social networks, incidents, viruses, worms, spam, the level of security regarding the applications used on social networks, etc were analysed. The findings of this research provide a basis that is useful to understand the importance of the prevention and treatment of risks in the social networks. Regarding the management perspective of an organization, this paper highlights the necessity of the investments in companies security against cyber risks. The paper also provides useful findings in the field of cyber risks for the online community.
引用
收藏
页码:974 / 977
页数:4
相关论文
共 5 条
  • [1] Naresh K., 2007, MARKETING RES APPL A
  • [2] Oboni F., 2013, WHAT YOU NEED KNOW R
  • [3] Sennewald C. A., 2016, EFFECTIVE SECURITY M, P205
  • [4] Coping with systems risk: Security planning models for management decision making
    Straub, DW
    Welke, RJ
    [J]. MIS QUARTERLY, 1998, 22 (04) : 441 - 469
  • [5] von Solms R., COMPUTERS SECURITY, V38, P97