{"title":"Social Login Usage for Third-Party Cloud Services — Relation of Security Risks and Configuration","authors":"Martin Zboril, J. Syrovátková, A. Pavlíček","doi":"10.1109/SNAMS58071.2022.10062712","DOIUrl":null,"url":null,"abstract":"Social logins offer users a simplified authentication method where they may leverage already-established social media accounts, such as with Twitter or Facebook. This concept brings users many benefits but, simultaneously, users should be aware of the multiple associated security risks. Social media users should also pay attention to the appropriate security configuration of their accounts to decrease the probability of a cyberattack. Social logins and the security configurations of social media have been broadly researched within the environment of the Czech Republic. This paper further analyzes the relation between the users' perception of security as regards social logins, the security risks associated with them, the security configuration of social media accounts, and the risk appetite of users. The authors examined the data through descriptive analysis and multi-factor analysis.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SNAMS58071.2022.10062712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Social logins offer users a simplified authentication method where they may leverage already-established social media accounts, such as with Twitter or Facebook. This concept brings users many benefits but, simultaneously, users should be aware of the multiple associated security risks. Social media users should also pay attention to the appropriate security configuration of their accounts to decrease the probability of a cyberattack. Social logins and the security configurations of social media have been broadly researched within the environment of the Czech Republic. This paper further analyzes the relation between the users' perception of security as regards social logins, the security risks associated with them, the security configuration of social media accounts, and the risk appetite of users. The authors examined the data through descriptive analysis and multi-factor analysis.