{"title":"第三方云服务社交登录使用-安全风险与配置关系","authors":"Martin Zboril, J. Syrovátková, A. Pavlíček","doi":"10.1109/SNAMS58071.2022.10062712","DOIUrl":null,"url":null,"abstract":"Social logins offer users a simplified authentication method where they may leverage already-established social media accounts, such as with Twitter or Facebook. This concept brings users many benefits but, simultaneously, users should be aware of the multiple associated security risks. Social media users should also pay attention to the appropriate security configuration of their accounts to decrease the probability of a cyberattack. Social logins and the security configurations of social media have been broadly researched within the environment of the Czech Republic. This paper further analyzes the relation between the users' perception of security as regards social logins, the security risks associated with them, the security configuration of social media accounts, and the risk appetite of users. The authors examined the data through descriptive analysis and multi-factor analysis.","PeriodicalId":371668,"journal":{"name":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Social Login Usage for Third-Party Cloud Services — Relation of Security Risks and Configuration\",\"authors\":\"Martin Zboril, J. Syrovátková, A. Pavlíček\",\"doi\":\"10.1109/SNAMS58071.2022.10062712\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social logins offer users a simplified authentication method where they may leverage already-established social media accounts, such as with Twitter or Facebook. This concept brings users many benefits but, simultaneously, users should be aware of the multiple associated security risks. Social media users should also pay attention to the appropriate security configuration of their accounts to decrease the probability of a cyberattack. Social logins and the security configurations of social media have been broadly researched within the environment of the Czech Republic. This paper further analyzes the relation between the users' perception of security as regards social logins, the security risks associated with them, the security configuration of social media accounts, and the risk appetite of users. The authors examined the data through descriptive analysis and multi-factor analysis.\",\"PeriodicalId\":371668,\"journal\":{\"name\":\"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SNAMS58071.2022.10062712\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Ninth International Conference on Social Networks Analysis, Management and Security (SNAMS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SNAMS58071.2022.10062712","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Social Login Usage for Third-Party Cloud Services — Relation of Security Risks and Configuration
Social logins offer users a simplified authentication method where they may leverage already-established social media accounts, such as with Twitter or Facebook. This concept brings users many benefits but, simultaneously, users should be aware of the multiple associated security risks. Social media users should also pay attention to the appropriate security configuration of their accounts to decrease the probability of a cyberattack. Social logins and the security configurations of social media have been broadly researched within the environment of the Czech Republic. This paper further analyzes the relation between the users' perception of security as regards social logins, the security risks associated with them, the security configuration of social media accounts, and the risk appetite of users. The authors examined the data through descriptive analysis and multi-factor analysis.