儿童网络安全:社交媒体应用调查

IF 4.4 4区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Victor Chang, Lewis Golightly, Qi Xu, Thanaporn Boonmee, B. Liu
{"title":"儿童网络安全:社交媒体应用调查","authors":"Victor Chang, Lewis Golightly, Qi Xu, Thanaporn Boonmee, B. Liu","doi":"10.1080/17517575.2023.2188122","DOIUrl":null,"url":null,"abstract":"ABSTRACT The paper discusses cybersecurity for children (particularly teenagers) and focuses on Social Media’s impact using a theoretical approach. Many social media users are unaware of their Cybersecurity in Social Media and all-round digital privacy and do not understand the importance of developing privacythrough taking both digital and physical measures. We identify seven categories of hacking motivations through multimedia platforms: Emotions, Financial gains, Entertainment, Proficiency for jobs, Hacktivism, Espionage, and Cyber-warfare, particularly for children. As vulnerable people, they can be the principal victims. We explore various methods used for hacking, such as Sexting, Facebook depression, and Influence on buying advertisements. In our findings, we demonstrate that the most critical protection method is to fully understand the digital footprint left behind and its possible consequences. The users should know this as a self-protection mechanism to mitigate security issues before problems occur. It means adopting the same mindset and attitude of protecting oneself in the online world as in the real world.","PeriodicalId":11750,"journal":{"name":"Enterprise Information Systems","volume":null,"pages":null},"PeriodicalIF":4.4000,"publicationDate":"2023-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Cybersecurity for children: an investigation into the application of social media\",\"authors\":\"Victor Chang, Lewis Golightly, Qi Xu, Thanaporn Boonmee, B. Liu\",\"doi\":\"10.1080/17517575.2023.2188122\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ABSTRACT The paper discusses cybersecurity for children (particularly teenagers) and focuses on Social Media’s impact using a theoretical approach. Many social media users are unaware of their Cybersecurity in Social Media and all-round digital privacy and do not understand the importance of developing privacythrough taking both digital and physical measures. We identify seven categories of hacking motivations through multimedia platforms: Emotions, Financial gains, Entertainment, Proficiency for jobs, Hacktivism, Espionage, and Cyber-warfare, particularly for children. As vulnerable people, they can be the principal victims. We explore various methods used for hacking, such as Sexting, Facebook depression, and Influence on buying advertisements. In our findings, we demonstrate that the most critical protection method is to fully understand the digital footprint left behind and its possible consequences. The users should know this as a self-protection mechanism to mitigate security issues before problems occur. It means adopting the same mindset and attitude of protecting oneself in the online world as in the real world.\",\"PeriodicalId\":11750,\"journal\":{\"name\":\"Enterprise Information Systems\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2023-03-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Enterprise Information Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1080/17517575.2023.2188122\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Enterprise Information Systems","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1080/17517575.2023.2188122","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 2

摘要

摘要本文讨论了儿童(尤其是青少年)的网络安全问题,并运用理论方法重点研究了社交媒体的影响。许多社交媒体用户不知道他们在社交媒体中的网络安全和全面的数字隐私,也不理解通过采取数字和物理措施来发展隐私的重要性。我们通过多媒体平台确定了七类黑客动机:情感、经济收益、娱乐、工作能力、黑客主义、间谍活动和网络战,尤其是针对儿童的。作为弱势群体,他们可能是主要受害者。我们探索了各种用于黑客攻击的方法,如性骚扰、脸书抑郁症和对购买广告的影响。在我们的研究结果中,我们证明了最关键的保护方法是充分了解留下的数字足迹及其可能的后果。用户应该知道这是一种自我保护机制,可以在出现问题之前缓解安全问题。这意味着在网络世界和现实世界中采取同样的心态和态度来保护自己。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Cybersecurity for children: an investigation into the application of social media
ABSTRACT The paper discusses cybersecurity for children (particularly teenagers) and focuses on Social Media’s impact using a theoretical approach. Many social media users are unaware of their Cybersecurity in Social Media and all-round digital privacy and do not understand the importance of developing privacythrough taking both digital and physical measures. We identify seven categories of hacking motivations through multimedia platforms: Emotions, Financial gains, Entertainment, Proficiency for jobs, Hacktivism, Espionage, and Cyber-warfare, particularly for children. As vulnerable people, they can be the principal victims. We explore various methods used for hacking, such as Sexting, Facebook depression, and Influence on buying advertisements. In our findings, we demonstrate that the most critical protection method is to fully understand the digital footprint left behind and its possible consequences. The users should know this as a self-protection mechanism to mitigate security issues before problems occur. It means adopting the same mindset and attitude of protecting oneself in the online world as in the real world.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Enterprise Information Systems
Enterprise Information Systems 工程技术-计算机:信息系统
CiteScore
11.00
自引率
6.80%
发文量
24
审稿时长
6 months
期刊介绍: Enterprise Information Systems (EIS) focusses on both the technical and applications aspects of EIS technology, and the complex and cross-disciplinary problems of enterprise integration that arise in integrating extended enterprises in a contemporary global supply chain environment. Techniques developed in mathematical science, computer science, manufacturing engineering, and operations management used in the design or operation of EIS will also be considered.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信