Security and Nuisances of Social Media on Wi-Fi Network

Authors

  • Fuseini Inusah Kwame Nkrumah University of Science and Technology

DOI:

https://doi.org/10.47604/ijts.1837

Keywords:

Data Consumption; Device Accounting; Mobile Devices; Social Media; Wifi Network; Rockus Outdoor AP

Abstract

Purpose: This research is about the nuisances of social media application on a Wi-Fi network in a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network and the data consumption of those platforms on the network. Nmap Zenmap GUI 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services etc. to enable in accessing the vulnerability of the network. Data consumption on users' mobile devices was collected and analyzed.

Methodology: An online questionnaire was also used to solicit for the information on social media data usage from the users of the network.

Findings: The top ten social media platforms i.e. Facebook, WhatsApp, Twitter, YouTube, Messenger, Instagram, Telegram, LinkedIn, Telegram and Tik-Tok are not running on secured protocols and services. This calls for serious attention on the security of networks that allows such application. A proper filtering mechanism is necessary to protect the network from attacks.

Unique Contribution to Theory, Practice and Policy: Entertainment is relevant for education but not mandatory for learning. If social media platforms are posing security threats, increasing unnecessary traffic and resulting to high cost of maintaining networks. The nuisance of social media is as a result of the nature of the content or media that is allowed. Users of a network are often attracted to these content. The ability of the content to lure the users makes it necessary for traffic to be generated on the network through the social media applications.

 

Downloads

Download data is not yet available.

Author Biography

Fuseini Inusah, Kwame Nkrumah University of Science and Technology

 

 

References

Arnaboldi, V., Conti, M., Passarella, A., & Dunbar, R. I. M. (2017). Online Social Networks and information diffusion: The role of ego networks. Online Social Networks and Media, 1, 44-55. https://doi.org/10.1016/j.osnem.2017.04.001

Barakabitze, A. A., Ahmad, A., Mijumbi, R., & Hines, A. (2020). 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Computer Networks, 167. https://doi.org/10.1016/j.comnet.2019.106984

Charbonneau, N., & Vokkarane, V. M. (2011). Performance modeling of HS-RR-TCP over load-balanced optical burst-switched (OBS) networks. Optical Switching and Networking, 8(2), 116-128. https://doi.org/10.1016/j.osn.2010.10.002

Cuadra-sánchez, A. (2016). Mobile Data Loss: Threats and Countermeasures. Network Security, 2016(6), 4. https://doi.org/10.1016/s1353-4858(16)30054-x

Evans, G., Asante, M., & Acheampong Amponsah, A. (2016). Dynamic Routing Implementation Decision between OSPFv3 and IS-IS in IPv6 Networks. Communications on Applied Electronics, 6(3), 25-34. https://doi.org/10.5120/cae2016652446

Goda, K. (2016). Storage Area Network. Encyclopedia of Database Systems, 1-2. https://doi.org/10.1007/978-1-4899-7993-3_1329-2

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. https://doi.org/10.1016/j.jcss.2014.02.005

Leira, R., Aracil, J., López de Vergara, J. E., Roquero, P., & González, I. (2018). High-speed optical networks latency measurements in the microsecond timescale with software-based traffic injection. Optical Switching and Networking, 29(March), 39-45. https://doi.org/10.1016/j.osn.2018.03.004

Manca, M., Boratto, L., Morell Roman, V., Martori i Gallissà , O., & Kaltenbrunner, A. (2017). Using social media to characterize urban mobility patterns: State-of-the-art survey and case-study. Online Social Networks and Media, 1, 56-69. https://doi.org/10.1016/j.osnem.2017.04.002

Masud, F., Abdullah, A. H., Abdul-Salaam, G., & Ullah, F. (2017). Traffic adaptive MAC protocols in wireless body area networks. Wireless Communications and Mobile Computing, 2017. https://doi.org/10.1155/2017/8267162

Osseiran, A., Braun, V., & Hidekazu, T. (2013). The foundation of the mobile and wireless communications system for 2020 and beyond. Proc. IEEE Veh. Tech. "¦, 1-5. https://doi.org/10.1109/VTCSpring.2013.6692781

Raggo, M. T. (2016a). Developing Your Mobile Device Security Strategy. Mobile Data Loss, 37-43. https://doi.org/10.1016/b978-0-12-802864-3.00005-2

Raggo, M. T. (2016b). Preparing for Generation Mobile. In Mobile Data Loss (pp. 1-6). Elsevier. https://doi.org/10.1016/b978-0-12-802864-3.00001-5

Raptis, T. P. (2020). When Wireless Crowd Charging Meets Online Social Networks: A Vision for Socially Motivated Energy Sharing. Online Social Networks and Media, 16, 100069. https://doi.org/10.1016/j.osnem.2020.100069

Rostami-Shahrbabaki, M., Safavi, A. A., Papageorgiou, M., Setoodeh, P., & Papamichail, I. (2020). State estimation in urban traffic networks: A two-layer approach. Transportation Research Part C: Emerging Technologies, 115, 102616. https://doi.org/10.1016/j.trc.2020.102616

Shimonski, R. (2013). Deep Analysis. The Wireshark Field Guide, 101-118. https://doi.org/10.1016/b978-0-12-410413-6.00009-7

Tian, Z. (2020). Chaotic characteristic analysis of network traffic time series at different time scales. Chaos, Solitons and Fractals, 130. https://doi.org/10.1016/j.chaos.2019.109412

Venkatesh, T., Praveen, K., Sujatha, T. L., & Murthy, C. S. R. (2007). Performance evaluation of high speed TCP over optical burst switching networks. Optical Switching and Networking, 4(1), 44-57. https://doi.org/10.1016/j.osn.2006.09.005

Downloads

Published

2023-03-09

How to Cite

Inusah, F. . (2023). Security and Nuisances of Social Media on Wi-Fi Network. International Journal of Technology and Systems, 8(1), 28–44. https://doi.org/10.47604/ijts.1837

Issue

Section

Articles