Security and Nuisances of Social Media on Wi-Fi Network
DOI:
https://doi.org/10.47604/ijts.1837Keywords:
Data Consumption; Device Accounting; Mobile Devices; Social Media; Wifi Network; Rockus Outdoor APAbstract
Purpose: This research is about the nuisances of social media application on a Wi-Fi network in a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network and the data consumption of those platforms on the network. Nmap Zenmap GUI 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services etc. to enable in accessing the vulnerability of the network. Data consumption on users' mobile devices was collected and analyzed.
Methodology: An online questionnaire was also used to solicit for the information on social media data usage from the users of the network.
Findings: The top ten social media platforms i.e. Facebook, WhatsApp, Twitter, YouTube, Messenger, Instagram, Telegram, LinkedIn, Telegram and Tik-Tok are not running on secured protocols and services. This calls for serious attention on the security of networks that allows such application. A proper filtering mechanism is necessary to protect the network from attacks.
Unique Contribution to Theory, Practice and Policy: Entertainment is relevant for education but not mandatory for learning. If social media platforms are posing security threats, increasing unnecessary traffic and resulting to high cost of maintaining networks. The nuisance of social media is as a result of the nature of the content or media that is allowed. Users of a network are often attracted to these content. The ability of the content to lure the users makes it necessary for traffic to be generated on the network through the social media applications.
Downloads
References
Arnaboldi, V., Conti, M., Passarella, A., & Dunbar, R. I. M. (2017). Online Social Networks and information diffusion: The role of ego networks. Online Social Networks and Media, 1, 44-55. https://doi.org/10.1016/j.osnem.2017.04.001
Barakabitze, A. A., Ahmad, A., Mijumbi, R., & Hines, A. (2020). 5G network slicing using SDN and NFV: A survey of taxonomy, architectures and future challenges. Computer Networks, 167. https://doi.org/10.1016/j.comnet.2019.106984
Charbonneau, N., & Vokkarane, V. M. (2011). Performance modeling of HS-RR-TCP over load-balanced optical burst-switched (OBS) networks. Optical Switching and Networking, 8(2), 116-128. https://doi.org/10.1016/j.osn.2010.10.002
Cuadra-sánchez, A. (2016). Mobile Data Loss: Threats and Countermeasures. Network Security, 2016(6), 4. https://doi.org/10.1016/s1353-4858(16)30054-x
Evans, G., Asante, M., & Acheampong Amponsah, A. (2016). Dynamic Routing Implementation Decision between OSPFv3 and IS-IS in IPv6 Networks. Communications on Applied Electronics, 6(3), 25-34. https://doi.org/10.5120/cae2016652446
Goda, K. (2016). Storage Area Network. Encyclopedia of Database Systems, 1-2. https://doi.org/10.1007/978-1-4899-7993-3_1329-2
Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of Computer and System Sciences, 80(5), 973-993. https://doi.org/10.1016/j.jcss.2014.02.005
Leira, R., Aracil, J., López de Vergara, J. E., Roquero, P., & González, I. (2018). High-speed optical networks latency measurements in the microsecond timescale with software-based traffic injection. Optical Switching and Networking, 29(March), 39-45. https://doi.org/10.1016/j.osn.2018.03.004
Manca, M., Boratto, L., Morell Roman, V., Martori i Gallissà , O., & Kaltenbrunner, A. (2017). Using social media to characterize urban mobility patterns: State-of-the-art survey and case-study. Online Social Networks and Media, 1, 56-69. https://doi.org/10.1016/j.osnem.2017.04.002
Masud, F., Abdullah, A. H., Abdul-Salaam, G., & Ullah, F. (2017). Traffic adaptive MAC protocols in wireless body area networks. Wireless Communications and Mobile Computing, 2017. https://doi.org/10.1155/2017/8267162
Osseiran, A., Braun, V., & Hidekazu, T. (2013). The foundation of the mobile and wireless communications system for 2020 and beyond. Proc. IEEE Veh. Tech. "¦, 1-5. https://doi.org/10.1109/VTCSpring.2013.6692781
Raggo, M. T. (2016a). Developing Your Mobile Device Security Strategy. Mobile Data Loss, 37-43. https://doi.org/10.1016/b978-0-12-802864-3.00005-2
Raggo, M. T. (2016b). Preparing for Generation Mobile. In Mobile Data Loss (pp. 1-6). Elsevier. https://doi.org/10.1016/b978-0-12-802864-3.00001-5
Raptis, T. P. (2020). When Wireless Crowd Charging Meets Online Social Networks: A Vision for Socially Motivated Energy Sharing. Online Social Networks and Media, 16, 100069. https://doi.org/10.1016/j.osnem.2020.100069
Rostami-Shahrbabaki, M., Safavi, A. A., Papageorgiou, M., Setoodeh, P., & Papamichail, I. (2020). State estimation in urban traffic networks: A two-layer approach. Transportation Research Part C: Emerging Technologies, 115, 102616. https://doi.org/10.1016/j.trc.2020.102616
Shimonski, R. (2013). Deep Analysis. The Wireshark Field Guide, 101-118. https://doi.org/10.1016/b978-0-12-410413-6.00009-7
Tian, Z. (2020). Chaotic characteristic analysis of network traffic time series at different time scales. Chaos, Solitons and Fractals, 130. https://doi.org/10.1016/j.chaos.2019.109412
Venkatesh, T., Praveen, K., Sujatha, T. L., & Murthy, C. S. R. (2007). Performance evaluation of high speed TCP over optical burst switching networks. Optical Switching and Networking, 4(1), 44-57. https://doi.org/10.1016/j.osn.2006.09.005
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Fuseini Inusah
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.