Social Networking User Sites and Their Implication on Personal Security of Dagoretti North Constituency Residents in Nairobi County
##plugins.themes.bootstrap3.article.main##
This study was necessitated by the rising wave of insecurity in the posh places of Nairobi County including in the gated areas that this study presupposed was linked to information shared in social networking user sites. The study was guided by three objectives; to identify the features of online interaction in social networking user sites and their implication on personal security of Dagoretti North Constituency residents in Nairobi County, to identify personal security risks associated with interaction on social networking user sites; and to establish the risk mitigation measures that cushion social networking users in Dagoretti North Constituency in Nairobi County, Kenya. The study adopted a cross-sectional survey design. Questionnaires were used to collect data from 378 members of public while Key Informants (K.I) guide were used to collect qualitative data from 10 K.I who comprised of; police officers in crime branch sections of Kilimani and Kawangware police stations. Stratified random sampling technique was used to pick the main respondents. Data was analyzed with the aid of Statistical Package for Social Sciences (SPSS) and results presented using descriptive statistics. Qualitative responses were presented in verbatim quotes and selected comments. According to this study, Instagram (61.9%), Facebook (48.7%), Google+ (42.1%) and Twitter (31.5%) were the most frequently used sites, used every day. The study concluded that; social media sites expose user’s geographical coordinates, allow the use of pseudo names and credentials that disguise the criminals making them difficult to apprehend, made it easy to find victims with just a few keystrokes, allows replication of information and conceal originality, and hence predisposes user’s credentials to theft. The different features of social media networking sites exposed users to major personal security risks such as abductions, rape, robberies, break-ins, murders and burglaries. In order to address the personal security risks brought about by disclosure of personal identifiable information on social networking sites on the users, the study recommended policy formulation through the ICT ministry to create mechanisms for reaching out to SNS users for purposes of user education on safe usage of SNS. Further, as a matter of policy, the government should benchmark with developed countries for advanced preventive regulations measures against social networking vulnerability hence cushion and protect SNS users.
References
-
Aday, S., Henry F., Marc L., & John, S. (2010). Blogs and Bullets: New Media in Contentious Politics. Peaceworks, 65.
Google Scholar
1
-
Albrechtslund, A. (2008). Online Social Networking as Participatory Surveillance. First Monday, 13(3). doi:10.5210/fm. v13i3.2142.
Google Scholar
2
-
Alqubaiti, Zahra Y. (2016). The Paradox of Social Media Security: A Study of IT Students’ Perceptions versus Behavior on Using Facebook [Unpublished MA dissertation]. Kennesaw State University.
Google Scholar
3
-
Chennamaneni, A., & Taneja, A. (2015). Communication Privacy Management and Self- Disclosure on Social Media - A Case of Facebook, 1–11.
Google Scholar
4
-
Chipurici, C. (2016). How to Prevent Identity Theft? https://heimdalsecurity.com/blog/how-to-prevent-identity-theft-20-steps/.
Google Scholar
5
-
Cochran, W.G. (1963). Sampling Technique (2nd Edition). New York: John Wiley and Sons Inc.
Google Scholar
6
-
Duggan M, & Brenner J. (2013). The demographics of social media users – 2012. Washington, DC: Pew Internet & American Life Project.
Google Scholar
7
-
Ellison, N. B. & Boyd, d. (2013). Sociality through Social Network Sites. In W. H. Dutton (Ed.), The Oxford Handbook of Internet Studies.
Google Scholar
8
-
Elsevier, (2016). Identity theft rises sharply as fraudsters target social media. Computer Fraud & Security, 7.
Google Scholar
9
-
Fokes, E., & Li, L. (2014). A survey of security vulnerabilities in social networking media. Proceedings of the 3rd Annual Conference Research in Information Technology, 57.
Google Scholar
10
-
Gacy, F. S. (29 March 2010). Foreign policy: Africa’s internet threat. National Public Radio.
Google Scholar
11
-
Irshad, S., & Soomro, T.R. (2018). Identity Theft and Social Media. International Journal of Computer Science and Network Security, 18(1), 43–55.
Google Scholar
12
-
Kang, Y. S. (2010). Understanding the role of an IT artifact in online service continuance: An extended perspective of user satisfaction. Computers in Human Behavior, 26(3), 353-364.
Google Scholar
13
-
Kenya (2018). Kenya Police Service Annual Report. Nairobi: Government Printers.
Google Scholar
14
-
Kenya National Bureau of Statistics (2019). National Census Report. Nairobi: Government Printers.
Google Scholar
15
-
Kumar, Senthil, Saravanakumar, K., & Deepa, K., (2016). Privacy and Security in Social Media. A Comprehensive Study. Nagpur, INDIA.
Google Scholar
16
-
Liu, Y., & Ying, X. (2010). A Review of Social Network Sites: Definition, Experience and Applications. The Conference on Web Based Business Management. Scientific Research. Laudon, K., Laudon, J. and Dass R. (2010): Management Information Systems, 11th Edition (Pearson), pp 526-533.
Google Scholar
17
-
Mali, J. (2013). Identity Theft through Social Networking. http://www.lifehack.org/articles/technology/identity-theft-through-social-networking-lessons-take-now.html.
Google Scholar
18
-
Molluzzo, J.C., & Lawler, J.P. (2011). A study of the perceptions of college students on cyberbullying. Proceedings of the Information Systems Educators Conference (ISECON), Wilmington, North Carolina, 28(1633), 1-25.
Google Scholar
19
-
Mugenda, O.M., & Mugenda, A.G. (2003). Research Methods, Quantitative and Qualitative Approaches. Nairobi: ACT.
Google Scholar
20
-
National White Collar Crime Center (2013). The Annual Report. US: Bureau of Justice Assistance Department of Justice.
Google Scholar
21
-
Rohani, V., & Hock, S. (2009). On Social Network Web Sites: Definition, Features, Architectures and Analysis Tools. Journal of Advances in Computer Research.
Google Scholar
22
-
Rose, K., Eldridge, S. D., Lyman, C. (2015). The Internet of Things: An Overview. Understanding the Issues and Challenges of a more connected World. Corpus ID: 9217381.
Google Scholar
23
-
Statista (2016). Social Media Statistics. https://www.statista.com/topics/1164/social-networks/.
Google Scholar
24
-
Ungerer, C. (27 February 2012), Social Media and National Security, ASPI Strategic Policy Form.
Google Scholar
25
Most read articles by the same author(s)
-
Douglas R. Mwiraria,
Kibet Ngetich,
Panuel Mwaeke,
Factors Associated with Cybercrime Awareness Among University Students in Egerton University, Njoro Campus, Nakuru County, Kenya , European Journal of Humanities and Social Sciences: Vol. 2 No. 3 (2022) -
Tonui Paul Kiprugut,
Panuel Mwaeke,
Wokabi Mwangi,
Supermarket Operators’ Perception of Effects: Shoplifting Crimes Within the CBD In Nairobi County, Kenya , European Journal of Humanities and Social Sciences: Vol. 1 No. 6 (2021) -
Kenwilliams Nyakomitah,
Panuel Mwaeke,
Lydia Mareri,
Media’s Role in Televised Media Coverage and Its Influence on Terrorist Attacks in Nairobi County, Kenya , European Journal of Humanities and Social Sciences: Vol. 1 No. 6 (2021) -
Abdul Galgallo Diba,
Panuel Mwaeke,
Samuel Auya,
Influence of Illicit Brews on Security in Rongai Sub-County, Nakuru County Kenya , European Journal of Humanities and Social Sciences: Vol. 3 No. 4 (2023) -
Erick M. Mwangi,
Eric K. Bor,
Panuel Mwaeke,
Samwel Auya,
Influence of Victim-Offender Relationship on Reporting of Property Crime to the Police by Victims in Gilgil Ward, Nakuru County, Kenya , European Journal of Humanities and Social Sciences: Vol. 2 No. 6 (2022) -
Douglas Mwiraria,
Kibet Ngetich,
Panuel Mwaeke,
Exploring Individual Factors Associated with the Prevalence of Cybercrime Victimization Among Students at Egerton University, Kenya , European Journal of Humanities and Social Sciences: Vol. 4 No. 5 (2024)