##plugins.themes.bootstrap3.article.main##

This study was necessitated by the rising wave of insecurity in the posh places of Nairobi County including in the gated areas that this study presupposed was linked to information shared in social networking user sites. The study was guided by three objectives; to identify the features of online interaction in social networking user sites and their implication on personal security of Dagoretti North Constituency residents in Nairobi County, to identify personal security risks associated with interaction on social networking user sites; and to establish the risk mitigation measures that cushion social networking users in Dagoretti North Constituency in Nairobi County, Kenya. The study adopted a cross-sectional survey design. Questionnaires were used to collect data from 378 members of public while Key Informants (K.I) guide were used to collect qualitative data from 10 K.I who comprised of; police officers in crime branch sections of Kilimani and Kawangware police stations. Stratified random sampling technique was used to pick the main respondents. Data was analyzed with the aid of Statistical Package for Social Sciences (SPSS) and results presented using descriptive statistics. Qualitative responses were presented in verbatim quotes and selected comments. According to this study, Instagram (61.9%), Facebook (48.7%), Google+ (42.1%) and Twitter (31.5%) were the most frequently used sites, used every day. The study concluded that; social media sites expose user’s geographical coordinates, allow the use of pseudo names and credentials that disguise the criminals making them difficult to apprehend, made it easy to find victims with just a few keystrokes, allows replication of information and conceal originality, and hence predisposes user’s credentials to theft. The different features of social media networking sites exposed users to major personal security risks such as abductions, rape, robberies, break-ins, murders and burglaries. In order to address the personal security risks brought about by disclosure of personal identifiable information on social networking sites on the users, the study recommended policy formulation through the ICT ministry to create mechanisms for reaching out to SNS users for purposes of user education on safe usage of SNS. Further, as a matter of policy, the government should benchmark with developed countries for advanced preventive regulations measures against social networking vulnerability hence cushion and protect SNS users.

References

  1. Aday, S., Henry F., Marc L., & John, S. (2010). Blogs and Bullets: New Media in Contentious Politics. Peaceworks, 65.
     Google Scholar
  2. Albrechtslund, A. (2008). Online Social Networking as Participatory Surveillance. First Monday, 13(3). doi:10.5210/fm. v13i3.2142.
     Google Scholar
  3. Alqubaiti, Zahra Y. (2016). The Paradox of Social Media Security: A Study of IT Students’ Perceptions versus Behavior on Using Facebook [Unpublished MA dissertation]. Kennesaw State University.
     Google Scholar
  4. Chennamaneni, A., & Taneja, A. (2015). Communication Privacy Management and Self- Disclosure on Social Media - A Case of Facebook, 1–11.
     Google Scholar
  5. Chipurici, C. (2016). How to Prevent Identity Theft? https://heimdalsecurity.com/blog/how-to-prevent-identity-theft-20-steps/.
     Google Scholar
  6. Cochran, W.G. (1963). Sampling Technique (2nd Edition). New York: John Wiley and Sons Inc.
     Google Scholar
  7. Duggan M, & Brenner J. (2013). The demographics of social media users – 2012. Washington, DC: Pew Internet & American Life Project.
     Google Scholar
  8. Ellison, N. B. & Boyd, d. (2013). Sociality through Social Network Sites. In W. H. Dutton (Ed.), The Oxford Handbook of Internet Studies.
     Google Scholar
  9. Elsevier, (2016). Identity theft rises sharply as fraudsters target social media. Computer Fraud & Security, 7.
     Google Scholar
  10. Fokes, E., & Li, L. (2014). A survey of security vulnerabilities in social networking media. Proceedings of the 3rd Annual Conference Research in Information Technology, 57.
     Google Scholar
  11. Gacy, F. S. (29 March 2010). Foreign policy: Africa’s internet threat. National Public Radio.
     Google Scholar
  12. Irshad, S., & Soomro, T.R. (2018). Identity Theft and Social Media. International Journal of Computer Science and Network Security, 18(1), 43–55.
     Google Scholar
  13. Kang, Y. S. (2010). Understanding the role of an IT artifact in online service continuance: An extended perspective of user satisfaction. Computers in Human Behavior, 26(3), 353-364.
     Google Scholar
  14. Kenya (2018). Kenya Police Service Annual Report. Nairobi: Government Printers.
     Google Scholar
  15. Kenya National Bureau of Statistics (2019). National Census Report. Nairobi: Government Printers.
     Google Scholar
  16. Kumar, Senthil, Saravanakumar, K., & Deepa, K., (2016). Privacy and Security in Social Media. A Comprehensive Study. Nagpur, INDIA.
     Google Scholar
  17. Liu, Y., & Ying, X. (2010). A Review of Social Network Sites: Definition, Experience and Applications. The Conference on Web Based Business Management. Scientific Research. Laudon, K., Laudon, J. and Dass R. (2010): Management Information Systems, 11th Edition (Pearson), pp 526-533.
     Google Scholar
  18. Mali, J. (2013). Identity Theft through Social Networking. http://www.lifehack.org/articles/technology/identity-theft-through-social-networking-lessons-take-now.html.
     Google Scholar
  19. Molluzzo, J.C., & Lawler, J.P. (2011). A study of the perceptions of college students on cyberbullying. Proceedings of the Information Systems Educators Conference (ISECON), Wilmington, North Carolina, 28(1633), 1-25.
     Google Scholar
  20. Mugenda, O.M., & Mugenda, A.G. (2003). Research Methods, Quantitative and Qualitative Approaches. Nairobi: ACT.
     Google Scholar
  21. National White Collar Crime Center (2013). The Annual Report. US: Bureau of Justice Assistance Department of Justice.
     Google Scholar
  22. Rohani, V., & Hock, S. (2009). On Social Network Web Sites: Definition, Features, Architectures and Analysis Tools. Journal of Advances in Computer Research.
     Google Scholar
  23. Rose, K., Eldridge, S. D., Lyman, C. (2015). The Internet of Things: An Overview. Understanding the Issues and Challenges of a more connected World. Corpus ID: 9217381.
     Google Scholar
  24. Statista (2016). Social Media Statistics. https://www.statista.com/topics/1164/social-networks/.
     Google Scholar
  25. Ungerer, C. (27 February 2012), Social Media and National Security, ASPI Strategic Policy Form.
     Google Scholar