IDEAS home Printed from https://ideas.repec.org/a/bdu/ojijts/v8y2023i1p28-44id1837.html
   My bibliography  Save this article

Security and Nuisances of Social Media on Wi-Fi Network

Author

Listed:
  • Fuseini Inusah

Abstract

Purpose: This research is about the nuisances of social media application on a Wi-Fi network in a university campus in Ghana. The aim was to access the security risk on the network, the speed of the network and the data consumption of those platforms on the network. Nmap Zenmap GUI 7.80 application was used to scan the various social media platforms to identify the protocols, ports, services etc. to enable in accessing the vulnerability of the network. Data consumption on users' mobile devices was collected and analyzed. Methodology: An online questionnaire was also used to solicit for the information on social media data usage from the users of the network. Findings: The top ten social media platforms i.e. Facebook, WhatsApp, Twitter, YouTube, Messenger, Instagram, Telegram, LinkedIn, Telegram and Tik-Tok are not running on secured protocols and services. This calls for serious attention on the security of networks that allows such application. A proper filtering mechanism is necessary to protect the network from attacks. Unique Contribution to Theory, Practice and Policy: Entertainment is relevant for education but not mandatory for learning. If social media platforms are posing security threats, increasing unnecessary traffic and resulting to high cost of maintaining networks. The nuisance of social media is as a result of the nature of the content or media that is allowed. Users of a network are often attracted to these content. The ability of the content to lure the users makes it necessary for traffic to be generated on the network through the social media applications.

Suggested Citation

  • Fuseini Inusah, 2023. "Security and Nuisances of Social Media on Wi-Fi Network," International Journal of Technology and Systems, IPRJB, vol. 8(1), pages 28-44.
  • Handle: RePEc:bdu:ojijts:v:8:y:2023:i:1:p:28-44:id:1837
    as

    Download full text from publisher

    File URL: https://iprjb.org/journals/index.php/IJTS/article/view/1837
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:bdu:ojijts:v:8:y:2023:i:1:p:28-44:id:1837. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chief Editor (email available below). General contact details of provider: https://iprjb.org/journals/index.php/IJTS/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.