##plugins.themes.bootstrap3.article.main##

Ramiro Rios-Paredes

Diego Rios-Salgado

Abstract

We propose a process to estimate the actual level of privacy and security of Facebook users. It was based upon two factors: the risk level, which was generated by psychosocial behaviors on Facebook; and the user’s level of culture in terms of security and privacy. This process was applied to a sample of Facebook users and, when comparing their level of actual awareness, related to  security and privacy, with their level of hypothetical awareness (the one presumed by them); three options were obtained: hypothetical level = actual level, for the 41.15% of interviewees; hypothetical level < actual level for the 20.35%; and, hypothetical level > actual level for the 38.50%. Conclusions: 1) The iterative application of the guidelines, provided by the Grounded Theory and Hermeneutics, allowed to structure a solid foundation for a conceptual model of causes of cyber risks. 2) The process authentically reflects the reality of the Facebook users in three ways: they can have a hypothetical level that coincides with their actual level; or a hypothetical level which may be underestimated or overestimated when compared to their actual level. 3) The process provides with complementary data which may contribute to a safer experience within the social network.

##plugins.themes.bootstrap3.article.details##

Section
Empirical Articles

How to Cite

Rios-Paredes, R., & Rios-Salgado, D. . (2020). A process to estimate the actual level of awareness of Facebook users regarding privacy and security within the social network. New Trends in Qualitative Research, 4, 112–126. https://doi.org/10.36367/ntqr.4.2020.112-126
References

Algarni, A., Xu, Y., & Chan, T. (2014). Social engineering in social networking sites: The art of impersonation. Proceedings - 2014 IEEE International Conference on Services Computing, SCC 2014, 797–804. https://doi.org/10.1109/SCC.2014.108

Cornejo, M., & Tapia, M. L. (2011). Redes sociales y relaciones interpersonales en internet. Fundamentos En Humanidades, 2(24), 219–229. Retrieved from https://www.redalyc.org/articulo.oa?id=18426920010

Instituto de Auditores Internos de España. (2016). Ciberseguridad Una guía de supervisión. (Instituto de Auditores Internos de España, Ed.). Madrid. Retrieved from https://auditoresinternos.es/uploads/media_items/guia-supervision-ciberseguridad-fabrica-pensamientoiai.original.pdf

Lara, J. C., Pincheira, C., & Vera, F. (2014). La privacidad en el sistema legal chileno. Retrieved from https://www.derechosdigitales.org/wp-content/uploads/pp-08.pdf

Me Conecto Sin Clavos, M. de G. de G. (2017). Guía ciber-riesgos educadores. Guatemala.

Netter, M., Herbst, S., & Pernul, G. (2013). Interdisciplinary Impact Analysis of Privacy in Social Networks. In Y. Altshuler, Y. Elovici, A. B. Cremers, N. Aharony, & A. Pentland (Eds.), Security and Privacy in Social Networks (pp. 1–253). Springer. https://doi.org/10.1007/978-1-4614-4139-7

OECD. (1980). Annex to the recommendation of the Council of 23 September 1980: Guidelines governing the protection of privacy and transborder flows of personal data.

OECD. (2011). Thirty Years After the Oecd Privacy Guidelines. Retrieved from http://www.oecd.org/sti/ieconomy/49710223.pdf

UIT, U. I. T. (2014). Manual para la medición del uso y el acceso a las TIC por los hogares y las personas (2014th ed.). Retrieved from http://www.itu.int/dms_pub/itu-d/opb/ind/D-IND-ITCMEAS-2014-PDF-S.pdf

UNESCO. (2012). Global Survey on Internet Privacy and Freedom of Expression. UNESCO series on Internet freedom. https://doi.org/ISBN: 978-92-3-104241-6

Wallbridge, R. (2009). How safe is Your Facebook Profile ? Privacy issues of online social networks. ANU Undergraduate Research Journal, 1, 85–92. Retrieved from http://pressfiles.anu.edu.au/downloads/press/n1677/pdf/11.pdf

Wong, K. (2014). Trust and Privacy Exploitation in Online Social Networks, (October), 28–33. https://doi.org/10.1109/MITP.2009.1.

Zhan, J., & Fang, X. (2011). Social computing: the state of the art. Journal of Social Computing and Cyber- Physical Systems, 1(1), 12. Retrieved from http://www.inderscienceonline.com/doi/abs/10.1504/IJSCCPS.2011.043601

Zhang, C., Sun, J., Zhu, X., & Fang, Y. (2010). Privacy and Security for Online Social Networks: Challenges and Opportunities. IEEE Network, 24(4), 13–18. https://doi.org/10.1109/MNET.2010.5510913