Deliberate Inattention to Security on Public Wi-Fi
Flow Chart
—Public Wifi—
—UserSafety Risks/Improving Safety—
—Types of Attacks/Behavior changes/Educating/sharing info—
Hypothesis
How can users make a difference in their online security when using public Wi-Fi?
Introduction (Heading not included)
Briefly discuss public Wi-Fi
Safety risks when using public Wi-Fi
Improving network safety on public Wi-Fi
Scope and Users of Public Wi-Fi
Anna Picco-Schwendener, H. Jost Reinhold, and Lorenzo Cantoni. 2017. Usage Practices and User Types of a Municipal Wi-Fi Network: the Case of “WiFi Lugano”. In Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance (ICEGOV ’17). Association for Computing Machinery, New York, NY, USA, 292–301. DOI:https://doi.org/10.1145/3047273.3047309
Vamsi Krishna Gondi and Nazim Agoulmine. 2009. Secure interworking & roaming of WiMAX with 3G and Wi-Fi. In Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management (IM’09). IEEE Press, 133–136. https://dl.acm.org/doi/10.5555/1688933.1688954
Simplifying public Wi-Fi risks when surfing on the network
Alqahtani, M. A. (2022). Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis. Computational Intelligence and Neuroscience, 2022. https://link.gale.com/apps/doc/A698473867/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=494e0159. Accessed April 6, 2022. https://link.gale.com/apps/doc/A698238142/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=05d816ca
Noor, M. M., & Hassan, W. H. (2013). Wireless networks: developments, threats and countermeasures. International Journal of Digital Information and Wireless Communications, 3(1), 119+. https://go.gale.com/ps/i.do?id=GALE%7CA353693482&sid=googleScholar&v=2.1&it=r&linkaccess=abs&issn=2225658X&p=AONE&sw=w&userGroupName=anon%7E1a930429
Educating and Changing security behavior when using public Wi-Fi
Rader, E., & Wash, R. (2015). Identifying patterns in informal sources of security information. Journal of Cybersecurity. https://doi.org/10.1093/cybsec/tyv008
Schlette, D., Böhm, F., Caselli, M., & Pernul, G. (2021). Measuring and visualizing cyber threat intelligence quality. International Journal of Information Security, 20(1), 21–38. https://doi.org/10.1007/s10207-020-00490-y; https://rdcu.be/cMeLj
Zrahia, Aviram. “Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views.” Journal of Cybersecurity, vol. 4, no. 1, Mar. 2018, pp. 1g+. Gale OneFile: Computer Science, link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4. Accessed 6 Apr. 2022. https://link.gale.com/apps/doc/A607390910/CDB?u=klnb_fhsuniv&sid=bookmark-CDB&xid=e720f6b4
Methodology
A survey containing questions related to cybersecurity was distributed to university students, along with software and email security that can impact cyber-attacks.
Possible survey questions:
What percentage of people do you think to use public Wi-Fi? Can public Wi-Fi spy on you and get your exact location? Can you be traced by using public Wi-Fi when not at home and is it in real-time? Can Wi-Fi steal data that is not opened on your system? What precautions can I make to be secure on public Wi-Fi as far as for the basic user? What do you know about VPNs that can protect your privacy on public Wi-Fi? What internet connections can you connect to when you are not at home that will secure your location; and personal information on your system?
Educating users on sharing information on attacks can prevent others from sharing the fate of getting their computers wiped or personal information stolen.
Discussion
Network security is based on your cybersecurity awareness. Security vulnerabilities pose a danger to organizations’ ability to evade cyber-attacks. The cybersecurity of the company is impacted by every individual who has a connection to the internet. My research will improve users’ cybersecurity awareness and the impact of preventing cyber-attacks through deliberate attention to behavior when surfing on public Wi-Fi.
Potential for future studies:
Improving wireless network security
Improving Wi-Fi security at school, work
Weakness of study/potential issues:
Skill levels of potential users, and time needed.
Strength: All users want to improve their online security
The effects of not changing security behavior.
