International Conference on Information and Communication Technology and Its Applications (ICTA 2016) Federal University of Technology, Minna, Nigeria November 28 – 30, 2016 Online Social Networks: A Survey of Usage and Risks Experience among University Students in North-Central Nigeria Victor Legbo Yisa1, Oluwafemi Osho2, and Isaac Soje Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria {1victor.yisa, 2femi.osho}@futminna.edu.ng Abstract—Online social networks (OSNs), since the advent of virtual community can be created where users irrespective of the first, have continued to influence virtually every facet of boundaries or other segregating values of traditional human existence, as well as appeal to users of different ages communities interact, socialize, do business, learn, and and races, including students. This study seeks to investigate engage in a whole lot of other things. Disgruntled people in the usage of online social networks and associated risks the physical world may enjoy a whole lot of happiness and experienced among university students in North-Central, acceptance on social media. Nigeria. The study involves three tertiary institutions in North- Social networking sites have had massive impact on Central Nigeria. Data were collected via questionnaires. Most people‟s online activities. Users update status or tweet about of the respondents were male, full-time undergraduate themselves [6], [7]. The number of those using social students, and within the ages of 24 – 29. Findings reveal that most of the students use OSNs to interact with friends. More networking sites has more than doubled since 2008 [7] than half of the students usually uploaded their locations while Facebook alone in 2016 has a total of 1.71 billion monthly online, actually connected with other users they did not know, active users [8], a figure greater than china‟s population have extended relationships that commenced online to offline which happens to be the world most populous country. relationship, and used most of their time on the networks for Businesses, organizations and even governments have academic purposes. Other uses included dating and offering accepted the use of social networks in trying to achieve their financial assistance to acquaintances. For most of the students, aims. the use of OSNs had positively affected their performance. With a population of over one hundred and eighty six Most of the students were found to have experienced risks million, Nigeria has an internet penetration level of 46.1 including identity theft, unsolicited and irrelevant messages, percent meaning over 86 million Nigerians have access to information-request attack, and stolen password attack. the internet [9]. Because of the proliferation of smart phones and internet services in the country, youngsters especially Keywords-component; online social network; social students are constantly on OSNs, updating status, chatting, networking site; security; risk; privacy dating, reading news, commenting on profiles or sharing multimedia information. Over the years, the use of OSNs I. INTRODUCTION amongst Nigerians has been increasing. Facebook alone An Online social network, also called Social networking boast of 16 million users as at February 2016. site (SNSs), can be defined as an online application that In Nigeria, OSNs appeal not only to individuals; enable people to build a profile of themselves and share with organizations, institutions and even government institutions users of which it is believed they have some connection. It now employ them. Students share educative materials, chat, can also be defined as an interactive website that interacts make new friends, stream videos today using them. During with you while giving you information. It is a group of the 2011 elections in the country, OSNs were actively applications based on the Internet that allows the generation engaged by politicians, who took their campaigns more often and exchange of user-created contents [1]–[3] . Since the to the various SNSs where they could reach millions of advent of the first OSN, SixDegrees.com [1], the networks Nigerians easily and directly [10]. have increased rapidly in number and sophistication. By However the many and diverse benefits that OSNs 2010, up to 300 had pervaded the internet [4]. SNSs afford, like many systems, they are prone to be exploited for including Facebook, Instagram, 2go, Whatsapp, Twitter, and unethical uses. Unfortunately, many users can be said to be LinkedIn have intensely changed the way interaction is done naïve regarding the security mechanisms of the networks. on a global scale. Thus, they become vulnerable to malicious users lurking SNSs offer many advantages and usefulness. They can be behind their walls. A popular comedian was recently robbed used to increase sales, educate, meet new friends or old ones, after the wife had posted a picture of their recently acquired and even as a tool to communicate with the general public home on Instagram. There have been instances where OSNs [5]. They provide a platform for a user with no physical were used as aid to commit criminal activities in the physical friend in the real world to have lots of friends on social world. One example that readily comes to mind is the media, without ever meeting them [5], [6]. A new complete Cynthia Osokugu murder by some Facebook friends; an 129 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) event that shook the entire country in 2012. Investigations of the OSNs only afford weak security mechanisms. Hence, showed that she had made friends and given out chunks of they are prone to automatic crawling and access [18], [23]. personal information to her so called Facebook friends that Other risks center on proprietors‟ unethical use of users‟ killed her in a Lagos hotel after she had travelled to meet personal information [24]. Users‟ data can be mined and sold them [11]. These are clear examples of crimes that occurred for targeted advertisements [25]. due to users‟ ignorance and careless release of sensitive Lastly, privacy breaches are caused by malicious users. information on SNSs. Specifically, most risks are the handiwork of malicious users This study investigates the usage of online social who often pose as legitimate users. Regrettably, these networks and associated risks experienced among university constitute a significant portion of OSN users. In a study by students in North-Central, Nigeria. [26], it was discovered that up to 10% of profiles on The rest of the paper is organized as follows: a review of Facebook were either fake or duplicate accounts. As a result, risks associated with online social networks and summary of users are exposed to risks like spamming, social engineering, related studies are presented in section II. Section III stalking, identity theft, phishing, and malware attacks [22], describes the methodology used in the survey. In section IV [27]–[30]. and V, the findings are presented and discussed respectively. Section VI concludes the study. B. Related works The prevalent use of social media sites has attracted the II. LITERATURE REVIEW interest of many researchers. Studies by [31], [32] focused A. Online Social Networks Risks on usage of SNS amongst students‟ of tertiary institutions. While [31] focused on a University in Zimbabwe, [32] Although the benefits of using social media abounds, it considered one in Nsukka, Nigeria. Some studies have can also have serious security risks. While some of these investigated the impact of social media on students‟ risks are consequent of inherent vulnerabilities in SNSs, academic performance. These include [33] who focused on primarily, they are often caused or exacerbated by users impact on students‟ performance in Ghana. The other study, themselves. Many users either lack basic knowledge to by [34] considered students in Kosovo. Despite the different manage their security while online, or outrightly are care less geographical location, the findings of [31], [32], [34] suggest about security. Consequently, attackers exploit these security that high percentage of tertiary institution students use SNS, lapses for economic, social, or psychological benefits [12]. among which Facebook is one of the most prevalent. Figure 1 presents a taxonomy of OSN risks. The risks are Secondly, SNS usage has a huge impact on the academic either IT- or Non-IT-related. Many studies have shown the performance of students. evidence and effects of non-IT risks including excessive use Many authors have critically examined the security issues [13], addiction [14], sexual solicitation and harassment [15], associated with the use of online social networks. These posting regret [16], [17]. include privacy issues faced by users of social networking On the other hand, IT-related risks on OSNs are basically site [35], types of associated cyber threats [36], impact of privacy-related. Online privacy is a fundamental right of provided user information on privacy [37], [38]. every OSN user. User typically expects to retain exclusive right over their information available online. Unfortunately, absolute privacy on SNSs is highly unlikely. Lucas and III. METHODOLOGY Borisov [18] opined that privacy breaches are inevitable, regardless of OSNS‟ proprietors‟ and users‟ efforts. These To achieve the objective of the study, a survey of breaches are directly or indirectly caused by users students in three universities in the north central part of themselves, proprietors of SNSs, and other malicious users. Nigeria was conducted. The schools were Federal University Firstly, users, either intentionally or unintentionally, of Technology, Minna, and Ibrahim Badamasi Babangida expose themselves to privacy risks. While users could University, Lapai, both in Niger State, and University of unintentionally self-breach their privacy [18], many, Abuja, in the Federal Capital Territory. The survey took however, often display nonchalant disposition to personal place in 2014. Data were collected via questionnaires. A total privacy. Studies have shown users‟ indifference to their of 300 were distributed, while 266 were returned. Out of the privacy, leaving default security settings unchanged [19], completed and returned questionnaires, 12 were found to be and in some cases, despite being cognizant of the security invalid. The remaining 254 were consequently used for implications [20]. Unfortunately, this is more common analysis. Most of the respondents were male, 64.6% v. among young OSN users [1]. Adult users have been found to 35.4%; full-time undergraduate students, 79.5%; within the be more privacy-conscious while online [21], [22]. Self- ages of 24 – 29, 46.1%; and used Facebook, 35.8%.The breach of privacy exposes users to risks including over- demographic characteristics of the respondents are presented disclosure of information and cyber-stalking. in Table I. Secondly, OSN proprietors also expose users to privacy The questionnaire sought information on respondents‟ risks. These networks naturally thrive on their capacity to usage of online social networks, effects of and risks provide easy-to-use functionalities that encourage experienced with the usage. The 5-point Likert-type was information sharing. Unfortunately, security often suffers. used to indicate level of agreement. It consisted of SA = This is because, it is almost impossible to guarantee Strongly Agree, A = Agree, N = Neutral, D = Disagree, and simultaneously usability, functionality, and security. Many SD = Strongly Disagree. 130 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) Figure 1. Taxonomy of OSN risks actually connected with other users they did not know TABLE I. RESPONDENTS‟ DEMOGRAPHIC CHARACTERISTICS (70.1%), have extended relationships that commenced online Freq % to offline relationship (61.0%), and used most of their time Sex on the networks for academic purposes (55.1%). In the same Male 164 64.6 vein, compared to those who have not, more students have Female 90 35.4 dated someone met on the social networks (47.6%). Total 254 100.0 However, fewer students (31.9%) reported they have sent money to their online acquaintance. On the other hand, Studentship type Undergraduate (part-time) 20 7.9 53.5% confessed they had offered financial help to friends on Undergraduate (full-time) 202 79.5 their social networks. Postgraduate (part-time) 10 3.9 On the effect of online social network use on academic Postgraduate (full-time) 22 8.7 performance, more than half of the students, 57.5%, either Total 254 100.0 agreed or strongly agreed the use had positively affected their performance. Age 18 – 23 101 39.8 B. Risks Associated with Use of Online Social Networks 24 – 29 117 46.1 30 – 35 27 10.6 Table II also contains findings on risks experienced by > 35 9 3.5 students on online social networks. With the exception of Total 254 100.0 physical threat or assault (39.7%s), most of the students reported having experienced all identified risks. These risks Online social network used Facebook 91 35.8 include identity theft (51.9%), unsolicited and irrelevant Google+ 11 4.3 messages (81.5%), information-request attack (75.9%), and Whatsapp 62 24.4 stolen password attack (66.9%). Twitter 14 5.5 2GO 29 11.4 Instagram 8 3.1 EBuddy 5 2.0 V. DISCUSSION Badoo 8 3.1 The study sought to identify the different uses of online BBM Chat 21 8.3 Yahoo Messenger 5 2.0 social networks by university students, the effect of the use Total 254 100.0 on their academics, and security risks they are exposed to while online. Students from three universities were surveyed. Findings revealed that in addition to using online social IV. RESULTS networks for academic purposes, university students also use online social networks for other purposes, including meeting A. Use of Online Social Networks and Effects on new acquaintances and even dating. Many were found to Academics have extended relationships that commenced online offline. From our findings, as presented in Table II, almost all the Evidently, this category of online social networks users feel university students, 93.3%, used online social network to very much at ease while online. They tend to develop and interact with other users. More than half of the students maintain relationships without much anxiety. These findings usually uploaded their locations while online (66.9%), agree with those of [14] and [39]. 131 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) TABLE II. USAGE OF SOCIAL NETWORK, EFFECTS OF USAGE ON ACADEMICS AND RISKS EXPERIENCED ON THE NETWORKS SA (%) A (%) N (%) D (%) SD (%) Usage I interact with friends on social media sites 162 (63.8) 75 (29.5) 4 (1.6) 6 (2.4) 7 (2.8) I have friends I interact with that I don‟t know 101 (39.8) 77 (30.3) 14 (5.5) 28 (11.0) 34 (13.4) I upload my location when I chat or upload a status 63 (24.8) 107 (42.1) 33 (13.0) 26 (10.2) 25 (9.8) I have met physically with friends met on social media sites 73 (28.7) 82 (32.3) 18 (7.1) 48 (18.9) 33 (13.0) I have sent money to friends on social media sites 28 (11.0) 53 (20.9) 37 (14.6) 58 (22.8) 78 (30.7) I have met and dated someone via social media sites 57 (22.4) 64 (25.2) 34 (13.4) 52 (20.5) 47 (18.5) I use most of my time on social media for academic purposes 68 (26.8) 72 (28.3) 49 (19.3) 36 (14.2) 29 (11.4) Effects of usage on academics My usage of social media sites has affected my academic 75 (29.5) 71 (28.0) 38 (15.0) 34 (13.4) 36 (14.2) performance in a positive way Usage risks I have been physically threatened or assaulted by any of my 40 (15.7) 61 (24.0) 41 (16.1) 51 (20.1) 61 (24.0) friends from these social networking sites I have experienced some identity theft online (i.e. someone 57 (22.4) 75 (29.5) 50 (19.7) 42 (16.5) 30 (11.8) posing as you on the net with your correct details) I have received unsolicited and irrelevant messages on my social 93 (36.6) 114 (44.9) 27 (10.6) 11 (4.3) 9 (3.5) media account Someone sent me a message on social networking sites 72 (28.3) 121 (47.6) 29 (11.4) 20 (7.9) 12 (4.7) requesting for my confidential details I have experienced inability to log into any social networking 58 (22.8) 112 (44.1) 43 (16.9) 23 (9.1) 18 (7.1) sites due to my password being no longer correct However, many students seemed to care less about their Consequently, the need for the students to be more security security. The online networks may have become so natural aware while using these networks cannot be over- an ambience that many use them without consideration for emphasized. their privacy and security. For instance, most of the students reveal locations while online. This has been referred to as REFERENCES unintentional self-breach of privacy [18]. Findings also [1] D. M. Boyd and N. B. Ellison, “Social Network Sites : Definition , reveled most of the students having connections they were History , and Scholarship Social Network Sites : A Definition,” J. actually not familiar with. These confirm findings in Comput. Commun., vol. 13, no. 1, pp. 210–230, 2007. previous studies that categorized young users of online social [2] C. Steinfield, N. B. Ellison, C. Lampe, and J. Vitak, “Online social network sites and the concept of social capital,” Front. New Media networks as indifferent about protecting their privacy [1]. Res., pp. 115–131, 2012. One reason suggested is their ignorance or limited [3] A. Ahmad, “A Short Description of Social Networking Websites And knowledge of the public nature of the internet. Its Uses,” Int. J. Adv. Comput. Sci. Appl., vol. 2, no. 2, pp. 124–128, Considering their seeming lackadaisical attitude to 2011. security, it was not surprising to that most of the students [4] C. Zhang, J. Sun, X. Zhu, and Y. Fang, “Privacy and Security for have experienced one form of attack or the other while using Online Social Networks: Challenges and Opportunities,” IEEE Netw., their online social networks. Our findings confirm existing vol. 24, no. 4, pp. 13–18, 2010. findings that identified social media sites as a veritable [5] P. Collin, K. Rahilly, I. Richardson, and A. Third, “The Benefits of platform where different attacks, including spamming [23], Social Networking Services,” 2011. identity theft [22], information-request – with the intent of [6] R. Sawyer, “The Impact of New Social Media on Intercultural Adaptation,” University of Rhode Island, 2011. launching a phishing attack [28], and assault [39], are [7] K. N. Hampton, L. S. Goulet, L. Rainie, and K. Purcell, “Social targeted at users. networking sites and our lives,” 2011. The success of most of these attacks depends to a large [8] Statista, “Number of monthly active Facebook users worldwide as of extent on the type and quantity of information that users 2nd quarter 2016 (in millions).” [Online]. Available: share online, which is a direct consequence of the level of http://www.statista.com/statistics/263424/the-largest-energy-utility- importance they attach to their privacy and security. companies-worldwide-based-on-market-value/. Consequently, the need to be more circumspect while online [9] Internet Live Stats, “Nigeria Internet Users.” [Online]. Available: cannot be overemphasized. http://www.internetlivestats.com/internet-users/nigeria/. [10] N. Okoro and K. A. Nwafo, “Social Media and Political Participation in Nigeria during the 2011 General Elections: The Lapses and the VI. CONCLUSION Lessons,” Glob. J. Arts, Humanit. Soc. Sci., vol. 1, no. 3, pp. 29–45, This study has increased our understanding of the 2013. acceptance of online social networks by students of [11] E. Usman, “How ex-General‟s daughter, Cynthia, was killed by universities in North-Central Nigeria who use them not only facebook „friends,‟” Vanguard Newspaper, 2012. for academic purpose, but also to develop and maintain [12] A. Larionovs, A. Teilans, and P. Grabusts, “CORAS for Threat and Risk Modeling in Social Networks,” Procedia Comput. Sci., vol. 43, social relationships. On the other hand, they too, like other pp. 26–32, 2015. users, are not spared by malicious users who inundate them [13] C. M. K. Cheung, P.-Y. Chiu, and M. K. O. Lee, “Online social with unsolicited and irrelevant messages, and launch other networks: Why do students use facebook?,” Comput. Human Behav., attacks to steal their online credentials and identity. vol. 27, pp. 1337–1343, 2011. 132 International Conference on Information and Communication Technology and Its Applications (ICTA 2016) [14] L. W. Vilca and M. Vallejos, “Computers in Human Behavior conference on Computer supported cooperative work, 2008, pp. 403– Construction of the Risk of Addiction to Social Networks Scale ( C r . 412. A . R . S .),” Comput. Human Behav., vol. 48, pp. 190–198, 2015. [28] T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer, “Social [15] M. L. Ybarra and K. J. Mitchell, “How Risky are Social Network Phishing ∗,” Commun. ACM, vol. 50, no. 10, pp. 94–100, 2007. Sites? A Comparison of Places Online Where Youth Sexual [29] G. Yan, G. Ghen, S. Eidenbenz, and N. Li, “Malware Propagation in Solicitation and Harassment Occurs,” Pediatrics, vol. 121, no. 2, pp. Online Social Networks: Nature, Dynamics, and Defense e350–e357, 2010. Implications,” in Proceedings of the 6th ACM Symposium on [16] W. Xie and C. Kang, “See you, see me: Teenagers‟ self-disclosure Information, Computer and Communications Security, 2011, pp. 196– and regret of posting on social network site,” Comput. Human Behav., 206. vol. 52, pp. 398–407, 2015. [30] X. Zheng, Z. Zeng, Z. Chen, Y. Yu, and C. Rong, “Detecting [17] Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. spammers on social networks,” Neuorcomputing, vol. 159, pp. 27–34, F. Cranor, “I regretted the minute I pressed share: A qualitative study 2015. of regrets on Facebook,” in Proceedings of the Seventh Symposium on [31] D. Christina, N. Fanuel, and M. Stella, “The use of social media Usable Privacy and Security, 2011, p. 10. technology in universities: A case of Solusi University, Zimbabwe,” [18] M. M. Lucas and N. Borisov, “flyByNight : Mitigating the Privacy J. Media Commun. Stud., vol. 7, no. 5, pp. 101–111, 2015. Risks of Social Networking,” in Proceedings of the 7th ACM [32] C. O. Omekwu, H. N. Eke, and N. J. Odoh, “The Use of Social workshop on Privacy in the electronic society, 2008, pp. 1–8. Networking Sites among the Undergraduate Students of University of [19] R. Gross and A. Acquisti, “Information Revelation and Privacy in Nigeria, Nsukka,” Libr. Philos. Pract., pp. 1–26, 2014. Online Social Networks (The Facebook case),” in Proceedings of the [33] M. Owusu-Acheaw and A. G. Larson, “Use of Social Media and its 2005 ACM workshop on Privacy in the electronic society, 2005, pp. Impact on Academic Performance of Tertiary Institution Students: A 71–80. Study of Students of Koforidua Polytechnic, Ghana,” J. Educ. Pract., [20] J. L. Becker and H. Chen, “Measuring privacy risk in online social vol. 6, no. 6, pp. 94–101, 2015. networks,” in Proceedings of the 2009 Workshop on Web (Vol. 2), [34] G. Beqiri, “The Impact of Social Media on Higher Education in 2009. Kosovo : The Student ‟ s Perspective,” Acad. J. Interdiscip. Stud., vol. [21] N. Li and G. Chen, “Sharing Location in Online Social Networks,” 3, no. 2, pp. 155–164, 2014. IEEE Netw., vol. 24, no. 5, pp. 20–25, 2010. [35] S. M. Abdulhamid, S. Ahmad, V. O. Waziri, and F. N. Jibril, [22] A. Nosko, E. Wood, and S. Molema, “All about me : Disclosure in “Privacy and National Security Issues in Social Networks : The online social networking profiles : The case of FACEBOOK,” Challenges,” Int. J. Comput. Internet Manag., vol. 19, no. 3, pp. 14– Comput. Human Behav., vol. 26, pp. 406–418, 2010. 20, 2011. [23] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, “All Your Contacts [36] W. Gharibi and M. Shaabi, “Cyber Threats In Social Networking Are Belong to Us : Automated Identity Theft Attacks on Social Websites,” Int. J. Distrib. Parallel Syst., vol. 3, no. 1, pp. 119–126, Networks,” in Proceedings of the 18th international conference on 2012. World Wide Web, 2009, pp. 551–560. [37] S. M. Abdulhamid, H. T. Abdulazeez, O. Abraham, and U. [24] G. Cecere, F. Le Guel, and N. Soulie, “Perceived internet privacy Mohammed, “Analyzing Membership Profile Privacy Issues in concerns on social networks in Europe,” Technol. Forecast. Soc. Online Social Networks,” IUP J. Inf. Technol., vol. 7, no. 3, pp. 32– Change, vol. 96, pp. 277–287, 2015. 44, 2011. [25] C. Patsakis, A. Zigomitros, and A. Papageorgiou, “Distributing [38] S. Gangopadhyay and D. Dhar, “Social networking sites and privacy privacy policy over multimedia content across multiple online social issues concerning youths,” Glob. Media J. - Indian Ed., vol. 5, no. 1, networks,” Comput. Networks, vol. 75, pp. 531–543, 2014. pp. 1–7, 2014. [26] A. Vishwanath, “Habitual Facebook Use and its Impact on Getting [39] V. Sánchez, N. Muñoz-fernández, and R. Ortega-ruíz, “Computers in Deceived on Social Media,” J. Comput. Commun., vol. 20, no. 1, pp. Human Behavior „“ Cyberdating Q _ A ”‟: An instrument to assess 83–98, 2015. the quality of adolescent dating relationships in social networks,” [27] G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders, “Social Comput. Human Behav., vol. 48, pp. 78–86, 2015. networks and context-aware spam,” in Proceedings of the 2008 ACM 133