SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1425
A SURVEY ON SOCIAL NETWORKING AND AWARENESS ABOUT
RELATED CYBER THREATS AMONG YOUTH IN GOVERNMENT
INSTITUTIONS OF INDIA AND AN ATTEMPT TO EDUCATE THEM
D A Prathima Mathias1, Suma B2
1Assistant Professor, Department of Chemistry, I.D.S.G. Government College, Chikkamagaluru- 577102,
Karnataka, India
2Assistant Professor, Department of Library Science, I.D.S.G. Government College, Chikkamagaluru- 577102,
Karnataka, India.
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Renaissance in communication has occurred with
rise in concept of internet. Internet offers easy access to
information, its retention and reproduction features at finger
tips. The phenomenal growth in Information and Technology
has led to its extensive usage among children, adolescents,
youth, adults and aged. Smart phones at low cost with still
lower data plans have made digitization of India a reality.
Internet banking, online education, online shopping,
matrimonial sites etc. are few advantages of digitization. In
India the highly populated sector belongstoyouth whoarethe
main internet users. In this present study a survey using
questionnaires adopting random selection method was
performed. Its main intention was to study social networking
abilities and cybercrime awareness among our college
students who are aged between 19-24 years. Analysis showed
that 23.1% of our major consumers of internet (youth of our
college) use it only for social networking, 9.33% have never
used education related websites, 77.5% students have social
media account with 20% of them using it since more than 2
years. 40% of them have more friends online than in real life,
for 34.1% of them social media is the only time pass and most
of them between 7 to 9 PM. However 70% of them agree that
it affects their studies. It is alarming that 75% of students are
unaware of cybercrimes, but, 90% of them wanted to know
about it. Government colleges in Karnataka provide free
laptops for students belonging to Scheduled caste and
Scheduled tribes and free internet facilities in library and
college campus for all students. Moreover 95% of students
have internet on their mobiles, hence providing them
necessary information on cyber safety was our first priority
which was achieved by instruction through seminar.
Key Words: Survey, Digitization, Youth, Social media,
Seminar
1. INTRODUCTION
Advances in Information Technology have has shrunk the
globe and made every information easily available with just
a swipe. Smart phones with touch screen facilities provide
audio-visual effects and please the senses. A call from Sri.
Narendra Modi for digitization of India has made internet
and online transactions a necessary commodity. Beitonline
purchases, bill payments,reservationbookingsfortravel and
entertainment, bank transactions etc. all have reduced the
burden of long ques in our highly populated country. The
fancy world displayed in mobiles is so attractive that our
younger generation prefers socializing over phone more
convenient and comfortable than in reality. Free time of
youth only leads to mobile based interactions. They are all
the while stuck in social networking. A social networking
site is an online platform that allows users to create public
profile to interact with others on that particular web site. In
such platforms an unending friend list who are long lost
along with new ones get on added by the user. Our present
generation is aware of utilizing these platforms but is
uneducated about its darker sides. Cybercrime by hackers
and social engineers is logarithmically increasing. Innocent
youth are honey trapped not only in India but across the
world. It is a well-known fact that computing in education
has helped in conveying abstract ideas to students more
conveniently. Hence, Government of Karnataka hasbrought
to affect various student benefitting schemes under which
edusat, inflibnet facility in library, online browsingfacility in
colleges and free lap tops for Scheduled caste and tribes are
important. It is our primordial responsibility as a part of
education system to see that these facilities are effectively
and safely utilized. There is no syllabusoftheuniversity that
educated students about various types of cybercrime,
different cyber security options and cyber safety. The
present study aims at understanding the level of social
networking among youth of our college and analyzing their
knowledge about cybercrime and related aspects. A simple
survey would only lead to data collection only, hence, we
have conducted a seminar covering various aspects of
cybercrime to bring about effective teaching and learning.
2. REVIEW OF LITERATURE
Shalini Gupta et al. (2017) in their research paper suggest
that internet is a world of opportunities for young people
and hence associated risk management is necessary. They
feel that children and adolescents need be made resilient by
providing digital literacy and cyber safety skills.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1426
Dhruv Gupta (2016) emphasizes that cybercrime and social
media go hand in hand. Social Media Marketing demands its
customer to reveal their location and phone numbers, this
gives an easy platform for hackers to commit crime. Social
Media Marketing are also responsible for violation of
Intellectual Property Rights.
Anantha Krishna et al. (2017) in their paper conclude that
current attacks mainly use social platforms as delivery
mechanisms. Social accounts can be easily used to hack
authentic credentials with every login. They not only define
different types of cyber-attacks on social networks but also
related issues
3. OBJECTIVES
A. To know the extent of utilization of internet among
them with purpose and preferences.
B. To analyze students’ knowledge about types of
social media.
C. To analyze students exposure age to social media.
D. To analyze time at which students are online on
social media.
E. To know about widely used social media andreason
behind its utilization.
F. To study level of understanding about advantages
and disadvantages of social media.
G. To analyze the extent of knowledge on legal acts
regarding cybercrime.
H. To analyze the level of awareness about cybercrime
and cyber security among students.
I. To analyze the type of education about cybercrime
needed by the students.
J. To conduct a seminar on cybercrime with special
emphasis on social media.
K. To collect student feedback on seminar.
4. SIGNIFICANCE OF THE STUDY
Students are the largest consumers of data facilities. They
are addicted to many social networking sites. Hence, it is a
student’s right to be aware of the cyber threats and its
consequences. Moreover Government provides free laptop
facilities to underprivileged students and internet facility to
all classes of students. As faculty, it is our responsibility to
ensure that these facilities are utilized safely and effectively.
Having chosen a Government college for the present study
enables us to understand the cosmopolitan nature of
students who hail from both rural and urban background.
This study was essential and will help the Government to
understand the importance of incorporating cyber
awareness programmes in regular curriculum of every
University and for every branch of study.
5. METHODOLOGY
Location of study: Indavara Doddasiddalinge Gowdar
College (IDSG) a Government college of Chikkamagaluru
District, Karnataka State, India was chosen for this study.
This institution offers both Post graduation and Under
Graduation courses in science, commerce and arts. It is
affiliated to Kuvempu University and is the only degree
college in the district to offer wide options in studies to
students. Student population for the academic year2018-19
is 2500 hailing from both urban and rural background. This
large population can be used as a representation for all
Government college students in the state.
Method: Personal Information Schedule (PIS) Survey
questions were framed by the authors based on various
Social networking, cyber securities etc. These survey
questionnaires were typed, photocopied and used.
One day seminar was conducted on “Cybercrime” – Latest
trends and challenges. It’s detection, investigation and
conviction (Cyber legal challenges), dated 17th September
2018 at Sri. I.S. Mallegowda Auditorium, I.D.S.G. College,
Chikkamagaluru 577 102, Karnataka, India. Mr. Annamalai
K. IPS, DCP (South) Bangalore [Ex SP, Chikkamagaluru
District] was the chief guest and resource person for the
seminar. He spoke on all aspects covering the title of the
seminar.
Population and sample size
Both Under Graduate and Post Graduate students aged
between 18-21 years form the populationforthisstudy. The
method adopted was probability simple random sampling.
Total population of the college was 2,500 hence 250
questionnaires covering various aspects of cybercrime and
cyber security were distributed. And all of them were
collected after completion. Only questions and
corresponding answers relevant to social media are
presented in this paper.
Due to space limitation of the auditorium, only 120 students
of the college were registered and allowed to attend the
seminar as shown in Figure-1.
6. ANALYSIS AND INTERPRETATION
Survey questions covering purpose of internet usage,
cybercrime awareness and necessary mode of education
about cyber security were framed under three main
categories as mentioned below. The data obtained under
various headings were analyzed, percentage calculated and
pie charts plotted.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1427
6.1 Following key points were prepared to identify
the MAIN PURPOSE OF USING INTERNET (Charts 1 – 17)
6.1.1 Do you have internet on your mobile handset?
6.1.2 What was / is primary purpose of the usage?
6.1.3 Do you know about the following social networks?
(Assertive answers are considered here)
6.1.4 Do you have social networking account? (FACEBOOK,
LINKEDIN, YAHOO, GOOGLE PLUS etc.)
6.1.5 If you have a social networking accounts which one
among these?
6.1.6 How long have you been using social network
websites?
6.1.7 Why do you use social networks?
6.1.8 Do you have more friends on social media than you do
in your real life?
6.1.9 How often do you access your social networking
account?
6.1.10 At what time are you most active on social media?
6.1.11 Are your parents aware of your social networking
activities?
6.1.12 Have you changed security settings for your social
media accounts?
6.1.13 Is using online social networking useful and essential
for today’s life?
6.1.14 Do you think social networking helps you in your
studies by any means?
6.1.15 What are the best advantages of social network?
6.1.16 Do you think social networking gives negative effects
on your studies by any means?
6.1.17 What are the worst disadvantages of social network?
6.2 LEGAL AWARENESS was assessed using key points
as below. (Charts 18 -20)
6.2.1 Are you aware that watsapp group admin is legally
liable if objectionable information is posted by any member
of the group?
6.2.2 Admin is liable under which IPC (Indian Penal Court)?
6.2.3 How aware are you about cybercrime?
6.3 REMEDY FOR LEGAL IGNORANCE was determined
using below mentioned key points (Charts 21 a, b and c)
6.3.1 Has your college helped you know about cybercrimes?
6.3.2 Are you interested in knowing about cybercrimes?
6.3.3 What type of knowledge sharing about cybercrime
would you like from your college?
6.1 MAIN PURPOSE OF USING INTERNET
6.1.1 Do you have internet on your mobile handset?
YES NO
0
20
40
60
80
100
Percentage
Reply
Chart-1:
Percentage
of students
having
interneton
mobile
6.1.2 What was / is primary purpose of the usage?
WORK / BANKING/ APPLICATIONS
SOCIAL MEDIA
SEARCH ENGINES FOR KNOWLEDGE
BOTH A AND B
ALL OF THESE
NONE OF THESE
0 5 10 15 20 25 30
Percentage
Purpose
Chart-2:
Percentage of
students using
internet for
different
purposes
6.1.3 Do you know about the following social networks?
(Assertive answers are considered here)
FACE BOOK
WATSAPP
TWITTER
LINKEDLN
BLOG
GOOGLE+
ACADEMIA/EDUC/TEACHER.EDU/TUTORIALS.EDU
RESEARCH GATE
GOOGLE SCHOLAR
YOU TUBE
0 5 10 15 20 25
Percentage
Typesofsocialnetwork
Chart-3:
Percentag
e of
students
aware of
different
types of
social
networks
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1428
6.1.4 Do you have social networking account?
(FACEBOOK, LINKEDIN, YAHOO, GOOGLE PLUS)
7.5%
15%
77.5%
YES
NO
NEUTRAL
Chart-4:
Percentage of
students
having social
networking
account
6.1.5 If you have a social networkingaccountswhichone
among these?
2.34%
2.34%
3.91%
15.6%
2.34%
21.1%
2.34%
5.47%
26.6%
18%
FACE BOOK, WATSAPP
TWITTER, LINKEDLN
YOU TUBE, BLOG
GOOGLE+, ACADEMIA/EDUC/TEACHER.EDU/TUTORIALS.EDU
RESEARCH GATE, GOOGLE SCHOLAR
Chart-5:
Percentage of
students
having
differenttypes
of social
networking
accounts
6.1.6 How long have you been using social network
websites?
20%
35%
17.5%
10% 17.5%
LESS THAN 1 MONTH, 1-6 MONTHS
6-1 YEAR, 1-2 YEARS
MORE THAN 2 YEARS
Chart-6:
period since
which
students are
using social
networking
account
6.1.7 Why do you use social networks?
0%
61.8%
20%
18.2%
FOR FRIENDS, TIME PASS/FOR FUN
IT IS HIGHLY INFORMATIVE, PRESTIGE ISSUE
Chart-7:
Purpose for
which
students use
social network
6.1.8 Do you have more friends on socialmediathanyou
do in your real life?
2.5%
57.5%
40%
YES
NO
NEUTRAL
Chart-8:
Percentage
students
having more
friends online
6.1.9 How often do you access your social networking
account?
0%
34.1%
22.7%
2.27%0%
2.27%
6.82%
6.82%
25%
ONCE DAILY, ONCE WEEKLY
HOURLY, ONCE A MONTH
NEVER, EVERY FEW MINUTES (TAKE A PEEK)
WHENVER BORED AND HAVE NOTHING TO DO,
WHENEVER I HAVE TIME
WHENEVER IT BUZZES
Chart-9: Social
network
accessing
frequency
6.1.10 At what time are you most active onsocialmedia?
0%
37.2%
37.2%
4.65%2.33%0%4.65%
14%
0%
5-7 AM, 7-9 AM, 9-11 AM, 11-12 NOON
1-3 PM, 3-5 PM, 5-7 PM, 7-9 PM
AFTER 9 PM
Chart-10:
Social
network
accessing time
frequency
6.1.11 Are your parents aware ofyoursocialnetworking
activities?
20%
24%
56%
YES
NO
NEUTRAL
Chart-11:
Parents
aware of
students
social
networking
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1429
6.1.12 Have you changed securitysettingsforyoursocial
media accounts?
2.5%
30%
67.5%
YES
NO
NEUTRAL
Chart-12:
Percentage
of students
who use
security
settings in
profiles
6.1.13 Is using online social networking useful and
essential for today’s life?
2.5%
2.5%
95%
YES
NO
NEUTRAL
Chart-13:
Percentage
of students
feeling
social
networking
essential
6.1.14 Do you think social networking helps you in your
studies by any means?
12.5%
7.5%
80%
YES
NO
NEUTRAL
Chart-14:
Percentage of
students
feeling social
networking
helps in studies
6.1.15 What are the best advantages of social network?
1.89%
50.9%
34%
7.55%
5.66%
MEET NEW PEOPLE, HELPS SOCIALIZE
TOUCH WITH FRIENDS, HELPS TO LEARN TECHNOLOGY
NO ADVANTAG
Chart-15:
Advantages
of social
networking
6.1.16 Do you think social networking gives negative
effects on your studies by any means?
2.5%
27.5%
70%
YES
NO
NEUTRAL
Chart-16:Social
networking
affecting studies
6.1.17 What are the worst disadvantages of social
network?
9.76%
39%
19.5%
9.76%
22%
NO PRIVACY
ACADAMIC HINDERANCE
DECREASES/DESTROYS SOCIAL SKILLS
LESSENS PHYSICAL ACTIVITY AND RESULS IN HEALTH ISSUES
NEUTRAL
Chart-17:
Disadvantages
of social
networking
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1430
6.2 LEGAL AWARENESS
6.2.1 Are you aware that watsapp group admin islegally
liable if objectionable information is posted by any
member of the group?
10%
45%
45%
YES
NO
NEUTRAL
Chart-18:
Legal issues
in social
networking
part (a)
6.2.2 Admin is liable under which IPC (Indian Penal
Court)?
10%
40%
50%
DON'T KNOW
FORGOT
NEUTRAL
Chart-19:
Legal issues
in social
networking
part (b)
6.2.3 How aware are you about cybercrime?
25%
50%
22.5%
2.5%
VERY WELL
I KNOW ABOUT IT
NOT SO WELL
DON'T KNOW
Chart-20:
Legal issues in
social
networking
part (c)
6.3 REMEDY FOR LEGAL IGNORANCE
6.3.1 Has your college helped you know about
cybercrimes?
92.5%
7.5%
YES
NO
Chart-21:
Cybercrime
awareness
part (a)
6.3.2 Are you interested in knowing about cybercrimes?
7.5%
2.5%
90%
YES
NO
NOT SURE
Chart-21:
Cybercrime
awareness part
(b)
6.3.3 What type of knowledge sharing about cybercrime
would you like from your college?
12.5%
20%
60%
0%
7.5%
MAGAZINE ARTICLES, HAND BILLS
SEMINAR, WORKSHOP
NOT NEEDED
Chart-21:
Cybercrime
awareness
part (c)
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1431
Figure – 1: Seminar on Cybercrime dated 17th September
2018 at IDSG Govt College, Chikkamagaluru, Karnataka,
India. Resource person : Mr. Annamalai K. IPS, DCP
(South) Bangalore.
7. RESULTS
7.1 MAIN PURPOSE OF USING INTERNET
Around 95% of students use mobile for surfing (Chart – 1).
28.2 % of Students mainly browse search engines for
knowledge and 23.1 % for social media, around 10-30 % of
students make multiple uses of internet (Chart – 2). All
students are aware of different types of social networking
sites in different proportions. However, maximum
percentage of students are well aware of Facebook – 24.8%,
you tube – 11.7 % and WhatsApp – 11. 7 % (Chart – 3).
Students with a valid social networking account are 77.5%
(Chart – 4). Out of these 26.6 % have WhatsApp and 18 %
have Facebook accounts (Chart – 5). 25 % of students are
using social networking sites from 1-2 years, 20 % of
students are more than two years old to these (Chart –
6)types.
61.8 % Students find social networks informative 20 % of
them use it for time pass or fun and 18.2 % for friends (Chart
– 7). Around 40% of students have more friends on social
media than in real life (Chart – 8). 34.1 % of students access
social media whenever they have time, 22.7 % students
make themselves busy on social media whenever they are
bored and 25 % of them at least once daily (Chart – 9). 37.2
% of students are active either between 6-9 PM of after9PM
and 14 % are active between 7-9 AM (Chart – 10). When
asked about parent’s awareness about their social
networking activity, 24 % said no and 20 % refused to
answer (Chart – 11).
Social networking shouldbe securehence,whenaskedabout
security settings done by them 67.5 % have done such
settings and 30% have not, however the neutral 2.5 % are
unaware of such options (Chart – 12).
Majority of students – 95 % feel that social networking is
useful and essential in today’s life (Chart – 13). Only 7.5 %
students feel that it never helps in studies (Chart – 14). Out
of majority students who feel that social networkinghelps in
studies 50.9 % have an opinion that it helps learning
technology and 34 % want to maintain contacts with friends
only (Chart – 15). Students feel that along with advantages
social network is disadvantageous. 70 % of them feel it is
disadvantageous while 27.5 % disagree (Chart – 16). These
27.5 % along with students who feel social networking
disadvantageous agree to the fact that more usage of social
networking leads to lessening of physical activity leading to
diseases (39 %), there is no privacy (22 %), decreases or
destroys social skills (19.5 %) and is an academic hindrance
(9.76 %) (Chart – 17).
7.2 LEGAL AWARENESS
Around 45 % of students (Chart – 18)are both aware and
unaware that watsapp admin is liable to punishment if
members of a group make objectionable posts and 50 % do
not know the IPC sections under which such admins are
punishable (Chart – 19 a -c). Only 22.5 % of students know
something about cybercrimes (Chart – 20).
7.3 REMEDY FOR LEGAL IGNORANCE
Students have not been educated about cybercrimeand92.5
% voted this (Chart – 21 a) and 90 % of students were
interested in knowing about it (Chart – 21 b). 60 % of
students wanted to know about cybercrime and
cybersecurity through seminar, 20%throughworkshop, 7.5
% through magazine and 12.5 % needed no such education
(Chart – 21 c).
8. DISCUSSION AND CONCLUSION
Rise in usage of technology has restricted youth activities to
mobile screens. Extensive usage of social media has fetched
them many friends online who are both known and
strangers. In this era when social engineering for
committing crime has picked up pace, it is essential that our
students are aware of loop holes of Social Medias. We the
authors strictly recommend cybercrime and cyber security
to be included in regular syllabus and be taught effectivelyin
detail with collaboration between Education Department
and Police Department of the District. Only this type of
initiative can create a healthy social environment for the
highly populated class in our country – Youth.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1432
9 RECOMMENDATIONS
Mr. Annamalai K. summarizing his speech told that Use of
phones, computers and mobiles cannot be terminated.
Youth can however minimize cyber-attacks by adopting
following tips:
1) Never disclose your personal information.
2) Be careful while uploading your photos.
3) Do not send or accept friend requests from unknown
persons.
4) Use legal anti-virus and internet security.
5) Create strong alphanumeric passwords with a
combination of numbers + lower case + upper case
alphabets.
6) Use two factor (2FA) authentications.
7) Do not click on links in emails unless you are 100 %
certain.
8) Do not disclose your personal banking
username/password/ATM pin numbers/OTP’s to
anybody.
9) Never install 3rd party apps, software, cracks etc.
10) Make sure you have activated sms + email alerts of all
transactions so that you are alerted immediately of
wrong transactions.
11) Use virtual keyboards while typing passwords.
12) Avoid logging into net banking anywhere other than
your trusted network like your house or your mobile.
13) Avoid using unsecure public Wi-Fi network oraccessing
account from cyber café’s or LAN PC’s
10 ACKNOWLEDGEMENTS
Authors wish to thank Principal of IDSGGovernmentCollege
for permitting us to conduct this student survey. The
objectives of this paper could be completed only because of
Mr. Annamalai K. IPS, Deputy Commissioner of Police
(South), Bangalore, Karnataka, India [Ex Superintendent of
Police, Chikkamagaluru District], wethank him profuselyfor
being the chief guest and resource person fortheseminar on
“Cybercrime” – Latest trends and challenges. It’s detection,
investigation and conviction (Cyber legal challenges), held
on 17th September 2018 at Sri. I.S. Mallegowda Auditorium,
I.D.S.G. College, Chikkamagaluru 577 102, Karnataka, India,
and sharing his valuable time and knowledge with us
through effective and relevant presentation.
11 REFERENCES
[1] Shalini Gupta, Anamika Singh, Sheela Kumari and
Neelma Kunwar, “Impact of cybercrime on adolescents
through social networking sites”, International Journal
of Law, Vol. 3, Nov. 2017, pp. 104-106.
[2] Dhruv Gupta, “Cybercrime and social mediamarketing”,
Bharati Law Review, July-Sep, 2016.
[3] V. Anantha Krishna and Devender Nayak N., “A general
study on cyber-attacks on social networks”, Journal of
Computer Engineering, Vol. 19, Sep-Oct 2017, pp. 01-04
DOI 10.9790/iosrjournals 0661-1905050104.

More Related Content

What's hot

Tren IT menuju 2020 dan eLearning
Tren IT menuju 2020 dan eLearningTren IT menuju 2020 dan eLearning
Tren IT menuju 2020 dan eLearning
Stanley Karouw
 
Use of Social Media by Urban Indian Youth and its impact on Social Behavior
Use of Social Media by Urban Indian Youth and its impact on Social BehaviorUse of Social Media by Urban Indian Youth and its impact on Social Behavior
Use of Social Media by Urban Indian Youth and its impact on Social Behavior
National Institute of Mass Communication and Journalism, Ahmedabad
 
NIMCJ Media Consumption Survey During National Lockdown Due to COVID-19
NIMCJ Media Consumption Survey During National Lockdown Due to COVID-19NIMCJ Media Consumption Survey During National Lockdown Due to COVID-19
NIMCJ Media Consumption Survey During National Lockdown Due to COVID-19
National Institute of Mass Communication and Journalism, Ahmedabad
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using Smartphones
IJCI JOURNAL
 
Tugas Bahasa Inggris
Tugas Bahasa InggrisTugas Bahasa Inggris
Tugas Bahasa Inggris
JennyAnggraeni
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
AIRCC Publishing Corporation
 
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
ijcsit
 
A comparative analysis of e readiness assessment in nigerian
A comparative analysis of e readiness assessment in nigerianA comparative analysis of e readiness assessment in nigerian
A comparative analysis of e readiness assessment in nigerian
Alexander Decker
 
Perceived Security
Perceived SecurityPerceived Security
Perceived Security
afahamid
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
Alexander Decker
 
Academic and research libraries in the digital environment. challenges and pr...
Academic and research libraries in the digital environment. challenges and pr...Academic and research libraries in the digital environment. challenges and pr...
Academic and research libraries in the digital environment. challenges and pr...
Alexander Decker
 
Face Recognition Using ML in Public Transports
Face Recognition Using ML in Public TransportsFace Recognition Using ML in Public Transports
Face Recognition Using ML in Public Transports
ijtsrd
 
Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...
ijtsrd
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...
IJCSES Journal
 
research methodology Reviews
research methodology  Reviewsresearch methodology  Reviews
research methodology Reviews
Ashutosh Singh
 
Evaluation of Game-Based Learning in Cybersecurity Education for High School ...
Evaluation of Game-Based Learning in Cybersecurity Education for High School ...Evaluation of Game-Based Learning in Cybersecurity Education for High School ...
Evaluation of Game-Based Learning in Cybersecurity Education for High School ...
Journal of Education and Learning (EduLearn)
 
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET Journal
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Nzeih Chukwuemeka
 
IRJET- Social Media Effect on Youth
IRJET-  	  Social Media Effect on YouthIRJET-  	  Social Media Effect on Youth
IRJET- Social Media Effect on Youth
IRJET Journal
 
Improving the Information System of Tourist Destinations in the Context of th...
Improving the Information System of Tourist Destinations in the Context of th...Improving the Information System of Tourist Destinations in the Context of th...
Improving the Information System of Tourist Destinations in the Context of th...
ijtsrd
 

What's hot (20)

Tren IT menuju 2020 dan eLearning
Tren IT menuju 2020 dan eLearningTren IT menuju 2020 dan eLearning
Tren IT menuju 2020 dan eLearning
 
Use of Social Media by Urban Indian Youth and its impact on Social Behavior
Use of Social Media by Urban Indian Youth and its impact on Social BehaviorUse of Social Media by Urban Indian Youth and its impact on Social Behavior
Use of Social Media by Urban Indian Youth and its impact on Social Behavior
 
NIMCJ Media Consumption Survey During National Lockdown Due to COVID-19
NIMCJ Media Consumption Survey During National Lockdown Due to COVID-19NIMCJ Media Consumption Survey During National Lockdown Due to COVID-19
NIMCJ Media Consumption Survey During National Lockdown Due to COVID-19
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using Smartphones
 
Tugas Bahasa Inggris
Tugas Bahasa InggrisTugas Bahasa Inggris
Tugas Bahasa Inggris
 
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
Emerging Applications on Smart Phones: The Role of Privacy Concerns and its A...
 
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
THE VICES OF SOCIAL MEDIA ON STUDENTS SUCCESS AT THE ADAMAWA STATE POLYTECHNI...
 
A comparative analysis of e readiness assessment in nigerian
A comparative analysis of e readiness assessment in nigerianA comparative analysis of e readiness assessment in nigerian
A comparative analysis of e readiness assessment in nigerian
 
Perceived Security
Perceived SecurityPerceived Security
Perceived Security
 
Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...Personal factors as predictors of content specific use of the internet by aja...
Personal factors as predictors of content specific use of the internet by aja...
 
Academic and research libraries in the digital environment. challenges and pr...
Academic and research libraries in the digital environment. challenges and pr...Academic and research libraries in the digital environment. challenges and pr...
Academic and research libraries in the digital environment. challenges and pr...
 
Face Recognition Using ML in Public Transports
Face Recognition Using ML in Public TransportsFace Recognition Using ML in Public Transports
Face Recognition Using ML in Public Transports
 
Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...Strategic Database Security Management and Cybercrime Reduction among Youths ...
Strategic Database Security Management and Cybercrime Reduction among Youths ...
 
Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...Most Cited Articles in Academia - International Journal of Computer Science a...
Most Cited Articles in Academia - International Journal of Computer Science a...
 
research methodology Reviews
research methodology  Reviewsresearch methodology  Reviews
research methodology Reviews
 
Evaluation of Game-Based Learning in Cybersecurity Education for High School ...
Evaluation of Game-Based Learning in Cybersecurity Education for High School ...Evaluation of Game-Based Learning in Cybersecurity Education for High School ...
Evaluation of Game-Based Learning in Cybersecurity Education for High School ...
 
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
IRJET- Awareness and Knowledge about Android Smartphones Security among Ghana...
 
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder ApproachChild Online Protection in Nigeria: The need for a Multistakeholder Approach
Child Online Protection in Nigeria: The need for a Multistakeholder Approach
 
IRJET- Social Media Effect on Youth
IRJET-  	  Social Media Effect on YouthIRJET-  	  Social Media Effect on Youth
IRJET- Social Media Effect on Youth
 
Improving the Information System of Tourist Destinations in the Context of th...
Improving the Information System of Tourist Destinations in the Context of th...Improving the Information System of Tourist Destinations in the Context of th...
Improving the Information System of Tourist Destinations in the Context of th...
 

Similar to IRJET- A Survey on Social Networking and Awareness About Related Cyber Threats Among Youth in Government Institutions of India and an Attempt to Educate them

Unveiling the Influence of Social Media on Academic Performance: A Case Study...
Unveiling the Influence of Social Media on Academic Performance: A Case Study...Unveiling the Influence of Social Media on Academic Performance: A Case Study...
Unveiling the Influence of Social Media on Academic Performance: A Case Study...
IRJET Journal
 
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
ijtsrd
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
June Wall
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Nat Rice
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
SamanthaCossart
 
Icp assignment 2 a_group 11_project plan
Icp assignment 2 a_group 11_project planIcp assignment 2 a_group 11_project plan
Icp assignment 2 a_group 11_project plan
Nhật Anh Nguyễn
 
Effect of Gadget on student.pdf
Effect of Gadget on student.pdfEffect of Gadget on student.pdf
Effect of Gadget on student.pdf
MandeepMehta7
 
204
204204
Top Cited Articles International Journal of Managing Information Technology (...
Top Cited Articles International Journal of Managing Information Technology (...Top Cited Articles International Journal of Managing Information Technology (...
Top Cited Articles International Journal of Managing Information Technology (...
IJMIT JOURNAL
 
AN INVESTIGATION ON THE CHANGES OF SOCIAL MEDIA USE CAUSED BY COVID-19
AN INVESTIGATION ON THE CHANGES OF SOCIAL MEDIA USE CAUSED BY COVID-19AN INVESTIGATION ON THE CHANGES OF SOCIAL MEDIA USE CAUSED BY COVID-19
AN INVESTIGATION ON THE CHANGES OF SOCIAL MEDIA USE CAUSED BY COVID-19
IRJET Journal
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India
 
1 digital india implications in education sector
1 digital india implications in education sector1 digital india implications in education sector
1 digital india implications in education sector
chelliah paramasivan
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
Priscila Velázquez
 
Knowledge, awareness, and practices about government's smart city project amo...
Knowledge, awareness, and practices about government's smart city project amo...Knowledge, awareness, and practices about government's smart city project amo...
Knowledge, awareness, and practices about government's smart city project amo...
MiHika SenGupta
 
Investigating Smartphone Users’ Attitude and Intention Technology Acceptance ...
Investigating Smartphone Users’ Attitude and Intention Technology Acceptance ...Investigating Smartphone Users’ Attitude and Intention Technology Acceptance ...
Investigating Smartphone Users’ Attitude and Intention Technology Acceptance ...
ijtsrd
 
local_media5375011518898876798.docx
local_media5375011518898876798.docxlocal_media5375011518898876798.docx
local_media5375011518898876798.docx
CCSSenatorAbogadoAj
 
Artificial Intelligence A Boon in Expanding Online Education through Social M...
Artificial Intelligence A Boon in Expanding Online Education through Social M...Artificial Intelligence A Boon in Expanding Online Education through Social M...
Artificial Intelligence A Boon in Expanding Online Education through Social M...
ijtsrd
 
The Impact of Information Technology Integration on Government Services Repre...
The Impact of Information Technology Integration on Government Services Repre...The Impact of Information Technology Integration on Government Services Repre...
The Impact of Information Technology Integration on Government Services Repre...
ijtsrd
 
Effect of Social Media on Consumer Buying Behaviour of Students in Tertary In...
Effect of Social Media on Consumer Buying Behaviour of Students in Tertary In...Effect of Social Media on Consumer Buying Behaviour of Students in Tertary In...
Effect of Social Media on Consumer Buying Behaviour of Students in Tertary In...
ijtsrd
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
ggfg123
 

Similar to IRJET- A Survey on Social Networking and Awareness About Related Cyber Threats Among Youth in Government Institutions of India and an Attempt to Educate them (20)

Unveiling the Influence of Social Media on Academic Performance: A Case Study...
Unveiling the Influence of Social Media on Academic Performance: A Case Study...Unveiling the Influence of Social Media on Academic Performance: A Case Study...
Unveiling the Influence of Social Media on Academic Performance: A Case Study...
 
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...
 
Digital citizenship @ your school
Digital citizenship @ your schoolDigital citizenship @ your school
Digital citizenship @ your school
 
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Icp assignment 2 a_group 11_project plan
Icp assignment 2 a_group 11_project planIcp assignment 2 a_group 11_project plan
Icp assignment 2 a_group 11_project plan
 
Effect of Gadget on student.pdf
Effect of Gadget on student.pdfEffect of Gadget on student.pdf
Effect of Gadget on student.pdf
 
204
204204
204
 
Top Cited Articles International Journal of Managing Information Technology (...
Top Cited Articles International Journal of Managing Information Technology (...Top Cited Articles International Journal of Managing Information Technology (...
Top Cited Articles International Journal of Managing Information Technology (...
 
AN INVESTIGATION ON THE CHANGES OF SOCIAL MEDIA USE CAUSED BY COVID-19
AN INVESTIGATION ON THE CHANGES OF SOCIAL MEDIA USE CAUSED BY COVID-19AN INVESTIGATION ON THE CHANGES OF SOCIAL MEDIA USE CAUSED BY COVID-19
AN INVESTIGATION ON THE CHANGES OF SOCIAL MEDIA USE CAUSED BY COVID-19
 
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...IET India Advisory: Safeguarding children from cyber threats in times of a pa...
IET India Advisory: Safeguarding children from cyber threats in times of a pa...
 
1 digital india implications in education sector
1 digital india implications in education sector1 digital india implications in education sector
1 digital india implications in education sector
 
Digital Citizenship
Digital CitizenshipDigital Citizenship
Digital Citizenship
 
Knowledge, awareness, and practices about government's smart city project amo...
Knowledge, awareness, and practices about government's smart city project amo...Knowledge, awareness, and practices about government's smart city project amo...
Knowledge, awareness, and practices about government's smart city project amo...
 
Investigating Smartphone Users’ Attitude and Intention Technology Acceptance ...
Investigating Smartphone Users’ Attitude and Intention Technology Acceptance ...Investigating Smartphone Users’ Attitude and Intention Technology Acceptance ...
Investigating Smartphone Users’ Attitude and Intention Technology Acceptance ...
 
local_media5375011518898876798.docx
local_media5375011518898876798.docxlocal_media5375011518898876798.docx
local_media5375011518898876798.docx
 
Artificial Intelligence A Boon in Expanding Online Education through Social M...
Artificial Intelligence A Boon in Expanding Online Education through Social M...Artificial Intelligence A Boon in Expanding Online Education through Social M...
Artificial Intelligence A Boon in Expanding Online Education through Social M...
 
The Impact of Information Technology Integration on Government Services Repre...
The Impact of Information Technology Integration on Government Services Repre...The Impact of Information Technology Integration on Government Services Repre...
The Impact of Information Technology Integration on Government Services Repre...
 
Effect of Social Media on Consumer Buying Behaviour of Students in Tertary In...
Effect of Social Media on Consumer Buying Behaviour of Students in Tertary In...Effect of Social Media on Consumer Buying Behaviour of Students in Tertary In...
Effect of Social Media on Consumer Buying Behaviour of Students in Tertary In...
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
Nada Hikmah
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
LAXMAREDDY22
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
shahdabdulbaset
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
ydzowc
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
PKavitha10
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
SakkaravarthiShanmug
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 

Recently uploaded (20)

Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
Curve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods RegressionCurve Fitting in Numerical Methods Regression
Curve Fitting in Numerical Methods Regression
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
BRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdfBRAIN TUMOR DETECTION for seminar ppt.pdf
BRAIN TUMOR DETECTION for seminar ppt.pdf
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Hematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood CountHematology Analyzer Machine - Complete Blood Count
Hematology Analyzer Machine - Complete Blood Count
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
原版制作(Humboldt毕业证书)柏林大学毕业证学位证一模一样
 
CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1CEC 352 - SATELLITE COMMUNICATION UNIT 1
CEC 352 - SATELLITE COMMUNICATION UNIT 1
 
cnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classicationcnn.pptx Convolutional neural network used for image classication
cnn.pptx Convolutional neural network used for image classication
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 

IRJET- A Survey on Social Networking and Awareness About Related Cyber Threats Among Youth in Government Institutions of India and an Attempt to Educate them

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1425 A SURVEY ON SOCIAL NETWORKING AND AWARENESS ABOUT RELATED CYBER THREATS AMONG YOUTH IN GOVERNMENT INSTITUTIONS OF INDIA AND AN ATTEMPT TO EDUCATE THEM D A Prathima Mathias1, Suma B2 1Assistant Professor, Department of Chemistry, I.D.S.G. Government College, Chikkamagaluru- 577102, Karnataka, India 2Assistant Professor, Department of Library Science, I.D.S.G. Government College, Chikkamagaluru- 577102, Karnataka, India. ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Renaissance in communication has occurred with rise in concept of internet. Internet offers easy access to information, its retention and reproduction features at finger tips. The phenomenal growth in Information and Technology has led to its extensive usage among children, adolescents, youth, adults and aged. Smart phones at low cost with still lower data plans have made digitization of India a reality. Internet banking, online education, online shopping, matrimonial sites etc. are few advantages of digitization. In India the highly populated sector belongstoyouth whoarethe main internet users. In this present study a survey using questionnaires adopting random selection method was performed. Its main intention was to study social networking abilities and cybercrime awareness among our college students who are aged between 19-24 years. Analysis showed that 23.1% of our major consumers of internet (youth of our college) use it only for social networking, 9.33% have never used education related websites, 77.5% students have social media account with 20% of them using it since more than 2 years. 40% of them have more friends online than in real life, for 34.1% of them social media is the only time pass and most of them between 7 to 9 PM. However 70% of them agree that it affects their studies. It is alarming that 75% of students are unaware of cybercrimes, but, 90% of them wanted to know about it. Government colleges in Karnataka provide free laptops for students belonging to Scheduled caste and Scheduled tribes and free internet facilities in library and college campus for all students. Moreover 95% of students have internet on their mobiles, hence providing them necessary information on cyber safety was our first priority which was achieved by instruction through seminar. Key Words: Survey, Digitization, Youth, Social media, Seminar 1. INTRODUCTION Advances in Information Technology have has shrunk the globe and made every information easily available with just a swipe. Smart phones with touch screen facilities provide audio-visual effects and please the senses. A call from Sri. Narendra Modi for digitization of India has made internet and online transactions a necessary commodity. Beitonline purchases, bill payments,reservationbookingsfortravel and entertainment, bank transactions etc. all have reduced the burden of long ques in our highly populated country. The fancy world displayed in mobiles is so attractive that our younger generation prefers socializing over phone more convenient and comfortable than in reality. Free time of youth only leads to mobile based interactions. They are all the while stuck in social networking. A social networking site is an online platform that allows users to create public profile to interact with others on that particular web site. In such platforms an unending friend list who are long lost along with new ones get on added by the user. Our present generation is aware of utilizing these platforms but is uneducated about its darker sides. Cybercrime by hackers and social engineers is logarithmically increasing. Innocent youth are honey trapped not only in India but across the world. It is a well-known fact that computing in education has helped in conveying abstract ideas to students more conveniently. Hence, Government of Karnataka hasbrought to affect various student benefitting schemes under which edusat, inflibnet facility in library, online browsingfacility in colleges and free lap tops for Scheduled caste and tribes are important. It is our primordial responsibility as a part of education system to see that these facilities are effectively and safely utilized. There is no syllabusoftheuniversity that educated students about various types of cybercrime, different cyber security options and cyber safety. The present study aims at understanding the level of social networking among youth of our college and analyzing their knowledge about cybercrime and related aspects. A simple survey would only lead to data collection only, hence, we have conducted a seminar covering various aspects of cybercrime to bring about effective teaching and learning. 2. REVIEW OF LITERATURE Shalini Gupta et al. (2017) in their research paper suggest that internet is a world of opportunities for young people and hence associated risk management is necessary. They feel that children and adolescents need be made resilient by providing digital literacy and cyber safety skills.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1426 Dhruv Gupta (2016) emphasizes that cybercrime and social media go hand in hand. Social Media Marketing demands its customer to reveal their location and phone numbers, this gives an easy platform for hackers to commit crime. Social Media Marketing are also responsible for violation of Intellectual Property Rights. Anantha Krishna et al. (2017) in their paper conclude that current attacks mainly use social platforms as delivery mechanisms. Social accounts can be easily used to hack authentic credentials with every login. They not only define different types of cyber-attacks on social networks but also related issues 3. OBJECTIVES A. To know the extent of utilization of internet among them with purpose and preferences. B. To analyze students’ knowledge about types of social media. C. To analyze students exposure age to social media. D. To analyze time at which students are online on social media. E. To know about widely used social media andreason behind its utilization. F. To study level of understanding about advantages and disadvantages of social media. G. To analyze the extent of knowledge on legal acts regarding cybercrime. H. To analyze the level of awareness about cybercrime and cyber security among students. I. To analyze the type of education about cybercrime needed by the students. J. To conduct a seminar on cybercrime with special emphasis on social media. K. To collect student feedback on seminar. 4. SIGNIFICANCE OF THE STUDY Students are the largest consumers of data facilities. They are addicted to many social networking sites. Hence, it is a student’s right to be aware of the cyber threats and its consequences. Moreover Government provides free laptop facilities to underprivileged students and internet facility to all classes of students. As faculty, it is our responsibility to ensure that these facilities are utilized safely and effectively. Having chosen a Government college for the present study enables us to understand the cosmopolitan nature of students who hail from both rural and urban background. This study was essential and will help the Government to understand the importance of incorporating cyber awareness programmes in regular curriculum of every University and for every branch of study. 5. METHODOLOGY Location of study: Indavara Doddasiddalinge Gowdar College (IDSG) a Government college of Chikkamagaluru District, Karnataka State, India was chosen for this study. This institution offers both Post graduation and Under Graduation courses in science, commerce and arts. It is affiliated to Kuvempu University and is the only degree college in the district to offer wide options in studies to students. Student population for the academic year2018-19 is 2500 hailing from both urban and rural background. This large population can be used as a representation for all Government college students in the state. Method: Personal Information Schedule (PIS) Survey questions were framed by the authors based on various Social networking, cyber securities etc. These survey questionnaires were typed, photocopied and used. One day seminar was conducted on “Cybercrime” – Latest trends and challenges. It’s detection, investigation and conviction (Cyber legal challenges), dated 17th September 2018 at Sri. I.S. Mallegowda Auditorium, I.D.S.G. College, Chikkamagaluru 577 102, Karnataka, India. Mr. Annamalai K. IPS, DCP (South) Bangalore [Ex SP, Chikkamagaluru District] was the chief guest and resource person for the seminar. He spoke on all aspects covering the title of the seminar. Population and sample size Both Under Graduate and Post Graduate students aged between 18-21 years form the populationforthisstudy. The method adopted was probability simple random sampling. Total population of the college was 2,500 hence 250 questionnaires covering various aspects of cybercrime and cyber security were distributed. And all of them were collected after completion. Only questions and corresponding answers relevant to social media are presented in this paper. Due to space limitation of the auditorium, only 120 students of the college were registered and allowed to attend the seminar as shown in Figure-1. 6. ANALYSIS AND INTERPRETATION Survey questions covering purpose of internet usage, cybercrime awareness and necessary mode of education about cyber security were framed under three main categories as mentioned below. The data obtained under various headings were analyzed, percentage calculated and pie charts plotted.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1427 6.1 Following key points were prepared to identify the MAIN PURPOSE OF USING INTERNET (Charts 1 – 17) 6.1.1 Do you have internet on your mobile handset? 6.1.2 What was / is primary purpose of the usage? 6.1.3 Do you know about the following social networks? (Assertive answers are considered here) 6.1.4 Do you have social networking account? (FACEBOOK, LINKEDIN, YAHOO, GOOGLE PLUS etc.) 6.1.5 If you have a social networking accounts which one among these? 6.1.6 How long have you been using social network websites? 6.1.7 Why do you use social networks? 6.1.8 Do you have more friends on social media than you do in your real life? 6.1.9 How often do you access your social networking account? 6.1.10 At what time are you most active on social media? 6.1.11 Are your parents aware of your social networking activities? 6.1.12 Have you changed security settings for your social media accounts? 6.1.13 Is using online social networking useful and essential for today’s life? 6.1.14 Do you think social networking helps you in your studies by any means? 6.1.15 What are the best advantages of social network? 6.1.16 Do you think social networking gives negative effects on your studies by any means? 6.1.17 What are the worst disadvantages of social network? 6.2 LEGAL AWARENESS was assessed using key points as below. (Charts 18 -20) 6.2.1 Are you aware that watsapp group admin is legally liable if objectionable information is posted by any member of the group? 6.2.2 Admin is liable under which IPC (Indian Penal Court)? 6.2.3 How aware are you about cybercrime? 6.3 REMEDY FOR LEGAL IGNORANCE was determined using below mentioned key points (Charts 21 a, b and c) 6.3.1 Has your college helped you know about cybercrimes? 6.3.2 Are you interested in knowing about cybercrimes? 6.3.3 What type of knowledge sharing about cybercrime would you like from your college? 6.1 MAIN PURPOSE OF USING INTERNET 6.1.1 Do you have internet on your mobile handset? YES NO 0 20 40 60 80 100 Percentage Reply Chart-1: Percentage of students having interneton mobile 6.1.2 What was / is primary purpose of the usage? WORK / BANKING/ APPLICATIONS SOCIAL MEDIA SEARCH ENGINES FOR KNOWLEDGE BOTH A AND B ALL OF THESE NONE OF THESE 0 5 10 15 20 25 30 Percentage Purpose Chart-2: Percentage of students using internet for different purposes 6.1.3 Do you know about the following social networks? (Assertive answers are considered here) FACE BOOK WATSAPP TWITTER LINKEDLN BLOG GOOGLE+ ACADEMIA/EDUC/TEACHER.EDU/TUTORIALS.EDU RESEARCH GATE GOOGLE SCHOLAR YOU TUBE 0 5 10 15 20 25 Percentage Typesofsocialnetwork Chart-3: Percentag e of students aware of different types of social networks
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1428 6.1.4 Do you have social networking account? (FACEBOOK, LINKEDIN, YAHOO, GOOGLE PLUS) 7.5% 15% 77.5% YES NO NEUTRAL Chart-4: Percentage of students having social networking account 6.1.5 If you have a social networkingaccountswhichone among these? 2.34% 2.34% 3.91% 15.6% 2.34% 21.1% 2.34% 5.47% 26.6% 18% FACE BOOK, WATSAPP TWITTER, LINKEDLN YOU TUBE, BLOG GOOGLE+, ACADEMIA/EDUC/TEACHER.EDU/TUTORIALS.EDU RESEARCH GATE, GOOGLE SCHOLAR Chart-5: Percentage of students having differenttypes of social networking accounts 6.1.6 How long have you been using social network websites? 20% 35% 17.5% 10% 17.5% LESS THAN 1 MONTH, 1-6 MONTHS 6-1 YEAR, 1-2 YEARS MORE THAN 2 YEARS Chart-6: period since which students are using social networking account 6.1.7 Why do you use social networks? 0% 61.8% 20% 18.2% FOR FRIENDS, TIME PASS/FOR FUN IT IS HIGHLY INFORMATIVE, PRESTIGE ISSUE Chart-7: Purpose for which students use social network 6.1.8 Do you have more friends on socialmediathanyou do in your real life? 2.5% 57.5% 40% YES NO NEUTRAL Chart-8: Percentage students having more friends online 6.1.9 How often do you access your social networking account? 0% 34.1% 22.7% 2.27%0% 2.27% 6.82% 6.82% 25% ONCE DAILY, ONCE WEEKLY HOURLY, ONCE A MONTH NEVER, EVERY FEW MINUTES (TAKE A PEEK) WHENVER BORED AND HAVE NOTHING TO DO, WHENEVER I HAVE TIME WHENEVER IT BUZZES Chart-9: Social network accessing frequency 6.1.10 At what time are you most active onsocialmedia? 0% 37.2% 37.2% 4.65%2.33%0%4.65% 14% 0% 5-7 AM, 7-9 AM, 9-11 AM, 11-12 NOON 1-3 PM, 3-5 PM, 5-7 PM, 7-9 PM AFTER 9 PM Chart-10: Social network accessing time frequency 6.1.11 Are your parents aware ofyoursocialnetworking activities? 20% 24% 56% YES NO NEUTRAL Chart-11: Parents aware of students social networking
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1429 6.1.12 Have you changed securitysettingsforyoursocial media accounts? 2.5% 30% 67.5% YES NO NEUTRAL Chart-12: Percentage of students who use security settings in profiles 6.1.13 Is using online social networking useful and essential for today’s life? 2.5% 2.5% 95% YES NO NEUTRAL Chart-13: Percentage of students feeling social networking essential 6.1.14 Do you think social networking helps you in your studies by any means? 12.5% 7.5% 80% YES NO NEUTRAL Chart-14: Percentage of students feeling social networking helps in studies 6.1.15 What are the best advantages of social network? 1.89% 50.9% 34% 7.55% 5.66% MEET NEW PEOPLE, HELPS SOCIALIZE TOUCH WITH FRIENDS, HELPS TO LEARN TECHNOLOGY NO ADVANTAG Chart-15: Advantages of social networking 6.1.16 Do you think social networking gives negative effects on your studies by any means? 2.5% 27.5% 70% YES NO NEUTRAL Chart-16:Social networking affecting studies 6.1.17 What are the worst disadvantages of social network? 9.76% 39% 19.5% 9.76% 22% NO PRIVACY ACADAMIC HINDERANCE DECREASES/DESTROYS SOCIAL SKILLS LESSENS PHYSICAL ACTIVITY AND RESULS IN HEALTH ISSUES NEUTRAL Chart-17: Disadvantages of social networking
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1430 6.2 LEGAL AWARENESS 6.2.1 Are you aware that watsapp group admin islegally liable if objectionable information is posted by any member of the group? 10% 45% 45% YES NO NEUTRAL Chart-18: Legal issues in social networking part (a) 6.2.2 Admin is liable under which IPC (Indian Penal Court)? 10% 40% 50% DON'T KNOW FORGOT NEUTRAL Chart-19: Legal issues in social networking part (b) 6.2.3 How aware are you about cybercrime? 25% 50% 22.5% 2.5% VERY WELL I KNOW ABOUT IT NOT SO WELL DON'T KNOW Chart-20: Legal issues in social networking part (c) 6.3 REMEDY FOR LEGAL IGNORANCE 6.3.1 Has your college helped you know about cybercrimes? 92.5% 7.5% YES NO Chart-21: Cybercrime awareness part (a) 6.3.2 Are you interested in knowing about cybercrimes? 7.5% 2.5% 90% YES NO NOT SURE Chart-21: Cybercrime awareness part (b) 6.3.3 What type of knowledge sharing about cybercrime would you like from your college? 12.5% 20% 60% 0% 7.5% MAGAZINE ARTICLES, HAND BILLS SEMINAR, WORKSHOP NOT NEEDED Chart-21: Cybercrime awareness part (c)
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1431 Figure – 1: Seminar on Cybercrime dated 17th September 2018 at IDSG Govt College, Chikkamagaluru, Karnataka, India. Resource person : Mr. Annamalai K. IPS, DCP (South) Bangalore. 7. RESULTS 7.1 MAIN PURPOSE OF USING INTERNET Around 95% of students use mobile for surfing (Chart – 1). 28.2 % of Students mainly browse search engines for knowledge and 23.1 % for social media, around 10-30 % of students make multiple uses of internet (Chart – 2). All students are aware of different types of social networking sites in different proportions. However, maximum percentage of students are well aware of Facebook – 24.8%, you tube – 11.7 % and WhatsApp – 11. 7 % (Chart – 3). Students with a valid social networking account are 77.5% (Chart – 4). Out of these 26.6 % have WhatsApp and 18 % have Facebook accounts (Chart – 5). 25 % of students are using social networking sites from 1-2 years, 20 % of students are more than two years old to these (Chart – 6)types. 61.8 % Students find social networks informative 20 % of them use it for time pass or fun and 18.2 % for friends (Chart – 7). Around 40% of students have more friends on social media than in real life (Chart – 8). 34.1 % of students access social media whenever they have time, 22.7 % students make themselves busy on social media whenever they are bored and 25 % of them at least once daily (Chart – 9). 37.2 % of students are active either between 6-9 PM of after9PM and 14 % are active between 7-9 AM (Chart – 10). When asked about parent’s awareness about their social networking activity, 24 % said no and 20 % refused to answer (Chart – 11). Social networking shouldbe securehence,whenaskedabout security settings done by them 67.5 % have done such settings and 30% have not, however the neutral 2.5 % are unaware of such options (Chart – 12). Majority of students – 95 % feel that social networking is useful and essential in today’s life (Chart – 13). Only 7.5 % students feel that it never helps in studies (Chart – 14). Out of majority students who feel that social networkinghelps in studies 50.9 % have an opinion that it helps learning technology and 34 % want to maintain contacts with friends only (Chart – 15). Students feel that along with advantages social network is disadvantageous. 70 % of them feel it is disadvantageous while 27.5 % disagree (Chart – 16). These 27.5 % along with students who feel social networking disadvantageous agree to the fact that more usage of social networking leads to lessening of physical activity leading to diseases (39 %), there is no privacy (22 %), decreases or destroys social skills (19.5 %) and is an academic hindrance (9.76 %) (Chart – 17). 7.2 LEGAL AWARENESS Around 45 % of students (Chart – 18)are both aware and unaware that watsapp admin is liable to punishment if members of a group make objectionable posts and 50 % do not know the IPC sections under which such admins are punishable (Chart – 19 a -c). Only 22.5 % of students know something about cybercrimes (Chart – 20). 7.3 REMEDY FOR LEGAL IGNORANCE Students have not been educated about cybercrimeand92.5 % voted this (Chart – 21 a) and 90 % of students were interested in knowing about it (Chart – 21 b). 60 % of students wanted to know about cybercrime and cybersecurity through seminar, 20%throughworkshop, 7.5 % through magazine and 12.5 % needed no such education (Chart – 21 c). 8. DISCUSSION AND CONCLUSION Rise in usage of technology has restricted youth activities to mobile screens. Extensive usage of social media has fetched them many friends online who are both known and strangers. In this era when social engineering for committing crime has picked up pace, it is essential that our students are aware of loop holes of Social Medias. We the authors strictly recommend cybercrime and cyber security to be included in regular syllabus and be taught effectivelyin detail with collaboration between Education Department and Police Department of the District. Only this type of initiative can create a healthy social environment for the highly populated class in our country – Youth.
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 11 | Nov 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1432 9 RECOMMENDATIONS Mr. Annamalai K. summarizing his speech told that Use of phones, computers and mobiles cannot be terminated. Youth can however minimize cyber-attacks by adopting following tips: 1) Never disclose your personal information. 2) Be careful while uploading your photos. 3) Do not send or accept friend requests from unknown persons. 4) Use legal anti-virus and internet security. 5) Create strong alphanumeric passwords with a combination of numbers + lower case + upper case alphabets. 6) Use two factor (2FA) authentications. 7) Do not click on links in emails unless you are 100 % certain. 8) Do not disclose your personal banking username/password/ATM pin numbers/OTP’s to anybody. 9) Never install 3rd party apps, software, cracks etc. 10) Make sure you have activated sms + email alerts of all transactions so that you are alerted immediately of wrong transactions. 11) Use virtual keyboards while typing passwords. 12) Avoid logging into net banking anywhere other than your trusted network like your house or your mobile. 13) Avoid using unsecure public Wi-Fi network oraccessing account from cyber café’s or LAN PC’s 10 ACKNOWLEDGEMENTS Authors wish to thank Principal of IDSGGovernmentCollege for permitting us to conduct this student survey. The objectives of this paper could be completed only because of Mr. Annamalai K. IPS, Deputy Commissioner of Police (South), Bangalore, Karnataka, India [Ex Superintendent of Police, Chikkamagaluru District], wethank him profuselyfor being the chief guest and resource person fortheseminar on “Cybercrime” – Latest trends and challenges. It’s detection, investigation and conviction (Cyber legal challenges), held on 17th September 2018 at Sri. I.S. Mallegowda Auditorium, I.D.S.G. College, Chikkamagaluru 577 102, Karnataka, India, and sharing his valuable time and knowledge with us through effective and relevant presentation. 11 REFERENCES [1] Shalini Gupta, Anamika Singh, Sheela Kumari and Neelma Kunwar, “Impact of cybercrime on adolescents through social networking sites”, International Journal of Law, Vol. 3, Nov. 2017, pp. 104-106. [2] Dhruv Gupta, “Cybercrime and social mediamarketing”, Bharati Law Review, July-Sep, 2016. [3] V. Anantha Krishna and Devender Nayak N., “A general study on cyber-attacks on social networks”, Journal of Computer Engineering, Vol. 19, Sep-Oct 2017, pp. 01-04 DOI 10.9790/iosrjournals 0661-1905050104.