INFORMATION CHANGE THE WORLD

International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449 (Print), ISSN: 2076-9539 (Online)

Published By: MECS Press

IJWMT Vol.6, No.2, Mar. 2016

Research on Wireless Network Security Awareness of Average Users

Full Text (PDF, 294KB), PP.21-29


Views:81   Downloads:10

Author(s)

Paschal A. Ochang, Philip J. Irving, Paulinus O. Ofem

Index Terms

WLAN;Network security;Security Policy;Employee behavior;Statistical analysis

Abstract

Network insecurity has become an increasing problem in the world of computer networks. Technical experts have tried to combat this by improving the technical awareness of the threats and technical solutions involved in Wireless Local Networks (WLAN) through technical reports and policy enforcement. The average users' knowledge and awareness of network security, how they react to the warnings and implement security measures is also very important. Current studies on users' awareness of security policies, whether it has been communicated well enough and how aware WLAN users are to the threats and issues involved are still not fully ascertained. To fill this gap it is important to find out the users basic knowledge of the security measures and policies. In this paper, statistical methods were developed and adopted in other to compare the knowledge of Information Technology (IT) related employees and that of non-technical employees on how aware they are of WLAN security threats and security measures. The techniques the paper has adopted revealed the knowledge gap between non-technical and technical users. This revelation is significant and therefore requiring more efficient methods for creating awareness on WLAN threats and countermeasures among average users.

Cite This Paper

Paschal A. Ochang, Philip J. Irving, Paulinus O. Ofem,"Research on Wireless Network Security Awareness of Average Users", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.6, No.2, pp.21-29, 2016.DOI: 10.5815/ijwmt.2016.02.03

Reference

[1]Herath, T. and H. Rao, Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 2009. 47(2): p.154-165. 

[2]Park, J.S. and D. Dicoi, WLAN security: current and future. IEEE Internet Computing, 2003. 7(5): p. 60-65.

[3]Miller, S.K., Facing the challenge of wireless security. Computer, 2001. 34(7): p.16-18.

[4]K. Summers, W.C. and A. DeJoie. Wireless security techniques: an overview. 2004: ACM

[5]Arbaugh, W.A., Wireless security is different. Computer, 2003. 36(8): p. 99-101.

[6]Russell, S. F. Wireless network security for users, 2001. IEEE, p. 172-177

[7]Durbin, S. (2011). Tackling converged threats: building a security-positive environment. Network Security (6): 5-8

[8]Chenoweth, T., R. Minch, and S. Tabor. User security behavior on wireless networks: An empirical study. 2007: IEEE

[9]Dourish, P., et al., Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 2004. 8(6): p. 391-401

[10]Lapiotis, G., Kim, B., Das, S. & Anjum, F. A policy-based approach to wireless LAN security management, 2005. IEEE, p. 181-189

[11]Manley, M., Mcentee, C., Molet, A. & Park, J. Wireless security policy development for sensitive organizations, 2005. IEEE, p. 150-157

[12]Mishra, S. & Dhillon, G. Information systems security governance research: a behavioral perspective, 2006. p. 27-35

[13]Likert, R., A Technique for the Measurement of Attitudes. Archives of Psychology 140, 1932. p. 1–55.

[14]Nagashree R N, Vibha Rao, Aswini N,"Near Field Communication", IJWMT, vol.4, no.2, pp.20-30, 2014.DOI: 10.5815/ijwmt.2014.02.03

[15]Gu Jiantao,Fu Jinghong,Wu Tao,"Analysis of Current Wireless Network Security", IJEME, vol.2, no.10, pp.34-38, 2012.