Abstract

The Internet has become a ubiquitous medium that absorbs a greater proportion of our time. In addition to its unquestionable advantages, it presents a number of threats to the security of its users. The aim of the article is to analyse the ways in which individuals in different countries use the Internet and to examine the security implications resulting from the increasing popularity of the medium. The study demonstrates the results of a research conducted in the years 2018-2019 on a population of 562 Internet users from three countries: Spain, Poland and Turkey. The analysis of the results creates a gloomy picture of network users, who - despite risk awareness - do little to defend themselves against the threats until personally affected.

Highlights

  • The Internet is one of the basic sources of information and tools of communication

  • According to the “Digital 2019” Report, 360 million new Internet users appeared in the year 2018

  • This translates into 11 new users per second, i.e. an average of one million new users every day

Read more

Summary

Introduction

The Internet is one of the basic sources of information and tools of communication. Nowadays, the majority of people in developed and developing countries has Internet access. According to the “Digital 2019” Report, 360 million new Internet users appeared in the year 2018. This translates into 11 new users per second, i.e. an average of one million new users every day. 4.388 billion people, i.e. 57% of the global population is online. This constitutes a growth of 9% with respect to the previous. The Internet may be a cause of financial and valuable information losses, a source of health issues and emotional disturbances, and it may have a negative impact on our view of the world and the moral sphere (Grabowska, 2017). The objective of this article is to analyze the methods of Internet use from the perspective of user safety

The Review of Literature Concerning Risks of Internet Usage
The Objectives and Description of the Research Sample
Information security activities
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call