Introduction
Internet safety has become a significant concern in the current era of technology. Organizations and individuals use the internet extensively, but it exposes them to cybersecurity risks. Individual Internet users face security challenges such as cyberbullying and cyberstalking. Conversely, organizations and industries investing heavily in internet usage face security risks such as malware, phishing, and targeted attacks. Such risks can be overcome in various ways, including creating strong passwords, training about internet safety, relevant threat models, two-factor authentication, and avoiding unknown links (Smalls & Wilson, 2021). Such strategies foster the physical and psychological safety of internet users. Likewise, security strategies ensure that organizations’ operations continue uninterrupted. Thus, the literature review will discuss the challenges associated with safe internet, an organization that has dealt with them, potential solutions, a recommendation, and its implementation.
Literature Review
Problems Associated with Safe Internet
At the industrial level, literature by Tawalbeh et al. (2020) shows that cybersecurity and privacy risks, such as jamming and spoofing threats, are the most significant internet safety concerns. Currently, many industries have adopted the Internet of Things (IoT) technology. IoT encompasses connecting multiple devices over a single network through which they communicate. Such a network is vulnerable to access by unknown and unauthorized persons without the knowledge of the users. Cybersecurity and privacy challenges are most predominant in traditional technology without reinforced security models. When used with IoT devices, such systems make them vulnerable to high-profile hackers. Apart from the network, IoT devices form a system vulnerability. Most security models focus on protecting the network by developing communication protocols and implementing system scanners to survey the system. Little regard is given to individual gadgets in the system through which malware may use to infect the system without recognition (P. Romansky et al., 2020). IoT devices are also mechanically connected; thus, when a device is used to launch an attack on the system, it poses a risk to other devices. Moreover, password sharing on multiple devices challenges maintaining the confidentiality and privacy of an organization’s data. The challenge arises from the multiple usage of the password on various devices. Therefore, the interconnectivity of individual devices in an organization’s network makes the system vulnerable.
The authors P. Romansky et al. (2020) also identify social computing of internet users to endanger their private danger. Interactions among internet users take place via social networking sites that bring security vulnerability into a system or individual. Although social sites have embedded security features, they have a broad scope of users. A large group of users makes maintaining complete confidentiality with each challenging. Specifically, P. Romansky et al. (2020) identify various ways social interactions pose a security threat to other users. For instance, the literature describes the habit of people not reading the terms and conditions of social networking systems and just clicking the button ‘I agree.’ In many cases, people are unaware of what they have agreed upon, making them vulnerable to exploitation and disclosure of their sensitive information. Another risk identified by the text is that social networking sites provide an avenue for the owners to amass personal information and share it with associates. The challenge arises that agreeing to the terms and conditions gives the site owners power over sensitive information. Moreover, the storage of sensitive information on global networks makes it vulnerable to access by unauthorized people, making maintaining such data’s privacy difficult.
Cybersecurity issues like cyberbullying and cyberstalking have been clearly described in Siyam & Hussain (2021). Cyberbullying refers to the abuse of one’s power over another. Thus, cyberbullying in the context of safe internet describes how one user exploits cyberspace to cause another psychological distress. Cyberbullies mistreat the victims through hurtful words, images, or videos. With the increase in internet usage in this digital age, many undergo cyberbullying but persevere it. They overlook it because it occurs in cyberspace, but cyberbullying is vital and should be stopped because it jeopardizes the victim’s psychological health. Siyam & Hussain (2021) further mentions that the lack of regulation regarding cyberbullying makes cyberbullying prevalent. Moreover, the literature hypothesizes that cyberbullying is most significant among young people who have become the most prominent internet users. Young people without awareness of cyberbullying and without the intervention of a guardian or educator are victims and perpetrators of cyberbullying. At a young age, being the victim of cyberbullying will broadly impact their self-identity and image. The severity of the outcome calls for immediate intervention.
Kimpe et al. (2019) further discuss aggression risks that challenge creating a safe internet. The authors begin by discussing aggression risks facilitated by the anonymity of the internet. An Internet user becomes aggressive towards another when they feel superior to another. The sense of superiority drives them to want to dominate the other both in cyberspace and offline. Additionally, Kimpe et al. (2019) highlight that the ability of the oppressor to remain anonymous motivates them more. Without the fear of consequences, they hurt the other person constantly and repetitively. The increase in social media life among the youth offers more opportunities for them to harm each other.
Besides aggressive risks, the internet provides a platform for sexual and harmful information distribution risks. Kimpe et al., (2019). Sexual content can be upsetting to young people, while for some, it could be addictive. Sexual content affects the youngest children more than the older ones. The fact that such young children can access sexual images and videos without regulations makes the internet unsafe (Helzer et al., 2022). On the other hand, older children are likely to be more accommodating to sexual content. As mentioned by Kimpe et al. (2019), older children may even go ahead and create sexual content and then distribute it to their peers in a process called sexting. The issue arises when the recipient of the content decides to harm the sender by distributing private images without their consent. Such an action is called sexual extortion and can cause social isolation, depression, and suicidality. Such outcomes call interventions. Likewise, the authors Kimpe et al. (2019) also describe the harm of the false information distributed by online platforms to further some agenda. For instance, the authors describe sites that promote self-harm. Such sites give information on different ways a person can inflict injuries on themselves. They may warn the viewers, but the fact that such information exists on a public website jeopardizes the safety of internet users. Humans cannot unsee something once they perceive it. Therefore, when someone who struggles with suicidal thoughts comes across such information, they will be tempted to put it into practice.
An organization that has dealt with Issues Associated with Safe Internet
Cybersecurity and Infrastructure Security Agency (CISA) is an organization that provides solutions against cyberattacks. Specifically, CISA provides tools, resources, and services to help organizations achieve the best practices for cybersecurity, leading to the continuity of critical operations and the safety of data. CISA’s services are also available for all organizational sizes, from the smallest to the largest. CISA advises that cybersecurity is a holistic approach that begins an organization’s leadership directives and finishes with the information technology department collaborating to upgrade the infrastructure regularly (Bada et al., 2019). More than that, CISA emphasizes the significance of creating a safe cyberspace to promote business operations continuity. CISA collaborates with national agencies and international organizations, including non-profit, non-government, and academic corporations. Some of the best security practices that CISA advocates for include; using strong passwords, periodic software updates, using multifactor authentication, and thinking before clicking on a website (Smalls & Wilson, 2021). With such practices in place, an organization’s cybersecurity will be reinforced.
Major Challenges with Creating Safe Internet
The following is a summary of the significant challenges preventing the creation of safe internet. For instance, the interconnection of IoT devices via a network system makes all the users vulnerable to attacks (Bada et al., 2019). Additionally, the lack of emphasis on the safety of individual users in the network makes a weak link into the network without detection. Another safety concern is cybersecurity and aggression risk. Cyber security deals with the safety of internet users while in cyberspace. Interest users are often subjected to security risks such as hacking, sexual extortion, unauthorized access to private information, and consumption of harmful information. The situation worsens because of a lack of adequate awareness of safe internet risks (Smalls & Wilson, 2021). For instance, when signing up on social networking sites, many online users need to read the terms and conditions before accepting them. They may unconsciously provide access to their private information, which leads to heavy repercussions.
Possible Solutions to Challenges with Internet Safety
The authors Smalls & Wilson (2021) provide some safety tips for online users. They include; putting on a mask, upholding safety practices during offline periods, using relevant security models, and installing a password manager. Putting on a mask describes the practice of creating confidential solid passwords for login into public websites and shared network systems. Conversely, upholding security during offline periods is vital because the most effective attacks intrude on a network at such moments. Once the network resumes its only presence, the malware will then spread through the network, causing havoc in all connected uses and halting business operations. Likewise, installing relevant threat models to detect and respond ensures that the system and its users are not vulnerable to any risk. The authors Kimpe et al. (2019) also propose the development of legislative initiatives to control the distribution of harmful content via the Internet. They also mention that cybersecurity campaigns emphasizing individual efforts in securing cyberspace will have a big impact.
Recommendation and Its Implementation
Awareness campaigns discussed by Kimpe et al. (2019) have the most considerable impact on promoting internet safety. Therefore, implementing these campaigns and getting people and organizations altogether to invest in creating a safe online presence. The campaigns are effective because they reach minors and adults instead of focusing only on adults. That aspect is crucial as children are currently heavy internet consumers by frequently visiting social networking sites. Therefore, creating awareness of their threats provides an opportunity to engage them in their mission to form a safe internet. Additionally, awareness campaigns stimulate discussions which on the matter. The resultant debates also allow people to collectively evaluate the necessity of creating safe internet. Overall, awareness campaigns get everyone involved in fostering internet safety. More than that, Bada et al. (2019) provide various strategies to ensure the effectiveness of campaigns. The authors insist that the campaign message must be easy to understand and apply. Such a message has the power to change people’s attitudes which will reflect on their online behaviors. Another strategy is motivating people to change their online behaviors. The campaign can employ the fear appeals technique to instill fear in people about the dangers of unsafe internet. Overall, the campaign strategies will get everyone involved and motivated to uphold safe internet usage.
Conclusion
Creating a safe internet faces many challenges. They include; the interconnection of devices and systems, which makes the network vulnerable, social networking sites that violate its users’ privacy, and cyber threats. Solutions include; awareness campaigns, use of strong passwords, maintaining safety offline, and using a password manager. Awareness campaigns are the most effective strategy for creating a safe internet through collaborative efforts.
References
Bada, M., Sasse, A. M., & Nurse, J. R. C. (2019, January 9). Cyber Security Awareness Campaigns: Why do they fail to change behavior? arXiv.org. https://arxiv.org/abs/1901.02672
Durnell, E., Okabe-Miyamoto, K., Howell, R. T., & Zizi, M. (2020). Online privacy breaches, offline consequences: Construction and validation of the concerns with protecting the informational privacy scale. International Journal of Human–Computer Interaction, 36(19), 1834–1848. https://doi.org/10.1080/10447318.2020.1794626
Helzer, E. G., Cohen, T. R., & Kim, Y. (2022). The character Lens: A person-centered perspective on moral recognition and ethical decision-making. Journal of Business Ethics, 182(2), 483–500. https://doi.org/10.1007/s10551-021-05010-z
Kimpe, L., Walrave, M., Ponnet, K., & Ouytsel, J. (2019). Internet safety. The International Encyclopedia of Media Literacy, 1–11. https://doi.org/10.1002/9781118978238.ieml0093
- Romansky, R., & S. Noninska, I. (2020). Challenges of the digital age for privacy and Personal Data Protection. Mathematical Biosciences and Engineering, 17(5), 5288–5303. https://doi.org/10.3934/mbe.2020286
Siyam, N., & Hussain, M. (2021). Cyber-safety policy elements in the era of Online Learning: A content analysis of policies in the UAE. TechTrends. https://doi.org/10.1007/s11528-021-00595-8
Smalls, D., & Wilson, G. (2021). Ten quick tips for staying safe online. PLOS Computational Biology, 17(3). https://doi.org/10.1371/journal.pcbi.1008563
Tawalbeh, L., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IOT privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102. https://doi.org/10.3390/app10124102