Raising the information security awareness among social media users in the Middle East

Authors

  • Hend Khalid Alkahtani College of Computer and Information Sciences of Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia

DOI:

https://doi.org/10.20535/SRIT.2308-8893.2023.4.06

Keywords:

security, security awareness social media, WhatsApp, Twitter, Facebook

Abstract

Social media presents both opportunities and risks for any firm. The Internet has recently made everything possible. Due to its low cost and rapid speed, it is in high demand. Due to the virtual technique of interacting through various social media apps like Instagram, WhatsApp, Twitter, Facebook, etc., people are drawn to social networking. Despite the fact that it offers advantages on both sides, new threats are constantly emerging. Social media usage is widespread, but awareness is low, which makes significant cyberattacks more likely. Numerous threat categories put consumers at risk for cyber security. This research reviewed literature on educating Middle Eastern social media users about information security. Additionally, this research examines various threats made via social media, offers countermeasures, and considers various detection methods.

Author Biography

Hend Khalid Alkahtani, College of Computer and Information Sciences of Princess Nourah Bint Abdulrahman University, Riyadh

Department of Information Systems of College of Computer and Information Sciences of Princess Nourah Bint Abdulrahman University, Riyadh, Saudi Arabia.

References

L. Zhang, C. Amos, and I. Pentina, “Information Disclosure on a Chinese Social Media Platform,” J. Inf. Priv. Secur., vol. 11, no. 1, pp. 3–18, 2015. doi: 10.1080/15536548.2015.1010981

S. Rathore, P.K. Sharma, V. Loia, Y.S. Jeong, and J.H. Park, “Social network security: Issues, challenges, threats, and solutions,” Information Sciences, 421, pp. 43–69, 2017. doi: 10.1016/j.ins.2017.08.063.

M. Al-Enazi and S. El Khediri, “Advanced Classification Techniques for Improving Networks Intrusion Detection System Efficiency,” Journal of Applied Security Research, 17(1), 2021. doi: 10.1080/19361610.2021.1918500.

A. Ali, A. Kamran, M. Ahmed, B. Raza, and M. Ilyas, “Privacy concerns in online social networks: A users’ perspective,” International Journal of Advanced Computer Science and Applications, 10(7), 2019.

S. Ali, N. Islam, A. Rauf, I.U. Din, M. Guizani, and J.J. Rodrigues, “Privacy and security issues in online social networks,” Future Internet, 10(12), pp. 1–12, 2018. doi: 10.3390/fi10120114.

M. Koohikamali, D.A. Peak, and V.R. Prybutok, “Beyond self-disclosure: Disclosure of information about others in social network sites,” Comput. Human Behav., vol. 69, pp. 29–42, 2017. doi: 10.1016/j.chb.2016.12.012.

F. Aloul, “The Need for Effective Information Security Awareness,” Journal of Advances in Information Technology, 3(3), pp. 176–183, 2012. doi: 10.4304/jait.3.3.176-183.

S. Alotaibi, K. Alharbi, H. Alwabli, H. Aljoaey, B. Abaalkhail, S. El Khediri, “Threats, crimes and issues of privacy of users’ information shared on online social networks,” 2021 International Symposium on Networks, Computers and Communications (ISNCC). doi: 10.1109/ISNCC52172.2021.9615815.

Dony Martinus Sihotang et al., “Factors Affecting the Intention of Social Media Users to Disclosure Personal Information,” 2021 International Conference on Advanced Computer Science and Information Systems (ICACSIS). doi: 10.1109/ICACSIS53237.2021.9631351.

A. Ali, M. Mahmud, N. Molok, and Sh. Talib, “Information security awareness through the use of social media,” The 5th International Conference “Information and Communication Technology for The Muslim World”, 2014. doi: 10.1109/ICT4M.2014.7020668.

“Cyber security Brief Guide for Beginners: Phishing Attacks”, Cyber Coastal, 2022. Available: https://cybercoastal.com/cybersecurity-brief-guide-for-beginners-phishing-attacks/

A. Gupta, Sh. Mehetre, and A. More, “Security in Social Media,” International Research Journal of Innovations in Engineering and Technology, 5(12), pp. 40–44, 2021. doi: 10.47001/IRJIET/2021.512008.

Y. Hafsari, F. Permatasari, and N. Rahman, “A Review on Social Media Issues and Security Awareness among the users,” Journal of Applied Technology and Innovation, 1(1), pp. 28–36, 2017.

P. Potgieter, “The Awareness Behavior of Students on Cyber Security Awareness by Using Social Media Platforms: A Case Study at Central University of Technology,” Proceedings of 4th International Conference on the Internet, Cyber Security and Information Systems 2019, 12, pp. 272–280. Available: https://doi.org/10.29007/gprf

“Global Digital Statistics. GWI Social Summary. GWI Quarter Report,” Global Web Index. Accessed on: February 1, 2017. [Online]. Available: http://insight.globalwebindex.net/hsfs/hub/304927/file-2377691590-pdf/Reports/GWI_Social_Summary_Q4_2014.pdf?submissionGuid=d75c46ce922c-4efc-8ac3-08dbe9ba4904

S. Bennett, A. Bishop, B. Dalgarno, J. Waycott, and G. Kennedy, Implementing Web 2.0 technology in higher education: A collective case study. 1st ed., 2012

A. Charlesworth, An introduction to social media marketing. 1st ed. London: Routledge, 2015, 209 p.

K. Lewis, J. Kaufman, and N. Christakis, “The Taste for Privacy: An Analysis of College Student Privacy Settings in an Online Social Network,” Journal of Computer-Mediated Communication, 14(1), pp.79–100, 2008. Available: https://doi.org/10.1111/j.1083-6101.2008.01432.x

F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, “Characterizing user navigation and interactions in online social networks,” Information Sciences, 195, pp. 1–24, 2012. doi: 10.1145/1644893.1644900.

N.A. Abd Rahman, “A Review on Social Media Issues and Security Awareness among the users,” Journal of Applied Technology and Innovation, vol. 1, no. 1, pp. 28–36, 2018.

“Miniwatts Marketing Group,” 2010 Internet World Stats. Available: http://www.internetworldstats.com/stats.htm

F. Aloul, “The Need for Effective Information Security Awareness,” Journal of Advances in Information Technology, 3, pp. 176–183, 2012. doi: 10.4304/jait.3.3.176–183.

H. Almarabeh and A. Sulieman, “The impact of cyber threats on social networking sites,” International Journal of Advanced Research in Computer Science, 10(2), 2019. doi: 10.26483/ijarcs.v10i2.6384.

S. Ali, N. Islam, A. Rauf, I.U. Din, M. Guizani, and J.J. Rodrigues, “Privacy and security issues in online social networks,” Future Internet, 10(12), 2018. doi: 10.3390/fi10120114.

E. Aghasian, S. Garg, and J. Montgomery, “An automated model to score the privacy of unstructured information—Social media case,” Computers & Security, 92(3), 101778, 2020. doi: 10.1016/j.cose.2020.101778.

T.R. Soomro and M. Hussain, “Social Media-Related Cybercrimes and Techniques for Their Prevention,” Applied Computer Systems, 24(1), pp. 9–17, 2019. doi: 10.2478/acss-2019-0002.

M. Mostafa, A. Abdelwahab, and H.M. Sayed, “Detecting spam campaign in twitter with semantic similarity,” in Journal of Physics: Conference Series, vol. 1447, no. 1, p. 012044, 2020.

K. Stokes and N. Carlsson, “A peer-to-peer agent community for digital oblivion in online Social networks,” in 2013 Eleventh Annual Conference on Privacy, Security and Trust, IEEE 2013, pp. 103–110.

Downloads

Published

2023-12-26

Issue

Section

Problem- and function-oriented computer systems and networks