Authors retain the copyright without restrictions for their published content in this journal. HSSR is a SHERPA ROMEO Green Journal.
Publishing License
This is an open-access article distributed under the terms of
Cybersecurity and Cyberthreats in Social Media
Corresponding Author(s) : Agnieszka Orłowska
Humanities & Social Sciences Reviews,
Vol. 10 No. 6 (2022): November
Abstract
Purpose of the study: This study aimed to explore cyber-security and cyber threats in social media. It includes an analysis of how social media is used as a tool for cyberattacks, the kinds of cyberattacks, and what people are doing to prevent them.
Methodology: The paper was prepared using the critical literature review method, mainly in cybersecurity and cyber threats in social media.
Main findings: Cybersecurity experts have warned that social media sites like Facebook, Twitter, and Instagram are particularly vulnerable to cyber-attacks because they are used extensively by companies and governments to distribute propaganda, to launch cyberattacks and are full of personal information (like passwords) that can be valuable to criminals.
Application of the study: The presented article refers to cybersecurity and cyber threats in social media. It implies reflections in such scientific fields as, among others, security sciences.
The study's originality: The study identifies cyber security measures used to handle the identified threats.
Keywords
Download Citation
Endnote/Zotero/Mendeley (RIS)BibTeX
- Herath, T., Khanna, P., & Ahmed, M. (2022). Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal Of Cybersecurity and Privacy, 2(1), 1-18. https://doi.org/10.3390/jcp2010001 DOI: https://doi.org/10.3390/jcp2010001
- Khan, N., Ikram, N., Murtaza, H., & Asadi, M. (2021). Social media users and cybersecurity awareness: predicting self-disclosure using a hybrid artificial intelligence approach. Kybernetes. https://doi.org/10.1108/k-05-2021-0377. DOI: https://doi.org/10.1108/K-05-2021-0377
- Lande, D., Puchkov, O., & Subach, I. (2020). System for analyzing big data on cybersecurity issues from social media. Information Technology and Security, 8(1), 4-18. https://doi.org/10.20535/2411-1031.2020.8.1.217993. DOI: https://doi.org/10.20535/2411-1031.2020.8.1.217993
- Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659-671. https://doi.org/10.1016/j.bushor.2021.02.022. DOI: https://doi.org/10.1016/j.bushor.2021.02.022
- Lindsay, J. (2015). Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal Of Cybersecurity. https://doi.org/10.1093/cyber/tyv003 DOI: https://doi.org/10.1093/cybsec/tyv003
- Park, J., & Kwon, H. (2021). Cyberattack detection model using community detection and text analysis on social media. ICT Express. https://doi.org/10.1016/j.icte.2021.12.003. DOI: https://doi.org/10.1016/j.icte.2021.12.003
- Snider, K., Shandler, R., Zandani, S., & Canetti, D. (2021). Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. Journal Of Cybersecurity, 7(1). https://doi.org/10.1093/cyber/tyab019. DOI: https://doi.org/10.1093/cybsec/tyab019
- Thakur, K., Hayajneh, T., & Tseng, J. (2019). Cyber Security in social media: Challenges and the Way Forward. IT Professional, 21(2), 41-49. https://doi.org/10.1109/mitp.2018.2881373. DOI: https://doi.org/10.1109/MITP.2018.2881373
- van der Walt, E., Eloff, J., & Grobler, J. (2018). Cyber-security: Identity deception detection on social media platforms. Computers &Amp; Security, 78, 76-89. https://doi.org/10.1016/j.cose.2018.05.015. DOI: https://doi.org/10.1016/j.cose.2018.05.015
References
Herath, T., Khanna, P., & Ahmed, M. (2022). Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal Of Cybersecurity and Privacy, 2(1), 1-18. https://doi.org/10.3390/jcp2010001 DOI: https://doi.org/10.3390/jcp2010001
Khan, N., Ikram, N., Murtaza, H., & Asadi, M. (2021). Social media users and cybersecurity awareness: predicting self-disclosure using a hybrid artificial intelligence approach. Kybernetes. https://doi.org/10.1108/k-05-2021-0377. DOI: https://doi.org/10.1108/K-05-2021-0377
Lande, D., Puchkov, O., & Subach, I. (2020). System for analyzing big data on cybersecurity issues from social media. Information Technology and Security, 8(1), 4-18. https://doi.org/10.20535/2411-1031.2020.8.1.217993. DOI: https://doi.org/10.20535/2411-1031.2020.8.1.217993
Lee, I. (2021). Cybersecurity: Risk management framework and investment cost analysis. Business Horizons, 64(5), 659-671. https://doi.org/10.1016/j.bushor.2021.02.022. DOI: https://doi.org/10.1016/j.bushor.2021.02.022
Lindsay, J. (2015). Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack. Journal Of Cybersecurity. https://doi.org/10.1093/cyber/tyv003 DOI: https://doi.org/10.1093/cybsec/tyv003
Park, J., & Kwon, H. (2021). Cyberattack detection model using community detection and text analysis on social media. ICT Express. https://doi.org/10.1016/j.icte.2021.12.003. DOI: https://doi.org/10.1016/j.icte.2021.12.003
Snider, K., Shandler, R., Zandani, S., & Canetti, D. (2021). Cyberattacks, cyber threats, and attitudes toward cybersecurity policies. Journal Of Cybersecurity, 7(1). https://doi.org/10.1093/cyber/tyab019. DOI: https://doi.org/10.1093/cybsec/tyab019
Thakur, K., Hayajneh, T., & Tseng, J. (2019). Cyber Security in social media: Challenges and the Way Forward. IT Professional, 21(2), 41-49. https://doi.org/10.1109/mitp.2018.2881373. DOI: https://doi.org/10.1109/MITP.2018.2881373
van der Walt, E., Eloff, J., & Grobler, J. (2018). Cyber-security: Identity deception detection on social media platforms. Computers &Amp; Security, 78, 76-89. https://doi.org/10.1016/j.cose.2018.05.015. DOI: https://doi.org/10.1016/j.cose.2018.05.015