Critical Cybersecurity Risk Factors in Digital Social Media: Analysis of Information Security Requirements
2016-06-27 19:00:54   来源:   评论:0 点击:

Abstract—Digital Social Media provides an excellent communication platform through countless application such as online forums, chatting channels, video streaming and blogs. The greatest technological invention ever discovered and gaining fast popularity globally among internet user. Unfortunately, Social Media comes with several risks, especially the cybersecurity risks that could cause serious impacts to the cyber community. Cybersecurity risks are currently becoming serious issues in Social Media. The excitement of sharing their activities, statuses, locations, feelings, they do not realize that the information they shared could contribute to the critical cybersecurity risks. Hence, the objectives of the research are to determine the critical cybersecurity risks in social media digital platforms; and to discuss their criticalness for three information security core principles. Questionnaires were distributed to various cyber community, including professional and non-professional user that commonly used social media digital. The findings show that the most critical cybersecurity risks on the three core principles of information security requirements are Identity Theft; Information Manipulation; Cyber Assault/ Bullying; Information Theft; Espionage; and Privacy Violation. Findings also highlights other critical cybersecurity risk factors in digital social media. Through the findings, cyber community would be able to identify the critical cybersecurity risk factors and address them effectively. 
Index Terms—cybersecurity risk, digital social media, internet society, privacy violations, identity theft, social engineering

Cite: Nik Zulkarnaen Khidzir, Ahmad Rasdan Ismail, Khairul Azhar Mat Daud, Mohamad Shahfik Afendi Abdul Ghani, and Mohd Asrul Hery Ibrahim, "Critical Cybersecurity Risk Factors in Digital Social Media: Analysis of Information Security Requirements," Lecture Notes on Information Theory, Vol. 4, No. 1, pp. 18-24, June 2016. doi: 10.18178/lnit.4.1.18-24


上一篇:Analysis of LDPC Codes in DSRC System’s Application
下一篇:A Conceptual Framework Secure Web Service: Secure Transaction Logging System

分享到: 收藏