Cybersecurity For Children An Investigation Into The
Cybersecurity For Children An Investigation Into The
1. Introduction
1.1. Background
The revolution of communication networks and information technology contributes to the
development of various fields, industries, and consumer behaviours worldwide. The critical
turning point of this technology is Web 2.0, which is the second stage of development of
the World Wide Web. This new version of the web emphasises information sharing and
interconnectedness between users (Oztemel and Gursev 2020). In the beginning, social
media platforms such as Facebook and MySpace were created as communication tools
mainly for young people. However, these social networking sites have become the main
stream communication tools for young people of all age groups over the years of
development. According to the 2021 Children and parents: media use and attitudes report
published by OfCom (UK), 44% of 8–11-year-olds and 87% of 12–15-year-olds use social
media apps/websites (OfCom 2021). This demonstrates that social networking sites have
overtaken email as a primary communication method among young people (Cardon and
Marshall 2015). Like many things in the cyber world, social media does come with many
privacy concerns. In a journal entitled ‘Big data privacy issues in public social media, Smith
et al. (2012) show how the growing capabilities of mobile devices have a correlation with
the issues in privacy for users. They examine this in the field of big data and reveal that due
to the significant amount of data uploaded daily, it is hard for the users to realise the
immediate consequences and the future effects it can have.
As long as internet networking continues to evolve, the foremost essential thing
developers have to deal with is the security of using social media (Hiatt and Choi
2016). With a vast amount of information stored and shared online, social media
security is becoming more critical than ever. Since all connections on social net
works can create unexpected access to personal or business information, it primes
third-party to take advantage of the social network by having unauthorised access
or launching a phishing attack to steal personal information or other forms of
hacking (Das, Karmarkar, and Kamruzzaman 2019). For example, LinkedIn leaked
the users’ email addresses in 2012, and Facebook was hacked in 2016 and 2018,
exposing the personal information of its 50 million users.
This study assesses the security and privacy aspects of social media from
a Cybersecurity point of view while focusing on hackers. The paper analyzes various
unique motivations of hackers and demonstrates the mindset of why hackers want to
attack social media platforms. The paper evaluates social media as a platform and then
discusses its risks for attacks and mitigations. This study aims to further understand the
causes behind the hackers’ behaviours and provide guidance to develop effective
countermeasures. This paper aims to study the causes and consequences of security,
privacy, and hacking in social media. In order to realise these purposes, this paper uses
the Preferred Reporting Items for Systematic Review and Meta-Analysis (PRISMA)
framework to report on the literature review focused on cybersecurity for children
using social media. The paper also highlights research challenges that need to be
addressed in the future.
(1) The paper discusses contemporary issues described in social media around cyber
security and modern attacks and motivations linked to children and young people.
In addition, it analyzes and highlights the dangers of the digital footprint.
(2) The paper summarises recent statistics around Cyber attacks directed at social
media.
1498 V. CHANG ET AL.
The remainder of this paper is organised as follows: Section 2 introduces the systematic
literature review protocol followed by this paper. Section 3 provides an overview of social
media, including the definition of social media and a brief history of the development of
social media platforms. Section 4 provides a discussion on basic security in social media
and the risk of privacy issues. Section 5 introduces the hacking and explains the attacks
and motivations of hackers. We discuss the implications of our research findings between
Sections 6 and 8, including methods and recommendations for privacy on social media.
Finally, we conclude our paper in Section 9.
As a result, 272 articles were excluded for non-compliance with criteria 1 and 2, leaving 76
articles for additional assessment in the screening phase. Three or more researchers
assessed each article individually to determine whether the papers actually focused on
cybersecurity for children and social media and to evaluate their face validity. The review
team evaluated each manuscript based on its relevance to the subject matter, assigning
a score from three options: 3 for highly relevant, 2 for partially relevant, and 1 for not
ENTERPRISE INFORMATION SYSTEMS 1499
relevant. We retained articles in the dataset that were considered relevant or somewhat
relevant by at least three researchers. As a result, 54 were included in the Inclusion phase.
protection in a step-by-step methodological approach. Thus, the paper can help any
Facebook user take action to secure their account.
Lankton, McKnight, and Tripp (2017) discuss methods that social media users breach
their privacy and then offer methods to contain their personal information. The research
addresses concepts of protection. They mention how limiting the number of self-
disclosures that the users perform naturally contains the amount and significance of
personal data entering the site. This can be demonstrated by omitting information,
such as birth date, gender, and educational information. This works because it cannot
be viewed, stolen, or used if the information is not there. The authors convey how the
users can decide the variables associated with who can see their social networking site
and how the social media site does put that on to the user.
The paper also addresses the challenges associated with the privacy settings use
as it does take little effort to become ‘friends’ with a user on social media, which can
grant them access to the information. The study concludes by discussing the findings
that older users with the deepest privacy concerns and the lowest trust and technol
ogy usage perceptions are most private by having more restrictive privacy settings
use, fewer self-disclosures, and smaller network size. The study relates to other
studies by exploring the factors that often contribute to a breach of social media
privacy.
According to the current literature, several potential reasons why individuals are
attracted to cyber attacks can be summarised, including frequent use of public Wi-Fi,
using personal information to create passwords, never or rarely changing passwords, lack
of education about cyber attack methods, distrust of institutions and failure to report
(Alzubaidi, 2021).
Since then, the social media platforms or applications we use today have been develop
ing. The remainder of this section introduces the main social media platforms in the
history of social media.
The first widely recognised social media site, Six Degree, was launched in 1997, a little
over two decades ago. This site allows users to create their own profiles, invite friends, lost
family members, create groups, and send messages to other users. At that time, Six
Degree attracted about 1 million members who could create profiles and be friends
with one another (Heidemann, Klier, and Probst 2012).
Before long, LiveJournal was founded in 1999 as a blog platform allowing users to keep
friends by updating their lives, followed by Friendster in 2002 as the first real social media
model because it allows users to find their friends in the real world and expand their
connection by being friends with their friends’ friends (Davis 2010). The website is also
used for dating purposes to offer a safe place to meet new people because knowing other
people is faster than in the real world.t in the real world.
LinkedIn (2022) was introduced in 2003 as the first website that lines up with a business
with success in the consumer markets. This social media is still popular among people
interested in professional connections and job searches. The main purpose of LinkedIn is
to create professional connections between users. The users can post their resumes and
private messages for people with a business-orientated mind. It also adds some features
for users to have more convenience, such as real-time updates, creating groups, as well as
forums for questions and answers.
In the same year, MySpace was also founded in 2003 and became the most popular
social network in the US in 2006. It began as a private messenger, but it developed into an
instant messenger as time passed. The basic features of MySpace are the same as
Friendster with some new features. Users can create their profiles by embedding music,
video, or music and sending messages to friends (Mjos 2013).
Most notably, Facebook was launched in 2004, targeting the close community,
a college student community at Harvard. When it became an open and free platform, it
grew rapidly and became the most popular social network since 2008 (Franz et al. 2019).
The user can manage their profile by posting texts, videos, and pictures. Nowadays, it also
includes live video in real-time on its platform.
After yet quite different from Facebook, YouTube was made public in 2005. The users
can upload and share videos to the public or private. These social media have become
popular because users can easily discover new things, greatly impacting the entertain
ment industry (Stokel-Walker 2019).
Soon after that, Twitter was introduced to the market in 2006 to transmit short
messages and make users catch the uptrend quickly. The users can post and interact
with limited words, like/dislike opinions, share their thoughts and agree on the agenda
with retweets. As of May 2020, the total number of tweets sent per day was around
500 million, although this number has been stabilised since 2014 (Sayce 2020).
While many other platforms have been added to the market since then, Snapchat,
launched in 2011, stood out by its design that attracts users to focus on sharing pictures
and short videos quickly before the pictures and videos are obsoleted from the platform
(Wilken and Humphreys 2021). This social media was focused on person-sharing because
users can select which users want to share their messages. After that, it includes stories
that allow all of the users’ friends to access the users’ messages.
accessed by the public, friends or not, on social media. When enough trusting
information such as pictures and identity information has been gathered in a user
profile, the hacker can create a fake account to trick your friends and make them
believe that account is the actual user. To deal with the risk of security on social
media, users have to control the amount of their personal information and how
they set the privacy setting.
The biggest problem is that most social media users are unaware of their privacy
settings and do not know how to set them. Moreover, most of users do not realise the risk
of posting sensitive information on their profiles. Since social media platforms are
designed to bring many users together into the same place and interact with one another,
the values of the social network lie in its ability to connect and share in openness.
However, achieving these values can open up doors for hackers to conduct a variety of
cybercrime. Therefore, similar to using other kinds of technology, a security policy is also
required for using a social media platform. Despite such, it still has a huge gap that allows
hackers to harm users on social media.
Another significant problem with social media is the contradicting nature between
Privacy, Security and Accessibility, such that the users can only benefit from two of these
three aspects simultaneously. For example, a private and secure account lacks accessi
bility because the privacy settings will be so high that few others can find the account.
However, if an account is private and accessible, it will not be secure, as others can still
find information about the account. Finally, if the account is secure and accessible, it will
not be private.
According to the National Cybersecurity Centre (NCSC), the best way to keep secure on
social media is to understand the user’s digital footprint and take measures to protect the
user online. For example, this could avoid adding the user’s home address and telephone
number on the social media page even though the option is available (Ncsc 2020).
1506 V. CHANG ET AL.
Hacking
email and may cause network congestion (Truong, Diep, and Zelinka 2020). Social net
work administrators use filters to check and mark which emails are spam to mitigate such
problems. Thus, the spam report can also help users avoid the messages inside spam
emails received in their email inboxes.
5.1.6. Impersonation
In this kind of attack, the hacker tries to create a fake profile pretending to be someone
connected to the targeted victim on social media (Sun, Yu, and Zhang 2021). In other
words, the hacker tries to impersonate a real-world person. The effectiveness of this kind
of attack depends on the authentication techniques that the platform uses for the new
register.
5.1.7. Hijacking
Hijacking means the hacker has full control of the actual profile by cracking the login
password. Therefore, weak passwords can increase the chance of being cracked and
hence attacked by Hijacking. The users should create a strong password for personal
security and change it frequently (Moudud-Ul-Huq, Asaduzzaman, and Biswas 2020).
account without even needing to know the login credentials. However, there are preven
tion techniques to mitigate this kind of attack, which can be found in Cashion and
Bassiouni (Cashion and Bassiouni 2011).
5.2.1. Emotions
Infuriated users of social media may attempt to attack that social media to vent their
anger, disappointment, or sense of revenge (İ̇sa 2022). These hackers try to decrease the
reputation on social media by blocking their services and making the actual users
dissatisfied. If this hacking happened at the organisational level, it could cause a huge
impact, such as a huge financial loss.
5.2.3. Entertainment
Some hackers like to gain exciting experiences by hacking social media. They hack other
users to build their reputation and make others recognise their hacking skills in hacker
society. They did it without expectation of financial or political gain, rather simply
enjoying hacking experiences as Entertainment.
5.2.5. Hacktivism
Hacktivism in computer networks refers to attacking target victims for political objectives
such as promoting free speech, human rights, information ethics, etc. This type of
motivation also includes religious reasons, for example, online attacks by religious funda
mentalists to protest activities in other countries (ISECOM 2020).
1510 V. CHANG ET AL.
5.2.7. Cyber-warfare
Lastly, Cyber-warfare hacking is driven by political motivation and the targets are other
countries’ government websites. The hackers attempt to destroy government commu
nication, financial stability and other things so that the government of another country
would not function properly. It actually is a war that happens in cyberspace rather than
traditional physical wars fighting on the battleground.
someone else they have never met will look after the system and stop anything from
happening (Shareh et al. 2019).
5.3.6. Impersonation
Children can fall victim to this attack quickly due to being easily influenced by other
people, especially people in places of authority. The method of this attack can come
under social engineering, where the attacker will impose on someone different from who
they really are and often their intentions. This can be done in a variety of ways with
a variety of props. What makes this attack specifically dangerous is that it can be executed
in person as well as with technology such as Phishing, Spear-Phishing, Vishing, and
Smishing (Guo and Zhang 2020).
5.3.7. Hijacking
Session Hijacking can be highly likely to happen to children due to their typical lack of
perspicacity. A Man-In-The-Middle attack can be executed quickly with the right tools and
software. This can be especially common in establishments with free customer Wi-Fi, such
as a coffee shop or a bus where children will typically look for a ‘FREE Wi-Fi’ SSID and
connect to the first one, which can be the rogue access point where the attack is executed
by the malicious actor (Alhayani et al. 2021).
5.3.13. Entertainment
With government financial shortages and cuts to towns and communities, many children,
especially those from low socio-economic backgrounds, often find entertainment in
negative actions involving crime and anti-social social behaviour. This is something that
can be adapted into cybercrime as time goes on, with computer science education
developing in formal curriculum and access to devices becoming more commonplace
for young people, including the rise in open-source hacking applications (Rane, Devi, and
Wagh 2023).
5.3.15. Hacktivism
It is usual for people to act in their own methods of moral and ethical ideologies of
what they think is ‘right’ and ‘wrong’. This can be particularly emphasised for young
people as they tend to act with more haste than more mature adults. It is likely for
children to participate in hacktivism as they will act out of justice and believe that if
hacking is done for the right reasons, other people (adults) will agree with them and
it will defend them against criminal repercussions (Goswami and Gautam 2022).
6.2. Sexting
This is the action of sending or receiving sexually explicit messages, photographs
and images through any digital device. In a survey by O’keeffe et al. (2011), they
concluded that 20% of teens have engaged in posting nude or semi-nude photo
graphs or videos of themselves. In a study by Low and Khader (2021), there were two
key social factors identified in relation to sexting – the first factor is ‘Perceived
Subjective Norms’, where have been highlighted as a key determinant of behaviours –
they discuss how the frequency of sexting activity around young people makes the
behaviour more ‘normal’ with how common the action is with their peers. In addi
tion, a common social factor is ‘Family Support’. It was found that young people who
had more supportive families were less likely to participate in the action of sexting.
1514 V. CHANG ET AL.
Image
Social Fake Modifca
Identity request tion
Theft Phishing
Impersona
tion Botnet
Spam Sybil Attacks
Attack Attacks Attacks
Ransome
Hijacking
Malware ware
Attacks
Hacking
Ethical vs. Unethical
Financial
Emotions Gain
Cyber-
Entertainment
warfare
Proficiency Cyber-
for jobs espionage
Hacktivism
et al. 2013). Moreover, in the work of Błachnio and Przepiorka (2016), it has been observed
that Facebook addiction can occur without appropriate self-control over the quantity and
quality of screen time. They also highlighted the problem with the regulation of emotions,
thoughts and behaviours through being met with negative situations that can occur
when using the platform – one of the most significant being Facebook intrusion, where
someone’s account is hacked.
● Low self-esteem.
● Questioning sexual orientation.
● Risk-taking behaviour online.
1516 V. CHANG ET AL.
Full
understanding
of the digital
footprint
User
Use of Mitigations to
appropriate
privacy Protect Online
settings Privacy and
Security
Limited
Personal
Data
Disclosure
● Previous victimisation.
● Problems within the family.
● Lack of parental involvement in online life.
● Social isolation.
● Difficulties with friends.
● Problems at school.
ENTERPRISE INFORMATION SYSTEMS 1517
addition to the effects on children, the digital footprint can also have a long-lasting and
potentially damaging effect on adults once they start looking for career opportunities.
McPeak (2013) believes that ‘using social media can be a hazard to those who overlook
the privacy settings’. Using appropriate privacy settings can mitigate most of the poten
tially harmful data as the people from whom the user wants to hide the digital footprint
will not easily view the user’s profile. Additionally, this can also be beneficial when the
users forget their passwords or lock their accounts and cannot physically change their
digital footprint. Because it should not matter as anyone outside the users’ settings could
not view their accounts over time and the accounts will fade as their friend lists do not
expand.
Many researchers have looked into the main concerns users have with privacy options,
which points to the main concern being how users have to keep up with the constant
demand of changing privacy settings and self-presentation. In the research of Fiesler et al.
(2017), the authors investigate privacy settings and social media content sharing. They
begin by discussing the privacy strategies in place in one of the most reputable and
mainstream social media sites (Facebook). A method they have established is targeted
disclosure, where the user uses different privacy policies for different posts (subjective to
what the post is about).
by other people (an example of this could be humour). This can also be around discussing
workplace activities and/or businesses (an example of this could be discussing elements
of your work you are unhappy about) - this can be seen as valid due to it being your
profile. However, a future employer can view this negatively as they will not have their
business discussed in this way. Finally, be mindful of the factor that when you delete
content under your profile, it means it is deleted but not captured – this means that
someone can take an image of this and keep the content under your name (an example of
this is screenshotting). You should be aware of what content you are sharing and under
stand that the content reflects you as an individual in all aspects of your life.
We also recommend that when joining a new social media platform, the first thing
performed is the exploration of the privacy settings available to users. There are no exact
privacy settings to use, but you should be aware of what your options are and what you
are happy with other users being able to see and interact with your profile (An example of
this is a teacher may not want their students to see their personal profile). Finally, we
recommend being cautious of what personal information you give out to the world from
your profile. This can be done by understanding what other users need to know about you
and what presumptions can be made about you when disclosing personal data (an
example of this is deciding to add a workplace or place of education to the profile).
two main contributions to the physical and mental well-being of the population, helping
us advance medical knowledge as a society.
9. Conclusion
Social media has become a significant tool in our everyday lives as people use it to
communicate with friends, family, and colleagues anywhere on earth. The communication
is extended from sending messages and photos to Wi-Fi calling. However, with social
media providing ease of communication and working as an important tool for users, it has
also suffered from concerning attacks from hackers who exploit the precious tool of social
media. Digital footprint has been identified as a significant factor that causes harm to both
young and elderly people because they do not have a good understanding of what they
ENTERPRISE INFORMATION SYSTEMS 1521
have posted that can become publicly available and its significant consequences in the
future. In particular, young children are subjected to a higher risk of these attacks because
they spend extensive time using social media. Therefore, the consequences can be severe
if they do not understand the risk and simply follow the trends to pursue what others do
without thinking twice on social media such as Facebook. In this paper, we summarised
various types of recent attacks, the motivations behind hackers, the likely targeted
victims, and how the targeted victims may mitigate such a risk hence the negative
impacts on them in the early years of their life and social development. Based on the
descriptive analysis of security and hacking in social media in this paper, future work can
be directed to the methods that can improve the security system for reducing security
threats. These may be achieved by designing and assessing innovative social network
security and teaching young people the risks of using social media. As a result, younger
people are less likely to be typical users of sensitive crime. Rather, they become the users
who care about the information disclosure and its consequences in their lives.
Acknowledgments
This work is partly supported by VC Research (VCR 0000098).
Disclosure statement
No potential conflict of interest was reported by the authors.
Funding
The work was supported by the VC Research [VCR 0000098].
ORCID
Victor Chang http://orcid.org/0000-0002-8012-5852
Ben S. Liu http://orcid.org/0000-0002-2950-9607
References
Alazab, M., and R. Broadhurst. 2016. “Spam and Criminal Activity.” Trends and Issues in Crime and
Criminal Justice 526: 1–20.
Alhayani, B., S. T. Abbas, D. Z. Khutar, and H. J. Mohammed, 2021. “Best Ways Computation
Intelligent of Face Cyber Attacks.“ Materials Today, 26–31.
Alzubaidi, A. 2021. “Measuring the Level of Cyber-Security Awareness for Cybercrime in Saudi
Arabia.” Heliyon 7 (1): e06016.
Barbier, G., and H. Liu. 2011. “Data Mining in Social Media.” In Social Network Data Analytics, 327–352.
Springer US. doi:10.1007/978-1-4419-8462-3_12.
Błachnio, A., and A. Przepiorka. 2016. “Dysfunction of Self-Regulation and Self-Control in Facebook
Addiction.” The Psychiatric Quarterly 87 (3): 493–500. doi:10.1007/s11126-015-9403-1.
Buchanan, R., E. Southgate, J. Scevak, and S. P. Smith. 2018. “Expert Insights into Education for
Positive Digital Footprint Development.” Scan: The Journal for Educators 37: 49–64.
1522 V. CHANG ET AL.
Buchanan, R., E. Southgate, S. P. Smith, T. Murray, and B. Noble. 2017. “Post No Photos, Leave No
Trace: Children’s Digital Footprint Management Strategies.” E-Learning and Digital Media 14 (5):
275–290. doi:10.1177/2042753017751711.
Buchan, R., and I. Navarrete. 2021. “Cyber espionage and international law.” In Research Handbook
on International Law and Cyberspace”, 231–252. Edward Elgar Publishing.
Cardon, P. W., and B. Marshall. 2015. “The Hype and Reality of Social Media Use for Work
Collaboration and Team Communication.” International Journal of Business Communication
52 (3): 273–293. doi:10.1177/2329488414525446.
Cashion, J., and M. Bassiouni, 2011. Protocol for Mitigating the Risk of Hijacking Social Networking
Sites. In ColiaborateCom 2011 - Proceedings of the 7th International Conference on Collaborative
Computing: Networking, Applications and Worksharing. IEEE, pp. 324–331. doi:10.4108/icst.colla
boratecom.2011.247167
CEOP, 2022. What Can Make Young People Vulnerable Online?. Accessed Jan 6 2022. https://
parentzone.org.uk/article/what-can-make-young-people-vulnerable-online
Das, R., G. Karmarkar, and J. Kamruzzaman, 2019. How Much I Can Rely on You: Measuring
Trustworthiness of a Twitter User. IEEE Trans. Dependable and Secure Comput. 1. 10.1109/TDSC.
2019.2929782
Davis, K. 2010. “Coming of Age Online: The Developmental Underpinnings of girls’ Blogs.” Journal of
Adolescent Research 25 (1): 145–171. doi:10.1177/0743558409350503.
Fiesler, C., M. Dye, J. L. Feuston, C. Hiruncharoenvate, C. J. Hutto, S. Morrison, P. Khanipour Roshan,
et al., 2017. What (Or Who) is Public? Privacy Settings and Social Media Content Sharing. In
Proceedings of the 2017 ACM conference on computer supported cooperative work and social
computing, Portland Oregon, USA. (pp. 567–580).
Fire, M., R. Goldschmidt, and Y. Elovici. 2014. “Online Social Networks: Threats and Solutions.” IEEE
Communications Surveys & Tutorials 16 (4): 2019–2036. doi:10.1109/COMST.2014.2321628.
Franz, D., H. E. Marsh, J. I. Chen, and A. R. Teo. 2019. “Using Facebook for Qualitative Research: A Brief
Primer.” Journal of Medical Internet Research 21 (8): e13544. doi:10.2196/13544.
Frederic, S., and H. Woodrow, 2012. Boundary Regulation in Social Media. In Proceedings of the ACM
Conference on Computer Supported Cooperative Work, CSCW. ACM Press, New York, USA, pp.
769–778. 10.1145/2145204.2145320
Gandhi, R., A. Sharma, W. Mahoney, W. Sousan, Q. Zhu, and P. Laplante. 2011. “Dimensions of
Cyber-Attacks: Cultural, Social, Economic, and Political.” IEEE Technology and Society Magazine
30 (1): 28–38. doi:10.1109/MTS.2011.940293.
Goswami, A. K., and R. Gautam. 2022. “India’s Cybercrime, Cybersecurity and Cyber Regulation. In
Proceedings of the National Conference On “Cyber Crime, Security and Regulation” (CCSR)- 2022
Greater Noida, India.” pp.47–55. doi:10.55662/CCRSbook.2022.
Guo, L., and H. Zhang, 2020. A White-Box Impersonation Attack on the FaceId System in the Real
World. In Journal of Physics: Conference Series, Dalian, China. (Vol. 1651, No. 1, p. 012037). IOP
Publishing.
Hamid, A., M. Alam, H. Sheherin, and A. S. K. Pathan. 2020. “Cyber Security Concerns in Social
Networking Service.” International Journal of Communication Networks and Information Security
12 (2): 198–212. doi:10.17762/ijcnis.v12i2.4634.
Hannay, P., and G. Baatard, 2011. GeoIntelligence: Data Mining Locational Social Media Content for
Profiling and Information Gathering. ECU Publications. Accessed Jan 28 2021. https://ro.ecu.edu.
au/ecuworks2011/329
Harfath, M., R. Amrith, N. Dulanaka, P. Perera, L. Rupersinga, and C. Liyanapathirana, 2021. Intelligent
Cyber Safe Framework for Children. In 2021 IEEE 12th Annual Ubiquitous Computing, Electronics &
Mobile Communication Conference (UEMCON), New York, USA (pp. 0023–0029). IEEE.
Hassani, A., and H. Malik. 2021. “Securing Facial Recognition: The New Spoofs and Solutions.”
Biometric Technology Today 2021 (5): 5–9. doi:10.1016/S0969-4765(21)00059-X.
Heidemann, J., M. Klier, and F. Probst. 2012. “Online Social Networks: A Survey of a Global
Phenomenon.” Computer Networks 56 (18): 3866–3878. doi:10.1016/j.comnet.2012.08.009.
ENTERPRISE INFORMATION SYSTEMS 1523
Heike, V. O., and A. Durner, 2020. International Data on Youth and Media 2020. Accessed Jan 28
2021. https://www.bronline.de/jugend/izi/english/International%20Data%20on%20Youth%
20and%20Media.pdf
Hiatt, D., and Y. B. Choi. 2016. “Role of Security in Social Networking.” International Journal of
Advanced Computer Science and Applications 7 (2): 12–15. doi:10.14569/ijacsa.2016.070202.
Iovan, S., and A. A. Iovan. 2016. “From Cyber Threats to Cyber-Crime.” Journal of Information Systems
& Operations Management 10: 425–434.
Irfan, A., 2018. The History of Social Media. https://www.socialmediatoday.com/news/the-history-of-
social-media-infographic-1/522285/
İ̇ sa, A. V. C. I. 2022. “ANALYSIS of DATA SECURITY and CYBER-ATTACK METHODS in DIGITAL
CURRENCY.” Mühendislik Bilimleri ve Tasarım Dergisi 10 (3): 1000–1013.
ISECOM, 2020. Hacktivism. Accessed Jan 28 2021. https://www.hackerhighschool.org/lessons/HHS_
en20_Hacktivism.v2.pdf
Jain, A. K., and B. B. Gupta. 2022. “A Survey of Phishing Attack Techniques, Defence Mechanisms and
Open Research Challenges.” Enterprise Information Systems 16 (4): 527–565. doi:10.1080/
17517575.2021.1896786.
Jha, M., C. S. Anand, Y. Mahawar, U. Kalyan, and V. Verma, 2021. Cyber Security: Terms, Laws, Threats
and Protection. In 2021 International Conference on Computing Sciences (ICCS), Phagwara, India
(pp. 148–151). IEEE.
Kumari, K., J. P. Singh, Y. K. Dwivedi, and N. P. Rana. 2020. “Towards Cyberbullying-Free Social Media
in Smart Cities: A Unified Multi-Modal Approach.” Soft Computing 24 (15): 11059–11070. doi:10.
1007/s00500-019-04550-x.
Laleh, N., B. Carminati, and E. Ferrari. 2018. “Risk Assessment in Social Networks Based on User
Anomalous Behaviors.” IEEE Transactions on Dependable and Secure Computing 15 (2): 295–308.
doi:10.1109/TDSC.2016.2540637.
Lankton, N. K., D. H. McKnight, and J. F. Tripp. 2017. “Facebook Privacy Management Strategies:
A Cluster Analysis of User Privacy Behaviors.” Computers in Human Behavior 76: 149–163. doi:10.
1016/j.chb.2017.07.015.
Lim, J. W., and V. L. Thing. 2022. “Towards Effective Cybercrime Intervention.” arXiv preprint
arXiv:2211.09524. 10.1016/j.scitotenv.2022.156975.
LinkedIn, O. 2022 About LinkedIn. Available at: https://www.umt.edu/experiential-learning-career-
success/students/students/resource-handout-files/elcs-linkedin-handout.pdf
Lobo, A., Y. Mandekar, S. Pundpal, and B. Roy 2020. Detection of Sybil Attacks in Social Networks. In
International Conference on Computational Data and Social Networks (pp. 366–377). Springer,
Cham.
Low, J., and M. Khader. 2021. “Sexting in Singapore: An Empirical Study.” Introduction to Cyber
Forensic Psychology: Understanding the Mind of the Cyber Deviant Perpetrators. 2021: 353–373.
Madden, M., A. Lenhart, S. Cortesi, U. Gasser, M. D. Research, A. S. Senior, and M. Beaton, 2013. Teens,
Social Media, and Privacy. Pew Research Center. Available at: http://pewinternet.org/Reports/
2013/Teens-Social-Media-And-Privacy.aspx (accessed 1.28.21).
Manap, N. A., A. A. Rahim, and H. Taji. 2015. “Cyberspace Identity Theft: The Conceptual Framework.”
Mediterranean Journal of Social Sciences 6 (4): 595.
Mao, Y., Y. Zhu, Y. Liu, Q. Lin, H. Lu, and F. Zhang. 2020. “Classifying User Connections Through Social
Media Avatars and Users Social Activities: A Case Study in Identifying Sellers on Social Media.”
Enterprise Information Systems 16 (8–9): 1–20. doi:10.1080/17517575.2020.1856420.
McPeak, A. A. 2013. “The Facebook Digital Footprint: Paving Fair and Consistent Pathways to Civil
Discovery of Social Media Data.” Wake Forest Law Review 48: 887.
Media Genesis. 2018. Social Media Hacking in 2018. Accessed Jan 28 2021. https://mediag.com/
blog/social-media-hacking-in-2018/
Mendhurwar, S., and R. Mishra. 2021. “Integration of Social and IoT Technologies: Architectural
Framework for Digital Transformation and Cyber Security Challenges.” Enterprise Information
Systems 15 (4): 565–584. doi:10.1080/17517575.2019.1600041.
Mjos, O. J. 2013. Music, Social Media and Global Mobility: MySpace, Facebook, YouTube. New York,
USA: Routledge.
1524 V. CHANG ET AL.
Moher, D., A. Liberati, J. Tetzlaff, D. G. Altman, and P. R. I. S. M. A. Group T. 2009. “Preferred Reporting
Items for Systematic Reviews and Meta-Analyses: The PRISMA Statement.” Annals of Internal
Medicine 151 (4): 264–269. *. doi:10.7326/0003-4819-151-4-200908180-00135.
Moudud-Ul-Huq, S., M. Asaduzzaman, and T. Biswas. 2020. “Role of Cloud Computing in Global
Accounting Information Systems.” The Bottom Line 33 (3): 231–250. doi:10.1108/BL-01-2020-0010.
Ncsc, G. U., 2020. Social Media: How to Use It Safely. Accessed Jan 28 2021. https://www.ncsc.gov.uk/
guidance/social-media-how-to-use-it-safely
OfCom, 2021. Children and Parents: Media Use and Attitudes Report 2020/2021. Available at: https://
www.ofcom.org.uk/__data/assets/pdf_file/0025/217825/children-and-parents-media-use-and-
attitudes-report-2020-21.pdf (accessed 29 November 2022).
O’keeffe, G. S., K. Clarke-Pearson, D. A. Mulligan, T. R. Altmann, A. Brown, D. A. Christakis, H. L. Falik,
et al. 2011. “Clinical Report - the Impact of Social Media on Children, Adolescents, and Families.”
Pediatrics. doi:10.1542/peds.2011-0054.
Orabi, M., D. Mouheb, Z. Al Aghbari, and I. Kamel. 2020. “Detection of Bots in Social Media:
A Systematic Review.” Information Processing & Management 57 (4): 102250. doi:10.1016/j.ipm.
2020.102250.
Oztemel, E., and S. Gursev. 2020. “Literature Review of Industry 4.0 and Related Technologies.”
Journal of Intelligent Manufacturing 31 (1): 127–182. doi:https://doi.org/10.1007/s10845-018-
1433-8.
Prabhu Kavin, B., S. Karki, S. Hemalatha, D. Singh, R. Vijayalakshmi, M. Thangamani, S. L. A. Haleem,
et al. 2022. “Machine Learning-Based Secure Data Acquisition for Fake Accounts Detection in
Future Mobile Communication Networks.” Wireless Communications and Mobile Computing 2022:
1–10. doi:10.1155/2022/6356152.
Pybus, J., M. Coté, and T. Blanke. 2015. “Hacking the Social Life of Big Data.” Big Data & Society 2 (2).
doi:10.1177/2053951715616649.
Quayyum, F., D. S. Cruzes, and L. Jaccheri. 2021. “Cybersecurity Awareness for Children: A Systematic
Literature Review.” International Journal of Child-Computer Interaction 30: 100343. doi:10.1016/j.
ijcci.2021.100343.
Rane, S., G. Devi, and S. Wagh. 2023. “Cyber Threats: Fears for Industry.” In Cyber Security Threats and
Challenges Facing Human Life, 43–54. Chapman and Hall/CRC.
Ranjan, J. 2009. “Data Mining in Pharma Sector: Benefits.” International Journal of Health Care Quality
Assurance 22 (1): 82–92. doi:10.1108/09526860910927970.
Rathore, S., P. K. Sharma, V. Loia, Y. S. Jeong, and J. H. Park. 2017. “Social Network Security: Issues,
Challenges, Threats, and Solutions.” Information Sciences 421: 43–69. doi:10.1016/j.ins.2017.08.
063.
Razaque, A., M. B. H. Frej, D. Sabyrov, A. Shaikhyn, F. Amsaad, and A. Oun 2020. Detection of Phishing
Websites Using Machine Learning. In 2020 IEEE Cloud Summit, Harrisburg, PA, USA. (pp. 103–107).
IEEE.
Richardson, R., and M. M. North. 2017. “Ransomware: Evolution, Mitigation and Prevention.”
International Management Review 13 (1): 10.
Sayce, D., 2020. The Number of Tweets per Day in 2020. Accessed Jan 28 2021. https://www.dsayce.
com/social-media/tweets-day/
Senthil Kumar, N., K. Saravanakumar, and K. Deepa. 2016. “On Privacy and Security in Social Media –
a Comprehensive Study.” Procedia Computer Science 78: 114–119. doi:https://doi.org/10.1016/j.
procs.2016.02.019.
Shareh, M. B., H. Navidi, H. H. S. Javadi, and M. HosseinZadeh. 2019. “Preventing Sybil Attacks in P2P
File Sharing Networks Based on the Evolutionary Game Model.” Information Sciences 470: 94–108.
doi:10.1016/j.ins.2018.08.054.
Smith, M., C. Szongott, B. Henne, and G. Von Voigt, 2012. Big Data Privacy Issues in Public Social
Media. In IEEE International Conference on Digital Ecosystems and Technologies. Presented at the
IEEE International Conference on Digital Ecosystems and Technologies, IEEE, Italy. 10.1109/DEST.
2012.6227909
ENTERPRISE INFORMATION SYSTEMS 1525
Stankov, I., and G. Tsochev. 2020. “Vulnerability and Protection of Business Management Systems:
Threats and Challenges.” Problems of Engineering Cybernetics and Robotics 72: 29–40. doi:10.7546/
PECR.72.20.04.
Statista, 2020. Social Media & Users-Generated Content. Accessed Jan 28 2021. https://www.statista.
com/topics/1164/social-networks/
Stergiou, C., K. E. Psannis, T. Xifilidis, A. P. Plageras, and B. B. Gupta, 2018. Security and Privacy of Big
Data for Social Networking Services in Cloud, Presented at the IEEE INFOCOM 2018 - IEEE
Conference on Computer Communications Workshops (INFOCOM WKSHPS), IEEE, Honolulu, HI,
pp. 438–443. 10.1109/INFCOMW.2018.8406831
Stokel-Walker, C. 2019. YouTubers: How YouTube Shook Up TV and Created a New Generation of Stars.
Kingston upon Thames, Surrey, United Kingdom: Canbury Press.
Sun, X., F. R. Yu, and P. Zhang. 2021. “A Survey on Cyber-Security of Connected and Autonomous
Vehicles (CAVs).” IEEE Transactions on Intelligent Transportation Systems 23 (7): 6240–6259.
Truong, T. C., Q. B. Diep, and I. Zelinka. 2020. “Artificial Intelligence in the Cyber Domain: Offense and
Defense.” Symmetry 12 (3): 410. doi:10.3390/sym12030410.
van der Schyff, K., S. Flowerday, and S. Furnell. 2020a. “Duplicitous Social Media and Data
Surveillance: An Evaluation of Privacy Risk.” Computers & Security 94: 101822. doi:10.1016/j.cose.
2020.101822.
Vishwanath, A., W. Xu, and Z. Ngoh. 2018. “How People Protect Their Privacy on Facebook: A
Cost-Benefit View.” Journal of the Association for Information Science and Technology 69 (5):
700–709. doi:10.1002/asi.23894.
Wilken, R., and L. Humphreys. 2021. “Placemaking Through Mobile Social Media Platform Snapchat.”
Convergence 27 (3): 579–593. doi:10.1177/1354856521989518.
Zhang, Z., and B. B. Gupta. 2018. “Social Media Security and Trustworthiness: Overview and New
Direction.” Future Generation Computer Systems 86: 914–925. doi:10.1016/j.future.2016.10.007.
Copyright of Enterprise Information Systems is the property of Taylor & Francis Ltd and its
content may not be copied or emailed to multiple sites or posted to a listserv without the
copyright holder's express written permission. However, users may print, download, or email
articles for individual use.