• Title/Summary/Keyword: Social media threats

Search Result 18, Processing Time 0.025 seconds

Social Media Security and Attacks

  • Almalki, Sarah;Alghamdi, Reham;Sami, Gofran;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.174-183
    • /
    • 2021
  • The advent of social media has revolutionized the speed of communication between millions of people around the world in various cultures and disciplines. Social media is the best platform for exchanging opinions and ideas, interacting with other users of similar interests and sharing different types of media and files. With the phenomenal increase in the use of social media platforms, the need to pay attention to protection and security from attacks and misuse has also increased. The present study conducts a comprehensive survey of the latest and most important research studies published from 2018-20 on security and privacy on social media and types of threats and attacks that affect the users. We have also reviewed the recent challenges that affect security features in social media. Furthermore, this research pursuit also presents effective and feasible solutions that address these threats and attacks and cites recommendations to increase security and privacy for the users of social media.

Cyberbullying Detection in Twitter Using Sentiment Analysis

  • Theng, Chong Poh;Othman, Nur Fadzilah;Abdullah, Raihana Syahirah;Anawar, Syarulnaziah;Ayop, Zakiah;Ramli, Sofia Najwa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.1-10
    • /
    • 2021
  • Cyberbullying has become a severe issue and brought a powerful impact on the cyber world. Due to the low cost and fast spreading of news, social media has become a tool that helps spread insult, offensive, and hate messages or opinions in a community. Detecting cyberbullying from social media is an intriguing research topic because it is vital for law enforcement agencies to witness how social media broadcast hate messages. Twitter is one of the famous social media and a platform for users to tell stories, give views, express feelings, and even spread news, whether true or false. Hence, it becomes an excellent resource for sentiment analysis. This paper aims to detect cyberbully threats based on Naïve Bayes, support vector machine (SVM), and k-nearest neighbour (k-NN) classifier model. Sentiment analysis will be applied based on people's opinions on social media and distribute polarity to them as positive, neutral, or negative. The accuracy for each classifier will be evaluated.

A Study on the Factors Affecting the Intention of Chinese Users to Discriminate Against Fake News on Social Media - Focusing on attitude, social capital, and risk detection - (중국 이용자 소셜미디어 가짜뉴스 판별의도에 미치는 요인에 관한 연구 -태도, 사회자본, 위험감지를 중심으로-)

  • Tan, KeHong;Lee, Hwa Haeng
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.337-351
    • /
    • 2022
  • With the full spread and rapid development of social media, the trend of decentralization of social media information propagation is becoming clearer day by day, and the segmentation of time by audiences using social media information is clearly progressing. Therefore, this study aims to study the influence relationship between social media attitudes toward fake news, social capital, risk perception, and discriminant intentions based on existing studies. Accordingly, the research model presented related research questions and organized a questionnaire to collect a total of 500 valid surveys. The SPSS 26.0 program and the AMOS 24.0 program were used to analyze the data. The research results are as follows. First, the more positive the user's attitude towards the fake news identification intention of social media, the more they want to use various methods or tools to identify the authenticity of online information. Second, the more positive the user's attitude towards social media fake news, the more aware of the potential threats social media fake news poses to their own physical, psychological, financial and so on. At the same time, by raising one's own awareness of the dangers, counterintelligence intentions against fake news on social media will also increase. Third, the richer the social capital the user has, the stronger the information literacy, and therefore the stronger the identification intention of social media fake news. Fourth, the higher the value of social capital Chinese users have, the greater the damage they have suffered from fake news, and the higher the risk awareness of fake news to protect their interests. Fifth, it means that Chinese users recognized information suspected of social media and took corresponding measures.

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats (고도화된 사이버 위협에 효과적으로 대응하기 위한 Knowledge_Base 구축전략)

  • Lee, Tae-Young;Park, Dong-Gue
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.357-368
    • /
    • 2013
  • Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.

How Do Children Interact with Phishing Attacks?

  • Alwanain, Mohammed I
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.127-133
    • /
    • 2021
  • Today, phishing attacks represent one of the biggest security threats targeting users of the digital world. They consist of an attempt to steal sensitive information, such as a user's identity or credit and debit card details, using various methods that include fake emails, fake websites, and fake social media messages. Protecting the user's security and privacy therefore becomes complex, especially when those users are children. Currently, children are participating in Internet activity more frequently than ever before. This activity includes, for example, online gaming, communication, and schoolwork. However, children tend to have a less well-developed knowledge of privacy and security concepts, compared to adults. Consequently, they often become victims of cybercrime. In this paper, the effects of security awareness on users who are children are investigated, looking at their ability to detect phishing attacks in social media. In this approach, two Experiments were conducted to evaluate the effects of security awareness on WhatsApp application users in their daily communication. The results of the Experiments revealed that phishing awareness training has a significant positive effect on the ability of children using WhatsApp to identify phishing messages and thereby avoid attacks.

Smart Disaster Safety Management System for Social Security (사회안전을 위한 스마트 재난안전관리 시스템)

  • Kang, Heau-jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.225-229
    • /
    • 2017
  • In this paper, various units of industrial disaster safety threats as well as local and national facilities unit real-time detection and prevention refer to the corresponding system goes into disaster management preparedness, prevention, response recovery of phase I systematic ICT skills that can be managed more efficiently. In addition, the immediate disaster prevention and preparedness for early forecasting preemptive damage scale and high-tech information exchange technology to overcome the limitations of a human disaster in the field against the analysis and strategy of preemptive disaster safety management with smart risk management and prevention in response and recovery and the scene quickly and efficient mutual cooperation and effective collaboration and cooperation of the Community Center social security presented a smart disaster safety management system.

The Effects of Relational Intentionality and Self-presentation Tendency on Word-of-mouth Activities (관계의 유대지향성 및 자기표현성향이 구전활동에 미치는 영향)

  • Roh, Minjung;Chu, Wujin
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.409-420
    • /
    • 2018
  • The decision to actively reveal oneself as a consumer on social media depends on whether the focus is more on positive rewards than negative threats associated with self-presentation, that is, who the other party is in that relationship. The audience of self-presentation could also be divided into expressive and instrumental ties: work partners can be classified as an audience of instrumental ties, whereas school friends can be regarded as an audience of expressive ties. This study accordingly predicted that people would focus more on prevention of negative threats than positive reward, exhibiting defensive self-presentation in relationships with strong instrumental ties because the fallout from negative threats due to failed self-presentation have a more detrimental effect than a positive reward from successful self-presentation. The empirical findings thereby indicated that as the proportion of coworkers increased among Facebook friends, the mediation effect through defensive self-presentation increased, whereas such effect through acquisitive self-presentation decreased.

Development of Social Data Collection and Loading Engine-based Reliability analysis System Against Infectious Disease Pandemic (감염병 위기 대응을 위한 소셜 데이터 수집 및 적재 엔진 기반 신뢰도 분석 시스템 개발)

  • Doo Young Jung;Sang-Jun Lee;MIN KYUNG IL;Seogsong Jeong;HyunWook Han
    • The Journal of Bigdata
    • /
    • v.7 no.2
    • /
    • pp.103-111
    • /
    • 2022
  • There are many institutions, organizations, and sites related to responding to infectious diseases, but as the pandemic situation such as COVID-19 continues for years, there are many changes in the initial and current aspects, and accordingly, policies and response systems are evolving. As a result, regional gaps arise, and various problems are scattered due to trust, distrust, and implementation of policies. Therefore, in the process of analyzing social data including information transmission, Twitter data, one of the major social media platforms containing inaccurate information from unknown sources, was developed to prevent facts in advance. Based on social data, which is unstructured data, an algorithm that can automatically detect infectious disease threats is developed to create an objective basis for responding to the infectious disease crisis to solidify international competitiveness in related fields.

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

A Study on Contents Activism Analysis using Social Media - Focusing on Cases Related to Tom Moore's 100 Laps Challenge and the Exhibition of the Statue of Peace - (소셜미디어를 활용한 콘텐츠 액티비즘 분석 연구 - 톰 무어의 '100바퀴 챌린지'와 '평화의 소녀상' 전시를 중심으로-)

  • Shin, Jung-Ah
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.8
    • /
    • pp.91-106
    • /
    • 2021
  • The purpose of this study is to define the process of leading to self-realization and social solidarity through the process of contents planning, production, and distribution as Contents Activism, and to categorize specific execution steps. Based on this, we try to analyze concrete cases to find out the social meaning and effect of the practice of Contents Activism. As for the research method, after examining the differences between traditional activism and Contents Activism through a review of previous studies, the implementation process of Contents Activism was categorized into 7 steps. By applying this model, this study analyzed two cases of Contents Activism. The first case is the 100 laps challenge in the backyard planned by an elderly man ahead of his 100th birthday in early 2020, when the fear of COVID-19 spread. Sir Tom Moore, who lives in the UK, challenged to walk 100 laps in the backyard to help medical staff from the National Health Service as COVID-19 infections and deaths increased due to a lack of protective equipment. His challenge, which is difficult to walk without assistive devices due to cancer surgery and fall aftereffects, drew sympathy and participation from many people, leading to global solidarity. The second case analyzes the case of 'The Unfreedom of Expression, Afterwards' by Kim Seo-kyung and Kim Woon-seong, who were invited to the 2019 Aichi Triennale special exhibition in Japan. The 'Unfreedom of Expression, After' exhibition was a project to display the Statue of Peace and the lives of comfort women in the Japanese military, but it was withdrawn after three days of war due to threats and attacks from the far-right forces. Overseas artists who heard this news resisted the Triennale's decision, took and shared photos in the same pose as the Statue of Peace on social media such as Twitter and Instagram, empathizing with the historical significance of the Statue of Peace. Activism, which began with artists, has expanded through social media to the homes, workplaces, and streets of ordinary citizens living in various regions. The two cases can be said to be Contents Activism that led to social practice while solidifying and communicating with someone through contents.