Review on Social Media and Digital Security
DOI:
https://doi.org/10.48161/qaj.v2n2a119Keywords:
Social Media, Digital Security, Digital Growth, NetworksAbstract
The emerging social media with inherent capabilities seems to be gaining edge over comprehensiveness, diversity and wisdom, nevertheless its security and trustworthiness issues have also become increasingly serious, which need to be addressed urgently. The available studies mainly aim at both social media content and user security, including model, protocol, mechanism and algorithm. Unfortunately, there is a lack of investigating on effective and efficient evaluations and measurements for security and trustworthiness of various social media tools, platforms and applications, thus has effect on their further improvement and evolution. To address the challenge, this paper firstly made a survey on the state-of-the-art of social media networks security and trustworthiness particularly for the increasingly growing sophistication and variety of attacks as well as related intelligence applications. And then, we highlighted a new direction on evaluating and measuring those fundamental and underlying platforms, meanwhile proposing a hierarchical architecture for crowd evaluations based on signaling theory and crowd computing, which is essential for social media ecosystem. Finally, we conclude our work with several open issues and cutting-edge challenges.
Downloads
References
Zhiyong Zhang, Brij B. Gupta, Social media security and trustworthiness: Overview and new direction, Future Generation Computer Systems, Volume 86, 2018, Pages 914-925, ISSN 0167-739X, https://doi.org/10.1016/j.future.2016.10.007.
Simerly, T. W., Tang, T. S. H., Dutt, A. M., Pledger, P. K., Breton, K. D., & Kay, A. (2011). U.S. Patent No. 7,952,609. Washington, DC: U.S. Patent and Trademark Office.
Redmiles, E. M., Malone, A. R., & Mazurek, M. L. (2016, May). I think they're trying to tell me something: Advice sources and selection for digital security. In 2016 IEEE Symposium on Security and Privacy (SP) (pp. 272-288). IEEE.
Gritzalis, D., Kandias, M., Stavrou, V., & Mitrou, L. (2014). History of information: the case of privacy and security in social media. In Proc. of the History of Information Conference (pp. 283-310).
Rajab Asaad, R., & Masoud Abdulhakim, R. (2021). The Concept of Data Mining and Knowledge Extraction Techniques. Qubahan Academic Journal, 1(2), 17–20. https://doi.org/10.48161/qaj.v1n2a43.
Kim, H. J. (2012). Online social media networking and assessing its security risks. International journal of security and its applications, 6(3), 11-18.
Li, H., Wouhaybi, R. H., & Kohlenberg, T. (2015). "Security challenge assisted password proxy." U.S. Patent No. 9,223,950. Washington, DC: U.S. Patent and Trademark Office.
Asaad, R. R. (2021). Penetration Testing: Wireless Network Attacks Method on Kali Linux OS. Academic Journal of Nawroz University, 10(1), 7–12. https://doi.org/10.25007/ajnu.v10n1a998.
Kals, S., Kirda, E., Kruegel, C., & Jovanovic, N. (2006, May). Secubat: a web vulnerability scanner. In Proceedings of the 15th international conference on World Wide Web (pp. 247-256).
Asaad, R. R., Abdurahman, S. M., & Hani, A. A. (2017). Partial Image Encryption using RC4 Stream Cipher Approach and Embedded in an Image. Academic Journal of Nawroz University, 6(3), 40–45. https://doi.org/10.25007/ajnu.v6n3a76.
Oder, I.J.D., Oder, J.D., Cronic, K.J., Sommers, S.M. and Warner, D.W., Shift4 Corp, 2011. Secure payment card transactions. U.S. Patent 7,891,563.
Asaad, R. R., Abdulrahman, S. M., & Hani, A. A. (2017). Advanced Encryption Standard Enhancement with Output Feedback Block Mode Operation. Academic Journal of Nawroz University, 6(3), 1–10. https://doi.org/10.25007/ajnu.v6n3a70.
Data Reportal, (2020) Digital 2020: Global Digital Overview, https://datareportal.com/
Asaad, R. R. (2020). Implementation of a Virus with Treatment and Protection Methods. ICONTECH INTERNATIONAL JOURNAL, 4(2), 28-34. https://doi.org/10.46291/ICONTECHvol4iss2pp28-34
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Qubahan Academic Journal

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Allows users to copy and distribute the Article, provided this is not done for commercial purposes and further does not permit distribution of the Article if it is changed or edited in any way, and provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, and that the licensor is not represented as endorsing the use made of the work.
Access Rights
All articles published open access will be immediately and permanently free for everyone to read, download, copy and distribute, print, search, or link to the full texts of articles under the following conditions: attribution, noncommercial, and no derivative works.
Author Rights
For open access publishing this journal uses a licensing agreement. Authors will transfer copyright to Qubahan Academic Journal, but will have the right to share their article in the same way permitted to third parties under the relevant user license, as well as certain scholarly usage rights.