Cybersecurity Practices for Social Media Users: A Systematic Literature Review
Abstract
:1. Introduction
- Identify cyber threats in internet and social media use.
- Identify factors affecting users’ cyber awareness on social media platforms’ security-related features.
- Identify the impact of users’ cyber awareness on users’ cyber behavior on social media.
- Identify the impact of users’ cyber behavior on their vulnerability level on social media.
- Identify recommended cybersecurity practices for social media users from users’ point of view.
2. Methodology
2.1. Cyber Threats on the Internet
2.1.1. Cyber Threats on Social Media
2.2. Cybersecurity on the Internet
2.2.1. User Awareness When Using the Internet
2.2.2. User Behavior When Using the Internet
2.3. Cybersecurity on Social Media
2.3.1. User Awareness When Using Social Media
2.3.2. User Behavior When Using Social Media
3. Discussion
4. Limitations
- (1)
- The authors were unable to identify any studies relevant to recommended cybersecurity practices for social media users from users’ points of view, to the best of their knowledge.
- (2)
- The authors were unable to filter any studies discovering the impact of social media users’ age, gender, and education level on users’ awareness on social media platforms’ security-related features, to the best of their knowledge.
- (3)
- The authors were unable to find any studies revealing the impact of social media users’ awareness of social media platforms’ security-related features on social media users’ secure behavior in it, to the best of their knowledge.
- (4)
- The authors were unable to find enough studies disclosing the impact of social media users’ secure behavior on their vulnerability level in the platform, to the best of their knowledge.
5. Future Works
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Appendix A
Author and Year | Article Name | Key Findings | Research Area | Research Method |
---|---|---|---|---|
Tripathi, Tripathi, and Yadav (2016) | Role of information technology in cybercrime and ethical issues in cyber ethics | Types of cyber threats and the role of information technology act 2000 of India to discourage cyber threats | Cybercrimes and cyber ethics | Qualitative |
van den Berg and Keymolen (2017) | Regulating security on the Internet: Control versus trust. | Trust is a key element in cybersecurity strategies | Cybersecurity | Qualitative |
Kruse, Frederick, Jacobson, and Monticone (2017) | Cybersecurity in healthcare: A systematic review of modern threats and trends | The healthcare industry should strengthen its cybersecurity practices regularly | Cybersecurity threats and trends in the healthcare industry | Qualitative |
Ramakrishnan and Tandon (2018) | The evolving landscape of cyber threats | Major cyber threats available on the internet nowadays and the importance of cyber awareness | Cyber threats and user awareness | Qualitative |
Ali (2019) | A constant threat for the business sector and its growth (A study of the online banking sector in GCC) | Need of high-level security framework for online banking in the Gulf Cooperation Council (GCC) | Cybercrimes and cybersecurity in online banking | Quantitative |
Shryock (2019) | The growing cyber threat: Practices are increasingly coming under attack by cybercriminals | Medical practices should take necessary precautions to protect against growing cyber threats as a part of a broad cybersecurity plan | Growing cyber threats | Qualitative |
Svoboda and Lukas (2019) | Sources of threats and threats in cybersecurity. | Sources of cyber threats and types of cyber threats emerging from those sources | Cyber threats | Qualitative |
Author and Year | Article Name | Key Findings | Research Area | Research Method |
---|---|---|---|---|
Goh, Di Gangi, Rivera, and Worrell (2016) | Graduate student perceptions of personal social media risk: A comparison study. | Risks inherited in social media | Cyber risks/threats in social media | Mixed |
Eddolls (2016) | Making cybercrime prevention the highest priority | Evolving cyber threats and defensive mechanisms to minimizing the impact | Cybercrimes and preventive measures | Qualitative |
van Schaik et al. (2017) | Risk perceptions of cybersecurity and precautionary behavior | Cyber awareness leads to precautionary cyber behavior and thereby protect users from cyber risks | Cybersecurity risks and relevant precautionary behaviors | Quantitative |
Bossetta (2018) | The weaponization of social media: Spear phishing and cyber attacks on democracy | How political forces can weaponize social media platforms to perform spear-phishing campaigns | Social media and spear phishing | Qualitative |
Zhang and Gupta (2018) | Social media security and trustworthiness: Overview and new direction | Social media security and trustworthiness make users safe within the platform | Social media security | Quantitative |
Aldawood and Skinner (2019) | Reviewing cybersecurity social engineering training and awareness programs—Pitfalls and ongoing issues | Staff accessing social media using company interconnected information systems can draw the attention of social engineers to commence attacks on those systems. | Social engineering attacks on social media | Qualitative |
Author and Year | Article Name | Key Findings | Research Area | Research Method |
---|---|---|---|---|
Bayard (2019) | The rise of cybercrime and the need for state cybersecurity regulations | Cyber threats, existing federal and state cybersecurity regulations, and the importance of imposing cybersecurity regulations to reduce the impact of cyber threats | Cyber threats and cybersecurity regulations | Qualitative |
Richardson, Lemoine, Stephens, and Waller (2020) | Planning for cybersecurity in schools: The human factor. | The human factor should be given the same priority as same as technical advancements in schools when enhancing cybersecurity | Cybersecurity and human factor | Qualitative |
Zwilling et al. (2020) | Cybersecurity awareness, knowledge, and behavior: A Comparative Study | People with more cyber awareness and knowledge showed less vulnerable cyber behaviors | Cybersecurity awareness, knowledge, and behavior | Quantitative |
Author and Year | Article Name | Key Findings | Research Area | Research Method |
---|---|---|---|---|
Tasevski (2016) | IT and cybersecurity awareness-raising campaigns | Cybersecurity situational awareness is a significant factor in cyber awareness. | Cyber awareness | Qualitative |
Ogutcu, Testik, and Chouseinoglou (2016) | Analysis of personal information security behavior and awareness | Higher education level higher the information security awareness | Information security awareness and behavior | Quantitative |
McCormac et al. (2017) | Individual differences and information security awareness. | Information security awareness differs with individual differences including age, gender, personality, and risk-taking propensity | Information security awareness | Quantitative |
Cain, Edwards, and Still (2018) | An exploratory study of cyber hygiene behaviors and knowledge | Cyber hygiene behaviors and knowledge differs based on age, gender, experience in cyber attacks, and self-described expert level | Cyber hygiene behaviors and knowledge | Quantitative |
Thakur and Kang (2018) | Gender and locale differences in cybercrime awareness among adolescents | Girls had a higher level of cyber awareness while boys had a medium level of cyber awareness | Cyber awareness | Quantitative |
Kovacevic, Putnik, and Toskovic (2020) | Factors related to cybersecurity behavior | The participants of the survey knew that their data is not safe but still that did not alarm them to learn more about cybersecurity | Cyber awareness and cyber behavior | Quantitative |
Nalaka and Diunugala (2020) | Factors associating with social media related crime victimization: Evidence from the undergraduates at a public university in Sri Lanka | The probability of becoming a cyber victim of the youth is more than 50% and online security awareness among the youth generation is less | Cyber victimization | Quantitative |
Author and Year | Article Name | Key Findings | Research Area | Research Method |
---|---|---|---|---|
Safa et al. (2015) | Information security-conscious care behavior formation in organizations | Awareness plays a significant role in information security behavior | Information security behavior | Mixed |
Schilder, Brusselaers, and Bogaerts (2016) | The effectiveness of an intervention to promote awareness and reduce online risk behavior in early adolescence | Awareness was connected with a lower number of reported online risk behavior | Online awareness and behavior | Quantitative |
Hadlington (2017) | Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviors | Internet addiction leads to a risky cybersecurity behavior | Human factors leading to risky cybersecurity behaviors | Quantitative |
Muniandy et al. (2017) | Cybersecurity behavior among higher education students in Malaysia | Some vulnerable cyber behaviors can be reduced by proper cyber awareness | Cybersecurity behavior | Quantitative |
Szumski (2018) | Cybersecurity best practices among Polish students | Most of the cybersecurity-related information flows from unreliable resources | Cybersecurity best practices | Quantitative |
Furnell, Khern-am-nuai, Esmael, Yang, and Li (2018) | Enhancing security behavior by supporting the user | Users expected use of security features can be enhanced by proper guidance, feedback, explaining their security options and decisions | Security behavior | Quantitative |
Torten, Reaiche, and Boyle (2018) | The impact of security awareness on information technology professionals’ behavior | Countermeasure awareness should be the primary focus of security compliance training | Security awareness and behavior | Quantitative |
Barth, de Jong, Junger, Hartel, and Roppelt (2019) | Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources | Users claim to be concerned about their data misuse but yet they are unwilling to invest their time and effort or money to protect their privacy | Online privacy and security behaviors | Quantitative |
Chang and Coppel (2020) | Building cybersecurity awareness in a developing country: Lessons from Myanmar | Cyber maturity and the culture of a particular country are significant when designing cybersecurity awareness campaigns | Cybersecurity awareness | Qualitative |
Author and Year | Article Name | Key Findings | Research Area | Research Method |
---|---|---|---|---|
Tang-Mui and Chan-Eang (2017) | Impacts of social media (Facebook) on human communication and relationships: A view on behavioral change and social unity | Most respondents of the research were depending on Facebook in their daily life in terms of building relationships with friends and family, playing games, reading articles, accessing audio and video clips | Social media (Facebook) on human communication and relationships | Quantitative |
Bhatnagar and Pry (2020) | Student attitudes, awareness, and perceptions of personal privacy and cybersecurity in the use of social media: An initial study | Students are aware of the risks involved in social media. Additionally, they said that the security settings of social media are hard to understand and use. | Student attitudes, awareness, and perceptions of personal privacy and cybersecurity in the use of social media | Quantitative |
Sangster (2020) | When it comes to cybersecurity, ignorance isn’t bliss—it’s negligence | Employees should be more careful with the data they share in social networks | Cybersecurity | Qualitative |
Nyblom, Wangen, and Gkioulos (2020) | Risk perceptions on social media use in Norway | Reddit and Snapchat are the safest social media platforms while Facebook and Twitter are the riskiest in terms of risk perception | Risk perceptions on social media use | Quantitative |
Author and Year | Article Name | Key Findings | Research Area | Research Method |
---|---|---|---|---|
Pensa and Di Blasi (2017) | A privacy self-assessment framework for online social networks | The most powerful privacy protectors in the social network platforms are the users themselves | User privacy in social networks | Quantitative |
Atiso and Kammer (2018) | User beware: Determining vulnerability in social media platforms for users in Ghana | Most social media users are unaware of vulnerabilities in those platforms | User vulnerabilities in social media | Qualitative |
Ortiz, Chih, and Tsai (2018) | Information privacy, consumer alienation, and lurking behavior in social networking sites | Higher information security awareness leads social network users to protect themselves using threat appraisal and generating strong privacy risk belief | Information security awareness and behavior | Quantitative |
Author and Year | Article Name | Key Findings | Research Area | Research Method |
---|---|---|---|---|
Benson et al. (2015) | Information disclosure of social media users | There is a negative relationship between the level of control over personal data and self-disclosure | Information disclosure of social media users | Quantitative |
Leott (2019) | Screening out: Criminal justice students’ awareness of social media usage in policing | Main purposes of Criminal justice students’ social media usage | Social media usage | Quantitative |
Hruska and Maresova (2020) | Use of Social Media Platforms among Adults in the United States—Behavior on Social Media | Social media usage decreases with age and the usage increases when income and education level increases | The behavior of social media users | Qualitative |
References
- Bosse, I.; Renner, G.; Wilkens, L. Social media and Internet use patterns by adolescents with complex communication needs. Lang. Speech Hear. Serv. Sch. 2020, 51, 1024–1036. [Google Scholar] [CrossRef] [PubMed]
- Tankovska, H. Number of Global Social Network Users 2017–2025. 2021. Available online: https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/ (accessed on 10 January 2021).
- Tosun, N.; Altinoz, M.; Cay, E.; Cinkilic, T.; Gulseçen, S.; Yildirim, T.; Aydin, M.A.; Metin, B.; Ayvaz Reis, Z.; Unlu, N. A SWOT Analysis to Raise Awareness about Cyber Security and Proper Use of Social Media: Istanbul Sample. Int. J. Curric. Instr. 2020, 12, 271–294. [Google Scholar]
- Okyireh, R.O.; Okyireh, M.A.A. Experience of Social Media, Training and Development on Work Proficiency: A Qualitative Study with Security Personnel. J. Educ. Pract. 2016, 7, 122–127. [Google Scholar]
- van der Walt, E.; Eloff, J.; Grobler, J. Cyber-security: Identity deception detection on social media platforms. Comput. Secur. 2018, 78, 76–89. [Google Scholar] [CrossRef] [Green Version]
- Murire, O.T.; Flowerday, S.; Strydom, K.; Fourie, C.J.S. Narrative review: Social media use by employees and the risk to institutional and personal information security compliance in South Africa. J. Transdiscipl. Res. S. Afr. 2021, 17, e1–e10. [Google Scholar] [CrossRef]
- Rethlefsen, M.L.; Kirtley, S.; Waffenschmidt, S.; Ayala, A.P.; Moher, D.; Page, M.J.; Koffel, J.B. PRISMA-S: An extension to the PRISMA statement for reporting literature searches in systematic reviews. J. Med. Libr. Assoc. 2021, 109, 174–200. [Google Scholar] [CrossRef]
- Rafael, S.-O.; Ferrán, C.-L.; Edoardo, A.; Craig, L. How to properly use the PRISMA statement. Syst. Rev. 2021, 10, 1–3. [Google Scholar] [CrossRef]
- Rice, D.B.; Kloda, L.A.; Shrier, I.; Thombs, B.D. Reporting completeness and transparency of meta-analyses of depression screening tool accuracy: A comparison of meta-analyses published before and after the PRISMA statement. J. Psychosom. Res. 2016, 87, 57–69. [Google Scholar] [CrossRef]
- Moher, D.; Liberati, A.; Tetzlaff, J.; Altman, D.G. Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. BMJ Br. Med. J. 2009, 339, 332–336. [Google Scholar] [CrossRef] [Green Version]
- Kruse, C.S.; Frederick, B.; Jacobson, T.; Monticone, D.K. Cybersecurity in healthcare: A systematic review of modern threats and trends. Technol. Health Care 2017, 25, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Ali, L. Cyber crimes—A constant threat for the business sector and its growth (A study of the online banking sector in GCC). J. Dev. Areas 2019, 53. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsbig&AN=edsbig.A554041623&site=eds-live&scope=site (accessed on 12 January 2021). [CrossRef]
- Shryock, T. The growing cyber threat: Practices are increasingly coming under attack by cyber criminals. Med. Econ. 2019, 96, 22. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edsgac&AN=edsgac.A590952666&site=eds-live&scope=site (accessed on 15 January 2021).
- Ramakrishnan, U.P.; Tandon, J.K. The evolving lanscape of cyber threats. Vidwat Indian J. Manag. 2018, 11, 31–35. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=139235797&site=eds-live&scope=site (accessed on 18 January 2021).
- Van den Berg, B.; Keymolen, E. Regulating security on the Internet: Control versus trust. Int. Rev. Law Comput. Technol. 2017, 31, 188–205. [Google Scholar] [CrossRef] [Green Version]
- Tripathi, E.; Tripathi, A.; Yadav, M.K.S. Role of information technology in cyber crime and ethical issues in cyber ethics. Int. J. Bus. Eng. Res. 2016, 10, 1–5. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=egs&AN=139360194&site=eds-live&scope=site (accessed on 18 January 2021).
- Svoboda, J.A.N.; Lukas, L. Sources of threats and threats in cyber security. DAAAM Int. Sci. Book 2019, 321–330. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edo&AN=140062921&site=eds-live&scope=site (accessed on 18 January 2021).
- Goh, S.H.; Di Gangi, P.M.; Rivera, J.C.; Worrell, J.L. Graduate student perceptions of personal social media risk: A comparison study. Issues Inf. Syst. 2016, 17, 109–119. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edo&AN=119120441&site=eds-live&scope=site (accessed on 19 January 2021).
- Eddolls, M. Making cybercrime prevention the highest priority. Netw. Secur. 2016, 2016, 5–8. [Google Scholar] [CrossRef]
- Van Schaik, P.; Jeske, D.; Onibokun, J.; Coventry, L.; Jansen, J.; Kusev, P. Risk perceptions of cyber-security and precautionary behaviour. Comput. Hum. Behav. 2017, 75, 547–559. [Google Scholar] [CrossRef] [Green Version]
- Zhang, Z.; Gupta, B.B. Social media security and trustworthiness: Overview and new direction. Futur. Gener. Comput. Syst. 2018, 86, 914–925. [Google Scholar] [CrossRef]
- Bossetta, M. The weaponization of social media: Spear phishing and cyber attacks on democracy. J. Int. Aff. 2018, 71, 97–106. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=bth&AN=132491875&site=eds-live&scope=site (accessed on 19 January 2021).
- Aldawood, H.; Skinner, G. Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues. Future Internet 2019, 11, 73. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=135682631&site=eds-live&scope=site (accessed on 1 February 2021). [CrossRef] [Green Version]
- Richardson, M.D.; Lemoine, P.A.; Stephens, W.E.; Waller, R.E. Planning for cyber security in schools: The human factor. Educ. Plan. 2020, 27, 23–39. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=eric&AN=EJ1252710&site=eds-live&scope=site (accessed on 2 February 2021).
- Patrascu, P. Promoting cybersecurity culture through education. eLearning Softw. Educ. 2019, 2, 273–279. [Google Scholar] [CrossRef]
- Bayard, E.E. The rise of cybercrime and the need for state cybersecurity regulations. Rutgers Comput. Technol. Law J. 2019, 45, 69–96. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=egs&AN=144292728&site=eds-live&scope=site (accessed on 2 February 2021).
- Zwilling, M.; Klien, G.; Lesjak, D.; Wiechetek, Ł.; Cetin, F.; Basim, H.N. Cyber security awareness, knowledge and behavior: A Comparative Study. J. Comput. Inf. Syst. 2020, 1–16. [Google Scholar] [CrossRef]
- Tasevski, P. IT and cyber security awareness-raising campaigns. Inf. Secur. 2016, 34, 7. [Google Scholar] [CrossRef]
- McCormac, A.; Zwaans, T.; Parsons, K.; Calic, D.; Butavicius, M.; Pattinson, M. Individual differences and Information Security Awareness. Comput. Hum. Behav. 2017, 69, 151–156. [Google Scholar] [CrossRef]
- Cain, A.A.; Edwards, M.E.; Still, J.D. An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 2018, 42, 36–45. [Google Scholar] [CrossRef]
- Ogutcu, G.; Testik, O.M.; Chouseinoglou, O. Analysis of personal information security behavior and awareness. Comput. Secur. 2016, 56, 83–93. [Google Scholar] [CrossRef]
- Nalaka, S.; Diunugala, H. Factors associating with social media related crime victimization: Evidence from the undergraduates at a public university in Sri Lanka. Int. J. Cyber Criminol. 2020, 14, 174–184. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edo&AN=143029465&site=eds-live&scope=site (accessed on 6 February 2021).
- Kovacevic, A.; Putnik, N.; Toskovic, O. Factors related to cyber security behavior. IEEE Access 2020, 8, 125140–125148. [Google Scholar] [CrossRef]
- Thakur, A.; Kang, T.K. Gender and locale differences in cyber crime awareness among adolescents. Indian J. Health Wellbeing 2018, 9, 906–916. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=134949110&site=eds-live&scope=site (accessed on 7 February 2021).
- Barth, S.; de Jong, M.D.T.; Junger, M.; Hartel, P.H.; Roppelt, J.C. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telemat. Inform. 2019, 41, 55–69. [Google Scholar] [CrossRef]
- Safa, N.S.; Sookhak, M.; Von Solms, R.; Furnell, S.; Ghani, N.A.; Herawan, T. Information security conscious care behaviour formation in organizations. Comput. Secur. 2015, 53, 65–78. [Google Scholar] [CrossRef] [Green Version]
- Schilder, J.; Brusselaers, M.; Bogaerts, S. The Effectiveness of an intervention to promote awareness and reduce online risk behavior in early adolescence. J. Youth Adolesc. 2016, 45, 286–300. [Google Scholar] [CrossRef] [Green Version]
- Muniandy, L.; Muniandy, B.; Samsudin, Z. Cyber security behaviour among higher education students in Malaysia. J. Inf. Assur. Cyber Secur. 2017, 2017, 1–13. [Google Scholar] [CrossRef] [Green Version]
- Furnell, S.; Khern-am-nuai, W.; Esmael, R.; Yang, W.; Li, N. Enhancing security behaviour by supporting the user. Comput. Secur. 2018, 75, 1–9. [Google Scholar] [CrossRef]
- Torten, R.; Reaiche, C.; Boyle, S. The impact of security awareness on information technology professionals’ behavior. Comput. Secur. 2018, 79, 68–79. [Google Scholar] [CrossRef]
- Chang, L.Y.C.; Coppel, N. Building cyber security awareness in a developing country: Lessons from Myanmar. Comput. Secur. 2020, 97, 101959. [Google Scholar] [CrossRef]
- Hadlington, L. Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon 2017, 3, 7. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Szumski, O. Cybersecurity best practices among Polish students. Procedia Comput. Sci. 2018, 126, 1271–1280. [Google Scholar] [CrossRef]
- Bhatnagar, N.; Pry, M. Student attitudes, awareness, and perceptions of personal privacy and cybersecurity in the use of social media: An initial study. Inf. Syst. Educ. J. 2020, 18, 48–58. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=eric&AN=EJ1246231&site=eds-live&scope=site (accessed on 12 February 2021).
- Tang-Mui, J.; Chan-Eang, T. Impacts of social media (Facebook) on human communication and relationships: A view on behavioral change and social unity. Int. J. Knowl. Content Dev. Technol. 2017, 7, 27–50. [Google Scholar] [CrossRef]
- Nyblom, P.; Wangen, G.; Gkioulos, V. Risk perceptions on social media use in Norway. Future Internet 2020, 12, 211. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=147738607&site=eds-live&scope=site (accessed on 12 February 2021). [CrossRef]
- Sangster, M. When it comes to cyber security, ignorance isn’t bliss—It’s negligence. Netw. Secur. 2020, 2020, 8–12. [Google Scholar] [CrossRef]
- Pensa, R.G.; Di Blasi, G. A privacy self-assessment framework for online social networks. Expert Syst. Appl. 2017, 86, 18–31. [Google Scholar] [CrossRef]
- Ortiz, J.; Chih, W.-H.; Tsai, F.-S. Information privacy, consumer alienation, and lurking behavior in social networking sites. Comput. Hum. Behav. 2018, 80, 143–157. [Google Scholar] [CrossRef]
- Atiso, K.; Kammer, J. User beware: Determining vulnerability in social media platforms for users in Ghana. Libr. Philos. Pract. 2018, 1–25. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=lxh&AN=133873708&site=eds-live&scope=site (accessed on 14 February 2021).
- Benson, V.; Saridakis, G.; Tennakoon, H. Information disclosure of social media users. Inf. Technol. People 2015, 28, 426–441. [Google Scholar] [CrossRef] [Green Version]
- Leott, Y.M. #Screening out: Criminal justice students’ awareness of social media usage in policing. Cogent Soc. Sci. 2019, 5. [Google Scholar] [CrossRef]
- Hruska, J.; Maresova, P. Use of Social Media Platforms among Adults in the United States—Behavior on Social Media. Societies 2020, 10, 27. Available online: http://wintec.idm.oclc.org/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=edb&AN=142616553&site=eds-live&scope=site (accessed on 14 February 2021). [CrossRef] [Green Version]
Section | Page No. |
---|---|
Title | 1 |
Structured summary | 1 |
Rationale | 1 |
Objectives | 1–2 |
Eligibility criteria | 3 |
Information sources | 3 |
Search | 3 |
Study selection | 3 |
Study selection | 3 |
Summary of evidence | 7–9 |
Limitations | 9 |
Conclusions | 10 |
Inclusion Criteria | Exclusion Criteria |
---|---|
Peer-reviewed articles with full access rights | Articles asking for payments for the access |
Published time in between 2015–2021 | Published outside the intended time frame |
Language: English | Other languages |
Full text | Articles with no full-text availability |
Include relevant keywords | Not relevant to the literature themes |
Original publication | Non-empirical studies |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Herath, T.B.G.; Khanna, P.; Ahmed, M. Cybersecurity Practices for Social Media Users: A Systematic Literature Review. J. Cybersecur. Priv. 2022, 2, 1-18. https://doi.org/10.3390/jcp2010001
Herath TBG, Khanna P, Ahmed M. Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal of Cybersecurity and Privacy. 2022; 2(1):1-18. https://doi.org/10.3390/jcp2010001
Chicago/Turabian StyleHerath, Thilini B. G., Prashant Khanna, and Monjur Ahmed. 2022. "Cybersecurity Practices for Social Media Users: A Systematic Literature Review" Journal of Cybersecurity and Privacy 2, no. 1: 1-18. https://doi.org/10.3390/jcp2010001
APA StyleHerath, T. B. G., Khanna, P., & Ahmed, M. (2022). Cybersecurity Practices for Social Media Users: A Systematic Literature Review. Journal of Cybersecurity and Privacy, 2(1), 1-18. https://doi.org/10.3390/jcp2010001