Alabdulatif, A., Alturise, F. (2020). Awareness of data privacy on social networks by students at Qassim University. International Journal of Advanced Computer Research, 10(50), 194. http://dx.doi.org/10.19101/IJACR.2020.1048094.
Albladi, S. M., & Weir, G. R. (2018). User characteristics that influence judgment of social engineering attacks in social networks.
Human-centric Computing and Information Sciences,
8(1), 1-24.
https://doi.org/10.1186/s13673-018-0128-7.
Al-Omoush, K. S., Garrido, R., & Cañero, J. (2023). The impact of government use of social media and social media contradictions on trust in government and citizens’ attitudes in times of crisis.
Journal of Business Research,
159, 113748.
https://doi.org/10.1016/j.jbusres.2023.113748.
Badami, M. A. , Meghdadi, M. M. & Pilevar, M. (2022). Investigating the Impact of Cyberspace on the Abuse of the Right to Raise a Child with Emphasis on Religious Education.
Legal Research,
21(50), 457-494. doi:
10.48300/jlr.2021.279730.1619 [In Persian]
Bhattacharya, M., Roy, S., Chattopadhyay, S., Das, A. K., & Shetty, S. (2023). A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges.
Security and Privacy,
6(1), e275.
https://doi.org/10.1002/spy2.275.
Cárcamo-Ulloa, L., Cárdenas-Neira, C., Scheihing-García, E., Sáez-Trumper, D., Vernier, M., & Blaña-Romero, C. (2023). On Politics and Pandemic: How Do Chilean Media Talk about Disinformation and Fake News in Their Social Networks?.
Societies,
13(2), 25.
https://doi.org/10.3390/soc13020025.
Chee, R. M., Capper, T. S., & Muurlink, O. T. (2023). The impact of social media influencers on pregnancy, birth, and early parenting experiences: A systematic review.
Midwifery,
120, 103623.
https://doi.org/10.1016/j.midw.2023.103623.
Coluccia, A., Pozza, A., Ferretti, F., Carabellese, F., Masti, A., & Gualtieri, G. (2020). Online romance scams: Relational dynamics and psychological characteristics of the victims and scammers. A scoping review.
Clinical practice and epidemiology in mental health: CP & EMH,
16, 24-35.
https://doi.org/10.2174%2F1745017902016010024.
Cross, C., & Layt, R. (2022). “I suspect that the pictures are stolen”: Romance fraud, identity crime, and responding to suspicions of inauthentic identities.
Social Science Computer Review,
40(4), 955-973.
https://doi.org/10.1177/0894439321999311.
Eslami, E,. Mousavi, S. H., & Alikhah, F. (2019). virtual celebrities; Familiar strangers in the age of social media.
Cultural Studies and Communication, 16(59), 45-74.
https://doi.org/10.22034/jcsc.2019.35296 [In Persian]
Fadhil, H. S. (2023). Social Engineering Attacks Techniques.
Int. J. Progress. Res. Eng. Manag. Sci. International Journal Of Engineering And Computer ScienceIJPREMS,
3(1) , 18-20. DOI:
10.18535/ijecs/v6i1.09
Fatemi Nia, M. A ,.Heydari, M , ., & Tabankhet, H. (1400). Social penetration coefficient of celebrities and social factors affecting it in Rasht city. Communication Research, 28(108), 39-67. [In Persian]
Gu, X., Chen, F., Yang, X., Chen, H., Wang, Y., Hou, J., ... & Wang, Y. (2023). Evolutionary trend and network structure characteristics of publicity information dissemination about waste separation by different opinion leaders.
Resources, Conservation and Recycling,
194, 106991.
https://doi.org/10.1016/j.resconrec.2023.106991
Hosseini Senu, S. A., & Mazaheri, E. (2017). The effect of privacy, security and perceived trust on information sharing behavior in mobile social networks: the moderating role of gender.
Journal of Information Processing and Management, 93(6), 235-213. doi:
10.35050/JIPM010.2018.009 [In Persian]
Hu, X., Hu, D., Zheng, S., Li, W., Chen, F., Shu, Z., & Wang, L. (2018). How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control. Multimedia Tools and Applications, 77(14), 18163-18185. https://doi.org/10.1007/s11042-017-4402-x.
Jafarpour Hadi Kiashari, R., Kabuli, M.H., & Shahcheraghi, A. (2022). Analyzing the effect of objective and subjective elements on the sense of "privacy" in the architectural space.
Eastern Art and Civilization, 10(38), 17-28. doi:
10.22034/jaco.2022.364304.1264 [In Persian]
Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177. https://doi.org/10.1007/s40747-021-00409-7.
Jalali, Z. , Kianpour, M. & Aqababaei, E. (2017). sociological study of factors influencing attitude towards personal privacy in social networks (the case of young Facebook users in Isfahan).
Strategic Research on Social Problems,
6(1), 17-28. doi:
10.22108/ssoss.2017.21281 [In Persian]
Kemp, S., & Erades Pérez, N. (2023). Consumer Fraud against Older Adults in Digital Society: Examining Victimization and Its Impact.
Environmental Research and Public Health,
20(7), 5404.
https://doi.org/10.3390/ijerph20075404
López, C., Hartmann, P., & Apaolaza, V. (2019). Gratifications on social networking sites: The role of secondary school students’ individual differences in loneliness.
Educational Computing Research,
57(1), 58-82.
https://doi.org/10.1177/0735633117743917
Nawaz, N. A., Ishaq, K., Farooq, U., Khalil, A., Rasheed, S., Abid, A., & Rosdi, F. (2023). A comprehensive review of security threats and solutions for the online social networks industry.
PeerJ Computer Science,
9, e1143. DOI:
10.7717/peerj-cs.1143
Okokpujie, K., Kennedy, C. G., Nnodu, K., & Noma-Osaghae, E. (2023). Cybersecurity Awareness: Investigating Students' Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study of a Nigerian Leading University).
Sustainable Development & Planning,
18(1), 255-263.
https://doi.org/10.18280/ijsdp.180127
Pour Naqdi, B. (2017). Security opportunities and threats in virtual social networks for students.
Strategic Researches of Iran's Social Issues, 1(2), 37-71. doi:
10.22108/ssoss.2018.103434.1062 [In Persian]
Rahmatizadeh, A,. Karimzadegan Moghadam, D,. & Vahdat, D. (1400). Reliability and the difference between the moral behavior of honesty in speech and the inner intention of people in social networks.
Ethics in Science and Technology, 16(3), 97-104. dor:
20.1001.1.22517634.1400.16.3.13.0 [In Persian]
Rehman, S. U., Manickam, S., & Al-Charchafchi, A. (2023). Privacy calculus model for online social networks: a study of Facebook users in a Malaysian university.
Education and Information Technologies,
28(6), 7205-7223. DOI:
10.1007/s10639-022-11459-w
Rhodes, S. C. (2022). Filter bubbles, echo chambers, and fake news: How social media conditions individuals to be less critical of political misinformation.
Political Communication,
39(1), 1-22.
https://doi.org/10.1080/10584609.2021.1910887.
Rochlitz, M., Schoors, K. J., & Zakharov, N. (
2023, April 29).
Can Authoritarian Propaganda Compete with the Opposition on Social Media? Experimental Evidence from Russia. Experimental Evidence from Russia.
http://dx.doi.org/10.2139/ssrn.4433145.
Sart, G., & Sezgin, F. H. (2022, November 7-9). The effect of internet addiction on social and emotional loneliness in university students. In
ICERI2022 Proceedings (pp. 6420-6426). IATED.
https://doi.org/10.21125/iceri.2022.1599.
Van Schaik, P., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour.
Computers in Human Behavior,
78, 283-297.
https://doi.org/10.1016/j.chb.2017.10.007.
White, G., & Leontyeva, A. (2023). Tweet Your Heart Out: The personality correlates and affective consequences of social media use on close relationships and psychological health. Mental Health and Social Behaviour, 5(1), 75, 177. https://doi.org/10.33790/jmhsb1100177.
Yasin, A., Fatima, R., Liu, L., Wang, J., Ali, R., & Wei, Z. (2021). Understanding and deciphering of social engineering attack scenarios.
Security and Privacy,
4(4), e161.
https://doi.org/10.1002/spy2.161.
Ye, S., Ho, K. K., & Zerbe, A. (2021). The effects of social media usage on loneliness and well-being: analysing friendship connections of Facebook, Twitter and Instagram.
Information Discovery and Delivery,
49(2), 136-150.
https://doi.org/10.1108/IDD-08-2020-0091.
Yi, Y., Zhu, N., He, J., Jurcut, A. D., Ma, X., & Luo, Y. (2023). A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks.
Computer Communications,
200, 149-160.
https://doi.org/10.1016/j.comcom.2023.01.010.
Yoro, R. E., Aghware, F. O., Akazue, M. I., Ibor, A. E., & Ojugo, A. A. (2023). Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian.
Electrical and Computer Engineering (IJECE),
13(2), 1943-1953. DOI:
10.11591/ijece.v13i2.pp1943-1953
Yoro, R. E., Aghware, F. O., Malasowe, B. O., Nwankwo, O., & Ojugo, A. A. (2023). Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria.
Electrical and Computer Engineering (IJECE),
13(2), 1922-1931.
https://doi.org/10.1177/0894439321999311.
Zhang, Z., Jing, J., Wang, X., Choo, K. K. R., & Gupta, B. B. (2020). A crowdsourcing method for online social networks security assessment based on human-centric computing.
Human-centric Computing and Information Sciences,
10(1), 23.
https://doi.org/10.1186/s13673‑020‑00230‑0.
Zulfahmi, M., Elsandi, A., Apriliansyah, A., Anggreainy, M. S., Iskandar, K., & Karim, S. (2023). Privacy protection strategies on social media.
Procedia Computer Science,
216, 471-478.
https://doi.org/10.1016/j.procs.2022.12.159