Document Type : Original Article

Authors

1 Master of Knowledge and Information Science, Faculty of Education and Psychology, University of Birjand, Birjand, Iran

2 Assistant Professor, Department of Knowledge and Information Science, Faculty of Education and Psychology, University of Birjand, Birjand, Iran.

3 Assistant Professor, Department of Knowledge and Information Science, Faculty of Education and Psychology, University of Birjand, Birjand, Iran

Abstract

Purpose: The vast volume of data and information circulating in social networks, combined with their popularity and extensive use, exposes these platforms to numerous security risks. Consequently, user security and privacy have become among the most critical issues in in today's digital landscape. Many factors influence users' security and privacy behaviors on social networks. This study investigates the role of individual factors in shaping behaviors related to the security and privacy of social network users.
Methodology: This descriptive-survey research employed a researcher-designed questionnaire administered to a sample of 375 students at the University of Birjand . The questionnaire's validity was confirmed by expert judgment, and its reliability was verified using Cronbach's alpha coefficient ( α = 0.876).
Findings: The average levels of behaviors associated with the social engineering factors of authority and loneliness were within the optimal range. However, the mean score for  the celebrity variable was significantly higher than the optimal level, while normalization and attention-grabbing  events acored significantly below the desired level. In addition, , the average levels of behaviors related to the social engineering methods of phishing, forgery, and identity theft was significantly higher than the optimal level, whereas bait links, fake website offers, and online romance scams were within the acceptable range. Demographic analysis revealed that female students scored higher than male students across all variables, and undergraduate students showed higher acores than those at graduate levels .
Conclusion: The behaviors related to social engineering factors (such as celebrity influence, authority, loneliness, attention-grabbing events, and normalization) were generally at a desirable level among students. However, behaviors associated with social engineering methods (including bait links, fraudulent websites, online romance scams, phishing, and identity theft) exceeded the optimal level.
Value: Overall, participants engaged more frequently in behaviors related to social engineering methods than in those related to factors. Although students expressed a strong concern for security and privacy issues, they also acknowledged limited awareness of certain aspects of these topics.

Keywords

Main Subjects

Alabdulatif, A., Alturise, F. (2020). Awareness of data privacy on social networks by students at Qassim University. International Journal of Advanced Computer Research, 10(50), 194. http://dx.doi.org/10.19101/IJACR.2020.1048094.
Albladi, S. M., & Weir, G. R. (2018). User characteristics that influence judgment of social engineering attacks in social networks. Human-centric Computing and Information Sciences, 8(1), 1-24. https://doi.org/10.1186/s13673-018-0128-7.
Albladi, S. M., & Weir, G. R. (2020). Predicting individuals’ vulnerability to social engineering in social networks. Cybersecurity, 3(1), 1-19. https://doi.org/10.1186/s42400-020-00047-5.
Al-Omoush, K. S., Garrido, R., & Cañero, J. (2023). The impact of government use of social media and social media contradictions on trust in government and citizens’ attitudes in times of crisis. Journal of Business Research, 159, 113748. https://doi.org/10.1016/j.jbusres.2023.113748.
Badami, M. A. , Meghdadi, M. M. & Pilevar, M. (2022). Investigating the Impact of Cyberspace on the Abuse of the Right to Raise a Child with Emphasis on Religious Education.  Legal Research21(50), 457-494. doi: 10.48300/jlr.2021.279730.1619  [In Persian]
 Bhattacharya, M., Roy, S., Chattopadhyay, S., Das, A. K., & Shetty, S. (2023). A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges. Security and Privacy, 6(1), e275. https://doi.org/10.1002/spy2.275.
Cárcamo-Ulloa, L., Cárdenas-Neira, C., Scheihing-García, E., Sáez-Trumper, D., Vernier, M., & Blaña-Romero, C. (2023). On Politics and Pandemic: How Do Chilean Media Talk about Disinformation and Fake News in Their Social Networks?. Societies, 13(2), 25. https://doi.org/10.3390/soc13020025.
Chee, R. M., Capper, T. S., & Muurlink, O. T. (2023). The impact of social media influencers on pregnancy, birth, and early parenting experiences: A systematic review. Midwifery, 120, 103623. https://doi.org/10.1016/j.midw.2023.103623.
Coluccia, A., Pozza, A., Ferretti, F., Carabellese, F., Masti, A., & Gualtieri, G. (2020). Online romance scams: Relational dynamics and psychological characteristics of the victims and scammers. A scoping review. Clinical practice and epidemiology in mental health: CP & EMH, 16, 24-35. https://doi.org/10.2174%2F1745017902016010024.
Cross, C., & Layt, R. (2022). “I suspect that the pictures are stolen”: Romance fraud, identity crime, and responding to suspicions of inauthentic identities. Social Science Computer Review, 40(4), 955-973. https://doi.org/10.1177/0894439321999311.
Eslami, E,. Mousavi, S. H., & Alikhah, F. (2019). virtual celebrities; Familiar strangers in the age of social media. Cultural Studies and Communication, 16(59), 45-74. https://doi.org/10.22034/jcsc.2019.35296 [In Persian]
Fadhil, H. S. (2023). Social Engineering Attacks Techniques. Int. J. Progress. Res. Eng. Manag. Sci. International Journal Of Engineering And Computer ScienceIJPREMS,3(1) , 18-20. DOI:10.18535/ijecs/v6i1.09
Fatemi Nia, M. A ,.Heydari, M , ., & Tabankhet, H. (1400). Social penetration coefficient of celebrities and social factors affecting it in Rasht city. Communication Research, 28(108), 39-67. [In Persian]
Gu, X., Chen, F., Yang, X., Chen, H., Wang, Y., Hou, J., ... & Wang, Y. (2023). Evolutionary trend and network structure characteristics of publicity information dissemination about waste separation by different opinion leaders. Resources, Conservation and Recycling194, 106991.‏ https://doi.org/10.1016/j.resconrec.2023.106991
Hood, M., Creed, P. A., & Mills, B. J. (2018). Loneliness and online friendships in emerging adults. Personality and Individual Differences133, 96-102.‏ https://doi.org/10.1016/j.paid.2017.03.045
Hosseini Senu, S. A., & Mazaheri, E. (2017). The effect of privacy, security and perceived trust on information sharing behavior in mobile social networks: the moderating role of gender. Journal of Information Processing and Management, 93(6), 235-213. doi: 10.35050/JIPM010.2018.009 [In Persian]
Hu, X., Hu, D., Zheng, S., Li, W., Chen, F., Shu, Z., & Wang, L. (2018). How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control. Multimedia Tools and Applications, 77(14), 18163-18185. https://doi.org/10.1007/s11042-017-4402-x.
Jafarpour Hadi Kiashari, R., Kabuli, M.H., & Shahcheraghi, A. (2022). Analyzing the effect of objective and subjective elements on the sense of "privacy" in the architectural space. Eastern Art and Civilization, 10(38), 17-28. doi: 10.22034/jaco.2022.364304.1264 [In Persian]
Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157-2177. https://doi.org/10.1007/s40747-021-00409-7.
Jalali, Z. , Kianpour, M. & Aqababaei, E. (2017). sociological study of factors influencing attitude towards personal privacy in social networks (the case of young Facebook users in Isfahan). Strategic Research on Social Problems6(1), 17-28. doi: 10.22108/ssoss.2017.21281 [In Persian]
Kemp, S., & Erades Pérez, N. (2023). Consumer Fraud against Older Adults in Digital Society: Examining Victimization and Its Impact. Environmental Research and Public Health, 20(7), 5404. https://doi.org/10.3390/ijerph20075404
López, C., Hartmann, P., & Apaolaza, V. (2019). Gratifications on social networking sites: The role of secondary school students’ individual differences in loneliness. Educational Computing Research, 57(1), 58-82. https://doi.org/10.1177/0735633117743917
Mittal, N. (2023). User Perceptions of Privacy and Security in Online Social Networks. Innovative Science and Research Technology,1(8), 91-94. DOIhttps://doi.org/10.5281/zenodo.7547576
Nawaz, N. A., Ishaq, K., Farooq, U., Khalil, A., Rasheed, S., Abid, A., & Rosdi, F. (2023). A comprehensive review of security threats and solutions for the online social networks industry. PeerJ Computer Science9, e1143.‏ DOI:10.7717/peerj-cs.1143
Okokpujie, K., Kennedy, C. G., Nnodu, K., & Noma-Osaghae, E. (2023). Cybersecurity Awareness: Investigating Students' Susceptibility to Phishing Attacks for Sustainable Safe Email Usage in Academic Environment (A Case Study of a Nigerian Leading University). Sustainable Development & Planning, 18(1), 255-263. https://doi.org/10.18280/ijsdp.180127
Paki, Z. S., Sani, S., & Diri, G. I. (2022). Connection to the use of free Android apps in Kebbi State, Nigeria. Social Sciences, 5(3), 144-154. https://doi.org/10.52326/jss.utm.2022.5(3).11.
Pour Naqdi, B. (2017). Security opportunities and threats in virtual social networks for students. Strategic Researches of Iran's Social Issues, 1(2), 37-71. doi: 10.22108/ssoss.2018.103434.1062 [In Persian]
Rahmatizadeh, A,. Karimzadegan Moghadam, D,. & Vahdat, D. (1400). Reliability and the difference between the moral behavior of honesty in speech and the inner intention of people in social networks. Ethics in Science and Technology, 16(3), 97-104. dor: 20.1001.1.22517634.1400.16.3.13.0 [In Persian]
Rehman, S. U., Manickam, S., & Al-Charchafchi, A. (2023). Privacy calculus model for online social networks: a study of Facebook users in a Malaysian university. Education and Information Technologies, 28(6), 7205-7223. DOI:10.1007/s10639-022-11459-w
Rhodes, S. C. (2022). Filter bubbles, echo chambers, and fake news: How social media conditions individuals to be less critical of political misinformation. Political Communication39(1), 1-22.‏ https://doi.org/10.1080/10584609.2021.1910887.
Rochlitz, M., Schoors, K. J., & Zakharov, N. (2023, April 29). Can Authoritarian Propaganda Compete with the Opposition on Social Media? Experimental Evidence from Russia. Experimental Evidence from Russia. http://dx.doi.org/10.2139/ssrn.4433145.
Sart, G., & Sezgin, F. H. (2022, November 7-9). The effect of internet addiction on social and emotional loneliness in university students. In ICERI2022 Proceedings (pp. 6420-6426). IATED. https://doi.org/10.21125/iceri.2022.1599.
Van der Schyff, K., & Flowerday, S. (2021). Mediating effects of information security awareness. Computers & Security, 106, 102313. https://doi.org/10.1016/j.cose.2021.102313.
Van Schaik, P., Jansen, J., Onibokun, J., Camp, J., & Kusev, P. (2018). Security and privacy in online social networking: Risk perceptions and precautionary behaviour. Computers in Human Behavior, 78, 283-297. https://doi.org/10.1016/j.chb.2017.10.007.
White, G., & Leontyeva, A. (2023). Tweet Your Heart Out: The personality correlates and affective consequences of social media use on close relationships and psychological health. Mental Health and Social Behaviour, 5(1), 75, 177. https://doi.org/10.33790/jmhsb1100177.
Yasin, A., Fatima, R., Liu, L., Wang, J., Ali, R., & Wei, Z. (2021). Understanding and deciphering of social engineering attack scenarios. Security and Privacy, 4(4), e161. https://doi.org/10.1002/spy2.161.
Ye, S., Ho, K. K., & Zerbe, A. (2021). The effects of social media usage on loneliness and well-being: analysing friendship connections of Facebook, Twitter and Instagram. Information Discovery and Delivery, 49(2), 136-150. https://doi.org/10.1108/IDD-08-2020-0091.
Yi, Y., Zhu, N., He, J., Jurcut, A. D., Ma, X., & Luo, Y. (2023). A privacy-dependent condition-based privacy-preserving information sharing scheme in online social networks. Computer Communications, 200, 149-160. https://doi.org/10.1016/j.comcom.2023.01.010.
Yoro, R. E., Aghware, F. O., Akazue, M. I., Ibor, A. E., & Ojugo, A. A. (2023). Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian. Electrical and Computer Engineering (IJECE), 13(2), 1943-1953. DOI:10.11591/ijece.v13i2.pp1943-1953
Yoro, R. E., Aghware, F. O., Malasowe, B. O., Nwankwo, O., & Ojugo, A. A. (2023). Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria.  Electrical and Computer Engineering (IJECE), 13(2), 1922-1931. https://doi.org/10.1177/0894439321999311.
Zhang, Z., Jing, J., Wang, X., Choo, K. K. R., & Gupta, B. B. (2020). A crowdsourcing method for online social networks security assessment based on human-centric computing. Human-centric Computing and Information Sciences10(1), 23.‏ https://doi.org/10.1186/s13673‑020‑00230‑0.
Zulfahmi, M., Elsandi, A., Apriliansyah, A., Anggreainy, M. S., Iskandar, K., & Karim, S. (2023). Privacy protection strategies on social media. Procedia Computer Science, 216, 471-478. https://doi.org/10.1016/j.procs.2022.12.159