Research Article
BibTex RIS Cite

Digital Marketing in the Age of Cyber Threats: A Comprehensive Guide to Cybersecurity Practices

Year 2024, Volume: 8 Issue: 15, 1 - 10, 29.02.2024
https://doi.org/10.30520/tjsosci.1412062

Abstract

As digital marketing strategies become increasingly integrated into business models, unique vulnerabilities to cyber threats make cybersecurity essential. This descriptive study provides a detailed analysis of cybersecurity for digital marketing, which is rapidly evolving with technological advancements and consumer behavior transitions. The integration of tools like Search Engine Optimization, social media, and online advertising and their susceptibility to cyber risks are investigated. Critical cybersecurity threats in digital marketing, including phishing attacks, malware and ransomware, data breaches, and Distributed Denial of Service attacks, are explored, emphasizing their potential impact on business operations, customer trust, and brand reputation. The study further explores best practices in cybersecurity tailored to the digital marketing area, advocating for regular software updates, comprehensive employee training, stringent data encryption protocols, strong password policies, multi-factor authentication, and periodic security audits, highlighting the importance of data backups and adherence to data protection laws in maintaining legal and ethical standards. The role of Artificial Intelligence and Machine Learning is investigated, emphasizing how these technologies enhance cybersecurity measures through proactive threat detection and efficient incident management. Additionally, the study examines the rising consumer concerns and awareness regarding data privacy and security in digital marketing, reflecting how these concerns influence business practices and the increasing demand for transparency and data control among consumers. Necessitating continuous vigilance and adaptation to protect against ever-evolving cyber threats, effective cybersecurity is indispensable in digital marketing for protection against cyber threats and as a vital element in building and maintaining consumer trust and loyalty.

References

  • Agarwal, M. (2021). A study on Pay-Per-Click advertising. Asian Journal of Multidimensional Research, 10(11), 618–624. https://doi.org/10.5958/2278-4853.2021.01042.9
  • Akdemir, N. (2021). Coping with Identity Theft and Fear of Identity Theft in the Digital Age. In Legal Challenges in the New Digital Age (pp. 176–197). Brill Nijhoff. https://doi.org/10.1163/9789004447417_011
  • Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Journal of King Saud University - Computer and Information Sciences, 34(10, Part A), 8176–8206. https://doi.org/10.1016/j.jksuci.2022.08.003
  • Algharibeh, M. M., Husari, G., & Jaf, S. (2021). A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement. 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), 1980–1987. https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00296
  • Alhayani, B., Mohammed, H. J., Chaloob, I. Z., & Ahmed, J. S. (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings, 531.
  • Ansari, M. F., Dash, B., Sharma, P., & Yathiraju, N. (2022). The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review (SSRN Scholarly Paper 4323317). https://papers.ssrn.com/abstract=4323317
  • Ansari, M. F., Sharma, P. K., & Dash, B. (2022). Prevention of phishing attacks using AI-based Cybersecurity Awareness Training. Prevention, 3(3), Article 6, Available at: https://www.interscience.in/ijssan/vol3/iss3/6
  • Beauvisage, T., & Mellet, K. (2020). Datassets: Assetizing and marketizing personal data. Assetization: Turning Things into Assets in Technoscientific Capitalism, 75–96.
  • Bukaty, P. (2019). The California Consumer Privacy Act (CCPA): An implementation guide. IT Governance Ltd.
  • Butt, U. J., Abbod, M. F., & Kumar, A. (2020). Cyber Threat Ransomware and Marketing to Networked Consumers. In Handbook of Research on Innovations in Technology and Marketing for the Connected Consumer (pp. 155–185). IGI Global. https://doi.org/10.4018/978-1-7998-0131-3.ch008
  • Das, S. (2021). Search Engine Optimization and Marketing: A Recipe for Success in Digital Marketing. CRC Press, A Chapman and Hall Book.
  • Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine learning in cybersecurity: A comprehensive survey. The Journal of Defense Modeling and Simulation, 19(1), 57–106. https://doi.org/10.1177/1548512920951275
  • Dubovyk, T., Buchatska, I., Zerkal, A., & Lebedchenko, V. (2022). Digital Marketing in the Condition of Wartime Posture in Ukraine, 22(7), 206. https://doi.org/10.22937/IJCSNS.2022.22.7.25
  • Dunsin, D., Ghanem, M. C., & Quazzane, K. (2022). The use of artificial intelligence in digital forensics and incident response in a constrained environment. International Journal of Information and Communication Engineering, 16(8), 280–285.
  • Furnell, S. M., & Vasileiou, I. (2022). A holistic view of cybersecurity education requirements. In Research Anthology on Advancements in Cybersecurity Education (pp. 289–307). IGI Global.
  • Garg, S., Gupta, S., & Gupta, B. (2022). Impacts of Blockchain on Digital Marketing. In A. K. Nagar, D. S. Jat, G. Marín-Raventós, & D. K. Mishra (Eds.), Intelligent Sustainable Systems (pp. 209–217). Springer Nature. https://doi.org/10.1007/978-981-16-6309-3_21
  • Gupta, N. (2020). Digital marketing: Trends, opportunities, and challenges. ASIAN JOURNAL OF MANAGEMENT, 11(4), 434–440. https://doi.org/10.5958/2321-5763.2020.00066.9
  • Habibzadeh, H., Nussbaum, B. H., Anjomshoa, F., Kantarci, B., & Soyata, T. (2019). A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society, 50, 101660. https://doi.org/10.1016/j.scs.2019.101660
  • Hammou, I., Aboudou, S., & Makloul, Y. (2020). Social Media and Intangible Cultural Heritage for Digital Marketing Communication: Case of Marrakech Crafts, 2227-6718, https://doi.org/10.21272/mmi.2020.1-09
  • He, W., & Zhang, Z. (Justin). (2019). Enterprise cybersecurity training and awareness programs: Recommendations for success. Journal of Organizational Computing and Electronic Commerce, 29(4), 249–257. https://doi.org/10.1080/10919392.2019.1611528
  • Hoofnagle, C. J., van der Sloot, B., & Borgesius, F. Z. (2019). The European Union general data protection regulation: What it is and means*. Information & Communications Technology Law, 28(1), 65–98. https://doi.org/10.1080/13600834.2019.1573501
  • Huzaizi, A. H. A., Tajuddin, S., Bahari, K. A., Manan, K. A., & Abd Mubin, N. N. (2021). Cyber-security culture towards digital marketing communications among small and medium-sized (SME) entrepreneurs. Asian Culture and History, 13(2), 1–20.
  • Ilyas, G. B., Munir, A. R., Tamsah, H., Mustafa, H., & Yusriadi, Y. (2021). The Influence of Digital Marketing and Customer Perceived Value through Customer Satisfaction on Customer Loyalty. Journal of Legal, Ethical and Regulatory Issues, 24 Pt. 2, 1.
  • Jenkinson, A. (2022). Ransomware and Cybercrime. CRC Press, Web Site: https://books.google.com.tr/books?hl=tr&lr=&id=DLprEAAAQBAJ&oi=fnd&pg=PT6&dq=Ransomware+and+Cybercrime.+CRC+Press&ots=Zu97Lehq3i&sig=sBKWktegxBmXO-dsQrsAvyDgdRY&redir_esc=y#v=onepage&q=Ransomware%20and%20Cybercrime.%20CRC%20Press&f=false
  • Juma’h, A. H., & Alnsour, Y. (2020). The effect of data breaches on company performance. International Journal of Accounting & Information Management, 28(2), 275–301. https://doi.org/10.1108/IJAIM-01-2019-0006
  • Kanimozhi, V., & Jacob, T. P. (2019). Artificial Intelligence-based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing. 2019 International Conference on Communication and Signal Processing (ICCSP), 0033–0036. https://doi.org/10.1109/ICCSP.2019.8698029
  • Kaur Chahal, J., Bhandari, A., & Behal, S. (2019). Distributed Denial of Service Attacks: A Threat or Challenge. New Review of Information Networking, 24(1), 31–103. https://doi.org/10.1080/13614576.2019.1611468
  • Kilag, O. K. T., Indino, N. V., Sabagala, A. M., Abendan, C. F. K., Arcillo, M. T., & Camangyan, G. A. (2023). Managing Cybersecurity Risks in Educational Technology Environments: Strategies and Best Practices. American Journal of Language, Literacy and Learning in STEM Education (2993-2769), 1(5), Article 5.
  • Kollnig, K., Shuba, A., Binns, R., Van Kleek, M., & Shadbolt, N. (2022). Are iPhones Really Better for Privacy? Comparative Study of iOS and Android Apps. Proceedings on Privacy Enhancing Technologies, 2022(2), 6–24. https://doi.org/10.2478/popets-2022-0033
  • Konyeha, S. (2020). Exploring cybersecurity threats in digital marketing. Journal of Science and Technology Research, 2(3), 12-20, https://doi.org/10.37933/nipes/2.3.2020.2
  • Krishen, A. S., Dwivedi, Y. K., Bindu, N., & Kumar, K. S. (2021). A broad overview of interactive digital marketing: A bibliometric network analysis. Journal of Business Research, 131, 183–195. https://doi.org/10.1016/j.jbusres.2021.03.061
  • Lies, J. (2019). Marketing Intelligence and Big Data: Digital Marketing Techniques on their Way to Becoming Social Engineering Techniques in Marketing, 5(5), 134-144, https://doi.org/10.9781/ijimai.2019.05.002
  • Maglaras, L., & Kantzavelou, I. (2021). Cybersecurity Issues in Emerging Technologies. CRC Press.
  • Makridis, C. A. (2021). Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018. Journal of Cybersecurity, 7(1), tyab021. https://doi.org/10.1093/cybsec/tyab021
  • Mogaji, E., Soetan, T. O., & Kieu, T. A. (2021). The implications of artificial intelligence on the digital marketing of financial services to vulnerable customers. Australasian Marketing Journal, 29(3), 235–242. https://doi.org/10.1016/j.ausmj.2020.05.003
  • Mugarza, I., Flores, J. L., & Montero, J. L. (2020). Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era. Sensors, 20(24), 7160. https://doi.org/10.3390/s20247160
  • Mukherjee, S. B., Ghatak, S. G. N., & Ray, N. (2021). Digitization of Economy and Society: Emerging Paradigms. CRC Press, Web Site: https://books.google.com.tr/books?hl=tr&lr=&id=BiA-EAAAQBAJ&oi=fnd&pg=PP1&dq=Digitization+of+Economy+and+Society:+Emerging+Paradigms.+CRC+Press.&ots=j1S58OZeKK&sig=gYc9QjnG7HrT0N8IoYCwNfQhEdY&redir_esc=y#v=onepage&q=Digitization%20of%20Economy%20and%20Society%3A%20Emerging%20Paradigms.%20CRC%20Press.&f=false, Apple Academic Press.
  • Murn, L. (2021). Data Safety and Cybersecurity. In Digital Transformation of the Laboratory (pp. 85–100). John Wiley & Sons, Ltd. https://doi.org/10.1002/9783527825042.ch4
  • Naseer, H., Maynard, S. B., & Desouza, K. C. (2021). Demystifying analytical information processing capability: The case of cybersecurity incident response. Decision Support Systems, 143, 113476. https://doi.org/10.1016/j.dss.2020.113476
  • Omorogbe, P. E. (2023). Improving Digital Marketing Strategy: The Impact of Digital Analytics, Bachelor’s Degree in International Business Web Site: https://www.theseus.fi/handle/10024/803981
  • Peter, M. K., & Dalla Vecchia, M. (2021). The Digital Marketing Toolkit: A Literature Review for the Identification of Digital Marketing Channels and Platforms. In R. Dornberger (Ed.), New Trends in Business Information Systems and Technology: Digital Innovation and Digital Business Transformation (pp. 251–265). Springer International Publishing. https://doi.org/10.1007/978-3-030-48332-6_17
  • Purnomo, Y. J. (2023). Digital marketing strategy to increase sales conversion on e-commerce platforms. Journal of Contemporary Administration and Management (ADMAN), 1(2), 54–62.
  • Raul, A. C. (2021). The privacy, data protection, and cybersecurity law review. Law Business Research Limited, Web Site: https://datamatters.sidley.com/wp-content/uploads/sites/2/2019/11/The-Privacy-Data-Protection-and-Cybersecurity-Law-Review-Edition-6.pdf
  • Reeves, A., Calic, D., & Delfabbro, P. (2021). “Get a red-hot poker and open up my eyes; it’s so boring.”1: Employee perceptions of cybersecurity training. Computers & Security, 106, 102281. https://doi.org/10.1016/j.cose.2021.102281
  • Rosário, A. T. (2023). Security in Digital Marketing: Challenges and Opportunities. In Confronting Security and Privacy Challenges in Digital Marketing (pp. 206–233). IGI Global. https://doi.org/10.4018/978-1-6684-8958-1.ch010
  • Sabillon, R. (2022). Audits in Cybersecurity. In Research Anthology on Business Aspects of Cybersecurity (pp. 1–18). IGI Global. https://doi.org/10.4018/978-1-6684-3698-1.ch001
  • Sachdev, R. (2020). Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments. 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 341–346. https://doi.org/10.1109/FMEC49853.2020.9144755
  • Sain, M., Normurodov, O., Hong, C., & Hui, K. L. (2021). A Survey on the Security in Cyber-Physical System with Multi-Factor Authentication. 2021 23rd International Conference on Advanced Communication Technology (ICACT), 1–8. https://doi.org/10.23919/ICACT51234.2021.9370515
  • Saura, J. R. (2021). Using Data Sciences in Digital Marketing: Framework, methods, and performance metrics. Journal of Innovation & Knowledge, 6(2), 92–102. https://doi.org/10.1016/j.jik.2020.08.001
  • Scott, H. (2023). ‘Reject All’: Data, Drift and Digital Vigilance. In S. Hayes, M. Jopling, S. Connor, & M. Johnson (Eds.), Human Data Interaction, Disadvantage and Skills in the Community: Enabling Cross-Sector Environments for Postdigital Inclusion (pp. 285–298). Springer International Publishing. https://doi.org/10.1007/978-3-031-31875-7_15
  • Singh, D., Sumesh. (2019). Handbook of Research on Innovations in Technology and Marketing for the Connected Consumer. IGI Global.
  • Sisodia, D., & Sisodia, D. S. (2023). A transfer learning framework towards identifying fraudulent publishers’ behavioral changes in pay-per-click online advertising model for click fraud detection. Expert Systems with Applications, 232, 120922. https://doi.org/10.1016/j.eswa.2023.120922
  • Srinivas, S., & Liang, H. (2022). Being digital to being vulnerable: Does digital transformation allure a data breach? Journal of Electronic Business & Digital Economics, 1(1/2), 111–137. https://doi.org/10.1108/JEBDE-08-2022-0026
  • Srivastav, P., & Gupta, H. (2021). Role and Applications of Digital Marketing in Digital Era: A Review. 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 1–5. https://doi.org/10.1109/ICRITO51393.2021.9596087
  • Tezel, A., Papadonikolaki, E., Yitmen, I., & Bolpagni, M. (2022). Blockchain Opportunities and Issues in the Built Environment: Perspectives on Trust, Transparency and Cybersecurity. In M. Bolpagni, R. Gavina, & D. Ribeiro (Eds.), Industry 4.0 for the Built Environment: Methodologies, Technologies and Skills (pp. 569–588). Springer International Publishing. https://doi.org/10.1007/978-3-030-82430-3_24
  • Wiafe, I., Koranteng, F. N., Obeng, E. N., Assyne, N., Wiafe, A., & Gulliver, S. R. (2020). Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature. IEEE Access, 8, 146598–146612. https://doi.org/10.1109/ACCESS.2020.3013145

Digital Marketing in the Age of Cyber Threats: A Comprehensive Guide to Cybersecurity Practices

Year 2024, Volume: 8 Issue: 15, 1 - 10, 29.02.2024
https://doi.org/10.30520/tjsosci.1412062

Abstract

As digital marketing strategies become increasingly integrated into business models, unique vulnerabilities to cyber threats make cybersecurity essential. This descriptive study provides a detailed analysis of cybersecurity for digital marketing, which is rapidly evolving with technological advancements and consumer behavior transitions. The integration of tools like Search Engine Optimization, social media, and online advertising and their susceptibility to cyber risks are investigated. Critical cybersecurity threats in digital marketing, including phishing attacks, malware and ransomware, data breaches, and Distributed Denial of Service attacks, are explored, emphasizing their potential impact on business operations, customer trust, and brand reputation. The study further explores best practices in cybersecurity tailored to the digital marketing area, advocating for regular software updates, comprehensive employee training, stringent data encryption protocols, strong password policies, multi-factor authentication, and periodic security audits, highlighting the importance of data backups and adherence to data protection laws in maintaining legal and ethical standards. The role of Artificial Intelligence and Machine Learning is investigated, emphasizing how these technologies enhance cybersecurity measures through proactive threat detection and efficient incident management. Additionally, the study examines the rising consumer concerns and awareness regarding data privacy and security in digital marketing, reflecting how these concerns influence business practices and the increasing demand for transparency and data control among consumers. Necessitating continuous vigilance and adaptation to protect against ever-evolving cyber threats, effective cybersecurity is indispensable in digital marketing for protection against cyber threats and as a vital element in building and maintaining consumer trust and loyalty.

References

  • Agarwal, M. (2021). A study on Pay-Per-Click advertising. Asian Journal of Multidimensional Research, 10(11), 618–624. https://doi.org/10.5958/2278-4853.2021.01042.9
  • Akdemir, N. (2021). Coping with Identity Theft and Fear of Identity Theft in the Digital Age. In Legal Challenges in the New Digital Age (pp. 176–197). Brill Nijhoff. https://doi.org/10.1163/9789004447417_011
  • Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Journal of King Saud University - Computer and Information Sciences, 34(10, Part A), 8176–8206. https://doi.org/10.1016/j.jksuci.2022.08.003
  • Algharibeh, M. M., Husari, G., & Jaf, S. (2021). A Data-Driven Password Strength Meter for Cybersecurity Assessment and Enhancement. 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys), 1980–1987. https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00296
  • Alhayani, B., Mohammed, H. J., Chaloob, I. Z., & Ahmed, J. S. (2021). Effectiveness of artificial intelligence techniques against cyber security risks apply of IT industry. Materials Today: Proceedings, 531.
  • Ansari, M. F., Dash, B., Sharma, P., & Yathiraju, N. (2022). The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review (SSRN Scholarly Paper 4323317). https://papers.ssrn.com/abstract=4323317
  • Ansari, M. F., Sharma, P. K., & Dash, B. (2022). Prevention of phishing attacks using AI-based Cybersecurity Awareness Training. Prevention, 3(3), Article 6, Available at: https://www.interscience.in/ijssan/vol3/iss3/6
  • Beauvisage, T., & Mellet, K. (2020). Datassets: Assetizing and marketizing personal data. Assetization: Turning Things into Assets in Technoscientific Capitalism, 75–96.
  • Bukaty, P. (2019). The California Consumer Privacy Act (CCPA): An implementation guide. IT Governance Ltd.
  • Butt, U. J., Abbod, M. F., & Kumar, A. (2020). Cyber Threat Ransomware and Marketing to Networked Consumers. In Handbook of Research on Innovations in Technology and Marketing for the Connected Consumer (pp. 155–185). IGI Global. https://doi.org/10.4018/978-1-7998-0131-3.ch008
  • Das, S. (2021). Search Engine Optimization and Marketing: A Recipe for Success in Digital Marketing. CRC Press, A Chapman and Hall Book.
  • Dasgupta, D., Akhtar, Z., & Sen, S. (2022). Machine learning in cybersecurity: A comprehensive survey. The Journal of Defense Modeling and Simulation, 19(1), 57–106. https://doi.org/10.1177/1548512920951275
  • Dubovyk, T., Buchatska, I., Zerkal, A., & Lebedchenko, V. (2022). Digital Marketing in the Condition of Wartime Posture in Ukraine, 22(7), 206. https://doi.org/10.22937/IJCSNS.2022.22.7.25
  • Dunsin, D., Ghanem, M. C., & Quazzane, K. (2022). The use of artificial intelligence in digital forensics and incident response in a constrained environment. International Journal of Information and Communication Engineering, 16(8), 280–285.
  • Furnell, S. M., & Vasileiou, I. (2022). A holistic view of cybersecurity education requirements. In Research Anthology on Advancements in Cybersecurity Education (pp. 289–307). IGI Global.
  • Garg, S., Gupta, S., & Gupta, B. (2022). Impacts of Blockchain on Digital Marketing. In A. K. Nagar, D. S. Jat, G. Marín-Raventós, & D. K. Mishra (Eds.), Intelligent Sustainable Systems (pp. 209–217). Springer Nature. https://doi.org/10.1007/978-981-16-6309-3_21
  • Gupta, N. (2020). Digital marketing: Trends, opportunities, and challenges. ASIAN JOURNAL OF MANAGEMENT, 11(4), 434–440. https://doi.org/10.5958/2321-5763.2020.00066.9
  • Habibzadeh, H., Nussbaum, B. H., Anjomshoa, F., Kantarci, B., & Soyata, T. (2019). A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society, 50, 101660. https://doi.org/10.1016/j.scs.2019.101660
  • Hammou, I., Aboudou, S., & Makloul, Y. (2020). Social Media and Intangible Cultural Heritage for Digital Marketing Communication: Case of Marrakech Crafts, 2227-6718, https://doi.org/10.21272/mmi.2020.1-09
  • He, W., & Zhang, Z. (Justin). (2019). Enterprise cybersecurity training and awareness programs: Recommendations for success. Journal of Organizational Computing and Electronic Commerce, 29(4), 249–257. https://doi.org/10.1080/10919392.2019.1611528
  • Hoofnagle, C. J., van der Sloot, B., & Borgesius, F. Z. (2019). The European Union general data protection regulation: What it is and means*. Information & Communications Technology Law, 28(1), 65–98. https://doi.org/10.1080/13600834.2019.1573501
  • Huzaizi, A. H. A., Tajuddin, S., Bahari, K. A., Manan, K. A., & Abd Mubin, N. N. (2021). Cyber-security culture towards digital marketing communications among small and medium-sized (SME) entrepreneurs. Asian Culture and History, 13(2), 1–20.
  • Ilyas, G. B., Munir, A. R., Tamsah, H., Mustafa, H., & Yusriadi, Y. (2021). The Influence of Digital Marketing and Customer Perceived Value through Customer Satisfaction on Customer Loyalty. Journal of Legal, Ethical and Regulatory Issues, 24 Pt. 2, 1.
  • Jenkinson, A. (2022). Ransomware and Cybercrime. CRC Press, Web Site: https://books.google.com.tr/books?hl=tr&lr=&id=DLprEAAAQBAJ&oi=fnd&pg=PT6&dq=Ransomware+and+Cybercrime.+CRC+Press&ots=Zu97Lehq3i&sig=sBKWktegxBmXO-dsQrsAvyDgdRY&redir_esc=y#v=onepage&q=Ransomware%20and%20Cybercrime.%20CRC%20Press&f=false
  • Juma’h, A. H., & Alnsour, Y. (2020). The effect of data breaches on company performance. International Journal of Accounting & Information Management, 28(2), 275–301. https://doi.org/10.1108/IJAIM-01-2019-0006
  • Kanimozhi, V., & Jacob, T. P. (2019). Artificial Intelligence-based Network Intrusion Detection with Hyper-Parameter Optimization Tuning on the Realistic Cyber Dataset CSE-CIC-IDS2018 using Cloud Computing. 2019 International Conference on Communication and Signal Processing (ICCSP), 0033–0036. https://doi.org/10.1109/ICCSP.2019.8698029
  • Kaur Chahal, J., Bhandari, A., & Behal, S. (2019). Distributed Denial of Service Attacks: A Threat or Challenge. New Review of Information Networking, 24(1), 31–103. https://doi.org/10.1080/13614576.2019.1611468
  • Kilag, O. K. T., Indino, N. V., Sabagala, A. M., Abendan, C. F. K., Arcillo, M. T., & Camangyan, G. A. (2023). Managing Cybersecurity Risks in Educational Technology Environments: Strategies and Best Practices. American Journal of Language, Literacy and Learning in STEM Education (2993-2769), 1(5), Article 5.
  • Kollnig, K., Shuba, A., Binns, R., Van Kleek, M., & Shadbolt, N. (2022). Are iPhones Really Better for Privacy? Comparative Study of iOS and Android Apps. Proceedings on Privacy Enhancing Technologies, 2022(2), 6–24. https://doi.org/10.2478/popets-2022-0033
  • Konyeha, S. (2020). Exploring cybersecurity threats in digital marketing. Journal of Science and Technology Research, 2(3), 12-20, https://doi.org/10.37933/nipes/2.3.2020.2
  • Krishen, A. S., Dwivedi, Y. K., Bindu, N., & Kumar, K. S. (2021). A broad overview of interactive digital marketing: A bibliometric network analysis. Journal of Business Research, 131, 183–195. https://doi.org/10.1016/j.jbusres.2021.03.061
  • Lies, J. (2019). Marketing Intelligence and Big Data: Digital Marketing Techniques on their Way to Becoming Social Engineering Techniques in Marketing, 5(5), 134-144, https://doi.org/10.9781/ijimai.2019.05.002
  • Maglaras, L., & Kantzavelou, I. (2021). Cybersecurity Issues in Emerging Technologies. CRC Press.
  • Makridis, C. A. (2021). Do data breaches damage reputation? Evidence from 45 companies between 2002 and 2018. Journal of Cybersecurity, 7(1), tyab021. https://doi.org/10.1093/cybsec/tyab021
  • Mogaji, E., Soetan, T. O., & Kieu, T. A. (2021). The implications of artificial intelligence on the digital marketing of financial services to vulnerable customers. Australasian Marketing Journal, 29(3), 235–242. https://doi.org/10.1016/j.ausmj.2020.05.003
  • Mugarza, I., Flores, J. L., & Montero, J. L. (2020). Security Issues and Software Updates Management in the Industrial Internet of Things (IIoT) Era. Sensors, 20(24), 7160. https://doi.org/10.3390/s20247160
  • Mukherjee, S. B., Ghatak, S. G. N., & Ray, N. (2021). Digitization of Economy and Society: Emerging Paradigms. CRC Press, Web Site: https://books.google.com.tr/books?hl=tr&lr=&id=BiA-EAAAQBAJ&oi=fnd&pg=PP1&dq=Digitization+of+Economy+and+Society:+Emerging+Paradigms.+CRC+Press.&ots=j1S58OZeKK&sig=gYc9QjnG7HrT0N8IoYCwNfQhEdY&redir_esc=y#v=onepage&q=Digitization%20of%20Economy%20and%20Society%3A%20Emerging%20Paradigms.%20CRC%20Press.&f=false, Apple Academic Press.
  • Murn, L. (2021). Data Safety and Cybersecurity. In Digital Transformation of the Laboratory (pp. 85–100). John Wiley & Sons, Ltd. https://doi.org/10.1002/9783527825042.ch4
  • Naseer, H., Maynard, S. B., & Desouza, K. C. (2021). Demystifying analytical information processing capability: The case of cybersecurity incident response. Decision Support Systems, 143, 113476. https://doi.org/10.1016/j.dss.2020.113476
  • Omorogbe, P. E. (2023). Improving Digital Marketing Strategy: The Impact of Digital Analytics, Bachelor’s Degree in International Business Web Site: https://www.theseus.fi/handle/10024/803981
  • Peter, M. K., & Dalla Vecchia, M. (2021). The Digital Marketing Toolkit: A Literature Review for the Identification of Digital Marketing Channels and Platforms. In R. Dornberger (Ed.), New Trends in Business Information Systems and Technology: Digital Innovation and Digital Business Transformation (pp. 251–265). Springer International Publishing. https://doi.org/10.1007/978-3-030-48332-6_17
  • Purnomo, Y. J. (2023). Digital marketing strategy to increase sales conversion on e-commerce platforms. Journal of Contemporary Administration and Management (ADMAN), 1(2), 54–62.
  • Raul, A. C. (2021). The privacy, data protection, and cybersecurity law review. Law Business Research Limited, Web Site: https://datamatters.sidley.com/wp-content/uploads/sites/2/2019/11/The-Privacy-Data-Protection-and-Cybersecurity-Law-Review-Edition-6.pdf
  • Reeves, A., Calic, D., & Delfabbro, P. (2021). “Get a red-hot poker and open up my eyes; it’s so boring.”1: Employee perceptions of cybersecurity training. Computers & Security, 106, 102281. https://doi.org/10.1016/j.cose.2021.102281
  • Rosário, A. T. (2023). Security in Digital Marketing: Challenges and Opportunities. In Confronting Security and Privacy Challenges in Digital Marketing (pp. 206–233). IGI Global. https://doi.org/10.4018/978-1-6684-8958-1.ch010
  • Sabillon, R. (2022). Audits in Cybersecurity. In Research Anthology on Business Aspects of Cybersecurity (pp. 1–18). IGI Global. https://doi.org/10.4018/978-1-6684-3698-1.ch001
  • Sachdev, R. (2020). Towards Security and Privacy for Edge AI in IoT/IoE based Digital Marketing Environments. 2020 Fifth International Conference on Fog and Mobile Edge Computing (FMEC), 341–346. https://doi.org/10.1109/FMEC49853.2020.9144755
  • Sain, M., Normurodov, O., Hong, C., & Hui, K. L. (2021). A Survey on the Security in Cyber-Physical System with Multi-Factor Authentication. 2021 23rd International Conference on Advanced Communication Technology (ICACT), 1–8. https://doi.org/10.23919/ICACT51234.2021.9370515
  • Saura, J. R. (2021). Using Data Sciences in Digital Marketing: Framework, methods, and performance metrics. Journal of Innovation & Knowledge, 6(2), 92–102. https://doi.org/10.1016/j.jik.2020.08.001
  • Scott, H. (2023). ‘Reject All’: Data, Drift and Digital Vigilance. In S. Hayes, M. Jopling, S. Connor, & M. Johnson (Eds.), Human Data Interaction, Disadvantage and Skills in the Community: Enabling Cross-Sector Environments for Postdigital Inclusion (pp. 285–298). Springer International Publishing. https://doi.org/10.1007/978-3-031-31875-7_15
  • Singh, D., Sumesh. (2019). Handbook of Research on Innovations in Technology and Marketing for the Connected Consumer. IGI Global.
  • Sisodia, D., & Sisodia, D. S. (2023). A transfer learning framework towards identifying fraudulent publishers’ behavioral changes in pay-per-click online advertising model for click fraud detection. Expert Systems with Applications, 232, 120922. https://doi.org/10.1016/j.eswa.2023.120922
  • Srinivas, S., & Liang, H. (2022). Being digital to being vulnerable: Does digital transformation allure a data breach? Journal of Electronic Business & Digital Economics, 1(1/2), 111–137. https://doi.org/10.1108/JEBDE-08-2022-0026
  • Srivastav, P., & Gupta, H. (2021). Role and Applications of Digital Marketing in Digital Era: A Review. 2021 9th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO), 1–5. https://doi.org/10.1109/ICRITO51393.2021.9596087
  • Tezel, A., Papadonikolaki, E., Yitmen, I., & Bolpagni, M. (2022). Blockchain Opportunities and Issues in the Built Environment: Perspectives on Trust, Transparency and Cybersecurity. In M. Bolpagni, R. Gavina, & D. Ribeiro (Eds.), Industry 4.0 for the Built Environment: Methodologies, Technologies and Skills (pp. 569–588). Springer International Publishing. https://doi.org/10.1007/978-3-030-82430-3_24
  • Wiafe, I., Koranteng, F. N., Obeng, E. N., Assyne, N., Wiafe, A., & Gulliver, S. R. (2020). Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature. IEEE Access, 8, 146598–146612. https://doi.org/10.1109/ACCESS.2020.3013145
There are 56 citations in total.

Details

Primary Language English
Subjects Business Administration
Journal Section Articles
Authors

Hafize Nurgül Durmuş Şenyapar 0000-0003-0927-1643

Early Pub Date February 28, 2024
Publication Date February 29, 2024
Submission Date December 29, 2023
Acceptance Date February 21, 2024
Published in Issue Year 2024 Volume: 8 Issue: 15

Cite

APA Durmuş Şenyapar, H. N. (2024). Digital Marketing in the Age of Cyber Threats: A Comprehensive Guide to Cybersecurity Practices. The Journal of Social Science, 8(15), 1-10. https://doi.org/10.30520/tjsosci.1412062