Research Article
BibTex RIS Cite

Sosyal Medya Kullanımında Güvenlik Riskleri ve Korunma Önlemleri

Year 2020, Ejosat Special Issue 2020 (ISMSIT), 10 - 15, 30.11.2020
https://doi.org/10.31590/ejosat.818375

Abstract

The social media is a user-based online network that brings large masses together, where users share their own content. Social media is actively used today since it expands the interaction between individuals and institutions. Due to its great potential, social media also attracts the attention of malicious individuals. The attackers also use social media actively to reach their victims. Although large-scale security investments are made against these widespread threats affecting individuals and institutions, no definite solution has been found yet. In this study, it was aimed to increase awareness of end-users by identifying the security weaknesses in social media, measures that can be taken and the ways of protection.

References

  • Ceron A. Internet, news, and political trust: The difference between social media and online media outlets. Journal of Computer-Mediated Communication, 2005;20(5):487-503.
  • Rice E. Barman-Adhikari, A. Internet and social media use as a resource among homeless youth. Journal of Computer-Mediated Communication, 2014;19(2):232-247.
  • Primack BA, Shensa A, Escobar-Viera CG, Barrett EL, Sidani JE, Colditz JB, James AE. Use of multiple social media platforms and symptoms of depression and anxiety: A nationally-representative study among US young adults. Computers in human behavior, 2017;69:1-9.
  • Humphreys L, Von Pape T, Karnowski V. Evolving mobile media: Uses and conceptualizations of the mobile Internet. Journal of Computer-Mediated Communication, 12013; 8(4):491-507.
  • Lee CS, Ma L. News sharing in social media: The effect of gratifications and prior experience. Computers in human behavior, 2012;28(2):331-339.
  • Sashi CM. Customer engagement, buyer-seller relationships, and social media. Management decision, 2012;50(2);253-272.
  • Leavitt N. Mobile security: finally, a serious problem? Computer, 2011;(6):11-14.
  • Joshi P, Kuo CC J. (2011, July). Security and privacy in online social networks: A survey. In Multimedia and Expo (ICME), 2011 IEEE International Conference on (pp. 1-6). IEEE.
  • Grégoire Y, Salle A, Tripp TM. Managing social media crises with your customers: The good, the bad, and the ugly. Business Horizons, 2015;58(2):173-182.
  • Weinberg BD, Pehlivan E. Social spending: Managing the social media mix. Business horizons, 2011;54(3):275-282.
  • Goh DHL, Ang RP, Chua AY, Lee CS. (2009, October). Why we share: A study of motivations for mobile media sharing. In International Conference on Active Media Technology (pp. 195-206). Springer, Berlin, Heidelberg.
  • Kietzmann JH, Hermkens K, McCarthy IP, Silvestre BS. Social media? Get serious! Understanding the functional building blocks of social media. Business horizons, 2011;54(3):241-251.
  • Bakardjieva M, Smith R. The Internet in everyday life: Computer networking from the standpoint of the domestic user. New Media & Society, 2001;3(1):67-83.
  • Herring SC. Computer‐mediated communication on the Internet. Annual review of information science and technology, 2002;36(1):109-168.
  • Kotler P, Zaltman G. Social marketing: an approach to planned social change. The Journal of Marketing, 1971;3-12.
  • Kaplan AM, Haenlein M. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 2010;53(1):59-68.
  • Forkosh BA, Hershkovitz A. A case study of Israeli higher-education institutes sharing scholarly information with the community via social networks. The Internet and Higher Education, 2012;15(1):58-68.
  • Kwon O, Wen Y. An empirical study of the factors affecting social network service use. Computers in human behavior, 2010;26(2):254-263.
  • Dawley L. Social network knowledge construction: Emerging virtual world pedagogy. On the Horizon, 2009;17(2):109-121.
  • Zhang Z, Gupta BB. Social media security and trustworthiness: overview and new direction. Future Generation Computer Systems, 2018;86:914-925.
  • Gupta R, Brooks H. Using social media for global security. John Wiley & Sons. 2013.
  • Makridakis A, Athanasopoulos E, Antonatos S, Antoniades D, Ioannidis S, Markatos EP. Understanding the behavior of malicious applications in social networks. IEEE network, 2010;24(5).
  • Liu BH, Hsu YP, Ke WC. Virus infection control in online social networks based on probabilistic communities. International Journal of Communication Systems, 2014;27(12):4481-4491.
  • Abraham S, Chengalur-Smith I. An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 2010;32(3):183-196.
  • Kunwar RS, Sharma P. (2016, March). Malware Analysis: Tools and Techniques. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 144). ACM.
  • Santos I, Brezo F, Sanz B, Laorden C, Bringas PG. Using opcode sequences in single-class learning to detect unknown malware. IET information security, 2011;5(4):220-227.
  • Rao UH, Nayak U. (2014). Malicious software and anti-virus software. In The InfoSec Handbook (pp. 141-161). Apress, Berkeley, CA.
  • Kara, İ., Aydos, M. (2019). The ghost in the system: technical analysis of remote access trojan. International Journal on Information Technologies & Security, 11(1).
  • Kara, I. (2019). A basic malware analysis method. Computer Fraud & Security, 2019(6), 11-19.
  • Kara, İ., Aydos, M. (2019, October). Detection and Analysis of Attacks Against Web Services by the SQL Injection Method. In 2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-4). IEEE.
  • J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
  • I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  • K. Elissa, “Title of paper if known,” unpublished.
  • R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  • Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
  • M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.

Security Risks and Safeguard Measures in Social Media Usage

Year 2020, Ejosat Special Issue 2020 (ISMSIT), 10 - 15, 30.11.2020
https://doi.org/10.31590/ejosat.818375

Abstract

The social media is a user-based online network that brings large masses together, where users share their own content. Social media is actively used today since it expands the interaction between individuals and institutions. Due to its great potential, social media also attracts the attention of malicious individuals. The attackers also use social media actively to reach their victims. Although large-scale security investments are made against these widespread threats affecting individuals and institutions, no definite solution has been found yet. In this study, it was aimed to increase awareness of end-users by identifying the security weaknesses in social media, measures that can be taken and the ways of protection.

References

  • Ceron A. Internet, news, and political trust: The difference between social media and online media outlets. Journal of Computer-Mediated Communication, 2005;20(5):487-503.
  • Rice E. Barman-Adhikari, A. Internet and social media use as a resource among homeless youth. Journal of Computer-Mediated Communication, 2014;19(2):232-247.
  • Primack BA, Shensa A, Escobar-Viera CG, Barrett EL, Sidani JE, Colditz JB, James AE. Use of multiple social media platforms and symptoms of depression and anxiety: A nationally-representative study among US young adults. Computers in human behavior, 2017;69:1-9.
  • Humphreys L, Von Pape T, Karnowski V. Evolving mobile media: Uses and conceptualizations of the mobile Internet. Journal of Computer-Mediated Communication, 12013; 8(4):491-507.
  • Lee CS, Ma L. News sharing in social media: The effect of gratifications and prior experience. Computers in human behavior, 2012;28(2):331-339.
  • Sashi CM. Customer engagement, buyer-seller relationships, and social media. Management decision, 2012;50(2);253-272.
  • Leavitt N. Mobile security: finally, a serious problem? Computer, 2011;(6):11-14.
  • Joshi P, Kuo CC J. (2011, July). Security and privacy in online social networks: A survey. In Multimedia and Expo (ICME), 2011 IEEE International Conference on (pp. 1-6). IEEE.
  • Grégoire Y, Salle A, Tripp TM. Managing social media crises with your customers: The good, the bad, and the ugly. Business Horizons, 2015;58(2):173-182.
  • Weinberg BD, Pehlivan E. Social spending: Managing the social media mix. Business horizons, 2011;54(3):275-282.
  • Goh DHL, Ang RP, Chua AY, Lee CS. (2009, October). Why we share: A study of motivations for mobile media sharing. In International Conference on Active Media Technology (pp. 195-206). Springer, Berlin, Heidelberg.
  • Kietzmann JH, Hermkens K, McCarthy IP, Silvestre BS. Social media? Get serious! Understanding the functional building blocks of social media. Business horizons, 2011;54(3):241-251.
  • Bakardjieva M, Smith R. The Internet in everyday life: Computer networking from the standpoint of the domestic user. New Media & Society, 2001;3(1):67-83.
  • Herring SC. Computer‐mediated communication on the Internet. Annual review of information science and technology, 2002;36(1):109-168.
  • Kotler P, Zaltman G. Social marketing: an approach to planned social change. The Journal of Marketing, 1971;3-12.
  • Kaplan AM, Haenlein M. Users of the world, unite! The challenges and opportunities of Social Media. Business horizons, 2010;53(1):59-68.
  • Forkosh BA, Hershkovitz A. A case study of Israeli higher-education institutes sharing scholarly information with the community via social networks. The Internet and Higher Education, 2012;15(1):58-68.
  • Kwon O, Wen Y. An empirical study of the factors affecting social network service use. Computers in human behavior, 2010;26(2):254-263.
  • Dawley L. Social network knowledge construction: Emerging virtual world pedagogy. On the Horizon, 2009;17(2):109-121.
  • Zhang Z, Gupta BB. Social media security and trustworthiness: overview and new direction. Future Generation Computer Systems, 2018;86:914-925.
  • Gupta R, Brooks H. Using social media for global security. John Wiley & Sons. 2013.
  • Makridakis A, Athanasopoulos E, Antonatos S, Antoniades D, Ioannidis S, Markatos EP. Understanding the behavior of malicious applications in social networks. IEEE network, 2010;24(5).
  • Liu BH, Hsu YP, Ke WC. Virus infection control in online social networks based on probabilistic communities. International Journal of Communication Systems, 2014;27(12):4481-4491.
  • Abraham S, Chengalur-Smith I. An overview of social engineering malware: Trends, tactics, and implications. Technology in Society, 2010;32(3):183-196.
  • Kunwar RS, Sharma P. (2016, March). Malware Analysis: Tools and Techniques. In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (p. 144). ACM.
  • Santos I, Brezo F, Sanz B, Laorden C, Bringas PG. Using opcode sequences in single-class learning to detect unknown malware. IET information security, 2011;5(4):220-227.
  • Rao UH, Nayak U. (2014). Malicious software and anti-virus software. In The InfoSec Handbook (pp. 141-161). Apress, Berkeley, CA.
  • Kara, İ., Aydos, M. (2019). The ghost in the system: technical analysis of remote access trojan. International Journal on Information Technologies & Security, 11(1).
  • Kara, I. (2019). A basic malware analysis method. Computer Fraud & Security, 2019(6), 11-19.
  • Kara, İ., Aydos, M. (2019, October). Detection and Analysis of Attacks Against Web Services by the SQL Injection Method. In 2019 3rd International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT) (pp. 1-4). IEEE.
  • J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
  • I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  • K. Elissa, “Title of paper if known,” unpublished.
  • R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  • Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
  • M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989.
There are 36 citations in total.

Details

Primary Language English
Subjects Engineering
Journal Section Articles
Authors

İlker Kara 0000-0003-3700-4825

Publication Date November 30, 2020
Published in Issue Year 2020 Ejosat Special Issue 2020 (ISMSIT)

Cite

APA Kara, İ. (2020). Security Risks and Safeguard Measures in Social Media Usage. Avrupa Bilim Ve Teknoloji Dergisi10-15. https://doi.org/10.31590/ejosat.818375