Skip to main content

Human Factor of Online Social Media Cybersecurity Risk Impact on Critical National Information Infrastructure

  • Conference paper
  • First Online:
Advances in Human Factors in Cybersecurity

Abstract

Social Digital Media become an effective platform for many cyber community to promote product and services to get reach greater potential market around the globe. However, Social Digital Media could lead to several critical cybersecurity risk that might be difficult to manage and mitigate. Moreover, some the cybersecurity risk could cause severe impact of human factors especially if the risk affected the Critical National Information Infrastructure (CNII) that serve as backbone of the country. Hence the objective of the research are to determine the human factors related of social media cybersecurity risk and; to discuss their severity level impact on Critical National Information Infrastructure (CNII). Questionnaires are distributed to various private and government agencies practitioners for the study. The finding of the research show that the top 5 most critical cybersecurity risk are Information Theft; Cyber Attacks; Cyber Crime; Information Manipulation; Productivity Loss. This article also highlight top 5 least critical cybersecurity risks which are Attack of the Software; Cyber Assault/Bullying; Espionage; Terrorisms; Risk of Losing the legal Battle. Through the findings, expert, management and practitioner would be able to identify critical cybersecurity risk and address them appropriately and effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Tang, Q., Gu, B., Whinston, A.B.: Content contribution for revenue sharing and reputation in social media: a dynamic structural model. J. Manag. Inf. Syst. 29(2), 41–76 (2012)

    Article  Google Scholar 

  2. Ngai, E.W.T., Tao, S.S.C., Moon, K.K.L.: Social media research: theories, constructs, and conceptual frameworks. Int. J. Inf. Manag. 35, 33–34 (2015)

    Google Scholar 

  3. Kaplan, A.M., Haenlein, M.: Users of the world, unite! The challenges and opportunities of Social Media. Bus. Horiz. 53(1), 59–68 (2010)

    Article  Google Scholar 

  4. Jacka, J.M., Scott, P.R.: Auditing social media: a governance and risk guide. Wiley, Hoboken (2011)

    Google Scholar 

  5. Merriam-Webster Dictionary—Social Media. http://www.merriam-webster.com/dictionary/social%20media

  6. Colliander, J., Dahlén, M.: Following the fashionable friend: the power of social media. J. Advertising Res. 51(1), 313–320 (2011)

    Article  Google Scholar 

  7. Hanna, R., Rohm, A., Crittenden, V.L.: We’re all connected: the power of the social media ecosystem. Bus. Horiz. 54(3), 265–273 (2011)

    Article  Google Scholar 

  8. Hinson, G.: Top information security risk for 2008: information security risk. In: CISSP Forum, pp. 2–5, 2008

    Google Scholar 

  9. ISO/IEC 27000:2009 (E): Information technology—security techniques—information security management systems—overview and vocabulary. ISO/IEC (2009)

    Google Scholar 

  10. Best Practices in Social Networking Sites. Cyber Security Malaysia, 2011

    Google Scholar 

  11. Gasser, M.: Building a Secure Computer System (PDF), p. 3. Van Nostrand Reinhold, New York (1988). ISBN 0-442-23022-2

    Google Scholar 

  12. Online Source: Oxford English Dictionary online. Oxford University Press. Sept 2007. Archived from the original on 2012-07-08. Retrieved 27 Sept 2010

    Google Scholar 

  13. Online Source: Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield. Law.duke.edu. Retrieved 6 Feb 2016

    Google Scholar 

  14. Anderson, R.J.: Security engineering: a guide to building dependable distributed systems, 2nd edn, p. 1040. Wiley, Indianapolis, IN. ISBN 978-0-470-06852-6 (Chap. 2, p. 17)

    Google Scholar 

  15. Greavu-Åžerban, V., Åžerban, O.: Social engineering a general approach. Inf. Economica J. 18(2), 2014 (2014)

    Google Scholar 

  16. Willison, R.: Understanding the perpetration of employee computer crime in the organisational context (PDF). Inf. Organ. 16, 304–324 (2006)

    Article  Google Scholar 

  17. Online Source: Blitz, J.: Security: a huge challenge from China, Russia and organised crime. Financial Times, 1 Nov 2011. Retrieved 6 Feb 2016

    Google Scholar 

  18. Understanding Information Infrastructure. http://heim.ifi.uio.no/~oleha/Publications/bok.pdf

  19. National Cyber Security Policy-2013: Department of Electronics & Information Technology, Government of India. http://deity.gov.in/content/national-cyber-security-policy-2013-1

  20. Amid spying saga, India unveils cyber security policy. Times of India. INDIA. http://timesofindia.indiatimes.com/tech/enterprise-it/security/Amid-spying-saga-India-unveils-cyber-security-policy/articleshow/20885499.cms?referral=PM

  21. National Cyber Security Policy 2013: An Assessment. Institute for Defence Studies and Analyses. http://www.idsa.in/idsacomments/NationalCyberSecurityPolicy2013_stomar_260813

  22. For a unified cyber and telecom security policy. The Economic Times. http://articles.economictimes.indiatimes.com/2013-09-24/news/42361275_1_national-information-board-national-cyber-security-policy-state-of-the-art-security-lab

  23. Critical National Information Infrastructure. http://cnii.cybersecurity.my/main/about.html

  24. Cybersecurity Definition. http://whatis.techtarget.com/definition/cybersecurity

  25. For a unified cyber and telecom security policy. http://articles.economictimes.indiatimes.com

  26. Wikipedia, The free encyclopedia, Social Engineering. http://en.wikipedia.org

  27. Anderson, R.J.: Security engineering: a guide to building dependable distributed systems, 2nd edn, p. 1040. Wiley, Indianapolis, IN (2008). ISBN 978-0-470-06852-6 (Chap. 2, p. 17)

    Google Scholar 

  28. Irani, D.: Reverse Social Engineering Attacks in Online Social Networks. https://en.wikipedia.org/wiki/Social_engineering_(security)

  29. Khidzir, N.Z., Arshad, N.H., Mohamed, A.: Information security risk factors: critical threats and vulnerabilities in ICT outsourcing. In: Proceedings of International Conference on Information Retrieval and Knowledge Management (CAMP’10), 2010, pp. 194–199 [10]

    Google Scholar 

  30. Rahim, N.N, Khidzir, N.Z., Yusof, A.M., Daud, K.A.M.: Towards a conceptual framework of animated infographics in an islamic context. In: Proceedings of 1st International Islamic Heritage Conference, 2015, pp. 38–48

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nik Zulkarnaen Khidzir .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Khidzir, N.Z., Ismail, A.R., Daud, K.A.M., Ghani, M.S.A.A., Ismail, S., Ibrahim, A.H. (2016). Human Factor of Online Social Media Cybersecurity Risk Impact on Critical National Information Infrastructure. In: Nicholson, D. (eds) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol 501. Springer, Cham. https://doi.org/10.1007/978-3-319-41932-9_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41932-9_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41931-2

  • Online ISBN: 978-3-319-41932-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics