Social Media usage, and Information Security Factors (SMISF)

Author

Country

Purpose

Type of source (Methodology)

Summary of key points (factors)

(Tayouri, 2015)

Israel

“Identify cyber security risks, and mitigations, focusing on the human factor and social media usage.”

Conference proceeding

(Literature Review)

Education and training

Error handling

Information security

- Privacy/confidentiality

- Availability

(Wu He, 2012)

USA

“Review social media security risks and mitigation techniques”

Journal article

(Literature review)

Security policy

User monitoring

Education and training

Software update

Error handling

(Jain, Sahoo, & Kaubiyal, 2021)

India

“Review different security and privacy threats, and existing solutions that can provide security to social network users”

Journal article

(Literature review)

Security and privacy setting

Authentication mechanism

Report users

(Wilcox, & Bhattacharya, 2015)

Australia

“Countering Social Engineering through Social Media: An Enterprise Security Perspective”

Book chapter

Literature Review

Effective security policy

Increase awareness

Education and training

Legal factors

Technical factors

- Anti-virus

- Firewalls

- Anti-spam filter

- Access control

- VPN

- Intrusion detection

- Encryption

- Two factors authentication

(Ma, Zhang, Li, & Wu, 2019)

China

“Exploring information security education on social media use: Perspective of uses and gratifications theory”

Journal article

Survey and (Literature review and modeling)

Education and training

User satisfaction

Information security awareness

(Di Gangi, Johnston, Worrell & Thompson, 2016)

USA

“A multi-panel Delphi study of organizational social media risk”

Journal article

(Delphi approach)

Social factors

- Effective policy

- Awareness

- Education and training

Technical factors

Legal factors