Azam, F., & Yusoff, R. (2020). Human factors influencing social engineering vulnerability in online platforms. Asian Journal of Information Technology, 19(4), 345–354.
Cremer, F., et al. (2022). Cyber risk and cybersecurity: A systematic review of data availability. Information Systems Frontiers, 24(6), 1387–1402.
Egele, M., Stringhini, G., Kruegel, C., & Vigna, G. (2015). Detecting compromised accounts on social networks. NDSS Proceedings.
Elmas, T., Overdorf, R., & Aberer, K. (2020). Misleading repurposing on Twitter. ICWSM Proceedings.
Farazmanesh, F., Foroutan, F., & Bidgoly, A. J. (2022). Authorship verification for compromised accounts. IEEE ICMLA Proceedings.
Han, J. H. (2024). Reputation and breach coverage in celebrity firms. Strategic Management Journal, 45(2), 311–330.
Hammouchi, H., et al. (2024). STRisk socio-technical breach model. ICIS Proceedings.
Herath, T., Khanna, P., & Ahmed, M. (2022). Cybersecurity practices in social media. Journal of Cybersecurity and Privacy, 2(1), 1–18.
Koohang, A., Floyd, K., & Paliszkiewicz, J. (2021). Privacy, trust, and awareness in social media. Issues in Information Systems, 22(2), 133–145.
Mouncey, E. (2025). Instagram phishing awareness. Int. J. Cyber Behavior, 15(1), 12–27.
Mulahuwaish, A. (2025). Social cybersecurity threat landscape. Computers & Security, 139, 103155.
Peterson, J., & Roth, E. (2021). Influencer account hijacking analysis. Journal of Marketing Communications, 27(7), 654–672.
Rehman, S., & Farooq, U. (2023). User defense behaviors in social media. Telematics and Informatics, 83, 101966.
Ruohonen, J., et al. (2024). Breach communication and media narratives. Digital Threats, 5(1).
Sears, C. R., & Cunningham, D. R. (2024). Breach stress outcomes. Journal of Cybersecurity and Privacy, 4(3), 594–614.
Sharevski, F., & Kessell, B. (2023). Hacktivist information operations. SOUPS Proceedings.
Syed, R. (2019). Social media misuse and reputation risk. Computers in Human Behavior, 93, 366–377.
Yoon, S., Choi, M., & Park, J. (2022). Crisis communication after cyber incidents. Public Relations Review, 48(5), 102234.
Zhang, X., et al. (2022). Corporate data breach patterns. International Journal of Information and Computer Security, 19(3/4), 402–442.
- Abstract viewed - 3 times
- Pdf downloaded - 2 times
Affiliations
Norsyazwani Binti Mohd Puad
School of Computing, Universiti Utara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
Mohamad Fadli Bin Zolkipli
School of Computing, Universiti Utara Malaysia (UUM), 06010 Sintok, Kedah, MALAYSIA
How to Cite
Security Breaches of Celebrity and Corporate Social Media Accounts: Risk Dynamics, Impact, and Preventive Frameworks
Vol 8 No 4 (2025): December
Submitted: Nov 19, 2025
Published: Dec 1, 2025
Abstract
Social media platforms are now essential channels for organizations and public figures to connect, build brands, and create economic value. Yet, the immense visibility of celebrity and corporate accounts makes them irresistible targets for cybercriminals. Attackers seek quick financial gain, the ability to spread misinformation, and cause significant reputational damage. This paper investigates the common routes to compromise, including deceptive phishing schemes, password reuse, platform weaknesses, and psychological manipulation (social engineering). By reviewing prominent real-world cases and scholarly findings, we uncover the complex blend of psychological, technical, and governance issues driving these breaches. Finally, we propose a layered socio-technical mitigation framework that integrates technology, organizational policies, individual behavior, and platform accountability. The findings underscore a critical need to better protect these influential digital identities from ongoing exploitation.