Abdulla, R. M., Faraj, H. A., Abdullah, C. O., Amin, A. H., & Rashid, T. A. (2023). Analysis of social engineering awareness among students and lecturers. IEEE Access, 11, 101098–101111. https://doi.org/10.1109/access.2023.3311708
Akib, A. A. P. M., Candiwan, C., & Ramadhani, D. P. (2025). Cybersecurity compliance and other factors influencing employee protective behavior: A case study of bank X in Indonesia. International Journal of Safety and Security Engineering, 15(06), 1229–1241. https://doi.org/10.18280/ijsse.150613
Alkhazi, B., Alshaikh, M., Alkhezi, S., & Labbaci, H. (2022). Assessment of the impact of information security awareness training methods on knowledge, attitude, and behavior. IEEE Access, 10, 132132–132143. https://doi.org/10.1109/access.2022.3230286
Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, 13(9), 5700. https://doi.org/10.3390/app13095700
Ben Salamah, F., Palomino, M. A., Craven, M. J., Papadaki, M., & Furnell, S. (2023). An adaptive cybersecurity training framework for the education of social media users at work. Applied Sciences, 13(17), 9595. https://doi.org/10.3390/app13179595
Cengiz, A. B., Kalem, G., & Boluk, P. S. (2022). The effect of social media user behaviors on security and privacy threats. IEEE Access, 10, 57674–57684. https://doi.org/10.1109/access.2022.3177652
Chua, H. N., Teh, J. S., & Herbland, A. (2021). Identifying the effect of data breach publicity on information security awareness using hierarchical regression. IEEE Access, 9, 121759–121770. https://doi.org/10.1109/access.2021.3107426
Eliza, F. (2025). Effectiveness of cybersecurity awareness program based on mobile learning to improve cyber hygiene. International Journal of Information and Education Technology, 15(2), 220–229. https://doi.org/10.18178/ijiet.2025.15.2.2235
Frauenstein, E. D., Flowerday, S., Mishi, S., & Warkentin, M. (2023). Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model. Information & Management, 60(7), 103858. https://doi.org/10.1016/j.im.2023.103858
Ghosh, S., Gulati, A., Bera, A., Singh, S., . A., & Bhatia, M. (2025, May). Cybersecurity and social media: Privacy concerns in the digital age. SSRN Electronic Journal. International Conference on Innovative Computing & Communication (ICICC), New Delhi. https://doi.org/10.2139/ssrn.5237743
Herath, T. B. G., Khanna, P., & Ahmed, M. (2022). Cybersecurity practices for social media users: A systematic literature review. Journal of Cybersecurity and Privacy, 2(1), 1–18. https://doi.org/10.3390/jcp2010001
Hijji, M., & Alam, G. (2022). Cybersecurity awareness and training (CAT) framework for remote working employees. Sensors, 22(22), 8663. https://doi.org/10.3390/s22228663
Jian, N. J., & Kamsin, I. F. B. (2021). Cybersecurity awareness among the youngs in Malaysia by gamification. Atlantis Highlights in Computer Sciences. 3rd International Conference on Integrated Intelligent Computing Communication & Security (ICIIC 2021), Bangalore. https://doi.org/10.2991/ahis.k.210913.061
Kannelønning, K., & Katsikas, S. K. (2023). A systematic literature review of how cybersecurity-related behavior has been assessed. Information & Computer Security, 31(4), 463–477. https://doi.org/10.1108/ics-08-2022-0139
Kovacevic, A., Putnik, N., & Toskovic, O. (2020). Factors related to cyber security behavior. IEEE Access, 8, 125140–125148. https://doi.org/10.1109/access.2020.3007867
Mamade, B. K., & Dabala, D. M. (2021). Exploring the correlation between cyber security awareness, protection measures and the state of victimhood: The case study of Ambo University’s academic staffs. Journal of Cyber Security and Mobility, 10(4), 699–724. https://doi.org/10.13052/jcsm2245-1439.1044
Mazhar, T., Irfan, H. M., Khan, S., Haq, I., Ullah, I., Iqbal, M., & Hamam, H. (2023). Analysis of Cyber Security Attacks and Its Solutions for the Smart grid Using Machine Learning and Blockchain Methods. Future Internet, 15(2), 83. https://doi.org/10.3390/fi15020083
Monachelis, P., Maitland, E., Iordanou, K., Patrikakis, C. Z., Yalaz, E., & Papadopoulos, P. (2025). Social media as a lens for understanding public trust in science. 2025 IEEE 49th Annual Computers, Software, and Applications Conference (COMPSAC), 203–211. https://doi.org/10.1109/compsac65507.2025.00034
Mouncey, E., & Ciobotaru, S. (2025). Phishing scams on social media: An evaluation of cyber awareness education on impact and effectiveness. Journal of Economic Criminology, 7, 100125. https://doi.org/10.1016/j.jeconc.2025.100125
Mulahuwaish, A., Qolomany, B., Gyorick, K., Abdo, J. B., Aledhari, M., Qadir, J., Carley, K., & Al-Fuqaha, A. (2025). A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects. Computers in Human Behavior Reports, 18, 100668. https://doi.org/10.1016/j.chbr.2025.100668
Nowakowski, W. (2025). Social engineering analysis framework: A comprehensive playbook for human hacking. IEEE Access, 13, 18827–18849. https://doi.org/10.1109/access.2025.3532999
Pattnaik, N., Li, S., & Nurse, J. R. C. (2023). Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter. Computers & Security, 125, 103008. https://doi.org/10.1016/j.cose.2022.103008
Shah, M. U., Iqbal, F., Rehman, U., & Hung, P. C. K. (2023). A comparative assessment of human factors in cybersecurity: Implications for cyber governance. IEEE Access, 11, 87970–87984. https://doi.org/10.1109/access.2023.3296580
Zhang, Z. (Justin), He, W., Li, W., & Abdous, M. (2021). Cybersecurity awareness training programs: A cost–benefit analysis framework. Industrial Management & Data Systems, 121(3), 613–636. https://doi.org/10.1108/imds-08-2020-0462
Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2020). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82–97. https://doi.org/10.1080/08874417.2020.1712269
- Abstract viewed - 62 times
- Pdf downloaded - 18 times
Affiliations
Muhammad Eizzat Abdul Razzak
School of Computing, Awang Had Salleh Graduate School College of Arts and Sciene, Universiti Utara Malaysia (UUM), 06010 Kedah, MALAYSIA
Mohammad Fadli Zolkipli
School of Computing, Awang Had Salleh Graduate School College of Arts and Sciene, Universiti Utara Malaysia (UUM), 06010 Kedah, MALAYSIA
How to Cite
An Assessment of User Awareness on Cybersecurity Best Practices on Social Media Platforms
Vol 8 No 4 (2025): December
Submitted: Nov 19, 2025
Published: Nov 30, 2025
Abstract
Social media platforms are increasingly vulnerable to sophisticated cyberattacks such as phishing, malware, identity theft, data scraping, and social engineering. These risks stem from technical flaws and risky user behaviors, including poor password management, over-disclosure of personal information, and habitual disregard for security measures. Additionally, psychological factors like security fatigue, privacy resignation, and habituation to security warnings contribute to these challenges, elevating the perceived cost of secure behavior over the risks of data breaches. This assessment explores these vulnerabilities while advocating for a multifaceted approach to enhance cybersecurity awareness on social media. Such an approach includes educational initiatives, technical interventions, and the cultivation of user responsibility to promote secure practices and strengthen trust across these platforms.