Borneo International Journal eISSN 2636-9826 https://majmuah.com/journal/index.php/bij <p class="font_7" style="font-size: 16px; text-align: justify;"><span style="font-size: 16px;">Borneo International&nbsp;Journal ISSN 2636-9826 (online) is a single blind peer-reviewed, Open Access&nbsp;journal that publishes&nbsp;original research and&nbsp;reviews covering a wide range of subjects in Islamic studies, Arabic language, science, technology, business, management, social science, architecture and medicine.&nbsp;</span><span style="font-size: 16px;">It also publishes&nbsp;special issues of selected conference papers.</span></p> <p class="font_7" style="font-size: 16px; text-align: justify;">&nbsp;</p> Majmuah Enterprise en-US Borneo International Journal eISSN 2636-9826 2636-9826 Phishing Attacks and Credential Theft on Social Media Platforms: A Review of Recent Trends, Case Studies, and Mitigation Insights https://majmuah.com/journal/index.php/bij/article/view/976 <p>Social media platforms have transformed communication, work collaboration, and online identity expression, yet they have simultaneously become fertile ground for phishing attacks designed to steal user credentials and compromise privacy. This study reviews current research, industry reports, and empirical findings to examine how phishing functions within social media ecosystems. Using a qualitative literature review, the study identifies dominant attack vectors such as impersonation, direct-message phishing, and credential-harvesting links. Findings show that user behaviour such as oversharing, impulsive clicking, and trust bias plays a larger role in attack success than technical vulnerabilities. While protective measures like multi-factor authentication and automated detection algorithms exist, their effectiveness is constrained by inconsistent user adoption and platform governance. This study argues for integrated mitigation involving behavioural awareness, platform-level enforcement, and adaptive technological measures. The insights aim to support organisations, policymakers, and platform providers in improving user resilience and reducing phishing-driven credential theft.</p> Muhammad Fadilah Alfarizy Mohamad Fadli Bin Zolkipli ##submission.copyrightStatement## 2025-11-30 2025-11-30 8 4 1 7 An Assessment of User Awareness on Cybersecurity Best Practices on Social Media Platforms https://majmuah.com/journal/index.php/bij/article/view/979 <p>Social media platforms are increasingly vulnerable to sophisticated cyberattacks such as phishing, malware, identity theft, data scraping, and social engineering. These risks stem from technical flaws and risky user behaviors, including poor password management, over-disclosure of personal information, and habitual disregard for security measures. Additionally, psychological factors like security fatigue, privacy resignation, and habituation to security warnings contribute to these challenges, elevating the perceived cost of secure behavior over the risks of data breaches. This assessment explores these vulnerabilities while advocating for a multifaceted approach to enhance cybersecurity awareness on social media. Such an approach includes educational initiatives, technical interventions, and the cultivation of user responsibility to promote secure practices and strengthen trust across these platforms.</p> Muhammad Eizzat Abdul Razzak Mohammad Fadli Zolkipli ##submission.copyrightStatement## 2025-11-30 2025-11-30 8 4 8 17 Cybersecurity and its Impact on Users’ Digital Safety: An Analytical Study on Social Media Threats https://majmuah.com/journal/index.php/bij/article/view/980 <p>This rapid expansion of social media has transformed human communication, interaction and information sharing but it has created fertile ground for new cybersecurity threats that compromise users’ digital safety. This study investigates the impact of cybersecurity threats particularly cyberbullying on users’ privacy, identity, reputation and mental health across platforms like Instagram, X, TikTok, Facebook, LinkedIn and others. It examines the cybersecurity implications of social media threats by reviewing scholarly literature and case studies to identify measures. Findings reveal that age, language and platform design significantly influence vulnerability to cyberbullying while current mitigation strategies remain fragmented and reactive. Also reveals that weak privacy settings, anonymity and poor digital illiteracy contribute to the escalation of social media attacks, while emerging technologies such as artificial intelligence (AI) and machine learning are being leveraged to detect and prevent cyberbullying and misinformation. Additionally, emerging technologies such as AI-based content detection demonstrate potential but remain limited by language barriers, data bias and inconsistent enforcement. This study proposes an integrated digital-safety framework that combines platform governance, legal reform, user awareness and AI-driven monitoring. The insights contribute toward building safer social media ecosystems that promote accountability, digital well-being and cybersecurity resilience.</p> Nakibuuka Jamirah Mohamad Fadli Zolkipli ##submission.copyrightStatement## 2025-11-30 2025-11-30 8 4 18 24 The Spread of Fake News on Social Media and its Implication for Public Safety https://majmuah.com/journal/index.php/bij/article/view/973 <p><strong>Background:</strong> Social media platforms have become primary channels for news and crisis communication, yet their speed, scale, and engagement optimized ranking systems also enable the rapid spread of false and misleading content ("fake news"). In safety critical contexts, misinformation can distort risk perceptions, erode trust, and precipitate harmful behaviors.&nbsp;<strong>Objective:</strong> To synthesize contemporary evidence on (i) how fake news propagates across platforms; (ii) the mechanisms linking online exposure to offline public‑safety harms in health emergencies and disasters; and (iii) the effectiveness and limitations of technical, design, and governance interventions.&nbsp;<strong>Methods:</strong> We conduct a narrative synthesis (2017–2025) spanning communication science, public health, information systems, and computer science. We map mechanisms along the pathway <em>exposure → belief → behavior → safety outcomes</em>, and evaluate intervention classes: transformer‑based NLP, graph neural networks, multimodal/video methods, warning labels and accuracy prompts, UX friction, provenance cues, and infodemic management frameworks.&nbsp;<strong>Results:</strong> False content benefits from novelty and affect, achieving wider and faster cascades than true content. Text‑only detectors perform well in domain but degrade under domain shift; graph aware and hybrid approaches improve early detection and generalization, with emerging multimodal methods addressing video centric platforms. Field and platform studies show light‑touch accuracy prompts and well-designed labels can reduce sharing of low-quality content, though effects vary by placement, specificity, and audience. Major gaps persist in (i) measuring real‑world safety outcomes, (ii) robustness across topics, languages, and modalities, and (iii) transparency and data access for independent evaluation.&nbsp;<strong>Conclusions:</strong> No single solution suffices. We propose a socio technical framework integrating hybrid detection stacks, privacy safe audit pipelines, crisis aware platform design (friction, provenance, correction UX), and cross‑sector coordination with media literacy and trusted‑messenger strategies. A research and policy agenda is outlined to standardize evaluations, enable privacy safe data sharing, and maintain crisis playbooks that align platform incentives with public safety goals.</p> Wooi Sin Lai Mohamad Fadli Zolkipli ##submission.copyrightStatement## 2025-11-30 2025-11-30 8 4 25 34 Data Privacy and Misuse of Personal Information https://majmuah.com/journal/index.php/bij/article/view/971 <p>In the age of digital communication, social media platforms have revolutionised the methods by which individuals share, communicate, and express themselves online. Nonetheless, this simplicity also increased the risks of data privacy infringements and the exploitation of personal information. This article investigates the growing concern of data exploitation on social media platforms, highlighting the methods of user data collection, analysis, and possible misuse for economic, political, or nefarious objectives. The research examines the ethical, legal, and technological difficulties related to personal data protection through an analysis of academic literature, case studies, and privacy breach reports. Frameworks such as GDPR and Malaysia's PDPA are utilised to evaluate privacy threats and user behaviour. It also examines existing preventative measures, like privacy settings, awareness campaigns, and platform accountability, while predicting future risks that stem from AI-driven profiling and cross-platform reconnaissance. The results highlight severe inadequacies in enforcement, user comprehension, and ethical platform design. The article concludes by recommending measures to improve user knowledge, fortify governance, and advocate ethical data practices on social media platforms.</p> Nur Sabrina Mohd Shafawi Mohamad Fadli Zolkipli ##submission.copyrightStatement## 2025-11-30 2025-11-30 8 4 35 41 Security Breaches of Celebrity and Corporate Social Media Accounts: Risk Dynamics, Impact, and Preventive Frameworks https://majmuah.com/journal/index.php/bij/article/view/975 <p>Social media platforms are now essential channels for organizations and public figures to connect, build brands, and create economic value. Yet, the immense visibility of celebrity and corporate accounts makes them irresistible targets for cybercriminals. Attackers seek quick financial gain, the ability to spread misinformation, and cause significant reputational damage. This paper investigates the common routes to compromise, including deceptive phishing schemes, password reuse, platform weaknesses, and psychological manipulation (social engineering). By reviewing prominent real-world cases and scholarly findings, we uncover the complex blend of psychological, technical, and governance issues driving these breaches. Finally, we propose a layered socio-technical mitigation framework that integrates technology, organizational policies, individual behavior, and platform accountability. The findings underscore a critical need to better protect these influential digital identities from ongoing exploitation.</p> Norsyazwani Binti Mohd Puad Mohamad Fadli Bin Zolkipli ##submission.copyrightStatement## 2025-12-01 2025-12-01 8 4 42 46