Research Article | Open Access | Download Full Text
Volume 2 | Issue 2 | Year 2024 | Article Id: CYS-V2I2P101 DOI: https://doi.org/10.59232/CYS-V2I2P101
The Impact of Employees Social Media Use on Corporate Cyber Security Posture
Frankline Makokha
| Received | Revised | Accepted | Published |
|---|---|---|---|
| 04 Apr 2024 | 06 May 2024 | 28 May 2024 | 12 Jun 2024 |
Citation
Frankline Makokha. “The Impact of Employees Social Media Use on Corporate Cyber Security Posture.” DS Journal of Cyber Security, vol. 2, no. 2, pp. 1-8, 2024.
Abstract
Keywords
Cyber security, Cyber security posture, CIA, Yamane formula, Social media.
References
[1] ITU, Recommendation X.1205: Overview of Cybersecurity, ITU Standard, 2008. [Online]. Available: https://www.itu.int/rec/t-rec-x.1205-200804-i
[2] Ajitabh Ambastha et al., “Implication of Cyber Security in a Digital Economy: Learning from Corporate Sector with Special Reference to BFSI,” Artificial Intelligence for Sustainable Finance and Sustainable Technology, pp. 543-552, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Sagar Ajay Rahalkar, Certified Ethical Hacker (CEH) Foundation Guide, New York City: Apress, pp. 85-87, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[4] N.A. Khan, A. Saeed, and M. Yousuf, CEH v10: EC-Council Certified Ethical Hacker Complete Training Guide with Practice Questions & Labs: Exam: 312-50, England: IP Specialist LTD., pp. 46-48, 2018.
[5] Australian Signals Directorate, “The Commonwealth Cyber Security Posture in 2022,” Australian Government, Technical Report, 2022.
[6] K. Graves, CEH: Certified Ethical Hacker Study Guide, Indianapolis, Indiana, Wiley Publishing, Inc, pp. 344-350, 2010.
[7] Intel Security, Mcafee Labs Threats report, 2015. [Online]. Available: https://scadahacker.com/library/Documents/Threat_Intelligence/McAfee%20-%20Threat%20Report%202015-2Q.pdf
[8] Andreea Bendovschi, “Cyber-Attacks – Trends, Patterns and Security Counter-Measures,” Procedia Economics and Finance, vol. 28, pp. 24–31, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Uchenna Daniel Ani, Hongmei He, and Ashutosh Tiwari, “Human Factor Security: Evaluating the Cybersecurity Capacity of the Industrial Workforce,” Journal of Systems and Information Technology, vol. 21, no. 12, pp. 2-35, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Ahmed Alghamdi, “A Systematic Review on Human Factors in Cybersecurity,” JIJCSNS International Journal of Computer Science and Network Security, vol. 22, no. 10, pp. 282-290, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Liu Hua Yeo, and James Banfield, “Human Factors in Electronic Health Records Cybersecurity Breach: An Exploratory Analysis,” Perspect Health Information Management, vol. 19, no. 3, 2022.
[Google Scholar] [Publisher Link]
[12] Edward L. Deci, and Richard M. Ryan, Intrinsic Motivation and Self-Determination in Human Behavior, New York: Springer Nature, 1985.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Mehmet Akif Demircioglu, and Chung-An Chen, “Public Employees’ Use of Social Media: Its Impact on Need Satisfaction and Intrinsic Work Motivation,” Government Information Quarterly, vol. 36, no. 1, pp. 51-60, 1998.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Erdal Ozkaya, “Cybersecurity Challenges in Social Media,” PhD Thesis, Charles Sturt University, Australia, Australia, 2018.
[Google Scholar] [Publisher Link]
[15] Mohit Singhal et al., “Cybersecurity Misinformation Detection on Social Media: Case Studies on Phishing Reports and Zoom’s Threat,” Proceedings of the Seventeenth International AAAI Conference on Web and Social Media, vol. 17, no. 1, pp. 796-807, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Thilagaraj Ramasubbu, and Deepak Raj Rao G., “Vulnerabilities of Social Networking Sites- An Open Attack Vector for Cybercriminals,” Journal of Network and Information Security, vol. 6, no. 1, pp. 12-17, 2018.
[Google Scholar] [Publisher Link]
[17] Talal Alharbi, and Asifa Tassaddiq, “Assessment of Cybersecurity Awareness among Students of Majmaah University,” Big Data Cognitive Computing, vol. 5, no. 2, pp. 1-15, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Samar Muslah Albladi, and George R.S. Weir, “Predicting Individuals’ Vulnerability to Social Engineering in Social Networks,” Cybersecurity, vol. 3, pp. 1-19, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Nurul Nuha, and Abdul Molok, “Disclosure of Organizational Information by Employees on Facebook: Looking at the Potential for Information Security Risks,” 22nd Australasian Conference on Information Systems, vol. 78, pp. 1-11, 2011.
[Google Scholar] [Publisher Link]
[20] Bernhard Debatin et al., “Facebook and Online Privacy: Attitudes, Behaviors, and Unintended Consequences,” Journal of Computer-Mediated Communication, vol. 15, no. 1, pp. 83-108, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[21] KNBS, “2023 Economic Survey,” Kenya National Bureau of Statistics, Nairobi, Technical Report, pp. 1-510, 2023.
[22] Glenn D. Israel, “Determining Sample Size,” Florida Cooperative Extension Services, Institue of Food and Agricultural Sciences, University of Florida, Gainesville, Fact Sheet POED-6, 1992.
[Google Scholar] [Publisher Link]
[23] Taro Yamane, Statistics: An Introductory Analysis, 2nd ed., New York: Harper and Row, 1967.
[24] Ranjith Kumar, Research Methodology: A Step by Step Guide for Beginners, 4th ed., London: Sage, pp. 104-127, 2011.
[Google Scholar] [Publisher Link]
[25] Jack E. Fincham, “Response Rates and Responsiveness for Surveys, Standards, and the Journal,” American Journal of Pharmaceutical Education, vol. 72, no. 2, pp. 1- 4, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[26] John T.E. Richardson, “Instruments for Obtaining Student Feedback: A Review of the Literature,” Assessment and Evaluation in Higher Education, vol. 30, no. 4, pp. 387-415, 2010.