Skip to main content

The Effects of the Property of Access Possibilities and Cybersecurity Awareness on Social Media Application

  • 739 Accesses

Part of the Communications in Computer and Information Science book series (CCIS,volume 1097)


Cybersecurity became the third war in the world as it affects the privacy, security, availability, and access possibilities of user’s data. Lately, the statistics shows that the users prefer social media application to share their data and updates. Many users believe that only their followers can see their updates while the permissions of access possibilities terms and conditions provided some authority to access the data. To highlight this issue we did a survey in users awareness of accepting access possibility to their data and analyse the risks of allowing/accepting the access possibility of users’ data in social media applications. In this paper we propose a Reconnaissance Penetration Testing Methodology (RPTM) that aims to study the process of reconnaissance and information gathering of specific target to show the user’s data. In result and discussion we have did a statistical study to find out the level of users awareness in cybersecurity and access possibilities.


  • Cybersecurity
  • Social media
  • Penetration test
  • Social engineering

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-36365-9_5
  • Chapter length: 12 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
USD   59.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-36365-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   79.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.


  1. Rathod, P., Hämäläinen, T.: A novel model for cybersecurity economics and analysis. In: 2017 IEEE International Conference on Computer and Information Technology (CIT), Helsinki, pp. 274–279 (2017)

    Google Scholar 

  2. Sabillon, R., Serra-Ruiz, J., Cavaller, V., Cano, J.: A comprehensive cybersecurity audit model to improve cybersecurity assurance: the cybersecurity audit model (CSAM). In: 2017 International Conference on Information Systems and Computer Science (INCISCOS), Quito, pp. 253–259 (2017)

    Google Scholar 

  3. Javidi, G., Sheybani, E.: K-12 cybersecurity education, research, and outreach. In: 2018 IEEE Frontiers in Education Conference (FIE), San Jose, CA, USA, pp. 1–5 (2018)

    Google Scholar 

  4. Parekh, G., et al.: Identifying core concepts of cybersecurity: results of two Delphi processes. IEEE Trans. Educ. 61(1), 11–20 (2018)

    MathSciNet  CrossRef  Google Scholar 

  5. Tetskyi, A., Kharchenko, V., Uzun, D.: Neural networks based choice of tools for penetration testing of web applications. In: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), Kiev, pp. 402–405 (2018)

    Google Scholar 

  6. Al Shebli, H.M.Z., Beheshti, B.D.: A study on penetration testing process and tools. In: 2018 IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, pp. 1–7 (2018)

    Google Scholar 

  7. Jiajia, W.: Research of penetration test based on mobile internet. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC), Chengdu, pp. 2542–2545 (2016)

    Google Scholar 

  8. Wilcox, H., Bhattacharya, M.: A framework to mitigate social engineering through social media within the enterprise. In: 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA), Hefei, pp. 1039–1044 (2016)

    Google Scholar 

  9. Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack detection model: SEADMv2. In: 2015 International Conference on Cyberworlds (CW), Visby, pp. 216–223 (2015)

    Google Scholar 

  10. Kunwar, R.S., Sharma, P.: Social media: a new vector for cyber attack. In: 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring), Dehradun, pp. 1–5 (2016)

    Google Scholar 

  11. Soumya, T.R., Revathy, S.: Survey on threats in online social media. In: 2018 International Conference on Communication and Signal Processing (ICCSP), Chennai, pp. 0077–0081 (2018)

    Google Scholar 

  12. Greitzer, F., Strozer, J., Cohen, Sh., Moore, A., Mundie, D., Cowley, J.: Analysis of unintentional insider threats deriving from social engineering exploits. In: IEEE Security and Privacy Workshops (2017).

Download references

Author information

Authors and Affiliations


Corresponding authors

Correspondence to Bedour F. Alrashidi , Aljawharah M. Almuhana or Alanoud M. Aljedaie .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Alrashidi, B.F., Almuhana, A.M., Aljedaie, A.M. (2019). The Effects of the Property of Access Possibilities and Cybersecurity Awareness on Social Media Application. In: Alfaries, A., Mengash, H., Yasar, A., Shakshuki, E. (eds) Advances in Data Science, Cyber Security and IT Applications. ICC 2019. Communications in Computer and Information Science, vol 1097. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36364-2

  • Online ISBN: 978-3-030-36365-9

  • eBook Packages: Computer ScienceComputer Science (R0)