Beyond the Hashtag: Social Media and the challenges to Cyber Security
Keywords:Hashtag, Social media, Cyber Security, Facebook, YouTube
Social media may be seen as the new oil that makes the world go round providing access to all manner of information about the users. With the challenges to cyber security, social media users now require a level of awareness of the impact of their actions. This study focuses on the awareness level of social media users to the threats and risks of using the platforms and the extent to which the users are prepared to take responsibility. The study adopted a quantitative descriptive cross-sectional survey research over WhatsApp with 95 respondents selected from two institutions using random selection. Data collected were analyzed using IBM SPSS version 23 to generate summaries of descriptive statistics. All (100%) the respondents are within working class ages although most were aged 31-40 years (45.3%). All users were always on social media (SM) (100%), post daily on social media even though not all (21%) of them read terms and conditions associated with the different social media platforms. Also (55%) of the respondents agree that social media influences their thinking. However, majority of the users are unbothered about the aftermath of their posts as few respondents (32%) disagree that the thoughts of other users about their post is not their problem but that of the other users while (87%) of the respondents believe they can defend their posts. Few respondents (27%) believe that it is possible for litigation to arise as a result of their post on social media and (26%) believe that the application stores their records, which encourages litigation. Despite high level of awareness of the impact of acts of users on cyber security, users are more interested in their protection than that of other users. Whilst regulation would go a long way to manage identified threats, regulation should seek to regulate the coding of social media platforms while social media users garner the requisite emotional intelligence required as a defense mechanism for cyber security.
R. Widdison, “Electronic Law Practice: An Exercise in Legal Futurology,” The Modern Law Review, Vol. 60, No. 2, pp. 143-163, 1997.
Cambridge Dictionary, ‘Social Media’ Cambridge Dictionary, Retrieved from https://dictionary.cambridge.org/dictionary/ english/social-media 2021.
Kaplan, and M. Haenlein, “Users of the world, unite! The challenges and opportunities of social media,” Business Horizons, Vol. 53, No 1, pp. 59-68, 2010. [Online]. Available: https://dx.doi.org/10.1016/j. bushor.2009.09.003, 2010.
D. Leary, “Knowledge Management and Enterprise Social Networking: Content Versus Collaboration,” Social Science Research Network, [Online]. Available: http://dx.doi.org/10.2139/ssrn.2773273, 2016.
J. Wharton, “The Impact of Social Media: Is it Irreplaceable,” [email protected], [Online]. Available: https://knowledge. wharton.upenn.edu/article/impact-of-social-media/ 2019.
H. Tankovska, “Facebook: Number of monthly active users worldwide 2008-2020. Statista’, [Online]. Available: https://www.statista.com/ statistics/264810/number-of-monthly-activefacebookusersworldwide/#:~:text=With%20over%202.7%20billion%20monthly,network%20ever%20to%20do%20so, 2021.
G.Tiso, [Online]. Available: https://newhumanist.org.uk/articles/ 5358/ time-to-log-off 2018.
H. Kim, “Online Social Media Networking and Assessing Its Risks,” International Journal of Security and Its Applications, Vol. 6, No 3, pp. 11-18, 2012.
British Broadcasting Corporation (BBC), “Obinwanne Okeke: Nigerian email fraudster jailed for 10 years in US. BBC News,” [Online]. Available: https://www.bbc.com/news/world-africa-56085217, 2021.
M. Shepherd, and M. Admire, “#ThisFlag: Social Media and Cyber-Protests in Zimbabwe,” Social Media and Elections in Africa. [Online]. Available: https://dx.doi.org/ 10.1007/978-3-030-32682-1_9, 2021.
O. Abimbade, O. Philip, and D. Herro, “Millennial Activism within Nigerian Twitterscape: From Mobilization to Social Action of #ENDSARS Protest,” Social Science Research Network, [Online]. Available: http://dx.doi.org/10.2139/ssrn.3760973, 2021.
C. Dewey, “Facebook Fake-News Writer: I Think Donald Trump is in the White House because of Me. Washington Post,” [Online]. Available: https://www.washingtonpost.com/news/theintersect/wp/2016/11/17/facebook-fake-news-writer-i-think-donald-trump-is-in-the-white-house-because-of-me/, 2016.
J. Parkinson, “Click and Elect: How Fake News Helped Donald Trump Win a Real Election,” Guardian [Online]. Available: https://www.theguardian.com/commentisfree/2016/nov/14/fake-news-donald-trump-election-alt-right-social-media-tech-companies, 2016.
H. Brown, E. Guskin, and A. Mitchell, “The Role of Social Media in the Arab Uprisings,” Pew Research Centre Journalism and Media, [Online]. Available: https://www.journalism.org/2012/11/28/role-social-media-arab-uprisings/, 2012.
C. Ekoh, and E. George, “The Role of Digital Technology in the End Sars Protest in Nigeria, 2021.
E. Kambellari, “Online Impersonation: I have a right to be left alone. You can’t mandate how I use my privacy toolbox,” Timely Tech @ University of Illinois. pp. 1¬12, 2017.
Cambridge Dictionary, “Security’ Cambridge Dictionary” [Online]. Available: https://dictionary.cambridge.org/dictionary/english/ security, 2021.
British Broadcasting Corporation (BBC), “Facebook Data: How it was used by Cambridge Analytica,” BBC News, [Online]. Available: https://www.bbc.com/news/av/technology-43674480, 2018.
M. Hanna, and J. Isaak, “User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection,” Computer, Vol. 51, No. 8, pp. 56-5, Retrieved from https://doi.org/ 10.1109/MC.2018.3191268, 2018.
A. Kamal, “The Law of Cyber-space – an invitation to the table of negotiations,” United Nations Institute of Training and Research, [Online]. Available: https://www.un.int/kamal/sites/www.un.int/ files/The-Ambassador’s-Club-at-the-United-Nations/the_law_of_ cyber-space.pdf, 2005.
Hargrave, and S. Livingstone, “Harm and Offence in Media Content: A review of Evidence,” 2nd Revised Edn Intellect, Bristol UK, 2009.
S. Livingstone, L. Haddon, A. Görzig, and K. Ólafsson, “Risks and safety on the internet: The perspective of European children,” Full Findings, LSE, London: EU Kids Online, 2011.
Livingstone, Brake, “On the Rapid Rise of Social Networking Sites: New Findings and Policy Implications,” Children & Society, Vol. 24, No. 1, pp. 1-9, 2009.
D. Brake, “Sharing Our Lives Online: Risks and Exposure in Social Media,” Palgrave Macmilian, DOI: 10.1057/9781137312716, 2014.
J. Jang-Jaccard, and S. Nepal, “A survey of emerging threats in cybersecurity,” Journal of Computer and System Sciences, Vol. 80, No. 5, pp. 973-993,2014.
C. Ukpong, “Missing Akwa Ibom Woman raped, killed by man who promised her job,” Premium Times, [Online]. Available: https://www.premiumtimesng.com/news/headlines/459002-missing-akwa-ibom-woman-raped-killed-by-man-who-promised-her-job-police.html, accessed 18 July 2021.
S Kite, and R. Gable, “Cyber threats: a study of what middle and high school student know about threatening behaviours and internet safety,” International Journal Social Media and Interactive Learning Environment, Vol. 1 No. 3, pp. 240-254, 2013.
C. Barlow, J. Morrison, S. Stephens, H. Jenkins, E. Bailey, and M. Pilcher, “Unprofessional behaviour on social media by medical students,” The Medical Journal of Australia, Vol. 203, No. II.
Amnesty International, “Nigeria: Bills on hate speech and social media are dangerous attacks on freedom of expression,” [Online]. Available: https://www.amnesty.org/en/latest/news/2019/ 12/nigeria-bills-on-hate-speech-and-social-media-are-dangerous-attacks-on-freedom-of-expression/, 2019.
British Broadcasting Corporation (BBC), “Ecowas court order Nigeria to lift ban on Twitter,” [Online]. Available: https://www.bbc.com/pidgin/world-57572699> accessed 18 July 2021.
L. Lessig, Code Version 2.0, Perseus Books Group New York, 2006.