Research Article

Role of Social Networks in E-government: Risks and Security Threats

Rasim Alguliyev 1, Ramiz Aliguliyev 1, Farhad Yusifov 1 *
More Detail
1 Institute of Information Technology, Baku, AZERBAIJAN* Corresponding Author
Online Journal of Communication and Media Technologies, 8(4), October 2018, 363-376, https://doi.org/10.12973/ojcmt/3957
OPEN ACCESS   6175 Views   3094 Downloads
Download Full Text (PDF)

ABSTRACT

Social networks are becoming an important intermediary for interaction between governments, citizens, governmental agencies and business sectors. The popularization of social networks among users allows transforming public administration into open governance form and changing government-citizen relationships. There are various applications of social media to enable communication between users and share personal information. Currently, different attacks on social networks targeting the e-government system pose a great risk for users. In paper the role of social networks and security in e-government is examined. Potential threats targeting the confidentiality and security of each social network user are analyzed and classified. A multi-criteria evaluation method is proposed for analysis of social networks security threats. Potential threats are ranked according to the criteria determined by the Fuzzy TOPSIS method. In the numerical study, the social network security threats are evaluated and ranked according to selected criteria (such as interception of confidential information, reputation loss in government-citizen (G2C) relations and organization of social-political conflicts).

CITATION (APA)

Alguliyev, R., Aliguliyev, R., & Yusifov, F. (2018). Role of Social Networks in E-government: Risks and Security Threats. Online Journal of Communication and Media Technologies, 8(4), 363-376. https://doi.org/10.12973/ojcmt/3957

REFERENCES

  1. Afshari, A. R., Nikolić, M., & Akbari, Z. (2017), Personnel selection using group fuzzy AHP and SAW methods. Journal of engineering management and competitiveness, 7(1), 3-10.
  2. Aladalah, M., Cheung, Y., & Lee, V. (2015) Enabling Citizen Participation in Gov 2.0: An Empowerment Perspective. Electronic Journal of e-Government, 13(2).
  3. Alguliyev, R. M., & Yusifov, F. F. (2018) The Role and Impact of Social Media in E-Government, Book Chapter in L. Alcaide-Muñoz & F. J. Alcaraz-Quiles (Eds.) Optimizing E-Participation Initiatives Through Social Media (pp. 28-53), The Advances in Wireless Technologies and Telecommunication book series, USA, IGI Global.
  4. Alguliyev, R. M., Aliguliyev, R. M., & Mahmudova, R. M. (2016). A Fuzzy TOPSIS+Worst-Case Model for Personnel Evaluation Using Information Culture Criteria. International Journal of Operations Research and Information Systems, 7(4), 38-66. https://doi.org/10.4018/IJORIS.2016100102
  5. Alotaibi, R. M., Ramachandran, M., et al. (2016). Factors Affecting Citizens’ use of Social Media to Communicate with the Government: A Proposed Model. The Electronic Journal of e-Government, 14(1), 60-72.
  6. Banday, M. T., & Mattoo, M. M. (2013). Social Media in e-Governance. Scientific Research Journal, 47-56.
  7. Bergquist, M., et al. (2017). From e-government to e-governance: social media and public authorities legitimacy work. In Proceedings of the 25th European Conference on Information Systems (ECIS), Guimarгes, Portugal, June 5-10, 858-872.
  8. Bertot, J. C., Jaeger, P. T., & Grimes, J. M. (2010). Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government Information Quarterly, 27(3), 264–271. https://doi.org/10.1016/j.giq.2010.03.001
  9. Cao, J., Li, Q., Ji, Y., et al. (2016). Detection of forwarding-based malicious urls in online social networks. Int. J. Parallel Program, 44(1), 163–180. https://doi.org/10.1007/s10766-014-0330-9
  10. Capaldo, G., & Zollo, G. (2001). Applying fuzzy logic to personnel assessment: A case study, Omega, 29(6), 585-597. https://doi.org/10.1016/S0305-0483(01)00047-0
  11. CareerBuilder. (n.d.). Number of Employers Using Social Media to Screen Candidates Has Increased 500 Percent over the Last Decade. Retrieved on 15 April 2018 from www.careerbuilder.com
  12. Chang, Y.-H., Yeh, C.-H., & Chang, Y.-W. (2013). A new method selection approach for fuzzy group multicriteria decision making. Applied Soft Computing, 13(4), 2179–2187. https://doi.org/10.1016/j.asoc.2012.12.009
  13. Chun, S., Shulman, S., et al., (2010). Government 2.0: Making connections between citizens, data and government. Information Polity, 15, 1–9. https://doi.org/10.3233/IP-2010-0205
  14. Dreßing, H, Bailer, J., Anders, A., et al. (2014). Cyberstalking in a large sample of social network users: prevalence, characteristics, and impact upon victims. Cyberpsychol, Behav. Soc. Netw., 17(2), 61–67. https://doi.org/10.1089/cyber.2012.0231
  15. Dursun, M., & Karsak, E. E. (2010). A fuzzy MCDM approach for personnel selection. Expert Systems with Applications, 37, 4324-4330. https://doi.org/10.1016/j.eswa.2009.11.067
  16. Dwivedi, Y.K. & et al., (2017) Exploring the Role of Social Media in e-Government: an Analysis of Emerging Literature. ICEGOV 2017, 97-106. https://doi.org/10.1145/3047273.3047374
  17. Facebook1 suspends 200 apps over data misuse investigation (2018). Retrieved on 15 April 2018 from https://www.reuters.com
  18. Facebook2 temporarily blocks new apps from joining its platform (2018). Retrieved on 15 April 2018 from www.theverge.com
  19. Fire, M., Goldschmidt, R., & Elovici, Y. (2014). Online social networks: threats and solutions. IEEE Commun. Surv. Tut., 16(4), 2019-2036. https://doi.org/10.1109/COMST.2014.2321628
  20. Gao, H., Hu, J., Huang, T., et al. (2011). Security issues in online social networks. IEEE Internet Comput., 15(4), 56–63. https://doi.org/10.1109/MIC.2011.50
  21. Grubmüller, V., Götsch, K., & Krieger, B. (2013). Social media analytics for future oriented policy making. European Journal Futures Research, 1(20), 1-9. https://doi.org/10.1007/s40309-013-0020-7
  22. Jin, L., Chen, Y., Wang, T., et al. (2013). Understanding user behavior in online social networks: a survey. IEEE Commun. Mag., 51(9), 144–150. https://doi.org/10.1109/MCOM.2013.6588663
  23. Kamiloglu, F., & Erdogan, E. (2014). Effects of Social Media on Civil and Political Participation and a Field of Survey over on Facebook. Online Journal of Communication and Media Technologies, 4(3), 47-77.
  24. Karabasevica, D., Stanujkic, D., & Urosevic, S. (2015). The MCDM model for personnel selection based on SWARA and ARAS methods. Management, 77, 43-52.
  25. Karakiza, M. (2014). The impact of Social Media in the Public Sector. Proceedings of the International Conference on Strategic Innovative Marketing, 384-392.
  26. Kaur, R., & Saini, D. (2016). Social Networking and e-Government: The Role & Its Impact. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 5(3), 811-819.
  27. Kayes, I., & Iamnitchi, A. (2017). Privacy and security in online social networks: A survey. Online Social Networks and Media, 3–4, 1–21. https://doi.org/10.1016/j.osnem.2017.09.001
  28. Kelemenis, A., & Askounis, D. (2010). A new TOPSIS-based multi-criteria approach to personnel selection. Expert Systems with Applications, 37, 4999–5008. https://doi.org/10.1016/j.eswa.2009.12.013
  29. Khan, G. F., Swar, B., & Lee, S. K. (2014) Social Media Risks and Benefits: A Public Sector Perspective. Social Science Computer Review, 32(5), 606-627. https://doi.org/10.1177/0894439314524701
  30. Khasawneh, R. T., & Abu-Shanab, E. A. (2013). E-Government and Social Media Sites: The Role and Impact. World Journal of Computer Application and Technology, 1(1), 10–17.
  31. Khorami, M., & Ehsani, R. (2015). Application of Multi Criteria Decision Making approaches for personnel selection problem: A survey. International journal of engineering research and applications, 5(5), 14-29.
  32. Landsbergen, D. (2010). Government as part of the revolution: using social media to achieve public goals. Electron J e-Govern, 8(2), 135–147.
  33. Magro, M. J. (2012). A Review of Social Media Use in E-Government. Adm. Sci., 2, 148-161. Retrieved on 15 April 2018 from www.mdpi.com/journal/admsci https://doi.org/10.3390/admsci2020148
  34. Mardani, A., Jusoh, A., et al. (2015). Multiple criteria decision-making techniques and their applications – a review of the literature from 2000 to 2014. Economic Research – Ekonomska Istrazivanja, 28(1), 516-571. https://doi.org/10.1080/1331677X.2015.1075139
  35. Mcnamara, J. (2011). Social Media Strategy and Governance: Gaps, Risks and Opportunities. Sydney, Australia: University of Technology Sydney.
  36. Nien, W. L. (2017). What is the Role of Social Media in Establishing a Chain of Equivalence between Activists Participating in Protest Movements? Online Journal of Communication and Media Technologies, 7(3), 182-2015.
  37. Novak, E., & Li, Q. (2012) A Survey of Security and Privacy in Online Social Networks, College of William and Mary Computer Science. Technical Report, 1–32.
  38. Park, M. J., Kang, D., Rho, J. J., & Lee, D. H. (2016). Policy Role of Social Media in Developing Public Trust: Twitter communication with government leaders. Public Management Review, 18(9), 1265–1288. https://doi.org/10.1080/14719037.2015.1066418
  39. Parvcek, P., & Sachs, M. (2010). Open Government–Information Flow in Web 2.0. Eur. J. ePractice, 9, 57–68.
  40. Raggo, M. (2016). Anatomy of a Social Media Attack. Retrieved on 14 May 2018 from www.darkreading.com/analytics/anatomy-of-a-social-media-attack/a/d-id/1326680
  41. Rainie, L., et al. (2012). Social media and political engagement, pew internet & American life project. Pew Research Center: Washington DC. Retrieved on 14 May 2018 from http://pewinternet.org
  42. Rathore, Sh., Sharma, P. K., Loia, V., et al. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, 43–69. https://doi.org/10.1016/j.ins.2017.08.063
  43. Rodruguez-Bolivar, M. P. (2017). Governance Models for the Delivery of Public services Through the Web 2.0 technologies: A political view in large Spanish Municipalities. Social Science Computer Review, 35(2), 203–225. https://doi.org/10.1177/0894439315609919
  44. Rouyendegh, B. D., & Erkan, T. E. (2013). An application of the fuzzy ELECTRE method for academic staff selection, Human Factors and Ergonomics in Manufacturing and Service Industries, 23(2), 107-115. https://doi.org/10.1002/hfm.20301
  45. Sandsmark, F. (2011). From Social Media to Social Commerce. Proceeding of Microsoft Global High Tech Summit.
  46. Silic, M., & Back, A. (2016). The dark side of social networking sites: Understanding phishing risks. Computers in Human Behavior, 60, 35-43, http://dx.doi.org/10.1016/j.chb.2016.02.050
  47. Song, C., & Lee, J. (2016). Citizens’ Use of Social Media in Government, Perceived Transparency, and Trust in Government. Public Performance & Management Review, 39(2), 430–453. https://doi.org/10.1080/15309576.2015.1108798
  48. Stanujkic, D., Djordjevic, B., & Djordjevic, M. (2013). Comparative analysis of some prominent MCDM methods: A case of ranking Serbian banks. Serbian journal of management, 8(2), 213-241. https://doi.org/10.5937/sjm8-3774
  49. Symantec (n.d.) Internet Security Threat Report. Retrieved on 14 May 2018 from www.symantec.com
  50. Tuan, N. A. (2017). Personnel Evaluation and Selection using a Generalized Fuzzy Multi-Criteria Decision Making. International Journal of Soft Computing, 12(4), 263-269.
  51. Turskis, Z., & Zavadskas, E. K. (2011). Multiple criteria decision making (MCDM) methods in economics: an overview. Technological and economic development of economy, (2), 397-427.
  52. Ubaldi, B. (2013). Open Government Data: Towards Empirical Analysis of Open Government Data Initiatives. OECD Working Papers on Public Governance, 22, 15-35.
  53. Zavadskas, E. K., Turskis, Z., & Kildienė, S. (2014). State of art surveys of overviews on MCDM/MADM methods. Technological and Economic Development of Economy, 20(1), 165-179. https://doi.org/10.3846/20294913.2014.892037
  54. Zhang, Z., & Gupta, B. B. (2016) Social media security and trustworthiness: Overview and new Direction. Future Generation Computer Systems. Elsevier, https://doi.org/10.1016/j.future.2016.10.007