Affiliation:
1. Department of Computer Science, College of Computer, Qassim University, Buraydah 52571, SAUDI ARABIA
Abstract
The rapid development of digital human communication platforms and the globalization phenomenon have led to exposure to massive amounts of information every day. Furthermore, social media networks become mature platforms for social participation in information and interests exchanges, news, and highlighting events. This in turn can inevitably lead to various types of intellectual influences among people of different ages. This study aims to identify the role of cybersecurity in confronting intellectual security threats, such as extremism and terrorism. The study sample consists of 500 male and female students at Qassim University.
Publisher
World Scientific and Engineering Academy and Society (WSEAS)
Subject
Computer Science Applications,Information Systems
Reference21 articles.
1. Almahaireh, A., Alzaben, M., Aladwan, F. and Aljahani, M. (2021) “The level of intellectual security and its relationship with life satisfaction among mutah university students,” Journal of Social Studies Education Research, 12(3), pp.28-46.
2. Kemp, S. (2021) Digital 2020: Global Digital Overview - DataReportal – global digital insights, DataReportal. DataReportal – Global Digital Insights. Available at: https://datareportal.com/reports/digital-2020- global-digital-overview (Accessed: March 9, 2023).
3. Hussein, A. and Atwah, M. (2018) “The impact of social media characteristics on customer purchasing process: A field study at Jordanian universities students in Amman,” International Journal of Computer Applications, 182(19), pp. 41–50.
4. Al-Khataibeh, Y.D. (2019) "Social Mediaextremism ideas as an intellectual security threat: a case study of Jordanian University undergraduates," Revue Des Sciences Humaines journal, p. 21.
5. Chou, H.-T.G. and Edge, N. (2012) "They are happier and having better lives than I am': The impact of using Facebook on perceptions of others' lives," Cyberpsychology, Behavior, and Social Networking, 15(2), pp. 117–121.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Probabilistic Public-Key Encryption with Ensuring Data Integrity in Cloud Computing;2023 International Conference on Control, Artificial Intelligence, Robotics & Optimization (ICCAIRO);2023-04