Role of Social Networks in E-government: Risks and Security Threats

Rasim Alguliyev 1, Ramiz Aliguliyev 1, Farhad Yusifov 1 *
More Detail
1 Institute of Information Technology, Baku, AZERBAIJAN
* Corresponding Author
Online Journal of Communication and Media Technologies, Volume 8, Issue 4, pp. 363-376. https://doi.org/10.12973/ojcmt/3957
OPEN ACCESS   6080 Views   3065 Downloads   Published online: 12 Nov 2018
Download Full Text (PDF)

ABSTRACT

Social networks are becoming an important intermediary for interaction between governments, citizens, governmental agencies and business sectors. The popularization of social networks among users allows transforming public administration into open governance form and changing government-citizen relationships. There are various applications of social media to enable communication between users and share personal information. Currently, different attacks on social networks targeting the e-government system pose a great risk for users. In paper the role of social networks and security in e-government is examined. Potential threats targeting the confidentiality and security of each social network user are analyzed and classified. A multi-criteria evaluation method is proposed for analysis of social networks security threats. Potential threats are ranked according to the criteria determined by the Fuzzy TOPSIS method. In the numerical study, the social network security threats are evaluated and ranked according to selected criteria (such as interception of confidential information, reputation loss in government-citizen (G2C) relations and organization of social-political conflicts).

CITATION

Alguliyev, R., Aliguliyev, R., & Yusifov, F. (2018). Role of Social Networks in E-government: Risks and Security Threats. Online Journal of Communication and Media Technologies, 8(4), 363-376. https://doi.org/10.12973/ojcmt/3957

REFERENCES

  • Afshari, A. R., Nikolić, M., & Akbari, Z. (2017), Personnel selection using group fuzzy AHP and SAW methods. Journal of engineering management and competitiveness, 7(1), 3-10.
  • Aladalah, M., Cheung, Y., & Lee, V. (2015) Enabling Citizen Participation in Gov 2.0: An Empowerment Perspective. Electronic Journal of e-Government, 13(2).
  • Alguliyev, R. M., & Yusifov, F. F. (2018) The Role and Impact of Social Media in E-Government, Book Chapter in L. Alcaide-Muñoz & F. J. Alcaraz-Quiles (Eds.) Optimizing E-Participation Initiatives Through Social Media (pp. 28-53), The Advances in Wireless Technologies and Telecommunication book series, USA, IGI Global.
  • Alguliyev, R. M., Aliguliyev, R. M., & Mahmudova, R. M. (2016). A Fuzzy TOPSIS+Worst-Case Model for Personnel Evaluation Using Information Culture Criteria. International Journal of Operations Research and Information Systems, 7(4), 38-66. https://doi.org/10.4018/IJORIS.2016100102
  • Alotaibi, R. M., Ramachandran, M., et al. (2016). Factors Affecting Citizens’ use of Social Media to Communicate with the Government: A Proposed Model. The Electronic Journal of e-Government, 14(1), 60-72.
  • Banday, M. T., & Mattoo, M. M. (2013). Social Media in e-Governance. Scientific Research Journal, 47-56.
  • Bergquist, M., et al. (2017). From e-government to e-governance: social media and public authorities legitimacy work. In Proceedings of the 25th European Conference on Information Systems (ECIS), Guimarгes, Portugal, June 5-10, 858-872.
  • Bertot, J. C., Jaeger, P. T., & Grimes, J. M. (2010). Using ICTs to create a culture of transparency: E-government and social media as openness and anti-corruption tools for societies. Government Information Quarterly, 27(3), 264–271. https://doi.org/10.1016/j.giq.2010.03.001
  • Cao, J., Li, Q., Ji, Y., et al. (2016). Detection of forwarding-based malicious urls in online social networks. Int. J. Parallel Program, 44(1), 163–180. https://doi.org/10.1007/s10766-014-0330-9
  • Capaldo, G., & Zollo, G. (2001). Applying fuzzy logic to personnel assessment: A case study, Omega, 29(6), 585-597. https://doi.org/10.1016/S0305-0483(01)00047-0
  • CareerBuilder. (n.d.). Number of Employers Using Social Media to Screen Candidates Has Increased 500 Percent over the Last Decade. Retrieved on 15 April 2018 from www.careerbuilder.com
  • Chang, Y.-H., Yeh, C.-H., & Chang, Y.-W. (2013). A new method selection approach for fuzzy group multicriteria decision making. Applied Soft Computing, 13(4), 2179–2187. https://doi.org/10.1016/j.asoc.2012.12.009
  • Chun, S., Shulman, S., et al., (2010). Government 2.0: Making connections between citizens, data and government. Information Polity, 15, 1–9. https://doi.org/10.3233/IP-2010-0205
  • Dreßing, H, Bailer, J., Anders, A., et al. (2014). Cyberstalking in a large sample of social network users: prevalence, characteristics, and impact upon victims. Cyberpsychol, Behav. Soc. Netw., 17(2), 61–67. https://doi.org/10.1089/cyber.2012.0231
  • Dursun, M., & Karsak, E. E. (2010). A fuzzy MCDM approach for personnel selection. Expert Systems with Applications, 37, 4324-4330. https://doi.org/10.1016/j.eswa.2009.11.067
  • Dwivedi, Y.K. & et al., (2017) Exploring the Role of Social Media in e-Government: an Analysis of Emerging Literature. ICEGOV 2017, 97-106. https://doi.org/10.1145/3047273.3047374
  • Facebook1 suspends 200 apps over data misuse investigation (2018). Retrieved on 15 April 2018 from https://www.reuters.com
  • Facebook2 temporarily blocks new apps from joining its platform (2018). Retrieved on 15 April 2018 from www.theverge.com
  • Fire, M., Goldschmidt, R., & Elovici, Y. (2014). Online social networks: threats and solutions. IEEE Commun. Surv. Tut., 16(4), 2019-2036. https://doi.org/10.1109/COMST.2014.2321628
  • Gao, H., Hu, J., Huang, T., et al. (2011). Security issues in online social networks. IEEE Internet Comput., 15(4), 56–63. https://doi.org/10.1109/MIC.2011.50
  • Grubmüller, V., Götsch, K., & Krieger, B. (2013). Social media analytics for future oriented policy making. European Journal Futures Research, 1(20), 1-9. https://doi.org/10.1007/s40309-013-0020-7
  • Jin, L., Chen, Y., Wang, T., et al. (2013). Understanding user behavior in online social networks: a survey. IEEE Commun. Mag., 51(9), 144–150. https://doi.org/10.1109/MCOM.2013.6588663
  • Kamiloglu, F., & Erdogan, E. (2014). Effects of Social Media on Civil and Political Participation and a Field of Survey over on Facebook. Online Journal of Communication and Media Technologies, 4(3), 47-77.
  • Karabasevica, D., Stanujkic, D., & Urosevic, S. (2015). The MCDM model for personnel selection based on SWARA and ARAS methods. Management, 77, 43-52.
  • Karakiza, M. (2014). The impact of Social Media in the Public Sector. Proceedings of the International Conference on Strategic Innovative Marketing, 384-392.
  • Kaur, R., & Saini, D. (2016). Social Networking and e-Government: The Role & Its Impact. International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), 5(3), 811-819.
  • Kayes, I., & Iamnitchi, A. (2017). Privacy and security in online social networks: A survey. Online Social Networks and Media, 3–4, 1–21. https://doi.org/10.1016/j.osnem.2017.09.001
  • Kelemenis, A., & Askounis, D. (2010). A new TOPSIS-based multi-criteria approach to personnel selection. Expert Systems with Applications, 37, 4999–5008. https://doi.org/10.1016/j.eswa.2009.12.013
  • Khan, G. F., Swar, B., & Lee, S. K. (2014) Social Media Risks and Benefits: A Public Sector Perspective. Social Science Computer Review, 32(5), 606-627. https://doi.org/10.1177/0894439314524701
  • Khasawneh, R. T., & Abu-Shanab, E. A. (2013). E-Government and Social Media Sites: The Role and Impact. World Journal of Computer Application and Technology, 1(1), 10–17.
  • Khorami, M., & Ehsani, R. (2015). Application of Multi Criteria Decision Making approaches for personnel selection problem: A survey. International journal of engineering research and applications, 5(5), 14-29.
  • Landsbergen, D. (2010). Government as part of the revolution: using social media to achieve public goals. Electron J e-Govern, 8(2), 135–147.
  • Magro, M. J. (2012). A Review of Social Media Use in E-Government. Adm. Sci., 2, 148-161. Retrieved on 15 April 2018 from www.mdpi.com/journal/admsci https://doi.org/10.3390/admsci2020148
  • Mardani, A., Jusoh, A., et al. (2015). Multiple criteria decision-making techniques and their applications – a review of the literature from 2000 to 2014. Economic Research – Ekonomska Istrazivanja, 28(1), 516-571. https://doi.org/10.1080/1331677X.2015.1075139
  • Mcnamara, J. (2011). Social Media Strategy and Governance: Gaps, Risks and Opportunities. Sydney, Australia: University of Technology Sydney.
  • Nien, W. L. (2017). What is the Role of Social Media in Establishing a Chain of Equivalence between Activists Participating in Protest Movements? Online Journal of Communication and Media Technologies, 7(3), 182-2015.
  • Novak, E., & Li, Q. (2012) A Survey of Security and Privacy in Online Social Networks, College of William and Mary Computer Science. Technical Report, 1–32.
  • Park, M. J., Kang, D., Rho, J. J., & Lee, D. H. (2016). Policy Role of Social Media in Developing Public Trust: Twitter communication with government leaders. Public Management Review, 18(9), 1265–1288. https://doi.org/10.1080/14719037.2015.1066418
  • Parvcek, P., & Sachs, M. (2010). Open Government–Information Flow in Web 2.0. Eur. J. ePractice, 9, 57–68.
  • Raggo, M. (2016). Anatomy of a Social Media Attack. Retrieved on 14 May 2018 from www.darkreading.com/analytics/anatomy-of-a-social-media-attack/a/d-id/1326680
  • Rainie, L., et al. (2012). Social media and political engagement, pew internet & American life project. Pew Research Center: Washington DC. Retrieved on 14 May 2018 from http://pewinternet.org
  • Rathore, Sh., Sharma, P. K., Loia, V., et al. (2017). Social network security: Issues, challenges, threats, and solutions. Information Sciences, 421, 43–69. https://doi.org/10.1016/j.ins.2017.08.063
  • Rodruguez-Bolivar, M. P. (2017). Governance Models for the Delivery of Public services Through the Web 2.0 technologies: A political view in large Spanish Municipalities. Social Science Computer Review, 35(2), 203–225. https://doi.org/10.1177/0894439315609919
  • Rouyendegh, B. D., & Erkan, T. E. (2013). An application of the fuzzy ELECTRE method for academic staff selection, Human Factors and Ergonomics in Manufacturing and Service Industries, 23(2), 107-115. https://doi.org/10.1002/hfm.20301
  • Sandsmark, F. (2011). From Social Media to Social Commerce. Proceeding of Microsoft Global High Tech Summit.
  • Silic, M., & Back, A. (2016). The dark side of social networking sites: Understanding phishing risks. Computers in Human Behavior, 60, 35-43, http://dx.doi.org/10.1016/j.chb.2016.02.050
  • Song, C., & Lee, J. (2016). Citizens’ Use of Social Media in Government, Perceived Transparency, and Trust in Government. Public Performance & Management Review, 39(2), 430–453. https://doi.org/10.1080/15309576.2015.1108798
  • Stanujkic, D., Djordjevic, B., & Djordjevic, M. (2013). Comparative analysis of some prominent MCDM methods: A case of ranking Serbian banks. Serbian journal of management, 8(2), 213-241. https://doi.org/10.5937/sjm8-3774
  • Symantec (n.d.) Internet Security Threat Report. Retrieved on 14 May 2018 from www.symantec.com
  • Tuan, N. A. (2017). Personnel Evaluation and Selection using a Generalized Fuzzy Multi-Criteria Decision Making. International Journal of Soft Computing, 12(4), 263-269.
  • Turskis, Z., & Zavadskas, E. K. (2011). Multiple criteria decision making (MCDM) methods in economics: an overview. Technological and economic development of economy, (2), 397-427.
  • Ubaldi, B. (2013). Open Government Data: Towards Empirical Analysis of Open Government Data Initiatives. OECD Working Papers on Public Governance, 22, 15-35.
  • Zavadskas, E. K., Turskis, Z., & Kildienė, S. (2014). State of art surveys of overviews on MCDM/MADM methods. Technological and Economic Development of Economy, 20(1), 165-179. https://doi.org/10.3846/20294913.2014.892037
  • Zhang, Z., & Gupta, B. B. (2016) Social media security and trustworthiness: Overview and new Direction. Future Generation Computer Systems. Elsevier, https://doi.org/10.1016/j.future.2016.10.007