الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى
The present study aims at recognizing to an extreme the Arab communityis aware of how to protect their accounts and ways of penetration (hacking) ofprivacy on a general level and focusing on social engineering on particular. Inaddition to other available ways of training the digital citizen. The con...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
Egyptian Libraries Association
2019-10-01
|
Series: | المجلة الدولية لعلوم المكتبات والمعلومات |
Subjects: | |
Online Access: | https://ijlis.journals.ekb.eg/article_74326_97b26ed5671f5e9b995d903845a1156c.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832541214716461056 |
---|---|
author | د. مها أحمد ابراهیم |
author_facet | د. مها أحمد ابراهیم |
author_sort | د. مها أحمد ابراهیم |
collection | DOAJ |
description | The present study aims at recognizing to an extreme the Arab communityis aware of how to protect their accounts and ways of penetration (hacking) ofprivacy on a general level and focusing on social engineering on particular. Inaddition to other available ways of training the digital citizen. The concept ofsocial engineering (the art of penetrating minds), the significance of socialnetworks in the Arab world, and the importance of privacy from social networks'users in the Arab world, as well as recognizing ways of social networkspenetration and ways of social engineering protection. So we can point out thatthe Arab community awareness of social engineering is one of its priorities forprotecting their accounts in all social networks and the required skills to preventattacks of this social engineering in all social networks. A sample of 336individuals was applied to the current study. The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. In addition to hacking their banking accounts since 6.8% of the individualswere slightly hacked. One of the most common methods of social engineeringattacks are spam messages sent by a friend as congratulations (77.1%), followedby 53.2% who are convinced by the significance of programs to be downloaded,the importance of social networks in the Arab world, the importance of privacyfrom users' point of view of social networks in the Arab world, as well as theidentification of penetrate ways of the social networks and how to be protectedfrom social engineering. |
format | Article |
id | doaj-art-4140ed1ef2b443a88e391c5a6becea04 |
institution | Kabale University |
issn | 2356-8003 2735-3931 |
language | Arabic |
publishDate | 2019-10-01 |
publisher | Egyptian Libraries Association |
record_format | Article |
series | المجلة الدولية لعلوم المكتبات والمعلومات |
spelling | doaj-art-4140ed1ef2b443a88e391c5a6becea042025-02-04T09:16:43ZaraEgyptian Libraries Associationالمجلة الدولية لعلوم المكتبات والمعلومات2356-80032735-39312019-10-016424121910.21608/ijlis.2019.7432674326الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربىد. مها أحمد ابراهیم0قسم المکتبات جامعة بنى سويفThe present study aims at recognizing to an extreme the Arab communityis aware of how to protect their accounts and ways of penetration (hacking) ofprivacy on a general level and focusing on social engineering on particular. Inaddition to other available ways of training the digital citizen. The concept ofsocial engineering (the art of penetrating minds), the significance of socialnetworks in the Arab world, and the importance of privacy from social networks'users in the Arab world, as well as recognizing ways of social networkspenetration and ways of social engineering protection. So we can point out thatthe Arab community awareness of social engineering is one of its priorities forprotecting their accounts in all social networks and the required skills to preventattacks of this social engineering in all social networks. A sample of 336individuals was applied to the current study. The study also comes up with thefollowing results: positively, individuals of the academic community succeeded atprotecting their data automatically and at a high rate. Selection of fake namesconstitutes half of the academic community ( 53.2%), who use social networksand this is explored by their deny of personal data or by writing fake personaldata. In addition to hacking their banking accounts since 6.8% of the individualswere slightly hacked. One of the most common methods of social engineeringattacks are spam messages sent by a friend as congratulations (77.1%), followedby 53.2% who are convinced by the significance of programs to be downloaded,the importance of social networks in the Arab world, the importance of privacyfrom users' point of view of social networks in the Arab world, as well as theidentification of penetrate ways of the social networks and how to be protectedfrom social engineering.https://ijlis.journals.ekb.eg/article_74326_97b26ed5671f5e9b995d903845a1156c.pdfالهندسة الاجتماعيةشبکات التواصل الاجتماعى |
spellingShingle | د. مها أحمد ابراهیم الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى المجلة الدولية لعلوم المكتبات والمعلومات الهندسة الاجتماعية شبکات التواصل الاجتماعى |
title | الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى |
title_full | الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى |
title_fullStr | الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى |
title_full_unstemmed | الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى |
title_short | الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى |
title_sort | الهندسة الاجتماعیة وشبکات التواصل الاجتماعى وتاثیرها على المجتمع العربى |
topic | الهندسة الاجتماعية شبکات التواصل الاجتماعى |
url | https://ijlis.journals.ekb.eg/article_74326_97b26ed5671f5e9b995d903845a1156c.pdf |
work_keys_str_mv | AT dmhạạḥmdạbrạhym ạlhndsẗạlạjtmạʿyẗwsẖbḵạtạltwạṣlạlạjtmạʿywtạtẖyrhạʿlyạlmjtmʿạlʿrby |