نوع مقاله : مقاله پژوهشی

نویسندگان

1 دانشجو

2 استادیار موسسه آموزش عالی آیندگان

10.22105/imos.2022.327770.1210

چکیده

هدف: هدف از تحقیق حاضر شناسایی و رتبه‌بندی شاخص‌های امنیتی در شبکه‌های اجتماعی بر خط می‌باشد. شبکه‌های اجتماعی مانند فیس‌بوک، توییتر، تلگرام، واتساپ، یوتیوب و اینستاگرام می‌باشند.
روش‌شناسی پژوهش: واحدهای فناوری اطلاعات بانک ملی موردمطالعه قرار گرفته که تعداد 30 نفر به به‌عنوان خبرگان پژوهش در نظر گرفته شده است. بدین منظور، هفت شاخص مهم شناسایی گردید و به‌منظور اولویت‌بندی شاخص‌ها از تکنیک TOPSIS استفاده گردید. در این مرحله نیز پرسشنامه مقایسات زوجی برای خبرگان پژوهش توزیع و گرداوری گردید و بر اساس آن اولویت‌بندی عوامل ارائه شده است. درنهایت با استفاده از آزمون همبستگی اسپیرمن به بررسی ارتباط بین شاخص‌های شناسایی‌شده و امنیت در شبکه‌های اجتماعی بر خط پرداخته شد. بدین منظور نیز پرسشنامه‌ای با 24 گویه توزیع و تعداد 262 نمونه جمع‌آوری و مورد تحلیل قرار گرفت.
یافته‌ها: نتیجه تحقیق نشان می‌دهد شاخص‌های امنیتی در شبکه‌های اجتماعی بر خط به ترتیب اولویت عبارت‌اند از: پیاده‌سازی سازوکارهای تصدیق هویت و مجوزدهی‌، استفاده از نرم‌افزارهای به‌روز و پرهیز از برنامه‌های مشکوک، محدودیت انتشار اطلاعات شخصی، پایش به‌منظور عدم‌پردازش غیرمجاز اطلاعات، رعایت استانداردهای امنیتی، زیرساخت‌های IT کشور و نصب سیستم شناساگر متجاوز. همچنین بر اساس نتایج آزمون همبستگی اسپیرمن، کلیه عوامل تاثیر مثبت و معناداری بر امنیت شبکه‌های اجتماعی داشته‌اند.
اصالت/ارزش افزوده علمی: ما در این تحقیق به این نتیجه رسیدیم که بین عوامل موثر و امنیت شبکه‌های اجتماعی بر خط تعریف‌شده برای این شبکه‌ها، رابطه معناداری دارد. در واقع توسعه‎ی زیرساخت‌های فناوری اطلاعات و ارتباطات و افزایش شمار کاربران استفاده‌کننده از شبکه‌های اجتماعی مجازی، لزوم ایجاد و توسعه‌ی سازوکاری برای برقراری امنیت در این شبکه‌های ارتباطی را توجیه می‌کند.




 

کلیدواژه‌ها

عنوان مقاله [English]

Identification and ranking of security indicators in online social networks with MADM technique

نویسندگان [English]

  • hamed fathi 1
  • alireza amini 2

1 student

2 Assistant Professor of the Higher Education Institute of the Future

چکیده [English]

Purpose: The purpose of this study is to identify and rank security indicators in online social networks. Social networks such as Facebook, Twitter, Telegram, WhatsApp, YouTube, and Instagram.
Methodology: The information technology units of Melli Bank have been studied and 30 people have been considered as research experts. For this purpose, seven important indicators were identified and TOPSIS technique was used to prioritize the indicators. Then, using Spearman correlation test, the relationship between the identified indicators and online social network security was investigated. For this purpose, a questionnaire with 24 items was distributed and 262 samples were collected and analyzed.
Findings: The results show that security indicators in online social networks in order of priority are: implementation of authentication and licensing mechanisms, use of up-to-date software and avoidance of suspicious programs, restriction of personal information dissemination, monitoring to prevent unauthorized processing of information, compliance with standards the country's IT infrastructure, and the installation of an intruder detection system. Also, based on the results of Spearman correlation test, all factors have had a positive and significant effect on social network security.
Originality/Value: In this study, we concluded that there is a significant relationship between the effective factors and the security of social networks on the line defined for these networks. In fact, the development of information and communication technology infrastructures and the increase in the number of users using virtual social networks, justifies the need to create and develop a mechanism for establishing security in these communication networks.




 

کلیدواژه‌ها [English]

  • Iran IT infrastructure
  • Dissemination of personal information
  • Security
  • Online social networks
  • TOPSIS
Azar, A., & Rajabzadeh, A. (2017). Applied decision making (MADM approach). Negahe Danesh. (In Persian). https://www.gisoom.com
Ahmadi, A., & Vaezi, A. (2019). An approach to increase security and privacy on social media. 4th  international conference on applied research in science and engineering, Tehran, Iran. Civilcia. (In Persian). https://civilica.com/doc/1000645/
Babaei, B (2018). Threats of cyberspace and social networks in NAJA internal security. Journal of law enforcement and security studies, 13(47), 129-154. (In Persian). https://www.magiran.com/paper/1970526
Rasooli, M. R, & Bandegi Monfared, S. (2014). Content analysis of cultural and social themes in social networks (case study: Facebook and the youth of Tehran), Culture studies - communication, 15(27), 67-85. (In Persian). https://www.sid.ir/paper/395229/fa
Haghighi, E., & Gholamali, M. (2015). Identifying the factors affecting trust building in online social networks using fuzzy ELECTRE method. Information technology management, 7(4), 715-740. (In Persian). DOI: 10.22059/jitm.2015.54750
Hosseinnejad, V., & Hajikazem, A. A. (2018). Bayesian network-based trust model in social networks, Journal of electronic defense and cyber defense, 6(2), 29-38. (In Persian). https://www.magiran.com/paper/1902588
Rasekhi, A. (2016). Requirements for the development of soft security in cyberspace with emphasis on social networks. Police protection and security studies quarterly, 11(38), 1-39. (In Persian). http://spaps.jrl.police.ir/article_13760.html?lang=en
Rasouli, Y. S., & Jafari, M. (2020). Investigating and comparing how cryptographic algorithms work in network security. The 4th international conference on new strategies in engineering, information science and technology in the next century. Alborz, Iran. Civilcia. (In Persian). https://civilica.com/doc/1032523
Zare, M. H., Norouzi, E. (2019). Assessing the security of social networks of the particle cluster algorithm. Conference on computer science, electrical and telecommunication Engineering, Mashhad, Iran. Civilcia.  (In Persian). https://civilica.com/doc/988314/
Zarezadeh, r. (2021). disadvantages and security challenges of internal issues; a case study of virtual social networks. Journal of strategic studies, 2(92), 7-32. (In Persian). http://ensani.ir
Doaguyan, D., & Kheirandish, M. R. (2021). The effect of mobile social networks under the social relations of families in the western regions of greater Tehran (telegram case study). Journal of security and law enforcement studies, 14(53), 131-156. (In Persian). http://spaps.jrl.police.ir/article_93867.html?lang=en
Sahafizadeh, E., & Torkladani, B. (2020). Control of rumors on social networks using soft security mechanisms. The 17th international conference of the iranian password association, Tehran, Iran. Civilcia. (In Persian). https://civilica.com/doc/1120274
Abdulrahmani, R., Mozafari, M. M., & Mohamadi, I. (2018). Analyzing the security content of Telegram social network messages. Strategy, 27(89), 125-150. (In Persian). https://www.sid.ir/paper/405216/fa
Ghayuri-saleth, M., Bazdar, Gh. R., & Sarkardei, A. (2018). Influential factors in disseminating information on social networks based on entropy theory. Electronic and cyber defense, 2(22), 1-10. (In Persian). https://www.sid.ir/paper/243160/fa
Kalantari, S. (2015). The role of security in cyberspace and social networks. The first national conference on computer, information technology and Islamic communications in Iran, Qom, Iran. Civilcia. (In Persian). https://civilica.com/doc/408879
Mohamadrezae, M. R. (2021). Detection of fake users in social networks using principal component analysis and kernel density estimation algorithm (case study: on twitter social network). Electronic and cyber defense, 9(3), 109-123. (In Persian). https://ecdj.ihu.ac.ir/article_205996.html
Mohkamkar, I., & Halaj, M. M. (2014). Cyberspace, its dimensions, features and functions in the field of identity with the focus on virtual social networks. Journal of knowledge, 23 (201), 63-82. (In Persian). http://ensani.ir/file/download/article/20150617145855-9723-377.pdf
Mohamadi, Z., Delsooz, K., & Sayah, E. (2019). Filtering social networks and its role in protecting and securing civil rights in cyber defense in Iran. The 2nd national conference on cyber defense, Maraqeh, Iran. Civilcia. (In Persian). https://civilica.com/doc/903767/
Mehregan, A., & Sedqivash, M. (2020). Study and review of security solutions in social networks. The 4th national conference on computer science and technology of Iran, Tehran, Iran. Civilcia. (In Persian). https://civilica.com/doc/1116856/
Nadri, Gh. R., Bakhshayeshhi, A., Darabi, A., & Maghsudi, M. (2019). ). Investigating the political-security role of virtual social networks on national security of Iran. Protection and security research, 8(29), 63-88. (In Persian).https://www.sid.ir/paper/265958/fa
Blumenstock, J. E., Chi, G., & Tan, X. (2019). Migration and the value of social networks. Retrived from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3360078#
Chaffey, D. (2022). Global social media research summary 2018. Retrieved from https://www.smartinsights.com/social-media-marketing/social-media-strategy/new-global-social-media-research
Edosomwan, S., Prakasan, S. K., Kouame, D., Watson, J., & Seymour, T. (2011). The history of social media and its impact on business. Journal of applied management and entrepreneurship16(3), 79-91. https://www.proquest.com/openview/f828806820e0b99fcbda9c765788e137/1?pq-origsite=gscholar&cbl=25565
Al-Turjman, F., & Salama, R. (2021). Security in social networks. In Security in IoT social networks (pp. 1-27). Academic Press. DOI: https://doi.org/10.1016/B978-0-12-821599-9.00001-7
Hwang, C. L., & Yoon, K. (1981). Methods for multiple attribute decision making. In Multiple attribute decision making (pp. 58-191). Springer, Berlin, Heidelberg. 58-191. DOI: https://doi.org/10.1007/978-3-642-48318-9_3
Sagar, K., & Waghmare, V. (2016). Measuring the security and reliability of authentication of social networking sites. Procedia computer science79, 668-674. DOI: https://doi.org/10.1016/j.procs.2016.03.085
McCarroll, N., & Curran, K. (2013). Social networking in education. International journal of innovation in the digital economy (IJIDE)4(1), 1-15. DOI:10.4018/978-1-4666-6114-1.ch034
Ortiz-Ospina, E. (2019). The rise of social media. Our world in data. https://ourworldindata.org/rise-of-social-media
Ajami, R., Al Qirim, N., & Ramadan, N. (2012). Privacy issues in mobile social networks. Procedia computer science10, 672-679. DOI: https://doi.org/10.1016/j.procs.2012.06.086
Liao, Y., Zhao, G., Wang, J., & Li, S. (2020). Network security situation assessment model based on extended hidden Markov. Mathematical problems in engineering2020. DOI: https://doi.org/10.1155/2020/1428056
Zeebaree, S., Ameen, S., & Sadeeq, M. (2020). Social media networks security threats, risks and recommendation: A case study in the kurdistan region. International journal of innovation, creativity and change13(7), 349-365.