Document Type : Original Article


Department of Industrial Engineering, Ayandegan Institute of Higher Education, Tonekabon, Iran.


Purpose: This study aims to identify and rank security indicators in online social networks. Social networks include Facebook, Twitter, Telegram, WhatsApp, YouTube, and Instagram.
Methodology: The information technology units of Melli Bank have been studied, and 30 people have been considered research experts. For this purpose, seven important indicators were identified, and the TOPSIS technique was used to prioritize them. Then, the relationship between the identified indicators and online social network security was investigated using the Spearman correlation test. For this purpose, a questionnaire with 24 items was distributed, and 262 samples were collected and analyzed.
Findings: The results show that security indicators in online social networks in order of priority are implementing authentication and licensing mechanisms, using up-to-date software and avoiding suspicious programs, restricting personal information dissemination, monitoring to prevent unauthorized processing of information, compliance with standards the country's IT infrastructure, and the installing an intruder detection system. Also, based on the results of the Spearman correlation test, all factors have had a positive and significant effect on social network security.
Originality/Value: In this study, we concluded that there is a significant relationship between the influential factors and the security of social networks on the line defined for these networks. The development of information and communication technology infrastructures and the increase in users using virtual social networks justifies the need to create and develop a mechanism for establishing security in these communication networks.


Azar, A., & Rajabzadeh, A. (2017). Applied decision making (MADM approach). Negahe Danesh. (In Persian).
Ahmadi, A., & Vaezi, A. (2019). An approach to increase security and privacy on social media. 4th  international conference on applied research in science and engineering, Tehran, Iran. Civilcia. (In Persian).
Babaei, B (2018). Threats of cyberspace and social networks in NAJA internal security. Journal of law enforcement and security studies, 13(47), 129-154. (In Persian).
Rasooli, M. R, & Bandegi Monfared, S. (2014). Content analysis of cultural and social themes in social networks (case study: Facebook and the youth of Tehran), Culture studies - communication, 15(27), 67-85. (In Persian).
Haghighi, E., & Gholamali, M. (2015). Identifying the factors affecting trust building in online social networks using fuzzy ELECTRE method. Information technology management, 7(4), 715-740. (In Persian). DOI: 10.22059/jitm.2015.54750
Hosseinnejad, V., & Hajikazem, A. A. (2018). Bayesian network-based trust model in social networks, Journal of electronic defense and cyber defense, 6(2), 29-38. (In Persian).
Rasekhi, A. (2016). Requirements for the development of soft security in cyberspace with emphasis on social networks. Police protection and security studies quarterly, 11(38), 1-39. (In Persian).
Rasouli, Y. S., & Jafari, M. (2020). Investigating and comparing how cryptographic algorithms work in network security. The 4th international conference on new strategies in engineering, information science and technology in the next century. Alborz, Iran. Civilcia. (In Persian).
Zare, M. H., Norouzi, E. (2019). Assessing the security of social networks of the particle cluster algorithm. Conference on computer science, electrical and telecommunication Engineering, Mashhad, Iran. Civilcia.  (In Persian).
Zarezadeh, r. (2021). disadvantages and security challenges of internal issues; a case study of virtual social networks. Journal of strategic studies, 2(92), 7-32. (In Persian).
Doaguyan, D., & Kheirandish, M. R. (2021). The effect of mobile social networks under the social relations of families in the western regions of greater Tehran (telegram case study). Journal of security and law enforcement studies, 14(53), 131-156. (In Persian).
Sahafizadeh, E., & Torkladani, B. (2020). Control of rumors on social networks using soft security mechanisms. The 17th international conference of the iranian password association, Tehran, Iran. Civilcia. (In Persian).
Abdulrahmani, R., Mozafari, M. M., & Mohamadi, I. (2018). Analyzing the security content of Telegram social network messages. Strategy, 27(89), 125-150. (In Persian).
Ghayuri-saleth, M., Bazdar, Gh. R., & Sarkardei, A. (2018). Influential factors in disseminating information on social networks based on entropy theory. Electronic and cyber defense, 2(22), 1-10. (In Persian).
Kalantari, S. (2015). The role of security in cyberspace and social networks. The first national conference on computer, information technology and Islamic communications in Iran, Qom, Iran. Civilcia. (In Persian).
Mohamadrezae, M. R. (2021). Detection of fake users in social networks using principal component analysis and kernel density estimation algorithm (case study: on twitter social network). Electronic and cyber defense, 9(3), 109-123. (In Persian).
Mohkamkar, I., & Halaj, M. M. (2014). Cyberspace, its dimensions, features and functions in the field of identity with the focus on virtual social networks. Journal of knowledge, 23 (201), 63-82. (In Persian).
Mohamadi, Z., Delsooz, K., & Sayah, E. (2019). Filtering social networks and its role in protecting and securing civil rights in cyber defense in Iran. The 2nd national conference on cyber defense, Maraqeh, Iran. Civilcia. (In Persian).
Mehregan, A., & Sedqivash, M. (2020). Study and review of security solutions in social networks. The 4th national conference on computer science and technology of Iran, Tehran, Iran. Civilcia. (In Persian).
Nadri, Gh. R., Bakhshayeshhi, A., Darabi, A., & Maghsudi, M. (2019). ). Investigating the political-security role of virtual social networks on national security of Iran. Protection and security research, 8(29), 63-88. (In Persian).
Blumenstock, J. E., Chi, G., & Tan, X. (2019). Migration and the value of social networks. Retrived from
Chaffey, D. (2022). Global social media research summary 2018. Retrieved from
Edosomwan, S., Prakasan, S. K., Kouame, D., Watson, J., & Seymour, T. (2011). The history of social media and its impact on business. Journal of applied management and entrepreneurship16(3), 79-91.
Al-Turjman, F., & Salama, R. (2021). Security in social networks. In Security in IoT social networks (pp. 1-27). Academic Press. DOI:
Hwang, C. L., & Yoon, K. (1981). Methods for multiple attribute decision making. In Multiple attribute decision making (pp. 58-191). Springer, Berlin, Heidelberg. 58-191. DOI:
Sagar, K., & Waghmare, V. (2016). Measuring the security and reliability of authentication of social networking sites. Procedia computer science79, 668-674. DOI:
McCarroll, N., & Curran, K. (2013). Social networking in education. International journal of innovation in the digital economy (IJIDE)4(1), 1-15. DOI:10.4018/978-1-4666-6114-1.ch034
Ortiz-Ospina, E. (2019). The rise of social media. Our world in data.
Ajami, R., Al Qirim, N., & Ramadan, N. (2012). Privacy issues in mobile social networks. Procedia computer science10, 672-679. DOI:
Liao, Y., Zhao, G., Wang, J., & Li, S. (2020). Network security situation assessment model based on extended hidden Markov. Mathematical problems in engineering2020. DOI:
Zeebaree, S., Ameen, S., & Sadeeq, M. (2020). Social media networks security threats, risks and recommendation: A case study in the kurdistan region. International journal of innovation, creativity and change13(7), 349-365.