Comparison of Data Security and User Privacy on Instagram and Twitter: A Literature Study

  • Arly Maya Berlyanti Dwi Santoso Universitas Airlangga
    (ID)
  • Eva Alisya Febrianti Universitas Airlangga
    (ID)
  • Fitri Mutia Universitas Airlangga
    (ID)
Keywords: Data security, user privacy, social media, security threats

Abstract

This comprehensive literature study examines and compares data security and user privacy features on social media platforms such as Instagram and Twitter. The method used is a literature study of 25 journal articles from various trusted sources, such as Scopus, ScienceDirect, and Web of Science, with a qualitative approach. The study reveals that Instagram has advantages in some aspects of data security and privacy compared to Twitter. However, both platforms have weaknesses that users should be aware of, including the risk of phishing and cyberattacks. The research also highlights the importance of individual awareness and the implementation of effective data security measures, such as two-factor authentication and strict privacy settings. Although the study provides valuable insights, there are limitations in data collection methods that rely on electronic sources, which may not cover all relevant literature. Therefore, future research is expected to overcome these limitations and provide more up-to-date recommendations for improving data security and user privacy on social media.

Downloads

Download data is not yet available.

References

A. F. A. Rashid and Z. F. Zaaba, (2020). "Facebook, Twitter, and Instagram: The Privacy Challenges," 2020 International Conference on Promising Electronic Technologies (ICPET), Jerusalem, Palestine, pp. 122-127, doi: 10.1109/ICPET51420.2020.00032.

Abhinav, S., Sonalika, K., Charu, C., Yadav, C. P., & Lokesh, K. (2023). Meta-analysis on Plasmodium falciparum sulfadoxine-pyrimethamine resistance-conferring mutations in India identifies hot spots for genetic surveillance. International Journal of Antimicrobial Agents, 107071.

Al-Hamar, Y., Kolivand, H., Tajdini, M., Saba, T., & Ramachandran, V. (2021). Enterprise Credential Spear-phishing attack detection. Computers and Electrical Engineering, 94(September 2020), 107363. https://doi.org/10.1016/j.compeleceng.2021.107363

Aman, K. D. (2023). Study of Security and Privacy Measures on Twitter and Instagram. 6(3), 49–55.

Amon, M. J., Hasan, R., Hugenberg, K., Bertenthal, B. I., & Kapadia, A. (2020). Influencing photo sharing decisions on social media: A case of paradoxical findings. Proceedings - IEEE Symposium on Security and Privacy, 2020-May, 1350–1366. https://doi.org/10.1109/SP40000.2020.00006

Anwer, M. A., Zarro, R. D., & Farraj, K. H. (2017). Security Issues in Social Media: Challenges and Solutions. 6566(April), 408–420. https://doi.org/10.25212/lfu.qzj.2.2.41

Arendt, Hannah. (1958). The Human Condition 2nd ed. Chicago: University of Chicago Press.

Ayora, V., Horita, F., & Kamienski, C. (2021). Profiling online social network platforms: Twitter vs. Instagram. Proceedings of the Annual Hawaii International Conference on System Sciences, 2020-Janua, 2792–2801. https://doi.org/10.24251/hicss.2021.341

Bhatnagar, N. (2020). Student attitudes, awareness, and perceptions of personal privacy and cybersecurity in the use of social media : An initial study. 18(February), 48–58.

Boyd, D., & Ellison, N. (2007). Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication, 13(1), 210–230. https://doi.org/10.1111/j.10836101.2007.00393.x

Cengiz, A. B., Kalem, G., & Boluk, P. S. (2022). The Effect of Social Media User Behaviors on Security and Privacy Threats. IEEE Access, 10, 57674–57684. https://doi.org/10.1109/ACCESS.2022.3177652

Choi, T. R., & Sung, Y. (2018). Instagram versus Snapchat: Self-expression and privacy concern on social media. Telematics and Informatics, 35(8), 2289–2298. https://doi.org/10.1016/j.tele.2018.09.009

Christina Shane-Simpson, Adriana Manago, Naomi Gaggi, Kristen Gillespie-Lynch, (2018). Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital, Computers in Human Behavior, Volume 86, Pages 276-288, ISSN 0747-5632, https://doi.org/10.1016/j.chb.2018.04.041.

Darmaningrat, E. W. T., Astuti, H. M., & Alfi, F. (2020). Information Privacy Concerns Among Instagram Users: The Case of Indonesian College Students. Journal of Information Systems Engineering and Business Intelligence, 6(2), 159. https://doi.org/10.20473/jisebi.6.2.159-168

Darren Hayes, Francesco Cappa, Nhien An Le-Khac, An effective approach to mobile device management: Security and privacy issues associated with mobile applications, Digital Business, Volume 1, Issue 1, 2020, 100001, ISSN 2666-9544, https://doi.org/10.1016/j.digbus.2020.100001.

Dashora, D., Ashok, P., & Jetawat, K. (2017). An Assessment Cram on Security Issue of Fake Identity Behavior in Social Media. 34–37.

Gan, D., & Jenkins, L. (2015). Social Networking Privacy—Who’s Stalking You? Future Internet, 7(4), 67–93. https://doi.org/10.3390/fi7010067

Gangarde, R., Sharma, A., & Pawar, A. (2019). Bibliometric survey of privacy of social media network data publishing. Library Philosophy and Practice, 2019(July 2023), 1–21.

Gritzalis, D., Kandias, M., Stavrou, V., & Mitrou, L. (2014). History of Information: The case of Privacy and Security in Social Media. Proceedings of the History of Information Conference, 283–310. http://www.cis.aueb.gr/Publications/INFOHIST-2014 Legal Publications.pdf

Hafidz, I., Kautsar, A. R., Valianta, T., & Rakhmawati, N. A. (2017). Teenstagram TimeFrame: A Visualization for Instagram Time Dataset from Teen Users (Case Study in Surabaya, Indonesia). Procedia Computer Science, 124, 100–107. https://doi.org/10.1016/j.procs.2017.12.135

Kaur, R., Singh, S., & Kumar, H. (2018). Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches. Journal of Network and Computer Applications, 112(February), 53–88. https://doi.org/10.1016/j.jnca.2018.03.015

Kharbat, F. F., & Abu Daabes, A. S. (2019). Privacy paradoxes in the middle east: A content analysis from instagram. Proceedings - 2019 International Arab Conference on Information Technology, ACIT 2019, 287–288. https://doi.org/10.1109/ACIT47987.2019.8991070

Lim, J. S., Heinrichs, J. H., & Lim, K. S. (2017). Gender and hedonic usage motive differences in social media site usage behavior. Journal of Global Marketing, 30(3), 161-173.

Mistry, V. (2011). Critical care training: using Twitter as a teaching tool. British Journal of Nursing, 20(20), 1292-1296.

Muhammad Zulfahmi, Anthony Elsandi, Aldizar Apriliansyah, Maria Susan Anggreainy, Karto Iskandar, Syaeful Karim, (2023). Privacy protection strategies on social media, Procedia Computer Science, Volume 216, Pages 471-478, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2022.12.159.

Oehri, C., & Teufel, S. (2012). Social media security culture - The Human Dimension in Social Media Management. In Information Security for South Africa, 4(1), 1–5.

Ogbanufe, O. (2023). Securing online accounts and assets: An examination of personal investments and protection motivation. International Journal of Information Management, 68(July 2022), 102590. https://doi.org/10.1016/j.ijinfomgt.2022.102590

Okditazeini, V., & Irwansyah. (2018). Threat on Privacy and Data Mining in Digital Era: a Meta-Synthesis Analysis on Social Networking Sites (Sns). Jurnal Studi Komunikasi Dan Media, 22(2), 109–122. https://www.journals.sagepub.com

P. Giridhar, S. Wang, T. Abdelzaher, T. A. Amin and L. Kaplan, (2017). "Social Fusion: Integrating Twitter and Instagram for Event Monitoring," 2017 IEEE International Conference on Autonomic Computing (ICAC), Columbus, OH, USA, pp. 1-10, doi: 10.1109/ICAC.2017.46

Pawestri, F. D., & Jumino, J. (2021). Analisis Hubungan Information Privacy Concern dan Perilaku Perlindungan Privasi Pengguna Twitter di Indonesia. Anuva: Jurnal Kajian Budaya, Perpustakaan, dan Informasi, 5(2), 221-236.

Purwaningtyas, M. P. F., & Alicya, D. A. (2020). The Fragmented Self: Having Multiple Accounts in Instagram Usage Practice among Indonesian Youth. Jurnal Media Dan Komunikasi Indonesia, 1(2), 171. https://doi.org/10.22146/jmki.58459

Rejeb, A., Rejeb, K., Abdollahi, A., & Treiblmaier, H. (2022). The big picture on Instagram research: Insights from a bibliometric analysis. Telematics and Informatics, 73(December 2021), 1–28. https://doi.org/10.1016/j.tele.2022.101876

Shane-Simpson, C., Manago, A., Gaggi, N., & Gillespie-Lynch, K. (2018). Why do college students prefer Facebook, Twitter, or Instagram? Site affordances, tensions between privacy and self-expression, and implications for social capital. Computers in Human Behavior, 86, 276–288. https://doi.org/10.1016/j.chb.2018.04.041

Shevchuk, R., & Pastukh, Y. (2019). Improve the Security of Social Media Accounts. IEEE, 6–9.

Soumelidou, A., & Tsohou, A. (2020). Effects of privacy policy visualization on users’ information privacy awareness level: The case of Instagram. Information Technology and People, 33(2), 502–534. https://doi.org/10.1108/ITP-08-2017-0241

Soumelidou, A., & Tsohou, A. (2021). Towards the creation of a profile of the information privacy aware user through a systematic literature review of information privacy awareness. Telematics and Informatics, 61(February), 101592. https://doi.org/10.1016/j.tele.2021.101592

Statista. (2020). "Leading countries based on number of Twitter users as of October 2020".

Tal Laor (2022). My social network: Group differences in frequency of use, active use, and interactive use on Facebook, Instagram and Twitter, Technology in Society, Volume 68, 2022, 101922, ISSN 0160-791X,https://doi.org/10.1016/j.techsoc.2022.101922.

Vaia Moustaka, Zenonas Theodosiou, Athena Vakali, Anastasis Kounoudes, Leonidas G. Anthopoulos, (2019). Εnhancing social networking in smart cities: Privacy and security borderlines, Technological Forecasting and Social Change, Volume 142, Pages 285-300, ISSN 0040-1625, https://doi.org/10.1016/j.techfore.2018.10.026.

https://www.statista.com/statistics/242606/number-of-active-twitter-users-in-selected-countries/.

van der Schyff, K., & Flowerday, S. (2023). The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO. Computers and Security, 126, 103071. https://doi.org/10.1016/j.cose.2022.103071

Xu, H. et al. (2012), ‘Measuring mobile users’ concerns for information privacy’, International Conference

on Information Systems, ICIS 2012, 3(Ftc 2009), pp. 2278–2293.

Zhang, W., & Sun, H. M. (2017). Instagram spam detection. Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC, 227–228. https://doi.org/10.1109/PRDC.2017.43

Published
2024-05-07
How to Cite
Dwi Santoso, A. M. B., Eva Alisya Febrianti, & Fitri Mutia. (2024). Comparison of Data Security and User Privacy on Instagram and Twitter: A Literature Study. Khizanah Al-Hikmah : Jurnal Ilmu Perpustakaan, Informasi, Dan Kearsipan, 12(1), 77-88. https://doi.org/10.24252/kah.v12i1a7
Section
Articles
Abstract viewed = 302 times