Keywords

1 Introduction

Digital Social Media provides an excellent communication platform through uncountable application such as online forums, chatting channels, video streamings, blogs, etc. Unfortunately, digital social media could enable threats and vulnerabilities that lead to cybersecurity risks to the cyber communities and organizations. Thus, it is crucial to manage the confidentiality and integrity of information in Digital Social Media. To this end, the relationship between confidentiality and integrity security requirements were measured and analyzed. The empirical findings point to the significant relationship between information confidentiality, integrity and availability in digital social media. This suggests that organizations should carefully determine and evaluate cybersecurity risks’ confidentiality and integrity in their mitigation plan.

A generic definition for the term “social media” is given as “… the set of Web-based broadcast technologies that enable the democratization of content, giving people the ability to emerge from consumers of content to publishers (Jacka and Scott 2011). With the ability to achieve massive scalability in real time, these technologies empower people to connect with each other to create (or co-create) value through online conversation and collaboration” (Jacka and Scott 2011).

Cybersecurity is beyond securing a perimeter the individual digital or virtual assets (Carpinella 2015). It entails a comprehensive understanding of every element that might enable penetration, interaction and compromise, and that could lead to catastrophic events or risks. Cybersecurity is becoming increasingly important as more information and technology are being uploaded into cyberspace. This has led to new terms such as cyberwarfare, cybercrime, and cyberterrorism.

Digital Social Media is gaining fast popularity among Internet users globally. Unfortunately, Digital Social Media could become the main information sources from most of the social engineers to harvest required data and information to plan cyberattacks. The larger possibility of cybersecurity risks happening could cause serious impacts to the organization and cyber community, such Phishing Ponds, Privacy Violation, Risk of Losing the legal battle, Corporate Espionage, Viruses and Malware, Productivity Loss (Social Networking Sites 2011). Cybersecurity risks are currently becoming serious issues in digital social media due to the increasing number of social media population globally. Cybersecurity risks are caused by common risk factors, which are threats and vulnerabilities of information in social media. Social media allows social engineer to use the psychological manipulation of people into performing actions of confidential information for the purpose of information gathering, fraud, or system access (Anderson 2008; Valerică and Oana 2014; Wikipedia 2016a, b). Digital Social Media becomes the source of information for social engineer to capture and harvest useful information for the purpose of the cyberattack.

Information Security Requirements adopted the core principles of information confidentiality, integrity and availability (Vorster and Labuschagne 2005; Parker 2002; Wikipedia 2016a, b) and broadly used in various fields of studies (Khidzir et al. 2010). Confidentiality refers to the limitations on the use and retention of different kinds of information (Vorster and Labuschagne 2005; Parker 2002; Code of Practice for Information Security Management 2005; Canal 2005). Integrity is the guarantee that information has not been manipulated (Vorster and Labuschagne 2005; Parker 2002; Code of Practice for Information Security Management 2005; Canal 2005) while availability is ensuring that authorized users have access to information and associated assets when required (Vorster and Labuschagne 2005; Parker 2002; Code of Practice for Information Security Management 2005; Canal 2005). Information in Digital Social Media might be improperly disclosed due to its confidentiality being exposed, modified in an inappropriate way, if its integrity is jeopardized, and destroyed or lost because its availability is threatened (Blakley et al. 2001).

Therefore, for the purpose of this study, the exploration focused on investigating the relationship of information security requirement between information confidentiality, integrity and availability in Digital Social Media. The results were measured and statistically analyzed to investigate the relationship between them.

2 Methodology

An empirical study was conducted to determine the relationship between confidentiality, integrity and availability of cybersecurity risk in Digital Social Media. Five-Point Likert-Scale was used to measure the severity level of online social media cybersecurity risks. Primary data were collected using questionnaires as the data collection tool for the study. Analysis of primary data was supported by the application of appropriate statistical techniques such mean score analysis and Bivariate Pearson Correlation test.

3 Research Model

A research model illustrated in Fig. 1 was developed focusing on the confidentiality, integrity and availability core component which has contributed to cybersecurity risk in digital social media.

Fig. 1
figure 1

Research model for relationship between cybersecurity risk on confidentiality, integrity and availability in digital social media

Based from a research model in Fig. 1, three hypotheses have been developed to test the relationship between each core element of information security requirements, confidentiality, integrity and availability levels. The hypotheses are

H1:

There is a positive relationship between confidentiality and integrity for cybersecurity risk in Digital Social Media.

H2:

There is a positive relationship between confidentiality and availability for cybersecurity risk in Digital Social Media.

H3:

There is a positive relationship between integrity and availability for cybersecurity risk in Digital Social Media.

4 Results and Analysis

There are three sections discussing the results and analysis of demographic profiles and information security risk mean score for each core component information security requirement.

4.1 Demographic Profiles and Analysis

Respondents’ demographic profiles examined were respondents’ gender, age, professional experiences, organizational sectors and their industrial involvements. Most of them are the professional and senior executives from various organizations and institutions in Malaysia. Therefore, the analysis shows that most of the respondents were considered as appropriate professionals that possess sufficient experience to respond to the entire question trustfully and accurately. Table 1 summarized the demographic profiles of respondents involved in the study.

Table 1 Demographic analysis

In terms of respondents’ years of ICT Security Experiences, majority of 42.4% had experience between 1–3 years. Only 15.2% respondents had ICT Security Experience between 4–6 years. About 21.2% of those had less than 1 year as well as more than 6 years’ experience.

4.2 Information Security Requirement Mean Score Analysis (Confidentiality, Integrity, Availability)

Information security requirement (Confidentiality, Integrity and Availability) mean score for cybersecurity risk in Digital Social Media were measured to determine each severity level.

Table 2 Mean score cybersecurity risk confidentiality, integrity and availability

As summarized in Table 2, the highest mean score on availability (3.6510) of information in Digital Social Media indicates most of the cyber community alert on the availability aspect towards the cybersecurity risk severity level. The highest mean score of availability signifies the respondents really care about the availability aspects. The second highest mean score on confidentiality (3.6094) of information indicates the level of cyber community awareness on the confidentiality issues in Digital Social Media. Therefore, the confidentiality issues awareness among cyber community could also significant to severity level of cybersecurity risk. The results prove that integrity (3.6042) of information stored, processed, and transferred through Digital Social Media platform is also given an attention among cyber communities. They also realize that the integrity of information should give priority in managing the cybersecurity risk impact.

4.3 Analysis of Relationship between Confidentiality, Integrity and Availability in Digital Social Media

The Bivariate Pearson Correlation test was then conducted on the formulated research hypotheses to determine the significant relationship, strength, and direction between three core component of information security requirement (confidentiality, integrity and availability). The correlation coefficient values, (r) were derived to explain the relationship strength between them. A result of p-value <0.01 is considered significant. A weak relationship is indicated by a (r) value of less than 0.4, values between 0.4 and 0.7 indicate moderate relationship and a strong relationship has a value higher than 0.7.

5 Discussion

The analysis of mean score results discovers the empirical evidence on how the cyber communities concerned on the core element of information security requirement in Digital Social Media that could cause the cybersecurity risks. Generally, the mean score results demonstrate the moderate level of cyber communities concerned on the confidentiality, integrity and availability of information when using Digital Social Media. Therefore, cybersecurity awareness program should be in place to educate cyber communities how to use, communicate and interact through Digital Social Media in order to minimize the frequency of cybersecurity incident and mitigate the associated risks more effectively.

A specific target group and generation gap for cybersecurity awareness program also being identified based on the demographic analysis results for more effective outcome of the program. Specific awareness content focuses on information security requirement and cybersecurity risks issues also being identified through the findings.

As revealed in Table 3, the results of the hypothesis tests indicate positive correlations for the three hypotheses. H1, H2, and H3 were accepted and the null was rejected based on significant p-value  < 0.001. The correlation coefficient (r) values were 0.627 for H1, 0.591 for H2, and 0.631 for H3. All the significant hypotheses described moderate relationship strength among information security requirement (Confidentiality, Integrity and Availability) in Digital Social Media.

Table 3 Hypotheses test results for the significant relationship between cybersecurity risk confidentiality, integrity and availability

The strongest moderate positive relationship level integrity and availability of information will cause the cybersecurity risk in Digital Social Media. Thus, the level of moderate influences between integrity and availability of information in Digital Social Media. Information integrity does not influence much to the information availability that could cause the cybersecurity risk in Digital Social Media. Meanwhile, the weakest moderate relationship was between information confidentiality and availability for cybersecurity risk in Digital Social Media. Last but not least, the others moderate positive relationship between confidentiality and integrity for cybersecurity risk in Digital Social Media.

The moderate level of relationships among three core elements of information security requirement stored, transferred, and shared in Digital Social Media still contributes to the cybersecurity risks incident that could cause a catastrophic impact to human and the entire structure of cyberspace.

6 Conclusion

This study has empirically established the significant relationship between confidentiality, integrity and availability of information in Digital Social Media private and public agencies in Malaysia. However, the moderate level of relationship influences between each of information security requirement contributed to the cybersecurity risks incident in Digital Social Media. Other findings explore the level of cybersecurity risk awareness among cyber communities. The empirical evidences show the need the comprehensive cybersecurity risk awareness program for digital societies. By identifying the relationship between these cores component of information security requirement will assist the technologist, cybersecurity expert, and practitioners to mitigate the possible impact of the risk. Additionally, cyber community will gain the full benefit from Digital Social Media platform.