A Study on the Evolution of Digital Media Technologies and Their Effect on Information Security Practices

Authors

DOI:

https://doi.org/10.22399/ijcesen.1864

Keywords:

Digital Media Technologies, Information Security Practices, Cyber Threats, Encryption Methods, Social Media Vulnerabilities, Holistic Security Frameworks

Abstract

Digital media technologies transformed communication systems through exceptional advancement rates. Rapid technological progress transformed how we collaborate with others alongside information distribution practises. Modern technology provided easier connectivity and performance optimization but introduced extensive problems with infrastructure security. The study investigates how digital media technologies relate to information security by analysing storage procedures across systems and encryption protocols and social media network development patterns. A total of 280 participants were utilised in the study to evaluate both critical security hazards and educational requirements as well as existing defence systems. Research findings indicate an immediate requirement to create an integrated security framework connecting technology innovation to regulatory action and behavioural guidance to minimise risks. Through this research organisations receive targeted recommendations that enhance their security frameworks during their digital transformation phase.

References

[1] Nuriddinov. (2023). Use of Digital Sports Technologies in Sports Television. American Journal of Social Sciences and Humanity Research. 3(11);208-219. https://theusajournals.com/index.php/ajsshr/article/view/1980/1915

[2] Aondover, E. M., Tosin, Y. A. N., Akin-Odukoya, O. O., Onyejelem, T. E., & Ridwan, M. (2025). Exploring the Application of Social Media in Governance in Nigeria. SIASAT. 10(1);30-43. https://doi.org/10.33258/siasat.v10i1.193

[3] Qalati, S. A., Ostic, D., Sulaiman, M. A. B. A., Gopang, A. A., & Khan, A. (2022). Social media and SMEs' performance in developing countries; Effects of technological-organizational-environmental factors on the adoption of social media. Sage Open. 12(2);21582440221094594. https://doi.org/10.1177/21582440221094594

[4] Saeed, S., Altamimi, S. A., Alkayyal, N. A., Alshehri, E., & Alabbad, D. A. (2023). Digital transformation and cybersecurity challenges for business resilience: Issues and recommendations. Sensors. 23(15);6666. https://doi.org/10.3390/s23156666

[5] Sharma, P., Sharma, R., & Bhardwaj, K. (2024). Cloud Computing in Everyday Life: Revolutionizing How We Live, Work, and Connect. In Driving Transformative Technology Trends With Cloud Computing. IGI Global. 43-53. https://doi.org/10.4018/979-8-3693-2869-9.ch003

[6] Susanto, H., Fang Yie, L., Mohiddin, F., Rahman Setiawan, A. A., Haghi, P. K., & Setiana, D. (2021). Revealing social media phenomenon in time of COVID-19 pandemic for boosting start-up businesses through digital ecosystem. Applied System Innovation. 4(1);6. https://doi.org/10.3390/asi4010006

[7] Thakur, M. (2024). Cyber security threats and countermeasures in the digital age. Journal of Applied Science and Education (JASE). 4(1);1-20. https://doi.org/10.54060/a2zjournals.jase.42

[8] Mukherjee, S., Baral, M. M., Nagariya, R., Chittipaka, V., & Pal, S. K. (2024). Artificial intelligence-based supply chain resilience for improving firm performance in emerging markets. Journal of Global Operations and Strategic Sourcing. 17(3);516-540. https://doi.org/10.1108/JGOSS-10-2022-0075

[9] Kaur, G., Bonde, U., Pise, K. L., Yewale, S., Agrawal, P., Shobhane, P., Maheshwari, S., Pinjarkar, L., & Gangarde, R. (2024). Social Media in the Digital Age: A Comprehensive Review of Impacts, Challenges and Cybercrime. Engineering Proceedings. 62(1);6. https://doi.org/10.3390/engproc2023062006

[10] Bellovin, S. M., Blaze, M., Clark, S., & Landau, S. (2014). Lawful hacking: Using existing vulnerabilities for wiretapping on the Internet. Northwestern Journal of Technology and Intellectual Property. 12;1. https://scholarlycommons.law.northwestern.edu/cgi/viewcontent.cgi?article=1209&context=njtip

[11] Holloway, S. (2024). The Impact of Cloud-Based Information Systems on Collaboration and Productivity in Remote Teams. https://doi.org/10.20944/preprints202412.0958.v1

[12] Butun, I., Österberg, P., & Song, H. (2019). Security of the Internet of Things; Vulnerabilities, attacks, and countermeasures. IEEE Communications Surveys & Tutorials. 22(1);616-644. https://doi.org/10.1109/COMST.2019.2953364

[13] Butun, I., Österberg, P., & Song, H. (2019). Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Communications Surveys & Tutorials. 22(1);616-644. https://doi.org/10.1109/COMST.2019.2953364

[14] Bechara, F. R., & Schuch, S. B. (2021). Cybersecurity and global regulatory challenges. Journal of Financial Crime. 28(2);359-374. https://doi.org/10.1108/JFC-08-2020-0173

[15] Yu, S. (2021). Application of Blockchain-Based Sports Health Data Collection System in the Development of Sports Industry. Mobile Information Systems. 2021;4663147. https://doi.org/10.1155/2021/4663147

[16] Ismagilova, E., Hughes, L., Rana, N. P., & Dwivedi, Y. K. (2022). Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework. Information Systems Frontiers. 24;1-22. https://doi.org/10.1007/s10796-020-10044-1

[17] Sarker, O., Jayatilaka, A., Haggag, S., Liu, C., & Babar, M. A. (2024). A Multi-vocal Literature Review on challenges and critical success factors of phishing education, training and awareness. Journal of Systems and Software. 208;111899. https://doi.org/10.1016/j.jss.2023.111899

[18] Abdulhadi, O. (2023). The human connection to information security: A qualitative study on policy development, communication and compliance in government agencies. https://his.diva-portal.org/smash/record.jsf?pid=diva2%3A1772736

[19] Zhang, Z., Wen, F., Sun, Z., Guo, X., He, T., & Lee, C. (2022). Artificial intelligence‐enabled sensing technologies in the 5G/internet of things era: from virtual reality/augmented reality to the digital twin. Advanced Intelligent Systems. 4(7);2100228. https://doi.org/10.1002/aisy.202100228

[20] Habbal, M. K. Ali, & Abuzaraida, M. A. (2024). Artificial Intelligence Trust, risk and security management (AI trism): Frameworks, applications, challenges and future research directions. Expert Systems with Applications. 240;122442. https://doi.org/10.1016/j.eswa.2023.122442

[21] Shaikh, F. A., & Siponen, M. (2023). Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. Computers & Security. 124;102974. https://doi.org/10.1016/j.cose.2022.102974

[22] UNCTAD. (2021). Digital economy report 2021: Cross-border data flows and development. United Nations Conference on Trade and Development. Available at: https://unctad.org/webflyer/digital-economy-report-2021/

[23] Oke, E., Aliu, J., Fadamiro, P. O., Akanni, P. O., & Stephen, S. S. (2023). Attaining digital transformation in construction: an appraisal of the awareness and usage of automation techniques. Journal of Building Engineering. 67;105968. https://doi.org/10.1016/j.jobe.2023.105968

[24] Wale-Oshinowo, Omobowale, A. O., Adeyeye, M. M., & Lebura, S. (2023). Least developed countries in Africa. In The Palgrave Encyclopedia of Global Security Studies. Springer International Publishing. 882-897. https://doi.org/10.1007/978-3-319-74336-3_346-1

[25] ITU. (2021). Global cybersecurity index 2020. International Telecommunication Union. Available at: https://www.itu.int/en/ITU-D/Cybersecurity/Pages/GCI.aspx

[26] Couch, V. (2024). Investigating the Impact of Cybersecurity Awareness in K12 Context: A Quantitative Research Method. Ph.D. dissertation, Colorado Technical University.

[27] Hinton, P. R., McMurray, I., & Brownlow, C. (2014). SPSS Explained. 2nd ed. Routledge.

[28] Alcock, P. M. (2021). Cybersecurity perception and behavior, insights from a global workforce: A quantitative comparative study. Doctoral dissertation, Capella University.

[29] Trunfio, M., & Rossi, S. (2021). Conceptualising and measuring social media engagement: A systematic literature review. Italian Journal of Marketing. 2021(3);267-292. https://doi.org/10.1007/s43039-021-00035-8

[30] Aschbrenner, K. A., Kruse, G., Gallo, J. J., & Plano Clark, V. L. (2022). Applying mixed methods to pilot feasibility studies to inform intervention trials. Pilot and Feasibility Studies. 8(1);217. https://doi.org/10.1186/s40814-022-01173-2

[31] Hasan, N., Rana, R. U., Chowdhury, S., Dola, A. J., & Rony, M. K. K. (2021). Ethical considerations in research. Journal of Nursing Research, Patient Safety and Practise (JNRPSP). 1(01);1-4. https://doi.org/10.55529/jnrpsp11.1.4

[32] Lee, T., & Kim, M. (2021). Data Encryption Protocols for Protecting Confidential Survey Responses. Computers & Security. 101;102881. https://doi.org/10.1016/j.cose.2020.102881

[33] Chua, E. M. X., & Chan, T. J. (2022). The influence of corporate social responsibility communication and corporate image of beverage companies: A customers' perspective. Journal of Arts and Social Sciences. 5(2);1-14. https://ruijass.com/wp-content/uploads/2022/03/CTK0011.pdf

[34] Mohammad, N. (2021) Enhancing Security and Privacy in Multi-Cloud Environments: A Comprehensive Study on Encryption Techniques and Access Control Mechanisms. International Journal of Computer Engineering and Technology (IJCET). 12;51-63. http://iaeme.com/Home/issue/IJCET?Volume=12&Issue=2

[35] Jain, K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems. 7(5);2157-2177. https://doi.org/10.1007/s40747-021-00359-0

[36] Bandari, V. (2023). Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types. International Journal of Business Intelligence and Big Data Analytics. 6(1);1-11. https://research.tensorgate.org/index.php/IJBIBDA/article/download/3/3

[37] Ogbanufe, O. (2021). Enhancing end-user roles in information security: Exploring the setting, situation, and identity. Computers & Security. 108;102340. https://doi.org/10.1016/j.cose.2021.102340

[38] Alshaikh, M., Maynard, S. B., & Ahmad, A. (2021). Applying social marketing to evaluate current security education training and awareness programs in organisations. Computers & Security. 100;102090. https://doi.org/10.1016/j.cose.2020.102090

[39] Uchendu, B., Nurse, J. R. C., Bada, M., & Furnell, S. (2021). Developing a cyber security culture: Current practices and future needs. Computers & Security. 109;102387. https://doi.org/10.1016/j.cose.2021.102387

Downloads

Published

2025-05-05

How to Cite

Li, H. (2025). A Study on the Evolution of Digital Media Technologies and Their Effect on Information Security Practices. International Journal of Computational and Experimental Science and Engineering, 11(2). https://doi.org/10.22399/ijcesen.1864

Issue

Section

Research Article