SECURING TOMORROW’S LEADERS OF AN INSTITUTIONAL SAFETY NET FOR STUDENTS’ PROTECTION IN SOCIAL MEDIA RECRUITMENT TO TERRORISM: THE CASE OF STATE UNIVERSITIES AND COLLEGES IN DAVAO REGION, PHILIPPINES
Abstract
Article visualizations:
Keywords
Full Text:
PDFReferences
Adap, Johanna S. (2023). The Cyber Battleground: An Analysis of the Use of Social Media for Terrorist Recruitment. Retrieved from https://ndcp.edu.ph/the-cyber-battleground-an-analysis-on-the-use-ofsocial-media-for-terrorist-recruitment/
Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of COVID-19: A survey. Journal of King Saud University Computer and Information Sciences, 34(10), 8176-8206. https://doi.org/10.1016/j.jksuci.2022.08.003
Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cybersecurity vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333
Brangetto, P., & Veenendaal, M. A. (2016, May). Influence cyber operations: The use of cyberattacks in support of influence operations. In 2016, the 8th International Conference on Cyber Conflict (CyCon) (pp. 113-126). IEEE. Retrieved from https://ccdcoe.org/uploads/2018/10/Art-08-Influence-Cyber-Operations-The-Use-of-Cyberattacks-in-Support-of-Influence-Operations.pdf
Burke, P. (2016). It is Time to Shine a Light on the Islamic State’s Hidden Executions. War on the Rocks, 20. Retrieved from https://warontherocks.com/2016/09/it-is-time-to-shine-a-light-on-the-islamic-states-hidden-executions/
Carcary, M., Doherty, E., & Conway, G. (2019, July). A framework for managing cybersecurity effectiveness in the digital context. In European Conference on Cyber Warfare and Security (pp. 78–86). Academic Conferences International Limited. Retrieved from https://mic.elsevierpure.com/en/publications/a-framework-for-managing-cybersecurity-effectiveness-in-the-digit
Data Reportal (2019). Digital 2019: Global Digital Overview. Retrieved from https://datareportal.com/reports/digital-2019-global-digital-overview.
de Bruijn, H. and Janssen, M. (2017). Building Cybersecurity Awareness: The Need for Evidence-Based Framing Strategies. Government Information Quarterly, 34, 1-7. https://doi.org/10.1016/j.giq.2017.02.007
Fortiss (2020). AI Engineering: Progressing towards Robust and Trustworthy AI Systems. Retrieved from https://www.fortiss.org/fileadmin/user_upload/06_Ergebnisse/Studien_und_Roadmaps/fortiss _report_AI_Engineering_en_web.pdf.
Froment, F., García González, A. J., & Bohórquez, M. R. (2017). The Use of Social Networks as a Communication Tool between Teachers and Students: A Literature Review. Turkish Online Journal of Educational Technology-TOJET, 16(4), 126-144. Retrieved from https://files.eric.ed.gov/fulltext/EJ1160610.pdf
Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 49-58. https://doi.org/10.1093/cybsec/tyw018
Saeed, S., Suayyid, S. A., Al-Ghamdi, M. S., Al-Muhaisen, H., & Almuhaideb, A. M. (2023). A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience. Sensors, 23(16). https://doi.org/10.3390/s23167273
Tariq, U., Ahmed, I., Bashir, A. K., & Shaukat, K. (2023). A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review. Sensors, 23(8). https://doi.org/10.3390/s23084117
The Asia Foundation (2022). Cybersecurity in the Philippines: Global Context and Local Challenges. Retrieved from https://asiafoundation.org/publication/cybersecurity-in-thephilippines-global-context-and-local-challenges/.
Zeiger, S., & Gyte, J. (2020). Prevention of radicalization on social media and the internet. International Centre for Counterterrorism (ICCT). Retrieved from https://icct.nl/sites/default/files/2023-01/Chapter-12-Handbook_0.pdf
DOI: http://dx.doi.org/10.46827/ejsss.v11i3.2032
Copyright (c) 2025 Rommel V. Recla

This work is licensed under a Creative Commons Attribution 4.0 International License.
The research works published in this journal are free to be accessed. They can be shared (copied and redistributed in any medium or format) and\or adapted (remixed, transformed, and built upon the material for any purpose, commercially and\or not commercially) under the following terms: attribution (appropriate credit must be given indicating original authors, research work name and publication name mentioning if changes were made) and without adding additional restrictions (without restricting others from doing anything the actual license permits). Authors retain the full copyright of their published research works and cannot revoke these freedoms as long as the license terms are followed.
Copyright © 2016 - 2026. European Journal Of Social Sciences Studies (ISSN 2501-8590) is a registered trademark of Open Access Publishing Group. All rights reserved.
This journal is a serial publication uniquely identified by an International Standard Serial Number (ISSN) serial number certificate issued by Romanian National Library. All the research works are uniquely identified by a CrossRef DOI digital object identifier supplied by indexing and repository platforms. All the research works published on this journal are meeting the Open Access Publishing requirements and standards formulated by Budapest Open Access Initiative (2002), the Bethesda Statement on Open Access Publishing (2003) and Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities (2003) and can be freely accessed, shared, modified, distributed and used in educational, commercial and non-commercial purposes under a Creative Commons Attribution 4.0 International License. Copyrights of the published research works are retained by authors.