SECURING TOMORROW’S LEADERS OF AN INSTITUTIONAL SAFETY NET FOR STUDENTS’ PROTECTION IN SOCIAL MEDIA RECRUITMENT TO TERRORISM: THE CASE OF STATE UNIVERSITIES AND COLLEGES IN DAVAO REGION, PHILIPPINES

Rommel V. Recla

Abstract


This policy research investigates the awareness levels of students in State Universities and Colleges (SUCs) within Davao Region on the risk of social media recruitment into terrorism. With the increase of digital reliance during the COVID-19 pandemic, the rise of cyber threats and extremist exploitation through online platforms, this study explores the need for institutional safety nets that protect students from digital radicalization. Utilising a mixed-methods approach, this study employed descriptive statistics, exploratory factor analysis, and inferential tests to examine the socio-demographic profile of students and identify key protective dimensions. Results revealed two major components: (1) Institutional Safeguarding Frameworks for Heightened Awareness and Information Sensitivity, (2) Global Knowledge Synthesis for Holistic Mitigation. Further, findings underscore significant differences in perception based on gender, year level, and type of gadget use, among female, first-year students and those students engaged in school organizations, expressing higher awareness levels. Through this, the study recommends urgency for policy reforms, institutional frameworks and global strategies tailored to equip SUCs with proactive measures against cyberterrorism recruitment and thereby reinforcing the digital resilience and safety of the students.

 

Article visualizations:

Hit counter


Keywords


bridging gaps, needs analysis, effective research community extension program

Full Text:

PDF

References


Adap, Johanna S. (2023). The Cyber Battleground: An Analysis of the Use of Social Media for Terrorist Recruitment. Retrieved from https://ndcp.edu.ph/the-cyber-battleground-an-analysis-on-the-use-ofsocial-media-for-terrorist-recruitment/

Alawida, M., Omolara, A. E., Abiodun, O. I., & Al-Rajab, M. (2022). A deeper look into cybersecurity issues in the wake of COVID-19: A survey. Journal of King Saud University Computer and Information Sciences, 34(10), 8176-8206. https://doi.org/10.1016/j.jksuci.2022.08.003

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cybersecurity vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333

Brangetto, P., & Veenendaal, M. A. (2016, May). Influence cyber operations: The use of cyberattacks in support of influence operations. In 2016, the 8th International Conference on Cyber Conflict (CyCon) (pp. 113-126). IEEE. Retrieved from https://ccdcoe.org/uploads/2018/10/Art-08-Influence-Cyber-Operations-The-Use-of-Cyberattacks-in-Support-of-Influence-Operations.pdf

Burke, P. (2016). It is Time to Shine a Light on the Islamic State’s Hidden Executions. War on the Rocks, 20. Retrieved from https://warontherocks.com/2016/09/it-is-time-to-shine-a-light-on-the-islamic-states-hidden-executions/

Carcary, M., Doherty, E., & Conway, G. (2019, July). A framework for managing cybersecurity effectiveness in the digital context. In European Conference on Cyber Warfare and Security (pp. 78–86). Academic Conferences International Limited. Retrieved from https://mic.elsevierpure.com/en/publications/a-framework-for-managing-cybersecurity-effectiveness-in-the-digit

Data Reportal (2019). Digital 2019: Global Digital Overview. Retrieved from https://datareportal.com/reports/digital-2019-global-digital-overview.

de Bruijn, H. and Janssen, M. (2017). Building Cybersecurity Awareness: The Need for Evidence-Based Framing Strategies. Government Information Quarterly, 34, 1-7. https://doi.org/10.1016/j.giq.2017.02.007

Fortiss (2020). AI Engineering: Progressing towards Robust and Trustworthy AI Systems. Retrieved from https://www.fortiss.org/fileadmin/user_upload/06_Ergebnisse/Studien_und_Roadmaps/fortiss _report_AI_Engineering_en_web.pdf.

Froment, F., García González, A. J., & Bohórquez, M. R. (2017). The Use of Social Networks as a Communication Tool between Teachers and Students: A Literature Review. Turkish Online Journal of Educational Technology-TOJET, 16(4), 126-144. Retrieved from https://files.eric.ed.gov/fulltext/EJ1160610.pdf

Gross, M. L., Canetti, D., & Vashdi, D. R. (2017). Cyberterrorism: its effects on psychological well-being, public confidence and political attitudes. Journal of Cybersecurity, 3(1), 49-58. https://doi.org/10.1093/cybsec/tyw018

Saeed, S., Suayyid, S. A., Al-Ghamdi, M. S., Al-Muhaisen, H., & Almuhaideb, A. M. (2023). A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience. Sensors, 23(16). https://doi.org/10.3390/s23167273

Tariq, U., Ahmed, I., Bashir, A. K., & Shaukat, K. (2023). A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review. Sensors, 23(8). https://doi.org/10.3390/s23084117

The Asia Foundation (2022). Cybersecurity in the Philippines: Global Context and Local Challenges. Retrieved from https://asiafoundation.org/publication/cybersecurity-in-thephilippines-global-context-and-local-challenges/.

Zeiger, S., & Gyte, J. (2020). Prevention of radicalization on social media and the internet. International Centre for Counterterrorism (ICCT). Retrieved from https://icct.nl/sites/default/files/2023-01/Chapter-12-Handbook_0.pdf




DOI: http://dx.doi.org/10.46827/ejsss.v11i3.2032

Copyright (c) 2025 Rommel V. Recla

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

The research works published in this journal are free to be accessed. They can be shared (copied and redistributed in any medium or format) and\or adapted (remixed, transformed, and built upon the material for any purpose, commercially and\or not commercially) under the following terms: attribution (appropriate credit must be given indicating original authors, research work name and publication name mentioning if changes were made) and without adding additional restrictions (without restricting others from doing anything the actual license permits). Authors retain the full copyright of their published research works and cannot revoke these freedoms as long as the license terms are followed.

Copyright © 2016 - 2026. European Journal Of Social Sciences Studies (ISSN 2501-8590) is a registered trademark of Open Access Publishing Group. All rights reserved.

This journal is a serial publication uniquely identified by an International Standard Serial Number (ISSN) serial number certificate issued by Romanian National Library. All the research works are uniquely identified by a CrossRef DOI digital object identifier supplied by indexing and repository platforms. All the research works published on this journal are meeting the Open Access Publishing requirements and standards formulated by Budapest Open Access Initiative (2002), the Bethesda Statement on Open Access Publishing (2003) and  Berlin Declaration on Open Access to Knowledge in the Sciences and Humanities (2003) and can be freely accessed, shared, modified, distributed and used in educational, commercial and non-commercial purposes under a Creative Commons Attribution 4.0 International License. Copyrights of the published research works are retained by authors.