
CYBERSECURITY AND AI IMPLICATIONS FOR SOCIAL MEDIA
Abstract
Social media systems have assumed a significant societal role, connecting an extensive global community exceeding one billion people and facilitating communication and information exchange both on an individual and group scale. These platforms hold considerable potential to contribute to humanity by disseminating information on infectious diseases and serving as forums for addressing critical issues, such as child trafficking and violence against women. However, it is important to acknowledge that social media systems also have the capacity to cause harm, including the proliferation of misinformation, commonly referred to as fake news, and intrusions into individuals' privacy. The landscape is further complicated by the widespread adoption of Artificial Intelligence (AI) systems, bolstered by robust machine learning techniques, and the escalating frequency of cyberattacks on information systems. These developments are fundamentally altering the ways in which humans utilize social media platforms. This paper engages in a comprehensive exploration of the roles played by both AI and Cybersecurity within the realm of social media systems. It delves into the advantages offered by AI while underscoring the imperative need to safeguard social media systems.
Keywords
Social media, artificial intelligence (AI), cyber security
References
Nasrullayev, N., Muminova, S., Istamovich, D. K., & Boltaeva, M. (2023, July). Providing IoT Security in Industry 4.0 using Web Application Firewall. In 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 1788-1792). IEEE.
N. Safoev, and J. C. Jeon, “Reliable Design of Reversible Universal Gate Based on QCA,” Advanced Science Letters, vol. 23(10), pp. 9818-9823, 2017.
An Introduction to Role-Based Access Control, ITL, NIST, December 1995.
Shakarov, M., Safoev, N., & Nasrullaev, N. (2022). Обеспечение безопасности интернет вещей в промышленности 4.0 с использованием WAF. Research and Education, 1(9), 386-393.
Yakubdjanovna, I. D., Bakhtiyarovich, N. N., & lqbol Ubaydullayevna, X. (2020, November). Implementation of intercorporate correlation of information security messages and audits. In 2020 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.
Komil, T., & Nurbek, N. (2015). Development method of code detection system on based racewalk algorithm on platform FPGA. In Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE) (p. 278). International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE).
Safoev, N., & Nasrullaev, N. (2021, November). Low area QCA Demultiplexer Design. In 2021 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 01-05). IEEE.
N. Safoev and J. C. Jeon, "Implementation of high-speed shifting operation in quantum-dot cellu-lar automata technology." Int J Mech Eng Technol. Vol. 10 (2), pp. 576-586, (2019).
Piltan, F., Haghighi, S. T., Sulaiman, N., Nazari, I., & Siamak, S. (2011). Artificial control of PUMA robot manipulator: A-review of fuzzy inference engine and application to classical controller. International Journal of Robotics and Automation, 2(5), 401-425.
Karimov, M., Tashev, K., & Nasrullayev, N. (2016). Improve the Efficiency of Intrusion Detection Systems Using the Method of Classification of Network Packets. In Proceedings of International Conference on Application of Information and Communication Technology and Statistics in Economy and Education (ICAICTSEE) (pp. 21-28). International Conference on Application of Information and Communication Technology and Statistics and Economy and Education (ICAICTSEE).
Насруллаев, Н., Муминова, С., Сейдуллаев, М., & Сафоев, Н. (2022). Внедрение DMZ для повышения сетевой безопасности веб-тестирования. Scientific Collection «InterConf», (110), 641-649.
Vorobeychik, Y., Kantarcioglu, M., Brachman, R., Stone, P., & Rossi, F. (2018). Adversarial machine learning (Vol. 12). San Rafael, CA, USA: Morgan & Claypool Publishers.
Xu, R., Baracaldo, N., & Joshi, J. (2021). Privacy-preserving machine learning: Methods, challenges and directions. arXiv preprint arXiv:2108.04417.
N. Safoev and J. C. Jeon, "Low Complexity Design of Conservative QCA with Two-Pair Error Checker." Advanced Science Letters. Vol. 23 (10), pp. 10077-10081, (2017).
Article Statistics
Downloads
Copyright License
Copyright (c) 2023 Nurbek Nasrullayev, Elyor Nasrullayev, Tuyboyov Oybek Valijonovich, Djurayev Musurmon Avlakulovich

This work is licensed under a Creative Commons Attribution 4.0 International License.