{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:46:21Z","timestamp":1763451981356,"version":"3.45.0"},"reference-count":14,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:00:00Z","timestamp":1761004800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Facebook users face increasing privacy and security concerns, necessitating an understanding of how they navigate these issues, manage their information, and interact on social media platforms. This study aims to investigate the security and privacy concerns of Facebook users, considering their demographic information and disclosure behavior, as well as some determinants that influence the privacy protection behavior of users. Through structured online questionnaires, data were collected from 570 public university students and analyzed using descriptive analysis, correlation, chi\u2010square, and multiple regression. The findings of this study identified account impersonation and scams as the most prevalent issues and highlighted the significant impact of age and gender on Facebook disclosure behavior. Regularly reviewing and maintaining privacy settings increases privacy concerns, while those knowledgeable about privacy policies and personal information risk are more cautious about sharing information. Finally, this study contributed to the existing work regarding privacy protection behavior and personal information sharing to understand the complexity of security and privacy in the context of Facebook.<\/jats:p>","DOI":"10.1002\/spy2.70127","type":"journal-article","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T00:05:09Z","timestamp":1761091509000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Security, Privacy and Behaviors of Facebook Users"],"prefix":"10.1002","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-8410-9772","authenticated-orcid":false,"given":"Kabiru B.","family":"Ishola","sequence":"first","affiliation":[{"name":"Department of Computer Science Faculty of Computing, Nigerian Army University Biu  Nigeria"}]},{"given":"Wali M.","family":"Zubair","sequence":"additional","affiliation":[{"name":"Department of Computer Science College of Science Technology, Kaduna Polytechnic  Kaduna Nigeria"}]},{"given":"Mujtaba K.","family":"Tahir","sequence":"additional","affiliation":[{"name":"Department of Computer Science Faculty of Computing, Nigerian Army University Biu  Nigeria"}]}],"member":"311","published-online":{"date-parts":[[2025,10,21]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_2_6_2_1","DOI":"10.1016\/j.heliyon.2020.e04714"},{"doi-asserted-by":"publisher","key":"e_1_2_6_3_1","DOI":"10.14569\/IJACSA.2020.0111236"},{"doi-asserted-by":"publisher","key":"e_1_2_6_4_1","DOI":"10.1177\/1747016117740176"},{"doi-asserted-by":"publisher","key":"e_1_2_6_5_1","DOI":"10.37134\/ibej.Vol15.2.8.2022"},{"doi-asserted-by":"publisher","key":"e_1_2_6_6_1","DOI":"10.1109\/ICACSIS.2018.8618220"},{"doi-asserted-by":"publisher","key":"e_1_2_6_7_1","DOI":"10.1371\/journal.pone.0263157"},{"doi-asserted-by":"publisher","key":"e_1_2_6_8_1","DOI":"10.56553\/popets\u20102025\u20100025"},{"doi-asserted-by":"publisher","key":"e_1_2_6_9_1","DOI":"10.53894\/ijirss.v7i3.2959"},{"doi-asserted-by":"publisher","key":"e_1_2_6_10_1","DOI":"10.1109\/WCONF61366.2024.10692126"},{"doi-asserted-by":"publisher","key":"e_1_2_6_11_1","DOI":"10.33564\/ijeast.2023.v08i05.006"},{"volume-title":"Research Methods for Business Students","year":"2019","author":"Saunders M. N. K.","key":"e_1_2_6_12_1"},{"doi-asserted-by":"publisher","key":"e_1_2_6_13_1","DOI":"10.1007\/s10796\u201001909933\u2010x"},{"key":"e_1_2_6_14_1","article-title":"Privacy Concerns, Perceived Benefits, and Self\u2010Disclosure on Social Network Sites: Testing the Online Privacy Model Across Gender and Culture","volume":"47","author":"Johnson M. S.","year":"2020","journal-title":"Telematics and Informatics"},{"doi-asserted-by":"publisher","key":"e_1_2_6_15_1","DOI":"10.1007\/s43039\u2010021\u201000022\u2010z"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:43:10Z","timestamp":1763451790000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,21]]},"references-count":14,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70127"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70127","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,10,21]]},"assertion":[{"value":"2025-06-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70127"}}