{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:05:27Z","timestamp":1774368327081,"version":"3.50.1"},"reference-count":32,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T00:00:00Z","timestamp":1606348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Social media are getting more and more ingrained into everybody\u2019s lives. With people\u2019s more substantial presence on social media, threat actors exploit the platforms and the information that people share there to deploy and execute various types of attacks. This paper focuses on the Norwegian population, exploring how people perceive risks arising from the use of social media, focusing on the analysis of specific indicators such as age, sexes and differences among the users of distinct social media platforms. For data collection, a questionnaire was structured and deployed towards the users of multiple social media platforms (total n = 329). The analysis compares risk perceptions of using the social media platforms Facebook (n = 288), Twitter (n = 134), Reddit (n = 189) and Snapchat (n = 267). Furthermore, the paper analyses the differences between the sexes and between the digital natives and non-natives. Our sample also includes sufferers of ID theft (n = 50). We analyse how account compromise occurs and how suffering ID theft changes behaviour and perception. The results show significant discrepancies in the risk perception among the social media platform users across the examined indicators, but also explicit variations on how this affects the associated usage patterns. Based on the results, we propose a generic risk ranking of social media platforms, activities, sharing and a threat model for SoMe users. The results show the lack of a unified perception of risk on social media, indicating the need for targeted security awareness enhancement mechanisms focusing on this topic.<\/jats:p>","DOI":"10.3390\/fi12120211","type":"journal-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T09:04:15Z","timestamp":1606381455000},"page":"211","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Risk Perceptions on Social Media Use in Norway"],"prefix":"10.3390","volume":"12","author":[{"given":"Philip","family":"Nyblom","sequence":"first","affiliation":[{"name":"Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU\u2013Norwegian University of Science and Technology, 2815 Gj\u00f8vik, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3861-6746","authenticated-orcid":false,"given":"Gaute","family":"Wangen","sequence":"additional","affiliation":[{"name":"IT Division, Digital Security Section, NTNU\u2013Norwegian University of Science and Technology, 2815 Gj\u00f8vik, Norway"}]},{"given":"Vasileios","family":"Gkioulos","sequence":"additional","affiliation":[{"name":"Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU\u2013Norwegian University of Science and Technology, 2815 Gj\u00f8vik, Norway"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/978-981-15-2693-0_26","article-title":"Threats Against Information Privacy and Security in Social Networks: A Review","volume":"1132","author":"Alqattan","year":"2020","journal-title":"Adv. Cyber Secur."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wangen, G., Katsikas, S.K., Kavallieratos, G., and Kotzanikolaou, P. (2017). Security awareness of the digital natives. Information, 8.","DOI":"10.3390\/info8020042"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Studen, L., and Tiberius, V. (2020). Social Media, Quo Vadis? Prospective Development and Implications. Future Internet, 12.","DOI":"10.3390\/fi12090146"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Slovic, P., Fischhoff, B., and Lichtenstein, S. (1980). Facts and fears: Understanding perceived risk. Societal risk Assessment, Springer.","DOI":"10.1007\/978-1-4899-0445-4_9"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1111\/j.1539-6924.1994.tb00080.x","article-title":"A psychological study of the inverse relationship between perceived risk and perceived benefit","volume":"14","author":"Alhakami","year":"1994","journal-title":"Risk Anal."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1111\/j.0272-4332.2004.00433.x","article-title":"Risk as Analysis and Risk as Feelings: Some Thoughts about Affect, Reason, Risk, and Rationality","volume":"24","author":"Slovic","year":"2004","journal-title":"Risk Anal."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1037\/0033-2909.127.2.267","article-title":"Risk as feelings","volume":"127","author":"Loewenstein","year":"2001","journal-title":"Psychol. Bull."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1111\/j.1539-6924.1998.tb01123.x","article-title":"Gender Differences in risk perception: Theoretical and methodological erspectives","volume":"18","author":"Gustafsod","year":"1998","journal-title":"Risk Anal."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1080\/00140138808966688","article-title":"Risk homeostasis and the purpose of safety regulation","volume":"31","author":"Adams","year":"1988","journal-title":"Ergonomics"},{"key":"ref_10","unstructured":"Kahneman, D. (2011). Thinking, Fast and Slow, Macmillan."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/(SICI)1099-0771(200001\/03)13:1<1::AID-BDM333>3.0.CO;2-S","article-title":"The affect heuristic in judgments of risks and benefits","volume":"13","author":"Finucane","year":"2000","journal-title":"J. Behav. Decis. Mak."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/j.chb.2017.05.038","article-title":"Risk perceptions of cyber-security and precautionary behaviour","volume":"75","author":"Schaik","year":"2017","journal-title":"Comput. Hum. Behav."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Zou, Y., Roundy, K., Tamersoy, A., Shintre, S., Roturier, J., and Schaub, F. (2020, January 25). Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, Honolulu, HI, USA.","DOI":"10.1145\/3313831.3376570"},{"key":"ref_14","unstructured":"Gunleifsen, H., Gkioulos, V., Wangen, G., Shalaginov, A., Kianpour, M., and Abomhara, M. (2019). Cybersecurity Awareness and Culture in Rural Norway. Thirteenth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2019), University of Plymouth, Centre for Security, Communications and Network Research (CSCAN)."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"741","DOI":"10.1080\/15564886.2016.1177766","article-title":"The Consequences of Identity Theft Victimization: An Examination of Emotional and Physical Health Outcomes","volume":"12","author":"Golladay","year":"2017","journal-title":"Vict. Offenders"},{"key":"ref_16","unstructured":"Newman, G.R., and McNally, M.M. (2020, November 25). Identity Theft Literature Review, Available online: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.216.6852&rep=rep1&type=pdf."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","article-title":"Social phishing","volume":"50","author":"Jagatic","year":"2007","journal-title":"Commun. ACM"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1111\/j.1745-6606.2004.tb00865.x","article-title":"Consumers\u2019 Protection of Online Privacy and Identity","volume":"38","author":"MILNE","year":"2004","journal-title":"J. Consum. Aff."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Thomas, K., Li, F., Zand, A., Barrett, J., Ranieri, J., Invernizzi, L., Markov, Y., Comanescu, O., Eranti, V., and Moscicki, A. (November, January 30). Data breaches, phishing, or malware? Understanding the risks of stolen credentials. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134067"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Nyblom, P.J.B., Wangen, G., Kianpour, M., and \u00d8stby, G. (2020). The Root Causes of Compromised Accounts at the University. Proceedings of the 6th International Conference on Information Systems Security and Privacy, SciTePress.","DOI":"10.5220\/0008972305400551"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ur, B., and Wang, Y. (2013). A Cross-cultural Framework for Protecting User Privacy in Online Social Media. Proceedings of the 22nd International Conference on World Wide Web, ACM.","DOI":"10.1145\/2487788.2488037"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/3208039","article-title":"Multiparty Privacy in Social Media","volume":"61","author":"Such","year":"2018","journal-title":"Commun. ACM"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.chb.2017.10.007","article-title":"Security and privacy in online social networking: Risk perceptions and precautionary behaviour","volume":"78","author":"Jansen","year":"2018","journal-title":"Comput. Hum. Behav."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Mitchell, D., and El-Gayar, O. (2020, January 7\u201310). The effect of privacy policies on information sharing behavior on social networks: A Systematic Literature Review. Proceedings of the 53rd Hawaii International Conference on System Sciences, Hawaii, HI, USA.","DOI":"10.24251\/HICSS.2020.517"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1108\/13287261211232180","article-title":"A review of social media security risks and mitigation techniques","volume":"14","author":"Delerue","year":"2012","journal-title":"J. Syst. Inf. Technol."},{"key":"ref_26","unstructured":"Gonzalez, D. (2014). Managing Online Risk: Apps, Mobile, and Social Media Security, Butterworth-Heinemann."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1111\/j.1539-6924.1999.tb00439.x","article-title":"Trust, emotion, sex, politics, and science: Surveying the risk-assessment battlefield","volume":"19","author":"Slovic","year":"1999","journal-title":"Risk Anal."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1016\/j.envint.2003.12.001","article-title":"Risk perception research: socio-cultural perspectives on the public experience of air pollution","volume":"30","author":"Bickerstaff","year":"2004","journal-title":"Environ. Int."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Gkioulos, V., Wangen, G., and Katsikas, S. (2017). User Modelling Validation over the Security Awareness of Digital Natives. Future Internet, 9.","DOI":"10.3390\/fi9030032"},{"key":"ref_30","unstructured":"Malmedal, B., and R\u00f8islien, H.E. (2016). The norwegian cyber security culture. Norsis Rep., Available online: https:\/\/norsis.no\/wp-content\/uploads\/2016\/09\/The-Norwegian-Cybersecurity-culture-web.pdf."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1007\/s10459-010-9222-y","article-title":"Likert scales, levels of measurement and the \u201claws\u201d of statistics","volume":"15","author":"Norman","year":"2010","journal-title":"Adv. Health Sci. Educ."},{"key":"ref_32","first-page":"167","article-title":"Risk perceptions of men and women scientists","volume":"78","author":"Barke","year":"1997","journal-title":"Soc. Sci. Q."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/12\/211\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:37:52Z","timestamp":1760179072000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/12\/12\/211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,26]]},"references-count":32,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2020,12]]}},"alternative-id":["fi12120211"],"URL":"https:\/\/doi.org\/10.3390\/fi12120211","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,26]]}}}