The Phenomenon of Phishing Attacks through Social Media and Their Impact on Information Security Among Digital Youth: A Systematic Literatur Review

The Phenomenon of Phishing Attacks through Social Media and Their Impact on Information Security Among Digital Youth: A Systematic Literatur Review

Authors

  • Nida Shofwatunnisa Universitas Sebelas April

Keywords:

Phishing, Social Media, Information Security, Digital Youth

Abstract

Phishing through social media has become one of the growing cyber threats, especially for digital teenagers who are highly exposed to online media. This study aims to identify trends, techniques, and the impact of phishing attacks via social media on teenagers' information security. The method used is a Systematic Literature Review (SLR) following the PRISMA guidelines. Data was collected from various scientific databases such as IEEE Xplore, SINTA, Researchget, and Google Scholar using strict inclusion and exclusion criteria. The analysis results indicate that social engineering techniques are the most dominant method in social media phishing. The main impacts identified include credential theft, personal data breaches, and a decline in digital trust. This study provides insights for policymakers and cybersecurity practitioners in designing prevention strategies based on education and technology.

References

J N. Vadila and A. R. Pratama, “Analysis of Security Awareness Against Phishing Threats,” in National Conference on Information and Communication Technology, Islamic University of Indonesia, 2023.

I. D. Sari, D. Hariyadi, R. Sahtyawan, and N. I. Kusumaningtyas, “Analysis of Security Awareness Levels and Personal Threats Against

Phishing Threats Using the Technology Threat Avoidance Theory (TTAT) Method,” Teknomatika, vol. 16, no. 2, pp. 49–55, 2023.

B. A. Souhoka, R. A. Fadillah, M. Fathan, R. Meldiansah, M. I. Mutakin, and Fauziyah, “Analysis of Phishing Prevention Strategies: A Case Study on Facebook Social Media,” Journal of Cyber Technology and Security, vol. 4, no. 1, pp. 23–30, 2025.

D. Norlita, P. W. Nageta, S. A. Faradhila, M. P. Aryanti, F. Fakhriyah, and E. A. Ismayam, "Systematic Literature Review (SLR): Character

Education in Elementary Schools," Indonesian Journal of Elementary Education, vol. 10, no. 3, pp. 112–120, 2024.

D Wahyuddin, L. F. Ersa, G. Aningsih, T. Hidayat, and A. F. Sonni, “Analysis of Online Fraud Communication Networks Through WhatsApp Messenger Social Media,” Journal of Digital Communication Science, vol. 7, no. 2, pp. 67–75, 2024.

R. Wulandari and I. W. G. Lamopia, “Bibliometric Analysis of Phishing Education Using Vosviewer and Biblioshiny,” Journal of Information Security Research, vol. 9, no. 1, pp. 41–50, 2024.

Y. F. Riti, “Counseling and Education on Identifying Fraud Modes Through Social Media for the Community,” Journal of Cyber Community Service, vol. 6, no. 2, pp. 101–108, 2024.

A. Ramadhan, M. A. Alhafidh, and M. D. Firmansyah, “The Spread of Phishing Links from the Ministry of Education and Culture Regarding Awareness of Personal Information Among UNINUS Students,” Indonesian Journal of Information Security, vol. 5, no. 1, pp. 55–62, 2022.

R. Vebryto and Irwansyah, “Theft of Data and Information in Social Media Through Hoax Information: Case Study in Facebook,” International Journal of Social Media and Cybersecurity, vol. 11, no. 4, pp. 134–142, 2020.

R. Syah, “Police Strategies in Preventing Phishing Crimes Through Social Media in Cyberspace,” Journal of Criminology and Cyber Technology, vol. 3, no. 2, pp. 45–53, 2023.

A. Trianurahmah, A. Fauzi, E. N. Tyas, M. A. Suryanto, M. Rizky, and P. Wibisono, "Analysis of Phishing Threats Through the WhatsApp Application: A Case Study on Security Management to Address the Rise of Phishing Crimes Using Link-Based Modus Operandi," Journal of Cyber Technology and Security, vol. 5, no. 1, pp. 89–97, 2024.

I. A. Saputro, L. Sugiarto, F. S. Nugraha, and Nurhidayanto, “Socialization of Safe Social Media Use from Phishing Threats at Al Huda Pandeyan Mosque,” Journal of Information Technology Service, vol. 8, no. 3, pp. 77–85, 2024.

Malahayati and D. Fata, “Analysis of Social Media User Information Security Using SEToolkit Through Phishing Techniques,” Indonesian Cyber Security Journal, vol. 4, no. 2, pp. 99–106, 2024.

Nurhanifah, “The Phenomenon of Sensationalism on Social Media and Its Impact on Adolescent Behavior,” Journal of Digital Psychology, vol. 7, no. 1, pp. 121–130, 2024.

H. P. Fitrian, L. Abidah, K. W. Zahra, and W. H. Hafidudin, “The Influence of User Awareness on the Success of Phishing Attacks in Banking Networks,” Journal of Information Systems and Data Security, vol. 6, no. 2, pp. 58–66, 2023.

K. Z. Ansyafa, M. Fajarudin, M. Fadhil, and S. N. Neyman, “Analysis of Social Media Security Against Online Phishing Attacks Using the

Zphisher and SEToolkit Methods,” Journal of Information Technology and Cyber Security, vol. 5, no. 1, pp. 70–78, 2024.

A. A. J. Arsyad, U. Tamrin, J. P. Lande, and N. Umar, “Enhancing Teenagers' Awareness of Phishing Through Digital Literacy: A Case Study at SMK Darussalam Makassar,” Journal of Digital Education, vol. 9, no. 2, pp. 115–123, 2024.

K. D. Ananta, T. Ambodo, and A. Tohawi, “The Influence of Social Media on the Increase in Cybercrime in Indonesia,” Journal of Digital

Security and Crime, vol. 5, no. 1, pp. 102–110, 2024.

N. Vadila and A. R. Pratama, “Analysis of Security Awareness Against Phishing Threats,” in National Conference on Information and

Communication Technology, Islamic University of Indonesia, 2023.

Helmiawan, M. A., Juna, D. I., & Ramdhani, B. (2018). Pengamanan Sistem Dan Data E-Voting Berbasis Network. INTERNAL (Information System Journal), 1(1), 1–10.

Helmiawan, M. A., Firmansyah, E., Fadil, I., Sofivan, Y., Mahardika, F., & Guntara, A. (2020). Analysis of web security using open web application security project 10. 2020 8th International Conference on Cyber and IT Service Management

Helmiawan, M. A., Julian, E., Cahyan, Y., & Saeppani, A. (2021). Experimental evaluation of security monitoring and notification on network intrusion detection system for server security. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., Fadil, I., Sofiyan, Y., & Firmansyah, E. (2021). Security model using intrusion detection system on cloud computing security management. 2021 9th International Conference on Cyber and IT Service Management (CITSM ….

Helmiawan, M. A., & Nasution, A. I. (2022). The Effect of Internet Banking Use and Customer Protection Against Cyber Crime at Bank Rakyat Indonesia. Journal of Islamic Economics and Business, 2(2), 170–183.

Published

2025-08-22
Loading...