How to cite this paper
Hashem, T. (2024). Examining marketing cyber-security in the digital age: Evidence from marketing platform.International Journal of Data and Network Science, 8(2), 1141-1150.
Refrences
Alanazi, M., Mahmood, A., & Chowdhury, M. J. (2023). SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues. Computers & Security, 125, 103028. https://doi.org/10.1016/j.cose.2022.103028
Asbaş, C., & Tuzlukaya, Ş. (2022). Cyberattack and cyberwarfare strategies for businesses. Conflict Management in Digi-tal Business, 303–328. https://doi.org/10.1108/978-1-80262-773-220221027
Asiamah, N., Mensah, H. K., & Oteng-Abayie, E. F. (2022). Non-probabilistic sampling in Quantitative Clinical Research. International Journal of Applied Research on Public Health Management, 7(1), 1–18. https://doi.org/10.4018/ijarphm.290379
Ba, M. H. N., Bennett, J., Gallagher, M., & Bhunia, S. (2021). A Case Study of Credential Stuffing Attack: Canva Data Breach. In 2021 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 735-740). IEEE.
Deb, S. K., Mohanty, P. P., & Valeri, M. (2022). Promoting family business in handicrafts through local tradition and cul-ture: An innovative approach. Journal of Family Business Management. https://doi.org/10.1108/jfbm-10-2021-0131
Desai, D. M. (2019). Digital Marketing: A Review. International Journal of Trend in Scientific Research and Develop-ment, Special Issue(Special Issue-FIIIIPM2019), 196–200. https://doi.org/10.31142/ijtsrd23100
Junusi, R. E. (2020). Digital marketing during the pandemic period; a study of Islamic perspective. Journal of Digital Marketing and Halal Industry, 2(1), 15. https://doi.org/10.21580/jdmhi.2020.2.1.5717
Gazzari, M., Mattmann, A., Maass, M., & Hollick, M. (2021). My(O) armband leaks passwords. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(4), 1–24. https://doi.org/10.1145/3494986
Gupta, B. B., & Chaudhary, P. (2020). Cross-site scripting attacks: classification, attack, and countermeasures. CRC Press. https://doi.org/10.1201/9780429351327
Halesha, P. M., & Arundathi, K. L. (2020). A Study On Digital Marketing and its Impact on Customers of Pl India Securi-ties Pvt Ltd Bangalore.
Haraldsen, G. (2023). What Computerized Business Questionnaires and questionnaire management tools can offer. Ad-vances in Business Statistics, Methods and Data Collection, 335–355. https://doi.org/10.1002/9781119672333.ch15
Hashem, T. N. (2021). The reality of internet of things (Iot) in creating a data-driven marketing opportunity: mediating role of customer relationship management (Crm). J. Theor. Appl. Inf. Technol, 99(2),329-342.
Henson, R., Stewart, G., & Bedford, L. (2020). Key challenges and some guidance on using strong quantitative methodol-ogy in Education Research. Journal of Urban Mathematics Education, 13(2),42-59. https://doi.org/10.21423/jume-v13i2a382
Herhausen, D., Miočević, D., Morgan, R. E., & Kleijnen, M. H. P. (2020). The Digital Marketing Capabilities Gap. Indus-trial Marketing Management, 90, 276–290. https://doi.org/10.1016/j.indmarman.2020.07.022
Khakimova, M. C. (2019). Cyber security in digital marketing. In Развитие бизнеса и финансового рынка в условиях цифровизации экономики (pp. 275-278).
Khan, O. G., El-Saadany, E. F., Youssef, A., & Shaaban, M. F. (2021). Cyber security of market-based congestion man-agement methods in power distribution systems. IEEE Transactions on Industrial Informatics, 17(12), 8142–8153. https://doi.org/10.1109/tii.2021.3065714
Kolomeets, M., & Chechulin, A. (2021, May). Analysis of the malicious bots market. In 2021 29th conference of open in-novations association (FRUCT) (pp. 199-205). IEEE. https://doi.org/10.23919/fruct52173.2021.9435421
Konyeha, S. (2020). Exploring cybersecurity threats in digital marketing. NIPES Journal of Science and Technology Re-search, 2(3), 12. https://doi.org/10.37933/nipes/2.3.2020.2
Krishen, A. S., Dwivedi, Y. K., Bindu, N., & Kumar, K. S. (2021). A broad overview of Interactive Digital Marketing: A Bibliometric network analysis. Journal of Business Research, 131, 183–195. https://doi.org/10.1016/j.jbusres.2021.03.061
Kumar, S., Pallathadka, H., & Pallathadka, L. K. (2022). An Analysis of Cyber Security Threats in Digital Market-ing. Journal of Critical Reviews, 9(03), 85-94.
Latchoumi, T. P., Reddy, M. S., & Balamurugan, K. (2020). Applied machine learning predictive analytics to SQL injec-tion attack detection and prevention. European Journal of Molecular & Clinical Medicine, 7(02), 3543-3553.
Lei, Z., Nan, Y., Fratantonio, Y., & Bianchi, A. (2021). On the insecurity of SMS one-time password messages against lo-cal attackers in modern mobile devices. Proceedings 2021 Network and Distributed System Security Symposium. https://doi.org/10.14722/ndss.2021.24212
Limone, P., Toto, G. A., Guarini, P., & di Furia, M. (2022). Online quantitative research methodology: Reflections on good practices and future perspectives. Lecture Notes in Networks and Systems, 656–669. https://doi.org/10.1007/978-3-031-10461-9_45
Magano, J., & Cunha, M. N. (2020). Digital marketing impact on tourism in Portugal: A quantitative study. African Jour-nal of Hospitality, Tourism and Leisure, 9(1), 1-19.
Martins, I., Resende, J. S., Sousa, P. R., Silva, S., Antunes, L., & Gama, J. (2022). Host-based ids: A review and open is-sues of an anomaly detection system in IOT. Future Generation Computer Systems, 133, 95–113. https://doi.org/10.1016/j.future.2022.03.001
Mathur, M. (2018). Where is the security blanket? developing social media marketing capability as a shield from per-ceived cybersecurity risk. Journal of Promotion Management, 25(2), 200–224. https://doi.org/10.1080/10496491.2018.1443310
Mirian, A., DeBlasio, J., Savage, S., Voelker, G. M., & Thomas, K. (2019). Hack for hire: Exploring the emerging market for account hijacking. The World Wide Web Conference. https://doi.org/10.1145/3308558.3313489
Mishra, P., & Gupta, C. (2020). Cookies in a cross-site scripting: Type, utilization, detection, protection and remediation. 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Direc-tions) (ICRITO). https://doi.org/10.1109/icrito48877.2020.9198003
Mishra, S. (2019). SQL injection detection using machine learning. https://doi.org/10.31979/etd.j5dj-ngvb
Mogaji, E., Soetan, T. O., & Kieu, T. A. (2020). The implications of artificial intelligence on the digital marketing of fi-nancial services to vulnerable customers. Australasian Marketing Journal, 29(3), 235–242. https://doi.org/10.1016/j.ausmj.2020.05.003
Mukherjee, S., Chittipaka, V., & Baral, M. M. (2021). Developing a model to highlight the relation of Digital Trust with privacy and security for the blockchain technology. Advances in Marketing, Customer Relationship Management, and E-Services, 110–125. https://doi.org/10.4018/978-1-7998-8081-3.ch007
Okagbue, H. I., Oguntunde, P. E., Obasi, E. C., & Akhmetshin, E. M. (2021). Trends and usage pattern of SPSS and Minitab Software in scientific research. Journal of Physics: Conference Series, 1734(1), 012017. https://doi.org/10.1088/1742-6596/1734/1/012017
Olson, E. M., Olson, K. M., Czaplewski, A. J., & Key, T. M. (2021). Business strategy and the management of Digital Marketing. Business Horizons, 64(2), 285–293. https://doi.org/10.1016/j.bushor.2020.12.004
Pandey, N., Nayal, P., & Rathore, A. S. (2020). Digital marketing for B2B organizations: Structured Literature Review and future research directions. Journal of Business & Industrial Marketing, 35(7), 1191–1204. https://doi.org/10.1108/jbim-06-2019-0283
Pattewar, T., Patil, H., Patil, H., Patil, N., Taneja, M., & Wadile, T. (2019). Detection of SQL injection using machine learning: a survey. Int. Res. J. Eng. Technol.(IRJET), 6(11), 239-246.
Pedley, D., Borges, T., Bollen, A., Shah, J. N., Donaldson, S., Furnell, S., & Crozier, D. (2020). Cyber security skills in the UK labour market 2020. Department for Digital, Culture, Media & Sport.
Pham, H. C., Brennan, L., Parker, L., Phan-Le, N. T., Ulhaq, I., Nkhoma, M. Z., & Nhat Nguyen, M. (2019). Enhancing cyber security behavior: An internal social marketing approach. Information & Computer Security, 28(2), 133–159. https://doi.org/10.1108/ics-01-2019-0023
Prasad, R., & Rohokale, V. (2019). Cyber threats and attack overview. Springer Series in Wireless Technology, 15–31. https://doi.org/10.1007/978-3-030-31703-4_2
Saura, J. R. (2021). Using Data Sciences in Digital Marketing: Framework, methods, and performance metrics. Journal of Innovation & Knowledge, 6(2), 92–102. https://doi.org/10.1016/j.jik.2020.08.001
Saura, J. R., Ribeiro-Soriano, D., & Palacios-Marqués, D. (2021). Setting B2B Digital Marketing in artificial intelligence-based CRMS: A review and directions for future research. Industrial Marketing Management, 98, 161–178. https://doi.org/10.1016/j.indmarman.2021.08.006
Sharma, H. (2022). How short or long should be a questionnaire for any research? researchers dilemma in deciding the ap-propriate questionnaire length. Saudi Journal of Anaesthesia, 16(1), 65. https://doi.org/10.4103/sja.sja_163_21
Sheridan, R. P., Karnachi, P., Tudor, M., Xu, Y., Liaw, A., Shah, F., Cheng, A. C., Joshi, E., Glick, M., & Alvarez, J. (2020). Experimental error, kurtosis, activity cliffs, and methodology: What limits the predictivity of quantitative structure–activity relationship models? Journal of Chemical Information and Modeling, 60(4), 1969–1982. https://doi.org/10.1021/acs.jcim.9b01067
Singh, R. (2021). Digital Marketing in today's privacy-conscious world. Digitization of Economy and Society, 121–151. https://doi.org/10.1201/9781003187479-8
Subramaniam, T. V. (2020). Impact of social media on digital marketing: starbucks marketing strategy on Twitter. Case study, 2, 1-7.
Suleiman, D. A., Awan, T. M., & Javed, M. (2021). Enhancing digital marketing performance through usage intention of AI-powered websites. IAES International Journal of Artificial Intelligence (IJ-AI), 10(4), 810. https://doi.org/10.11591/ijai.v10.i4.pp810-817
Thomson, D. R., Rhoda, D. A., Tatem, A. J., & Castro, M. C. (2020). Gridded Population Survey Sampling: A systematic scoping review of the field and strategic research agenda. International Journal of Health Geographics, 19(1). https://doi.org/10.1186/s12942-020-00230-4
Trim, P. R. J., & Lee, Y.-I. (2019). The role of B2B marketers in increasing cyber security awareness and influencing be-havioural change. Industrial Marketing Management, 83, 224–238. https://doi.org/10.1016/j.indmarman.2019.04.003
Veerabudren, K. R., & Bekaroo, G. (2022). Security in web applications: A comparative analysis of key SQL Injection De-tection Techniques. 2022 4th International Conference on Emerging Trends in Electrical, Electronic and Communica-tions Engineering (ELECOM). https://doi.org/10.1109/elecom54934.2022.9965264
Wazid, M., Das, A. K., Chamola, V., & Park, Y. (2022). Uniting Cyber Security and machine learning: Advantages, chal-lenges and future research. ICT Express, 8(3), 313–321. https://doi.org/10.1016/j.icte.2022.04.007
Wibowo, R. M., & Sulaksono, A. (2021). Web vulnerability through Cross site scripting (XSS) detection with Owasp Se-curity shepherd. Indonesian Journal of Information Systems, 149–159. https://doi.org/10.24002/ijis.v3i2.4192
Asbaş, C., & Tuzlukaya, Ş. (2022). Cyberattack and cyberwarfare strategies for businesses. Conflict Management in Digi-tal Business, 303–328. https://doi.org/10.1108/978-1-80262-773-220221027
Asiamah, N., Mensah, H. K., & Oteng-Abayie, E. F. (2022). Non-probabilistic sampling in Quantitative Clinical Research. International Journal of Applied Research on Public Health Management, 7(1), 1–18. https://doi.org/10.4018/ijarphm.290379
Ba, M. H. N., Bennett, J., Gallagher, M., & Bhunia, S. (2021). A Case Study of Credential Stuffing Attack: Canva Data Breach. In 2021 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 735-740). IEEE.
Deb, S. K., Mohanty, P. P., & Valeri, M. (2022). Promoting family business in handicrafts through local tradition and cul-ture: An innovative approach. Journal of Family Business Management. https://doi.org/10.1108/jfbm-10-2021-0131
Desai, D. M. (2019). Digital Marketing: A Review. International Journal of Trend in Scientific Research and Develop-ment, Special Issue(Special Issue-FIIIIPM2019), 196–200. https://doi.org/10.31142/ijtsrd23100
Junusi, R. E. (2020). Digital marketing during the pandemic period; a study of Islamic perspective. Journal of Digital Marketing and Halal Industry, 2(1), 15. https://doi.org/10.21580/jdmhi.2020.2.1.5717
Gazzari, M., Mattmann, A., Maass, M., & Hollick, M. (2021). My(O) armband leaks passwords. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 5(4), 1–24. https://doi.org/10.1145/3494986
Gupta, B. B., & Chaudhary, P. (2020). Cross-site scripting attacks: classification, attack, and countermeasures. CRC Press. https://doi.org/10.1201/9780429351327
Halesha, P. M., & Arundathi, K. L. (2020). A Study On Digital Marketing and its Impact on Customers of Pl India Securi-ties Pvt Ltd Bangalore.
Haraldsen, G. (2023). What Computerized Business Questionnaires and questionnaire management tools can offer. Ad-vances in Business Statistics, Methods and Data Collection, 335–355. https://doi.org/10.1002/9781119672333.ch15
Hashem, T. N. (2021). The reality of internet of things (Iot) in creating a data-driven marketing opportunity: mediating role of customer relationship management (Crm). J. Theor. Appl. Inf. Technol, 99(2),329-342.
Henson, R., Stewart, G., & Bedford, L. (2020). Key challenges and some guidance on using strong quantitative methodol-ogy in Education Research. Journal of Urban Mathematics Education, 13(2),42-59. https://doi.org/10.21423/jume-v13i2a382
Herhausen, D., Miočević, D., Morgan, R. E., & Kleijnen, M. H. P. (2020). The Digital Marketing Capabilities Gap. Indus-trial Marketing Management, 90, 276–290. https://doi.org/10.1016/j.indmarman.2020.07.022
Khakimova, M. C. (2019). Cyber security in digital marketing. In Развитие бизнеса и финансового рынка в условиях цифровизации экономики (pp. 275-278).
Khan, O. G., El-Saadany, E. F., Youssef, A., & Shaaban, M. F. (2021). Cyber security of market-based congestion man-agement methods in power distribution systems. IEEE Transactions on Industrial Informatics, 17(12), 8142–8153. https://doi.org/10.1109/tii.2021.3065714
Kolomeets, M., & Chechulin, A. (2021, May). Analysis of the malicious bots market. In 2021 29th conference of open in-novations association (FRUCT) (pp. 199-205). IEEE. https://doi.org/10.23919/fruct52173.2021.9435421
Konyeha, S. (2020). Exploring cybersecurity threats in digital marketing. NIPES Journal of Science and Technology Re-search, 2(3), 12. https://doi.org/10.37933/nipes/2.3.2020.2
Krishen, A. S., Dwivedi, Y. K., Bindu, N., & Kumar, K. S. (2021). A broad overview of Interactive Digital Marketing: A Bibliometric network analysis. Journal of Business Research, 131, 183–195. https://doi.org/10.1016/j.jbusres.2021.03.061
Kumar, S., Pallathadka, H., & Pallathadka, L. K. (2022). An Analysis of Cyber Security Threats in Digital Market-ing. Journal of Critical Reviews, 9(03), 85-94.
Latchoumi, T. P., Reddy, M. S., & Balamurugan, K. (2020). Applied machine learning predictive analytics to SQL injec-tion attack detection and prevention. European Journal of Molecular & Clinical Medicine, 7(02), 3543-3553.
Lei, Z., Nan, Y., Fratantonio, Y., & Bianchi, A. (2021). On the insecurity of SMS one-time password messages against lo-cal attackers in modern mobile devices. Proceedings 2021 Network and Distributed System Security Symposium. https://doi.org/10.14722/ndss.2021.24212
Limone, P., Toto, G. A., Guarini, P., & di Furia, M. (2022). Online quantitative research methodology: Reflections on good practices and future perspectives. Lecture Notes in Networks and Systems, 656–669. https://doi.org/10.1007/978-3-031-10461-9_45
Magano, J., & Cunha, M. N. (2020). Digital marketing impact on tourism in Portugal: A quantitative study. African Jour-nal of Hospitality, Tourism and Leisure, 9(1), 1-19.
Martins, I., Resende, J. S., Sousa, P. R., Silva, S., Antunes, L., & Gama, J. (2022). Host-based ids: A review and open is-sues of an anomaly detection system in IOT. Future Generation Computer Systems, 133, 95–113. https://doi.org/10.1016/j.future.2022.03.001
Mathur, M. (2018). Where is the security blanket? developing social media marketing capability as a shield from per-ceived cybersecurity risk. Journal of Promotion Management, 25(2), 200–224. https://doi.org/10.1080/10496491.2018.1443310
Mirian, A., DeBlasio, J., Savage, S., Voelker, G. M., & Thomas, K. (2019). Hack for hire: Exploring the emerging market for account hijacking. The World Wide Web Conference. https://doi.org/10.1145/3308558.3313489
Mishra, P., & Gupta, C. (2020). Cookies in a cross-site scripting: Type, utilization, detection, protection and remediation. 2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Direc-tions) (ICRITO). https://doi.org/10.1109/icrito48877.2020.9198003
Mishra, S. (2019). SQL injection detection using machine learning. https://doi.org/10.31979/etd.j5dj-ngvb
Mogaji, E., Soetan, T. O., & Kieu, T. A. (2020). The implications of artificial intelligence on the digital marketing of fi-nancial services to vulnerable customers. Australasian Marketing Journal, 29(3), 235–242. https://doi.org/10.1016/j.ausmj.2020.05.003
Mukherjee, S., Chittipaka, V., & Baral, M. M. (2021). Developing a model to highlight the relation of Digital Trust with privacy and security for the blockchain technology. Advances in Marketing, Customer Relationship Management, and E-Services, 110–125. https://doi.org/10.4018/978-1-7998-8081-3.ch007
Okagbue, H. I., Oguntunde, P. E., Obasi, E. C., & Akhmetshin, E. M. (2021). Trends and usage pattern of SPSS and Minitab Software in scientific research. Journal of Physics: Conference Series, 1734(1), 012017. https://doi.org/10.1088/1742-6596/1734/1/012017
Olson, E. M., Olson, K. M., Czaplewski, A. J., & Key, T. M. (2021). Business strategy and the management of Digital Marketing. Business Horizons, 64(2), 285–293. https://doi.org/10.1016/j.bushor.2020.12.004
Pandey, N., Nayal, P., & Rathore, A. S. (2020). Digital marketing for B2B organizations: Structured Literature Review and future research directions. Journal of Business & Industrial Marketing, 35(7), 1191–1204. https://doi.org/10.1108/jbim-06-2019-0283
Pattewar, T., Patil, H., Patil, H., Patil, N., Taneja, M., & Wadile, T. (2019). Detection of SQL injection using machine learning: a survey. Int. Res. J. Eng. Technol.(IRJET), 6(11), 239-246.
Pedley, D., Borges, T., Bollen, A., Shah, J. N., Donaldson, S., Furnell, S., & Crozier, D. (2020). Cyber security skills in the UK labour market 2020. Department for Digital, Culture, Media & Sport.
Pham, H. C., Brennan, L., Parker, L., Phan-Le, N. T., Ulhaq, I., Nkhoma, M. Z., & Nhat Nguyen, M. (2019). Enhancing cyber security behavior: An internal social marketing approach. Information & Computer Security, 28(2), 133–159. https://doi.org/10.1108/ics-01-2019-0023
Prasad, R., & Rohokale, V. (2019). Cyber threats and attack overview. Springer Series in Wireless Technology, 15–31. https://doi.org/10.1007/978-3-030-31703-4_2
Saura, J. R. (2021). Using Data Sciences in Digital Marketing: Framework, methods, and performance metrics. Journal of Innovation & Knowledge, 6(2), 92–102. https://doi.org/10.1016/j.jik.2020.08.001
Saura, J. R., Ribeiro-Soriano, D., & Palacios-Marqués, D. (2021). Setting B2B Digital Marketing in artificial intelligence-based CRMS: A review and directions for future research. Industrial Marketing Management, 98, 161–178. https://doi.org/10.1016/j.indmarman.2021.08.006
Sharma, H. (2022). How short or long should be a questionnaire for any research? researchers dilemma in deciding the ap-propriate questionnaire length. Saudi Journal of Anaesthesia, 16(1), 65. https://doi.org/10.4103/sja.sja_163_21
Sheridan, R. P., Karnachi, P., Tudor, M., Xu, Y., Liaw, A., Shah, F., Cheng, A. C., Joshi, E., Glick, M., & Alvarez, J. (2020). Experimental error, kurtosis, activity cliffs, and methodology: What limits the predictivity of quantitative structure–activity relationship models? Journal of Chemical Information and Modeling, 60(4), 1969–1982. https://doi.org/10.1021/acs.jcim.9b01067
Singh, R. (2021). Digital Marketing in today's privacy-conscious world. Digitization of Economy and Society, 121–151. https://doi.org/10.1201/9781003187479-8
Subramaniam, T. V. (2020). Impact of social media on digital marketing: starbucks marketing strategy on Twitter. Case study, 2, 1-7.
Suleiman, D. A., Awan, T. M., & Javed, M. (2021). Enhancing digital marketing performance through usage intention of AI-powered websites. IAES International Journal of Artificial Intelligence (IJ-AI), 10(4), 810. https://doi.org/10.11591/ijai.v10.i4.pp810-817
Thomson, D. R., Rhoda, D. A., Tatem, A. J., & Castro, M. C. (2020). Gridded Population Survey Sampling: A systematic scoping review of the field and strategic research agenda. International Journal of Health Geographics, 19(1). https://doi.org/10.1186/s12942-020-00230-4
Trim, P. R. J., & Lee, Y.-I. (2019). The role of B2B marketers in increasing cyber security awareness and influencing be-havioural change. Industrial Marketing Management, 83, 224–238. https://doi.org/10.1016/j.indmarman.2019.04.003
Veerabudren, K. R., & Bekaroo, G. (2022). Security in web applications: A comparative analysis of key SQL Injection De-tection Techniques. 2022 4th International Conference on Emerging Trends in Electrical, Electronic and Communica-tions Engineering (ELECOM). https://doi.org/10.1109/elecom54934.2022.9965264
Wazid, M., Das, A. K., Chamola, V., & Park, Y. (2022). Uniting Cyber Security and machine learning: Advantages, chal-lenges and future research. ICT Express, 8(3), 313–321. https://doi.org/10.1016/j.icte.2022.04.007
Wibowo, R. M., & Sulaksono, A. (2021). Web vulnerability through Cross site scripting (XSS) detection with Owasp Se-curity shepherd. Indonesian Journal of Information Systems, 149–159. https://doi.org/10.24002/ijis.v3i2.4192