أطر معالجة قضايا الأمن السيبراني في الصحافة الرقمية وأثرها على إدراك النخب الإعلامية للتهديدات الرقمية: دراسة تطبيقية

نوع المستند : بحوث علمیة متخصصة فی مجال الاعلام والاتصال.

المؤلف

قسم الإعلام التربوي ، كلية التربية النوعية ، جامعة المنيا

10.21608/jkom.2025.467523

المستخلص

هدف البحث إلى دراسة أطر معالجة قضايا الأمن السيبراني في الصحف الرقمية وعلاقتها بإدراك النخب الإعلامية للتهديدات الرقمية، بالاستناد إلى نظرية الأطر الإعلامية ونظرية الاتصال بالمخاطر لفهم كيفية بناء الرسائل الإعلامية الخاصة بالأمن السيبراني ودورها في تشكيل الوعي بالتهديدات الرقمية، استخدم البحث منهج المسح بشقيه التحليلي والميداني، من خلال تحليل محتوى بوابة الأهرام وموقع اليوم السابع، وتطبيق استبيان على عينة مكونة من 422 مفردة من النخب الأكاديمية والمهنية في المجال الإعلامي، وأظهرت النتائج أن إطار التهديد والخطر كان الأكثر شيوعاً بنسبة 26.07%، تلاه إطار الحلول والوقاية بنسبة 20.14%، ثم إطار المسؤولية بنسبة 17.77%، في حين تراجعت الأطر ذات الطابع الإنساني والأخلاقي والاقتصادي، كما تبين ارتفاع مستوى إدراك النخب الإعلامية لأبعاد التهديدات الرقمية، خصوصاً في مجالات الأمن السيبراني والخصوصية والتأثيرات النفسية والاجتماعية، مما يعكس وعياً حقيقياً بخطورة الظواهر الرقمية المعاصرة، مع وجود علاقة ارتباط موجبة قوية ودالة إحصائياً بين درجة تبني النخب الإعلامية لأطر معالجة قضايا الأمن السيبراني وإدراكهم للتهديدات الرقمية.

الكلمات الرئيسية


Al-Adawy, Z. (2024). Science Communication and Digital Journalism in Egypt: Challenges and Future Perspectives. Arab Journal of Media & Communication Research, Cairo University, Issue 44, p. 105-125

Al-Askari, Hanaa Radi. (2024). Requirements for achieving cybersecurity and combating cybercrimes in light of media digitization. The Scientific Journal of the Faculty of Specific Education, Mansoura University, 13(2), 155–184.

Alazrak, N. N. (2020). Cost of online connection: Digital threats for the Egyptian journalists and their awareness of the techniques used to attain their safety – A qualitative study. Journal of Media Researches , 54(6), 4299–4338. https://doi.org/10.21608/jsb.2020.110305

Al-Badawi, Habib. (2024). Digital warfare and cybersecurity: The danger of threats versus the strengthening of defenses. Journal of Digital Media Research, 3(3), 153–180. https://doi.org/10.21608/jsmd.2024.357434

Al-Buheiri, Sherine. (2023). The role of digital media in enhancing cybersecurity and combating cyber threats and crimes. The Scientific Journal of Public Relations and Advertising Research, (25), 47–85. https://doi.org/10.21608/sjocs.2023.299143

Bada, M., Sasse, A. M., & Nurse, J. R. C. (2019). Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672. Retrieved from https://arxiv.org/abs/1901.02672

Bojic, L., Prodanovic, N., & Samala, A. D. (2024, January 7). Maintaining journalistic integrity in the digital age: A comprehensive NLP framework for evaluating online news content [Preprint]. arXiv. https://arxiv.org/abs/2401.03467

Centers for Disease Control and Prevention (CDC). (2019). Crisis and Emergency Risk Communication (CERC) Manual. U.S. Department of Health and Human Services. Retrieved from https://emergency.cdc.gov/cerc/manual/index.asp

Chen, D., Wawrzynski, P., & Lv, Z. (2021). Cyber security in smart cities: a review of deep learning-based applications and case studies. Sustainable Cities and Society, 66, 102655.‏

Chen, Jing and Henry, Elaine and Jiang, Xi,(2022), Is Cybersecurity Risk Factor Disclosure Informative? Evidence from Disclosures Following a Data Breach (February 20, 2022). Journal of Business Ethics, Forthcoming, Available at SSRN: https://ssrn.com/abstract=3780388 or http://dx.doi.org/10.2139/ssrn.3780388

Chen, X., Xu, J., & Li, J. (2020). Risk communication in cyberspace: A brief review of the information-processing and mental models approaches. Journal of Risk Research, 23(5), 678–694. https://doi.org/10.1080/13669877.2020.1750456

Clarke, M. A., Patel, M., & Young, H. (2023). Managing cybersecurity risk in healthcare settings: Risk communication and organizational resilience. Frontiers in Public Health, 11, 10725101. https://doi.org/10.3389/fpubh.2023.10725101

Dave, D., Sawhney, G., Aggarwal, P., & Silswal, N. (2023). The new frontier of cybersecurity: Emerging threats and innovations [Preprint]. arXiv. https://doi.org/10.48550/arXiv.2311.02630

El-Awady, N. (2009), Science journalism: The Arab boom. Nature 459, 1057 , https://doi.org/10.1038/4591057a

Elrefai, M. (2019). Transformations and Trends in Science Journalism as Viewed by the Egyptian Media and Scientific Community. Arab Media & Society, 28.‏

Falade, P. V. (2023). Decoding the threat landscape: ChatGPT, FraudGPT, and WormGPT in social engineering attacks. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 9(5), 185-198. https://doi.org/10.32628/CSEIT2390533

Hashish, Reham Essam Sayed Ahmed, & Khairy, Mohamed Fetouh. (2024). Artificial intelligence technologies in digital media and their impact on students’ opinions toward cybersecurity issues within the university campus. Journal of Qualitative Education and Technology: Scientific and Applied Research, 31(1), 311–342. https://doi.org/10.21608/maat.2024.330607.1169

Hilal, Mohamed Abdel Hakim. (2025). A proposed framework to confront automation threats in Egyptian general secondary education. Journal of the Faculty of Education in Educational Sciences, 49(1), 127–206.

Jabbar, Safaa Ali. (2025). The role of digital media in raising Iraqi public awareness of cybersecurity risks and crimes. Wasit Journal for Humanities, 21(2), 829–849. https://doi.org/10.31185/wjfh

Jones, M., & Scott, A. (2022).Media Framing of Cybersecurity Threats: An Analysis of News Narratives in Western Digital Journalism. Digital Journalism, 10(4), 512–530.

Knight, R., & Nurse, J. R. C. (2020). A framework for effective corporate communication after cybersecurity incidents. arXiv preprint arXiv:2009.09210. Retrieved from https://arxiv.org/abs/2009.09210

Kolich, H. N. (2014). Risk and Emergency Communications: How to Be Heard. Clemson University. Retrieved from https://tigerprints.clemson.edu/cgi/viewcontent.cgi?article=2276&context=joe

Leiss, W. (1996). Three phases in the evolution of risk communication practice. The Annals of the American Academy of Political and Social Science, 545(1), 85-94. https://doi.org/10.1177/0002716296545001009

Majebi, N. L., & Drakeford, O. M. (2021). Child safety in the digital age: Historical lessons from media regulation and their application to modern cybersecurity policies. International Journal of Multidisciplinary Research and Growth Evaluation, 2(1), 735–742. https://doi.org/10.54660/.IJMRGE.2021.2.1.735-742

Mazzarolo, G., Fernandez Casas, J. C., Jurcut, A. D., & Le-Khac, N.-A. (2021). Protect against unintentional insider threats: The risk of an employee’s cyber misconduct on a social media site. arXiv preprint arXiv:2103.04744. Retrieved from https://arxiv.org/abs/2103.04744

Meissner, F., Buse, C., & Wilke, A. (2024). Mediated perspectives on cyber risk: A content analysis of news reporting about cyber threats and safety measures. Proceedings of the International Crisis and Risk Communication Conference (ICRCC). p. 45-48 https://www.ssoar.info/ssoar/handle/document/98308

Meissner, F., Wilke, A. J., & Puikytė, M. (2025). How is cybersecurity discussed across media channels? Exploratory analyses of Twitter content and news reporting. Journal of Risk Research, 28(8), 855–875. https://doi.org/10.1080/13669877.2025.2553079

Mohamed, Sara Ibrahim Ibrahim. (2024). The role of Egyptian and Arab news websites in promoting cybersecurity awareness among the public. (Unpublished doctoral dissertation). Mansoura University, Faculty of Arts, Department of Media.

Muzykant, V., Burdovskaya, E., Muzykant, E., & Muqsith, M. A. (2023). Digital threats and challenges to netizens generation media education (Indonesian case). Media Education (Mediaobrazovanie), 19(1), 97–106. https://doi.org/10.13187/me.2023.1.97

Nganga, A., Khadim, M., & Tesfaye, A. (2025). Cyber risk communication during vessel incidents: Lessons from maritime cybersecurity management. Computers & Security, 142, 103053. https://doi.org/10.1016/j.cose.2025.103053

Okonkwo, P., Njoku, I. A., & Okonkwo, R. N. (2024, November 27). Digital media ethics in generative AI journalism: A framework for accountability [Preprint]. Preprints.org. https://doi.org/10.20944/preprints202411.2157.v1

Oltramari, A., & Kott, A. (2018). Towards a reconceptualisation of cyber risk: An empirical and ontological study. arXiv preprint arXiv:1806.08349. Retrieved from https://arxiv.org/abs/1806.08349

Othman, Doaa Mohsen. (2025). Cyber threats and legal gaps: A study on Egypt and UAE laws. The Egyptian Journal of Comparative Legal Studies, 25(2), 1637–1676. Available at: https://journals.ekb.eg/article_448547_0.html

Ritchie, B. W. (2008). Tourism disaster planning and management: From response and recovery to reduction and readiness. Current Issues in Tourism, 11(4), 315-348. https://doi.org/10.1080/13683500802140372

Rodríguez-Priego, N., Martínez-Martínez, A. M., & García-González, M. (2020). Framing Effects on Online Security Behavior. Frontiers in Psychology, 11, 527886. https://doi.org/10.3389/fpsyg.2020.527886

Romero-Masters, P. (2021). The Model of Influence in Cybersecurity with Frames. In Advances in Human Factors in Cybersecurity (pp. 181–192). Springer. https://scispace.com/papers/the-model-of-influence-in-cybersecurity-with-frames-3fv4st8bld

Saleh Kalantan, Farid. (2024). Challenges and risks of losing media trust in the digital era due to privacy violations and cyberattacks in the Kingdom of Saudi Arabia. Journal of Media Research and Studies, 29(29), 585–650.

Sandman, P. M. (1993). Responding to community outrage: Strategies for effective risk communication. Fairfax, VA: American Industrial Hygiene Association. ISBN: 9780932627299

Sbriz, L. (2021, December 21). Communicating information security risk simply and effectively, part ISACA Journal, Volume 6. Retrieved from https://www.isaca.org/resources/isaca-journal/issues/2021/volume-6/communicating-information-security-risk-simply-and-effectively-part-1

Schmitt, M. (2023). Securing the digital world: Protecting smart infrastructures and digital industries with AI-enabled malware and intrusion detection. arXiv. https://arxiv.org/abs/2401.01342

Sheppard, B., Janoske, M., & Liu, B. (2012). Understanding Risk Communication Theory: A Guide for Emergency Managers and Communicators. College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism (START), U.S. Department of Homeland Security. Retrieved from https://www.start.umd.edu/pubs/UnderstandingRiskCommunicationTheory.pdf

Sheppard, B., Janoske, M., & Liu, B. (2012). Understanding Risk Communication Best Practices: A Guide for Emergency Managers and Communicators. College Park, MD: START, Department of Homeland Security. Retrieved from https://www.start.umd.edu/publication/understanding-risk-communication-best-practices-guide-emergency-managers-and

Silva, M., Raposo de Mello, A. C., & Nishijima, M. (2022). Traditional written media coverage and cybersecurity events: the NSA case. Opinião Pública. https://scispace.com/papers/traditional-written-media-coverage-and-cybersecurity-events-299yhwlt

Sufi, F. K. (2025). A new computational method for quantification and analysis of media bias in cybersecurity reporting. IEEE Transactions on Computational Social Systems. Advance online publication. https://doi.org/10.1109/TCSS.2025.3560199

Westlund, O., Boyles, J. L., Guo, L., Saldaña, M., Salaverría, R., & Wu, S. (2025). Digital journalism (studies): An agenda for the future. Digital Journalism, 13(2), 179–194. https://doi.org/10.1080/21670811.2025.2474530

World Health Organization (WHO). (2015). Chapter 7: Risk and crisis communication. In Public health for mass gatherings: Key considerations. Geneva: World Health Organization. Retrieved from https://www.who.int/ihr/publications/WHO_HSE_GCR_2015.5/en

Zidan, Asmaa Murad Saleh Murad. (2024). Developing cybersecurity culture among Helwan University students in light of digital media literacy competencies (A proposed framework). Journal of Educational and Social Studies, 30(7.1), 11–129. https://doi.org/10.21608/jsu.2024.384687