• Ehsan Abbas Independent researcher Pakistan
  • Anis Ahmed Qazi Independent Researcher Germany


Federated Learning, Transparency, User Empowerment, Bias Mitigation, Emerging Technologies, User-Centric Innovations, Data Security, Ethical AI Guidelines Case Studies, User Experience, Ethical Considerations, Future Trends, Regulatory Influences, Personalized AI-Backed.


 The revolutionary field of Personalized AI-Backed Privacy and Security Settings for Social Media Web Applications is examined in-depth in this review study. The introduction lays the groundwork by outlining the escalating worries about security and privacy in the digital era, which prompts an investigation into AI-driven solutions customized to meet the demands of specific users. The background explains past struggles and the shortcomings of conventional privacy settings, laying the groundwork for the development of customized AI solutions. After that, the essay explores the necessity of customization in security and privacy settings, highlighting the variety of user preferences, the dynamic nature of threats, and the fine line that must be drawn between user experience and privacy. It presents the emergence of personalized AI solutions, propelled by sophisticated machine learning algorithms that assess user behavior in real-time and dynamically adjust security and privacy settings. This overview of privacy and security settings looks at the standard capabilities and accompanying restrictions provided by social media sites. In the part on practical implementation, case studies from well-known social media platforms are highlighted with an emphasis on best practices, lessons learned, and successful implementations. The benefits and advantages section describes how adaptive security measures, better privacy protection, and an improved user experience are all brought about by personalized AI solutions. Discussions about possible cost savings and operational efficiency arise when platforms adopt automation and AI-driven personalization.


Ahanger, T. A., & Aljumah, A. (2018). Internet of Things: A comprehensive study of security issues and defense mechanisms. IEEE Access, 7, 11020-11028.

Tene, O., & Polonetsky, J. (2012). Big data for all: Privacy and user control in the age of analytics. Nw. J. Tech. & Intell. Prop., 11, 239.

Kaye, J., Whitley, E. A., Lund, D., Morrison, M., Teare, H., & Melham, K. (2015). Dynamic consent: a patient interface for twenty-first century research networks. European journal of human genetics, 23(2), 141-146.

Aceto, G., Persico, V., & Pescapé, A. (2019). A survey on information and communication technologies for industry 4.0: State-of-the-art, taxonomies, perspectives, and challenges. IEEE Communications Surveys & Tutorials, 21(4), 3467-3501.

Neisse, R. (2012). Trust and privacy management support for context-aware service platforms. University of Twente, Enschede, Netherlands.

Ollier-Malaterre, A., Rothbard, N. P., & Berg, J. M. (2013). When worlds collide in cyberspace: How boundary work in online social networks impacts professional relationships. Academy of Management review, 38(4), 645-669.

Wang, D., & Wang, P. (2016). Two birds with one stone: Two-factor authentication with security beyond conventional bound. IEEE transactions on dependable and secure computing, 15(4), 708-722.

Kishnani, U., Noah, N., Das, S., & Dewri, R. (2023, October). Assessing Security, Privacy, User Interaction, and Accessibility Features in Popular E-Payment Applications. In Proceedings of the 2023 European Symposium on Usable Security (pp. 143-157).

Haleem, A., Javaid, M., Qadri, M. A., Singh, R. P., & Suman, R. (2022). Artificial intelligence (AI) applications for marketing: A literature-based study. International Journal of Intelligent Networks, 3, 119-132.

Baden, R., Bender, A., Spring, N., Bhattacharjee, B., & Starin, D. (2009, August). Persona: an online social network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 conference on Data communication (pp. 135-146).

Dwivedi, Y. K., Kshetri, N., Hughes, L., Slade, E. L., Jeyaraj, A., Kar, A. K., ... & Wright, R. (2023). “So what if ChatGPT wrote it?” Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy. International Journal of Information Management, 71, 102642.

Jang-Jaccard, J., & Nepal, S. (2014). A survey of emerging threats in cybersecurity. Journal of computer and system sciences, 80(5), 973-993.

Haleem, A., Javaid, M., Qadri, M. A., Singh, R. P., & Suman, R. (2022). Artificial intelligence (AI) applications for marketing: A literature-based study. International Journal of Intelligent Networks, 3, 119-132.

Grace, P., & Surridge, M. (2017, August). Towards a model of user-centered privacy preservation. In Proceedings of the 12th International Conference on Availability, Reliability and Security (pp. 1-8).

De Spiegeleire, S., Maas, M., & Sweijs, T. (2017). Artificial intelligence and the future of defense: strategic implications for small-and medium-sized force providers. The Hague Centre for Strategic Studies.

Albert, B., & Tullis, T. (2013). Measuring the user experience: collecting, analyzing, and presenting usability metrics. Newnes.

Stahl, B. C. (2021). Artificial intelligence for a better future: an ecosystem perspective on the ethics of AI and emerging digital technologies (p. 124). Springer Nature.

Teltzrow, M., & Kobsa, A. (2004). Impacts of user privacy preferences on personalized systems: a comparative study. In Designing personalized user experiences in eCommerce (pp. 315-332). Dordrecht: Springer Netherlands.

Chen, T., Liu, J., Xiang, Y., Niu, W., Tong, E., & Han, Z. (2019). Adversarial attack and defense in reinforcement learning-from AI security view. Cybersecurity, 2, 1-22.

Domingos, J., Dean, J., Cruickshank, T. M., Śmiłowska, K., Fernandes, J. B., & Godinho, C. (2021). A novel boot camp program to help guide personalized exercise in people with Parkinson disease. Journal of Personalized Medicine, 11(9), 938.

Liu, C., & Julien, C. (2015). Pervasive context sharing in magpie: adaptive trust-based privacy protection. In Mobile Computing, Applications, and Services: 7th International Conference, MobiCASE 2015, Berlin, Germany, November 12–13, 2015, Revised Selected Papers 7 (pp. 122-139). Springer International Publishing.

Khan, A. A., Laghari, A. A., Gadekallu, T. R., Shaikh, Z. A., Javed, A. R., Rashid, M., ... & Mikhaylov, A. (2022). A drone-based data management and optimization using metaheuristic algorithms and blockchain smart contracts in a secure fog environment. Computers and Electrical Engineering, 102, 108234.

Riecken, H. (2022). AI in performance management: a game-changing development? (Bachelor's thesis, University of Twente).

Dwivedi, Y. K., Ismagilova, E., Hughes, D. L., Carlson, J., Filieri, R., Jacobson, J., ... & Wang, Y. (2021). Setting the future of digital and social media marketing research: Perspectives and research propositions. International journal of information management, 59, 102168.

Bettini, C., & Riboni, D. (2015). Privacy protection in pervasive systems: State of the art and technical challenges. Pervasive and Mobile Computing, 17, 159-174.

Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: Tensions in privacy and data. Journal of the Academy of Marketing Science, 50(6), 1299-1323.

Manheim, K., & Kaplan, L. (2019). Artificial intelligence: Risks to privacy and democracy. Yale JL & Tech., 21, 106.

Carmody, J., Shringarpure, S., & Van de Venter, G. (2021). AI and privacy concerns: a smart meter case study. Journal of Information, Communication and Ethics in Society, 19(4), 492-505.

Calleo, Y., & Pilla, F. (2024). Optimizing spatial survey administration adopting RT-GSCS: A statistical perspective on performance metrics. MethodsX, 12, 102578.

Cheng, L., Varshney, K. R., & Liu, H. (2021). Socially responsible ai algorithms: Issues, purposes, and challenges. Journal of Artificial Intelligence Research, 71, 1137-1181.

Hermann, E. (2022). Artificial intelligence and mass personalization of communication content—An ethical and literacy perspective. New media & society, 24(5), 1258-1277.

Dwivedi, Y. K., Hughes, L., Ismagilova, E., Aarts, G., Coombs, C., Crick, T., ... & Williams, M. D. (2021). Artificial Intelligence (AI): Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy. International Journal of Information Management, 57, 101994.

Heer, J. (2019). Agency plus automation: Designing artificial intelligence into interactive systems. Proceedings of the National Academy of Sciences, 116(6), 1844-1850.

Favaretto, M., De Clercq, E., & Elger, B. S. (2019). Big Data and discrimination: perils, promises and solutions. A systematic review. Journal of Big Data, 6(1), 1-27.

Lewis, D., & Moorkens, J. (2020). A rights-based approach to trustworthy AI in social media. Social Media+ Society, 6(3), 2056305120954672.

Kane, G. C., & Fichman, R. G. (2009). The shoemaker's children: Using wikis for information systems teaching, research, and publication. MIS quarterly, 1-17.

Felzmann, H., Villaronga, E. F., Lutz, C., & Tamò-Larrieux, A. (2019). Transparency you can trust: Transparency requirements for artificial intelligence between legal norms and contextual concerns. Big Data & Society, 6(1), 2053951719860542.

Díaz-Rodríguez, N., Del Ser, J., Coeckelbergh, M., de Prado, M. L., Herrera-Viedma, E., & Herrera, F. (2023). Connecting the dots in trustworthy Artificial Intelligence: From AI principles, ethics, and key requirements to responsible AI systems and regulation. Information Fusion, 99, 101896.

Keshta, I. (2022). AI-driven IoT for smart health care: Security and privacy issues. Informatics in medicine Unlocked, 30, 100903.


Ozmen Garibay, O., Winslow, B., Andolina, S., Antona, M., Bodenschatz, A., Coursaris, C., ... & Xu, W. (2023). Six human-centered artificial intelligence grand challenges. International Journal of Human ComputerInteraction, 39(3),391-437.




How to Cite

Ehsan Abbas, & Anis Ahmed Qazi. (2024). CUSTOMIZED AI-POWERED SECURITY AND PRIVACY CONFIGURATIONS FOR SOCIAL MEDIA WEBSITES. BULLET : Jurnal Multidisiplin Ilmu, 3(1), 108–117. Retrieved from