Abstract

With the rise of online platforms where individuals could gather and spread information came the rise of online cybercrimes aimed at taking advantage of not just single individuals but collectives. In response, researchers and practitioners began trying to understand this digital playground and the way in which individuals who were socially and digitally embedded could be manipulated. What is emerging is a new scientific and engineering discipline—social cybersecurity. This paper defines this emerging area, provides case examples of the research issues and types of tools needed, and lays out a program of research in this area.

Highlights

  • In today’s high tech world, beliefs opinions and attitudes are shaped as people engage with others in social media, and through the internet

  • In our research we have found that there is some work in social cybersecurity that draws on most scientific fields

  • 2 Case study 1: building community in social media In Ukraine there were a group of young men sending out provocative images of women

Read more

Summary

Social cybersecurity

In response to these cyber-mediated threats to democracy, a new scientific discipline has emerged—social cybersecurity. The methods build on work in high dimensional network analysis, data science, machine learning, natural language processing and agent-based simulation These methods are used to provide evidence about who is manipulating social media and the internet for/against you or your organization, what methods are being used, and how these social manipulation methods can be countered. The methods and findings in this area are critical, and advance practices for intelligence and forensics research These methods provide scalable techniques for assessing and predicting the impact of influence operations carried out through social media, and for securing social activity on the internet and mitigating the effects of malicious and undue influence. After presenting these case studies we turn to a discussion of a new orienting approach for doing research in social cybersecurity, referred to as the BEND framework These items provide a glimpse into the core of this emerging scientific field. This is because privacy was viewed as a separate field unto itself and papers in that area were not include in the analysis

Case study 1: building community in social media
Case study 2: increasing communicative reach in social media
Case study 3: conspiracies in social media
The BEND framework
Using social network analysis and artificial intelligence
Research directions
Social Cyber-Forensics
Information Maneuvers
Motive Identification
Diffusion
Effectiveness of Information Campaigns
Mitigation
Governance
Findings
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.