Abstract
With the rise of online platforms where individuals could gather and spread information came the rise of online cybercrimes aimed at taking advantage of not just single individuals but collectives. In response, researchers and practitioners began trying to understand this digital playground and the way in which individuals who were socially and digitally embedded could be manipulated. What is emerging is a new scientific and engineering discipline—social cybersecurity. This paper defines this emerging area, provides case examples of the research issues and types of tools needed, and lays out a program of research in this area.
Highlights
In today’s high tech world, beliefs opinions and attitudes are shaped as people engage with others in social media, and through the internet
In our research we have found that there is some work in social cybersecurity that draws on most scientific fields
2 Case study 1: building community in social media In Ukraine there were a group of young men sending out provocative images of women
Summary
In response to these cyber-mediated threats to democracy, a new scientific discipline has emerged—social cybersecurity. The methods build on work in high dimensional network analysis, data science, machine learning, natural language processing and agent-based simulation These methods are used to provide evidence about who is manipulating social media and the internet for/against you or your organization, what methods are being used, and how these social manipulation methods can be countered. The methods and findings in this area are critical, and advance practices for intelligence and forensics research These methods provide scalable techniques for assessing and predicting the impact of influence operations carried out through social media, and for securing social activity on the internet and mitigating the effects of malicious and undue influence. After presenting these case studies we turn to a discussion of a new orienting approach for doing research in social cybersecurity, referred to as the BEND framework These items provide a glimpse into the core of this emerging scientific field. This is because privacy was viewed as a separate field unto itself and papers in that area were not include in the analysis
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have