Abstract

Evaluating an actor's ‘cyber power’ is an inherently complex problem involving a laundry list of military, normative, and technical variations. However, one important but under-theorised factor is the relationship between military social media operations and cyber operations. Policymakers, journalists, and even some academics often treat social media activity as a proxy variable for an actor's latent technical proficiency and even cyber capability, in other words, its cyber power. Actors that are extremely successful at engaging in social media activities are assumed to be technically proficient and even capable of engaging in cyber operations. This paper argues that an actor's social media use is a poor proxy for its technical and cyber security competency. In fact, under certain conditions social media activity may actually magnify the vulnerability of that actor. This paper synthesises cross-disciplinary research from strategic studies, political science, and technologists to develop a theoretical framework for better understanding the role of social media in cyber operations. It outlines the similarities and differences between social media and cyber security, and categorises different military social media operations into three types: information-gathering (IGMO), defensive social media operations (DeSMO), and offensive social media operations (OSMO).

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.