Abstract
Social Cyber-Security is an emerging scientific discipline. Its methodological and scientific foundation, key challenges, and scientific direction are described. The multi-disciplinary nature of this field and its emphasis on dynamic information strategies is considered.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Reveron, D.S.: Cyberspace and National Security: Threats, Opportunities, and Power in A Virtual World. Georgetown University Press, Washington D.C. (2012)
Gass, R.H., Seiter, J.S.: Persuasion: Social Influence and Compliance Gaining. Routledge, UK (2015)
Benigni, M., Joseph, K., Carley, K.M.: Online extremism and the communities that sustain it: detecting the ISIS supporting community on Twitter. PLoS ONE 12(12), e0181405 (2017)
Sunstein, C.R.: #Republic: Divided democracy in the age of social media. Princeton University Press, Princeton (2018)
Bennett, W.L.: The personalization of politics: political identity, social media, and changing patterns of participation. Ann. Am. Acad. Polit. Soc. Sci. 644(1), 20–39 (2012)
Wu, L., Liu, H.: Tracing fake-news footprints: characterizing social media messages by how they propagate. In: The Proceedings of the 11th ACM International Conference on Web Search and Data Mining (WSDM2018), pp. 637–645. ACM, NY (2018)
Colliander, J., Dahlén, M.: Following the fashionable friend: the power of social media: weighing publicity effectiveness of blogs versus online magazines. J. Advert. Res. 51(1), 313–320 (2011)
Backstrom, L., Huttenlocher, D., Kleinberg, J., Lan, X.: Group formation in large social networks: membership, growth, and evolution. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 44–54. ACM, NY (2006)
Joseph, K., Wei, W., Benigni, M., Carley, K.M.: A social-event based approach to sentiment analysis of identities and behaviors in text. J. Math. Sociol. 40(3), 137–166 (2016)
Benigni, M., Joseph, K., Carley, K.M.: Mining online communities to inform strategic messaging: practical methods to identify community-level insights. Comput. Math. Organ. Theor. 24, 224–242 (2017)
Cordesman, A.H., Cordesman, J.G.: Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending The US Homeland. Greenwood Publishing Group, Westport (2002)
Al-khateeb, S., Hussain, M.N., Agarwal, N.: Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns. In: Lee, D., Lin, Y.-R., Osgood, N., Thomson, R. (eds.) SBP-BRiMS 2017. LNCS, vol. 10354, pp. 108–113. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-60240-0_13
Entman, R.M.: Framing bias: media in the distribution of power. J. Commun. 57(1), 163–173 (2007)
Benigni, M., Carley, K.M.: From tweets to intelligence: understanding the islamic jihad supporting community on Twitter. In: Xu, K., Reitter, D., Lee, D., Osgood, N. (eds.) SBP-BRiMS 2016. Lecture Notes in Computer Science, vol. 9708, pp. 346–355. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39931-7_33
Carley, K.M., Wei, W., Joseph, K.: High dimensional network analytics: mapping topic networks in twitter data during the Arab spring. In: Cui, S., Hero, A., Luo, Z.-Q., Moura, J. (eds.) Big Data Over Networks. Cambridge University Press, Boston (2016)
Hu, X., Liu, H.: Text Analytics in Social Media. In: Aggarwal, C., Zhai, C. (eds.) Mining text data, pp. 385–414. Springer, Boston (2012). https://doi.org/10.1007/978-1-4614-3223-4_12
Agarwal, N., Kumar, S., Gao, H., Zafarani, R., Liu, H.: Analyzing behavior of the influentials across social media. In: Cao, L., Yu, P. (eds.) Behavior Computing, pp. 3–19. Springer, London (2012). https://doi.org/10.1007/978-1-4471-2969-1_1
Cervone, G., Sava, E., Huang, Q., Schnebele, E., Harrison, J., Waters, N.: Using Twitter for tasking remote-sensing data collection and damage assessment: 2013 Boulder flood case study. Int. J. Remote Sens. 37(1), 100–124 (2016)
Wei, W., Joseph, K., Liu, H., Carley, K.M.: Exploring characteristics of suspended users and network stability on Twitter. Soc. Netw. Anal. Min. 6(1), 51 (2016)
Carley, K.M., Momin, M., Landwehr, P.M., Pfeffer, J., Kowalchuck, M.: Crowd sourcing disaster management: the complex nature of Twitter usage in Padang Indonesia. Saf. Sci. 90, 48–61 (2016)
Morstatter, F., Pfeffer, J., Liu, H. Carley, K.M.: Is the sample good enough? Comparing data (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Carley, K.M., Cervone, G., Agarwal, N., Liu, H. (2018). Social Cyber-Security. In: Thomson, R., Dancy, C., Hyder, A., Bisgin, H. (eds) Social, Cultural, and Behavioral Modeling. SBP-BRiMS 2018. Lecture Notes in Computer Science(), vol 10899. Springer, Cham. https://doi.org/10.1007/978-3-319-93372-6_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-93372-6_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93371-9
Online ISBN: 978-3-319-93372-6
eBook Packages: Computer ScienceComputer Science (R0)