Social Cyber-Security

Social Cyber-Security is an emerging scientific discipline. Its methodological and scientific foundation, key challenges, and scientific direction are described. The multi-disciplinary nature of this field and its emphasis on dynamic information strategies is considered.

[1]  Kathleen M. Carley,et al.  Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter , 2017, PloS one.

[2]  Kathleen M. Carley,et al.  A social-event based approach to sentiment analysis of identities and behaviors in text , 2016, The Journal of Mathematical Sociology.

[3]  Kathleen M. Carley,et al.  Mining online communities to inform strategic messaging: practical methods to identify community-level insights , 2017, Computational and Mathematical Organization Theory.

[4]  Derek S. Reveron,et al.  Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World , 2012 .

[5]  W. Bennett,et al.  The Personalization of Politics , 2012 .

[6]  Anthony H. Cordesman,et al.  Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland , 2001 .

[7]  Jon M. Kleinberg,et al.  Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.

[8]  Reza Zafarani,et al.  Analyzing Behavior of the Influentials Across Social Media , 2012 .

[9]  Huan Liu,et al.  Text Analytics in Social Media , 2012, Mining Text Data.

[10]  Huan Liu,et al.  Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose , 2013, ICWSM.

[11]  Wei Wei,et al.  High-dimensional network analytics: mapping topic networks in Twitter data during the Arab Spring , 2016, Big Data over Networks.

[12]  Kathleen M. Carley,et al.  From Tweets to Intelligence: Understanding the Islamic Jihad Supporting Community on Twitter , 2016, SBP-BRiMS.

[13]  R. Entman Framing Bias: Media in the Distribution of Power , 2007 .

[14]  Micael Dahlen,et al.  Following the Fashionable Friend: The Power of Social Media , 2011, Journal of Advertising Research.

[15]  Kathleen M. Carley,et al.  Crowd sourcing disaster management: The complex nature of Twitter usage in Padang Indonesia , 2016 .

[16]  Qunying Huang,et al.  Using Twitter for tasking remote-sensing data collection and damage assessment: 2013 Boulder flood case study , 2016 .

[17]  Huan Liu,et al.  Tracing Fake-News Footprints: Characterizing Social Media Messages by How They Propagate , 2018, WSDM.

[18]  John S. Seiter,et al.  Persuasion: Social Inflence and Compliance Gaining , 2015 .

[19]  Nitin Agarwal,et al.  Social Cyber Forensics Approach to Study Twitter's and Blogs' Influence on Propaganda Campaigns , 2017, SBP-BRiMS.

[20]  Cass R. Sunstein,et al.  #Republic: Divided Democracy in the Age of Social Media , 2017 .

[21]  Huan Liu,et al.  Exploring characteristics of suspended users and network stability on Twitter , 2016, Social Network Analysis and Mining.