From recent years, online social network services are mostly used for marketing, social, political, religious campaign more than just connecting to the friends. Now-a-days, government of most of the countries actively participate on network enabled platforms. Many researchers worldwide are working on social network analysis to extract information from social network services to increase productivity, awareness, learning as well as finding malicious links, phishing, spams & trending viral contents. The study in this paper focuses on causes and effects of persuasive messages based on current trending news and events which effectively may influence an individual’s behavior. We name this effect as Cyberspace plus Psychology effect leading to CyberPsycho attacks. In CyberPsycho attacks an attacker uses cyber space & social network to affect or change attitude or behavior, and achieve certain goals to attain political, religious, economical, social gains. It motivates social media users towards a certain objective by spreading the persuasive messages in the form of texts, images or videos. The study is unique, valuable and compels the experts in academia, researchers, technologists and end-users to understand & acknowledge the serious impact of psychological, social and cultural aspects of internet addiction. In this paper, we propose three fundamental models to address and analyze the above concerns. These three proposed models to identify occurrence of cyberpsycho attacks is the major contribution of this paper.
[1]
Marko Turpeinen,et al.
Climate persuasive services: changing behavior towards low-carbon lifestyles
,
2009,
Persuasive '09.
[2]
Ai Cheo Yeo,et al.
Use of persuasive technology to change end-users' IT security aware behaviour: A pilot study
,
2008
.
[3]
Nisheeth Shrivastava,et al.
Mining (Social) Network Graphs to Detect Random Link Attacks
,
2008,
2008 IEEE 24th International Conference on Data Engineering.
[4]
Baharuddin Aris,et al.
Technological Persuasive Pedagogy: A New Way to Persuade Students in the Computer-based Mathematics Learning
,
2013
.
[5]
Jun Hu,et al.
Detecting and characterizing social spam campaigns
,
2010,
CCS '10.
[6]
B. J. Fogg,et al.
Captology: the study of computers as persuasive technologies
,
1997,
CHI Extended Abstracts.
[7]
B. J. Fogg,et al.
Persuasive technology: using computers to change what we think and do
,
2002,
UBIQ.
[8]
Brenda K. Wiederhold,et al.
The Role of Psychology in Enhancing Cybersecurity
,
2014,
Cyberpsychology Behav. Soc. Netw..