CYBER TERRORISM THROUGH SOCIAL MEDIA: A CATEGORICAL BASED PREVENTIVE APPROACH
CYBER TERRORISM THROUGH SOCIAL MEDIA: A CATEGORICAL BASED PREVENTIVE APPROACH
This paper deals with the categorical cyber terrorism threats on social media and preventive approach to minimize their issues. While dealing with the threat of cyber terrorism in social media, The United Nations Office for Drug and Crime UNODC categorical approach propaganda, financing, training, planning, execution, and cyber attacks are determined. In order to prevent, social spam, campaigns, misinformation,crowdturfing, and other practical techniques were mentioned with measures to be taken.
___
- [1]. L. Kirichenko, T. Radivilova, and A.
Carlsson. “Detecting cyber threats through
social network analysis: short survey.”
CoRR abs/1805.06680, 2018.
- [2]. R. B. Broadhurst, Chapman-Schmidt,
D. Maxim, S. Orlando, B. Sabol, and H.
Woodford-Smith. “Cyber Terrorism:
Research Review”, Australian National
University, Cybercrime Observatory,
Canberra, DOI:
10.13140/RG.2.2.19282.96964, 2017
- [3]. J.K. Kimutai. “Social. Media and
National Security Threats: A Case Study of
Kenya”, http://www.erepository.uonbi.ac.
ke/ bitstream/handle /11295/76667/
Kimutai_Social%20 Medi %20And%20
National%20Security%20Threats%20A%2
0 Case%20 Study%20Of%20Kenya.pdf?
sequence=4,2014 (Article)
- [4]. A Montagnese.“Impact of social media
on National Security”,Published MA
Thesis. University of Rome, 2012
- [5]. W. Marcellino, L.M. Smith, C. Paul,
L. Skrabala. Monitoring Social Media,
https://www.rand.org/content/dam/rand/
pubs/research_ reports/RR1700/RR1742/
RAND_RR1742.pdf, 2017 (Report)
- [6]. D. Prakash, S. Surendran., “Detection
and Analysis of Hidden Activities in Social
Networks”, IJCA, Volume 77 – No.16,
2013
- [7]. R. Littlefield. “Cyber Terrorism:
understanding and preventing acts of terror
within our cyber space”,
https://littlefield.co/cyber-terrorismunderstanding-and-preventing-acts-ofterror-within-our-cyber-space26ae6d53cfbb , 2017 (Article)
- [8]. S. Narula, N. Jindal. “Social Media,
Indian Youth and Cyber Terrorism
Awareness: A Comparative Analysis”. J
Mass Communicat Journalism 5:246.
doi:10.4172/2165-7912.1000246, 2017
- [9]. A. Aly, S. Macdonald, L. Jarvis and T.
M. Chen. “Introduction to the Special
Issue: Terrorist Online Propaganda and
Radicalization”, Studies in Conflict &
Terrorism, 40:1, 19, DOI:
10.1080/1057610X.2016.1157402, 2017
- [10]. D. Galinec, D. Možnik and B.
Guberina. “Cybersecurity and cyber
defence: national level strategic approach”,
Automatika, 58:3, 273-286, DOI:
10.1080/00051144.2017.1407022, 2017
- [11]. United Nations Office on Drugs and
CrimeThe use of the internet for terrorist
purposes. United Nations Office on Drugs
and Crime, pp.3-13. Available at:
https://www.unodc.org/documents/frontpa
ge/Use_of_Internet_for_Terrorist_Purpose
s.pdf, 2012.
- [12]. K. Shaffer. “ 10 ways to get started
fighting internet propaganda”,
https://pushpullfork.com/getting-startedfighting-internet-propaganda/, 2017
- [13]. M. Nazır. “How To Use Socıal Medıa
Effectıvely In “The Medıa Mıx”,
https://wearesocial.com/blog/2018 /01/usesocial-media-effectively-media-mix , 2018
- [14]. H.H. Willis, A.R. Morral, T.K.
Kellyand J. Medby. Estimating Terrorism
Risk. MG-388-RC. Santa Monica, CA,
RAND Corporation, 2005
- [15]. A. Chuipka, The Strategies of
Cyberterrorism: Is Cyberterrorism an
effective means to Achieving the Goals of
Terrorists?
https://ruor.uottawa.ca/bitstream/
10393/35695/1/CHUIPKA%2C%20Adam
%2020169.pdf, 2017
- [16]. M. Sreenu. “A General Study on
Cyber-Attacks on Social Networks.” IOSR
Journal of Computer Engineering (IOSRJCE) , vol. 19, no. 5, 2017
- [17]. L. Kyumin, J. Caverlee, James and P.
Calton. “Social spam, campaigns,
misinformation and crowdturfing”, 199-
200. 10.1145/2567948.2577270.
[18]. L. K. Williams. “ How to Prevent
Social Media Spam from Damaging Your
Brand”, 2017
- [19]. Isentia, “How toavoid a social media
campaign disaster”,
https://www.isentia.com/news/blog/ideas/h
ow-to-avoid-a-social-media-campaigndisaster, 2018
- [20]. D. Talbot. “Preventing
Misinformation from Spreading through
Social Media”,
https://www.technologyreview.com/s/5140
56/preventing-misinformation-fromspreading-through-social-media/, 2013.
[21]. Paul Krugman, How to avoid
spreading fake news when big stories
break,
https://mashable.com/201710/03/how-toavoid-spreading-misinformation-online/#,
TY5opc_ Jxmqm, 2017
- [22]. R. Spiegel. “ 3 Ways To Benefit
From Social Media Crowdsourcing”,
Https://Www.Socialmediaexaminer.Com
/3-Ways-To-Do-Social-Media
Crowdsourcing, 2011
- [23]. Preparisi, Social Media Threats.
Https://Www.Americanbar.Org/Content/D
am/Aba/
Events/State_Local_Government/2017/Ho
meland-Security/Social-Media-Threats
Checklist. Pdf, 2017
- [24]. L. Janczewski and A. Colarik, Cyber
warfare and cyber terrorism (1st ed., pp.
13–14). Hershey [Pa.]:Information Science
Reference, 2008.