CYBER TERRORISM THROUGH SOCIAL MEDIA: A CATEGORICAL BASED PREVENTIVE APPROACH

CYBER TERRORISM THROUGH SOCIAL MEDIA: A CATEGORICAL BASED PREVENTIVE APPROACH

This paper deals with the categorical cyber terrorism threats on social media and preventive approach to minimize their issues. While dealing with the threat of cyber terrorism in social media, The United Nations Office for Drug and Crime UNODC categorical approach propaganda, financing, training, planning, execution, and cyber attacks are determined. In order to prevent, social spam, campaigns, misinformation,crowdturfing, and other practical techniques were mentioned with measures to be taken.

___

  • [1]. L. Kirichenko, T. Radivilova, and A. Carlsson. “Detecting cyber threats through social network analysis: short survey.” CoRR abs/1805.06680, 2018.
  • [2]. R. B. Broadhurst, Chapman-Schmidt, D. Maxim, S. Orlando, B. Sabol, and H. Woodford-Smith. “Cyber Terrorism: Research Review”, Australian National University, Cybercrime Observatory, Canberra, DOI: 10.13140/RG.2.2.19282.96964, 2017
  • [3]. J.K. Kimutai. “Social. Media and National Security Threats: A Case Study of Kenya”, http://www.erepository.uonbi.ac. ke/ bitstream/handle /11295/76667/ Kimutai_Social%20 Medi %20And%20 National%20Security%20Threats%20A%2 0 Case%20 Study%20Of%20Kenya.pdf? sequence=4,2014 (Article)
  • [4]. A Montagnese.“Impact of social media on National Security”,Published MA Thesis. University of Rome, 2012
  • [5]. W. Marcellino, L.M. Smith, C. Paul, L. Skrabala. Monitoring Social Media, https://www.rand.org/content/dam/rand/ pubs/research_ reports/RR1700/RR1742/ RAND_RR1742.pdf, 2017 (Report)
  • [6]. D. Prakash, S. Surendran., “Detection and Analysis of Hidden Activities in Social Networks”, IJCA, Volume 77 – No.16, 2013
  • [7]. R. Littlefield. “Cyber Terrorism: understanding and preventing acts of terror within our cyber space”, https://littlefield.co/cyber-terrorismunderstanding-and-preventing-acts-ofterror-within-our-cyber-space26ae6d53cfbb , 2017 (Article)
  • [8]. S. Narula, N. Jindal. “Social Media, Indian Youth and Cyber Terrorism Awareness: A Comparative Analysis”. J Mass Communicat Journalism 5:246. doi:10.4172/2165-7912.1000246, 2017
  • [9]. A. Aly, S. Macdonald, L. Jarvis and T. M. Chen. “Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization”, Studies in Conflict & Terrorism, 40:1, 19, DOI: 10.1080/1057610X.2016.1157402, 2017
  • [10]. D. Galinec, D. Možnik and B. Guberina. “Cybersecurity and cyber defence: national level strategic approach”, Automatika, 58:3, 273-286, DOI: 10.1080/00051144.2017.1407022, 2017
  • [11]. United Nations Office on Drugs and CrimeThe use of the internet for terrorist purposes. United Nations Office on Drugs and Crime, pp.3-13. Available at: https://www.unodc.org/documents/frontpa ge/Use_of_Internet_for_Terrorist_Purpose s.pdf, 2012.
  • [12]. K. Shaffer. “ 10 ways to get started fighting internet propaganda”, https://pushpullfork.com/getting-startedfighting-internet-propaganda/, 2017
  • [13]. M. Nazır. “How To Use Socıal Medıa Effectıvely In “The Medıa Mıx”, https://wearesocial.com/blog/2018 /01/usesocial-media-effectively-media-mix , 2018
  • [14]. H.H. Willis, A.R. Morral, T.K. Kellyand J. Medby. Estimating Terrorism Risk. MG-388-RC. Santa Monica, CA, RAND Corporation, 2005
  • [15]. A. Chuipka, The Strategies of Cyberterrorism: Is Cyberterrorism an effective means to Achieving the Goals of Terrorists? https://ruor.uottawa.ca/bitstream/ 10393/35695/1/CHUIPKA%2C%20Adam %2020169.pdf, 2017
  • [16]. M. Sreenu. “A General Study on Cyber-Attacks on Social Networks.” IOSR Journal of Computer Engineering (IOSRJCE) , vol. 19, no. 5, 2017
  • [17]. L. Kyumin, J. Caverlee, James and P. Calton. “Social spam, campaigns, misinformation and crowdturfing”, 199- 200. 10.1145/2567948.2577270. [18]. L. K. Williams. “ How to Prevent Social Media Spam from Damaging Your Brand”, 2017
  • [19]. Isentia, “How toavoid a social media campaign disaster”, https://www.isentia.com/news/blog/ideas/h ow-to-avoid-a-social-media-campaigndisaster, 2018
  • [20]. D. Talbot. “Preventing Misinformation from Spreading through Social Media”, https://www.technologyreview.com/s/5140 56/preventing-misinformation-fromspreading-through-social-media/, 2013. [21]. Paul Krugman, How to avoid spreading fake news when big stories break, https://mashable.com/201710/03/how-toavoid-spreading-misinformation-online/#, TY5opc_ Jxmqm, 2017
  • [22]. R. Spiegel. “ 3 Ways To Benefit From Social Media Crowdsourcing”, Https://Www.Socialmediaexaminer.Com /3-Ways-To-Do-Social-Media Crowdsourcing, 2011
  • [23]. Preparisi, Social Media Threats. Https://Www.Americanbar.Org/Content/D am/Aba/ Events/State_Local_Government/2017/Ho meland-Security/Social-Media-Threats Checklist. Pdf, 2017
  • [24]. L. Janczewski and A. Colarik, Cyber warfare and cyber terrorism (1st ed., pp. 13–14). Hershey [Pa.]:Information Science Reference, 2008.