최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal on baltic security, v.2 no.1, 2016년, pp.6 - 27
Al-Khateeb, Samer (Maulden-Entergy Chair Professor of Information Science University of Arkansas at Little Rock, United States of America) , Agarwal, Nitin (Maulden-Entergy Chair Professor of Information Science University of Arkansas at Little Rock, United States of America)
AbstractThe inexpensive nature and wide availability of emerging media outlets, e.g. social networking sites and blogs makes them easy-to-use weapons, giving power and courage to individuals to form groups that are able to win or at least force concessions from stronger forces. Today, terrorist groups know that opinions can be influenced using networked media and this knowledge empowers and enables them to alienate their audience and sometimes provoke them into violent actions. To understand the strategic information manoeuvres used by such groups, e.g., trans-national terrorist groups, we study the channels (blogs, Twitter, etc.) and methods (e.g., influential actors/groups) they use to disseminate messages pertaining to recruitment, radicalization, and raising funds. We collect data from several sources, including over 130 blog websites known for pro-Russian propaganda for events such as the Crimean water crisis and Trident Juncture Exercise (TRJE 15). In addition to blogs, we collect data from Twitter for the above-mentioned events to study the crossinfluence of various social media platforms in conducting strategic information manoeuvres. The study shows that groups are able to spread their opinions and create emotional attitudes for their followers through the sophisticated and blended use of these network media platforms via powerful actors, trolls, and botnets. We design social and network science informed methodologies to study the sociotechnical behaviours of trolls and botnets and develop detection tools ready to be deployed for Cyber operations. The tools have been further tested in the information operations of ISIL, e.g., beheading of hostages in orange jump suits. This study helps identifying the actions needed to win this “battle of ideas”.
Allen, M., 2014. Kremlin’s “social media takeover”: Cold War tactics fuel Ukraine crisis [WWW Document]. Democr. Dig. Natl. Endow. Democr. URL http://www.demdigest.net/blog/kremlins-social-mediatakeover-cold-war-tactics-fuel-ukraine-crisis/ (accessed 5.27.15).
BBC, N., 2014. Russia fears Crimea water shortage as supply drops [WWW Document]. BBC News. URL http://www.bbc.com/news/world-europe-27155885 (accessed 5.27.14).
Berger, J.M., 2015. How ISIS Succeeds on Social Media Where #StopKony Fails [WWW Document]. The Atlantic. URL http://www.theatlantic.com/international/archive/2015/03/how-isis-succeeds-where-stopkony-fails/387859/ (accessed 5.27.15).
Berger, J.M., 2014. How ISIS Games Twitter: The militant group that conquered northern Iraq is deploying a sophisticated socialmedia strategy [WWW Document]. The Atlantic. URL http://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media-strategy/372856/ (accessed 5.27.15).
Bohlen, C., 2014. Cold War Media Tactics Fuel Ukraine Crisis [WWW Document]. The Times. URL http://www.nytimes.com/2014/03/11/world/europe/cold-warmedia-tactics-fuel-ukraine-crisis.html (accessed 5.27.15).
Boshmaf, Y., Muslukhov, I., Beznosov, K., Ripeanu, M., 2012. Key challenges in defending against malicious socialbots, in: Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats. USENIX Association.
Carter, J.A., Maher, S., Neumann, P.R., 2014. #Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks. The International Center for the Study of Radicalization and Political Violence (ICSR).
Dye, J., Finkle, J., 2013. US Charges Eight in $45 Million Cybercrime Scheme [WWW Document]. CNBC. URL http://www.cnbc.com/id/100724220#. (accessed 5.6.15).
10.1073/pnas.122653799 Girvan, M., Newman, M.E.J., 2002. Community structure in social and biological networks. Proc. Natl. Acad. Sci. U. S. Am. 99. doi:10.1073/pnas.122653799
Hall, J., 2014. “U dont need much, u get wages here, u get food provided and place to stay”: The rough travel guide British ISIS fighters are using to lure fellow Britons in to waging Jihad in Iraq. [WWW Document]. Dly. Mail. URL http://www.dailymail.co.uk/news/article-2661177/Travel-lightleave-Islamic-books-home-dont-arouse-suspicion-Isis-militantsoffer-travel-advice-jihadists-arriving-Syria-Iraq-Britain.html (accessed 5.27.15).
Hoke, Z., Babb, C., 2015. FBI Investigating Cyber Attack on US Central Command. Voice Am. URL http://www.voanews.com/content/us-centcom-twitter-hackedapparently-by-is-group/2595139.html (accessed 5.6.15).
Karasaridis, A., Rexroad, B., Hoeflin, D., 2007. Wide-scale botnet detection and characterization, in: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets. Cambridge, MA.
Kumar, S., Barbier, G., Abbasi, M.A., Liu, H., 2011. TweetTracker: An Analysis Tool for Humanitarian and Disaster Relief., in: ICWSM.
Nissen, T.E., 2015. #TheWeaponizationOfSocialMedia.
Protalinski, E., 2012. Facebook: 5-6% of accounts are fake [WWW Document]. ZDNet. URL http://www.zdnet.com/article/facebook-5-6-of-accounts-arefake/ (accessed 5.8.15).
10.1145/2501654.2501659 Rodriguez-Gomez, R.A., Macia-Fernandez, G., Garcia-Teodoro, P., 2013. Survey and taxonomy of botnet research through lifecycle. ACM Comput. Surv. CSUR 45, 45.
Sindelar, D., 2014. The Kremlin’s Troll Army [WWW Document]. TheAtlantic. URL http://www.theatlantic.com/international/archive/2014/08/the-kremlins-troll-army/375932/ (accessed 5.6.15).
Tatham, S.A., Defence Academy of the United Kingdom, Advanced Research and Assessment Group, 2008. Strategic communication: a primer. Defence Academy of the United Kingdom, Advanced Research and Assessment Group, Shrivenham.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.