Social Cyber Forensics Approach to Study Twitter's and Blogs' Influence on Propaganda Campaigns

被引:5
作者
Al-Khateeb, Samer [1 ]
Hussain, Muhammad Nihal [1 ]
Agarwal, Nitin [1 ]
机构
[1] Univ Arkansas Little Rock, Dept Informat Sci, Little Rock, AR 72204 USA
来源
SOCIAL, CULTURAL, AND BEHAVIORAL MODELING | 2017年 / 10354卷
关键词
Cyber propaganda campaign; Misinformation; NATO; Trident Juncture Exercise; Narrative; Influence; Blogs; Twitter; Social media; Social Network Analysis; Cyber forensics; Blogtrackers; Social Cyber Forensics;
D O I
10.1007/978-3-319-60240-0_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In today's information technology age our political discourse is shrinking to fit our smartphone screens. Online Deviant Groups (ODGs) use social media to coordinate cyber propaganda campaigns to achieve strategic and political goals, influence mass thinking, and steer behaviors. In this research, we study the ODGs who conducted cyber propaganda campaigns against NATO's Trident Juncture Exercise 2015 (TRJE 2015) and how they used Twitter and blogs to drive the campaigns. Using a blended Social Network Analysis (SNA) and Social Cyber Forensics (SCF) approaches, "anti-NATO" narratives were identified on blogs. The narratives intensified as the TRJE 2015 approached. The most influential narrative identified by the proposed methodology called for civil disobedience and direct actions against TRJE 2015 specifically and NATO in general. We use SCF analysis to extract metadata associated with propaganda-riddled websites. The metadata helps in the collection of social and communication network information. By applying SNA on the data, we identify influential users and powerful groups (or, focal structures) coordinating the propaganda campaigns. Data for this research (including blogs and metadata) is accessible through our in-house developed Blogtrackers tool.
引用
收藏
页码:108 / 113
页数:6
相关论文
共 12 条
  • [1] Al-khateeb S., 2015, 2015 AAAI SPRING S S
  • [2] Alexander L., 2015, Global Voices
  • [3] Systematic Literature Review on Data Carving in Digital Forensic
    Alherbawi, Nadeem
    Shukur, Zarina
    Sulaiman, Rossilawati
    [J]. 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS (ICEEI 2013), 2013, 11 : 86 - 92
  • [4] [Anonymous], 2008, Proceedings of the International Conference on Web Search and Web Data Mining, ACM
  • [5] Bazzell M., 2014, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, V4th
  • [6] Etling B., 2009, BERKMAN CENT RES PUB, V6
  • [7] Mulazzani M., 2012, 8 ANN IFIP WG, V11
  • [8] Oyeusi K., 2009, Computer Forensics
  • [9] Povar Digambar., 2011, Digital Forensics and Cyber Crime, P137
  • [10] Focal structures analysis: identifying influential sets of individuals in a social network
    Şen F.
    Wigand R.
    Agarwal N.
    Tokdemir S.
    Kasprzyk R.
    [J]. Şen, Fatih (fsen@uthsc.edu), 1600, Springer-Verlag Wien (06):