A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects

In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cyb...

Full description

Saved in:
Bibliographic Details
Main Authors: Aos Mulahuwaish, Basheer Qolomany, Kevin Gyorick, Jacques Bou Abdo, Mohammed Aledhari, Junaid Qadir, Kathleen Carley, Ala Al-Fuqaha
Format: Article
Language:English
Published: Elsevier 2025-05-01
Series:Computers in Human Behavior Reports
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2451958825000831
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849688239196078080
author Aos Mulahuwaish
Basheer Qolomany
Kevin Gyorick
Jacques Bou Abdo
Mohammed Aledhari
Junaid Qadir
Kathleen Carley
Ala Al-Fuqaha
author_facet Aos Mulahuwaish
Basheer Qolomany
Kevin Gyorick
Jacques Bou Abdo
Mohammed Aledhari
Junaid Qadir
Kathleen Carley
Ala Al-Fuqaha
author_sort Aos Mulahuwaish
collection DOAJ
description In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.
format Article
id doaj-art-5d6028e496484a1686a5d60f1bbf0321
institution DOAJ
issn 2451-9588
language English
publishDate 2025-05-01
publisher Elsevier
record_format Article
series Computers in Human Behavior Reports
spelling doaj-art-5d6028e496484a1686a5d60f1bbf03212025-08-20T03:22:04ZengElsevierComputers in Human Behavior Reports2451-95882025-05-011810066810.1016/j.chbr.2025.100668A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospectsAos Mulahuwaish0Basheer Qolomany1Kevin Gyorick2Jacques Bou Abdo3Mohammed Aledhari4Junaid Qadir5Kathleen Carley6Ala Al-Fuqaha7Department of Computer Science and Information Systems, Saginaw Valley State University, University Center, 48710, USA; Corresponding author.Department of Medicine, College of Medicine, Howard University, Washington D.C. 20059, USADepartment of Computer Science and Information Systems, Saginaw Valley State University, University Center, 48710, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH 45221, USADepartment of Data Science, University of North Texas, Denton, TX 76207, USAComputer Science and Engineering Department, Qatar University, Doha, QatarSchool of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, USAInformation and Computing Technologies (ICT) Division, College of Science and Engineering (CSE), Hamad Bin Khalifa University, Doha, QatarIn today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.http://www.sciencedirect.com/science/article/pii/S2451958825000831Social cybersecurityDetectionSocial network analysisDynamic network analysis
spellingShingle Aos Mulahuwaish
Basheer Qolomany
Kevin Gyorick
Jacques Bou Abdo
Mohammed Aledhari
Junaid Qadir
Kathleen Carley
Ala Al-Fuqaha
A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
Computers in Human Behavior Reports
Social cybersecurity
Detection
Social network analysis
Dynamic network analysis
title A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
title_full A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
title_fullStr A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
title_full_unstemmed A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
title_short A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
title_sort survey of social cybersecurity techniques for attack detection evaluations challenges and future prospects
topic Social cybersecurity
Detection
Social network analysis
Dynamic network analysis
url http://www.sciencedirect.com/science/article/pii/S2451958825000831
work_keys_str_mv AT aosmulahuwaish asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT basheerqolomany asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT kevingyorick asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT jacquesbouabdo asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT mohammedaledhari asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT junaidqadir asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT kathleencarley asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT alaalfuqaha asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT aosmulahuwaish surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT basheerqolomany surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT kevingyorick surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT jacquesbouabdo surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT mohammedaledhari surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT junaidqadir surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT kathleencarley surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects
AT alaalfuqaha surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects