A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects
In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cyb...
Saved in:
| Main Authors: | , , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2025-05-01
|
| Series: | Computers in Human Behavior Reports |
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2451958825000831 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849688239196078080 |
|---|---|
| author | Aos Mulahuwaish Basheer Qolomany Kevin Gyorick Jacques Bou Abdo Mohammed Aledhari Junaid Qadir Kathleen Carley Ala Al-Fuqaha |
| author_facet | Aos Mulahuwaish Basheer Qolomany Kevin Gyorick Jacques Bou Abdo Mohammed Aledhari Junaid Qadir Kathleen Carley Ala Al-Fuqaha |
| author_sort | Aos Mulahuwaish |
| collection | DOAJ |
| description | In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment. |
| format | Article |
| id | doaj-art-5d6028e496484a1686a5d60f1bbf0321 |
| institution | DOAJ |
| issn | 2451-9588 |
| language | English |
| publishDate | 2025-05-01 |
| publisher | Elsevier |
| record_format | Article |
| series | Computers in Human Behavior Reports |
| spelling | doaj-art-5d6028e496484a1686a5d60f1bbf03212025-08-20T03:22:04ZengElsevierComputers in Human Behavior Reports2451-95882025-05-011810066810.1016/j.chbr.2025.100668A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospectsAos Mulahuwaish0Basheer Qolomany1Kevin Gyorick2Jacques Bou Abdo3Mohammed Aledhari4Junaid Qadir5Kathleen Carley6Ala Al-Fuqaha7Department of Computer Science and Information Systems, Saginaw Valley State University, University Center, 48710, USA; Corresponding author.Department of Medicine, College of Medicine, Howard University, Washington D.C. 20059, USADepartment of Computer Science and Information Systems, Saginaw Valley State University, University Center, 48710, USASchool of Information Technology, University of Cincinnati, Cincinnati, OH 45221, USADepartment of Data Science, University of North Texas, Denton, TX 76207, USAComputer Science and Engineering Department, Qatar University, Doha, QatarSchool of Computer Science, Carnegie Mellon University, Pittsburgh, PA 15213, USAInformation and Computing Technologies (ICT) Division, College of Science and Engineering (CSE), Hamad Bin Khalifa University, Doha, QatarIn today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.http://www.sciencedirect.com/science/article/pii/S2451958825000831Social cybersecurityDetectionSocial network analysisDynamic network analysis |
| spellingShingle | Aos Mulahuwaish Basheer Qolomany Kevin Gyorick Jacques Bou Abdo Mohammed Aledhari Junaid Qadir Kathleen Carley Ala Al-Fuqaha A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects Computers in Human Behavior Reports Social cybersecurity Detection Social network analysis Dynamic network analysis |
| title | A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects |
| title_full | A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects |
| title_fullStr | A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects |
| title_full_unstemmed | A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects |
| title_short | A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects |
| title_sort | survey of social cybersecurity techniques for attack detection evaluations challenges and future prospects |
| topic | Social cybersecurity Detection Social network analysis Dynamic network analysis |
| url | http://www.sciencedirect.com/science/article/pii/S2451958825000831 |
| work_keys_str_mv | AT aosmulahuwaish asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT basheerqolomany asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT kevingyorick asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT jacquesbouabdo asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT mohammedaledhari asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT junaidqadir asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT kathleencarley asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT alaalfuqaha asurveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT aosmulahuwaish surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT basheerqolomany surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT kevingyorick surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT jacquesbouabdo surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT mohammedaledhari surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT junaidqadir surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT kathleencarley surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects AT alaalfuqaha surveyofsocialcybersecuritytechniquesforattackdetectionevaluationschallengesandfutureprospects |