Optimum control model of Malicious news spread on Social networks having Hidden accounts

Extremists are increasingly using social media to recruit and radicalize other users and increase their money. Terrorists can use popular social networks accounts and perform their activities in a hidden way. So, it is crucial to create a fruitful mechanism for controlling the spread of misinformati...

Full description

Saved in:
Bibliographic Details
Main Authors: Ankur Jain, Joydip Dhar
Format: Article
Language:English
Published: Elsevier 2024-12-01
Series:Results in Control and Optimization
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2666720724000985
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850115340230459392
author Ankur Jain
Joydip Dhar
author_facet Ankur Jain
Joydip Dhar
author_sort Ankur Jain
collection DOAJ
description Extremists are increasingly using social media to recruit and radicalize other users and increase their money. Terrorists can use popular social networks accounts and perform their activities in a hidden way. So, it is crucial to create a fruitful mechanism for controlling the spread of misinformation. Otherwise, a large number of people can mislead by this terrorist activity by joining them. Here, we propose malicious news spreading model incorporating hidden attackers of a social network. A threshold is defined for deciding the extinction of malicious news from a social network. Here, we show the importance of network alertness and activity of cybersecurity agencies in the modified model. Moreover, we obtained the optimal values of the control parameters for emergencies.
format Article
id doaj-art-674ff852f0604ecdb10833792fa4c6fc
institution OA Journals
issn 2666-7207
language English
publishDate 2024-12-01
publisher Elsevier
record_format Article
series Results in Control and Optimization
spelling doaj-art-674ff852f0604ecdb10833792fa4c6fc2025-08-20T02:36:35ZengElsevierResults in Control and Optimization2666-72072024-12-011710046810.1016/j.rico.2024.100468Optimum control model of Malicious news spread on Social networks having Hidden accountsAnkur Jain0Joydip Dhar1Department of Mathematics and Statistics, School of Basic Sciences, Manipal University, Jaipur, India; Corresponding author.Department of Applied Sciences, ABV-Indian Institute of Information Technology and Management, Gwalior 474015, M.P., IndiaExtremists are increasingly using social media to recruit and radicalize other users and increase their money. Terrorists can use popular social networks accounts and perform their activities in a hidden way. So, it is crucial to create a fruitful mechanism for controlling the spread of misinformation. Otherwise, a large number of people can mislead by this terrorist activity by joining them. Here, we propose malicious news spreading model incorporating hidden attackers of a social network. A threshold is defined for deciding the extinction of malicious news from a social network. Here, we show the importance of network alertness and activity of cybersecurity agencies in the modified model. Moreover, we obtained the optimal values of the control parameters for emergencies.http://www.sciencedirect.com/science/article/pii/S2666720724000985Hidden attackBasic influence numberNetwork alertnessUser characteristicsPontryagin’s maximum principle
spellingShingle Ankur Jain
Joydip Dhar
Optimum control model of Malicious news spread on Social networks having Hidden accounts
Results in Control and Optimization
Hidden attack
Basic influence number
Network alertness
User characteristics
Pontryagin’s maximum principle
title Optimum control model of Malicious news spread on Social networks having Hidden accounts
title_full Optimum control model of Malicious news spread on Social networks having Hidden accounts
title_fullStr Optimum control model of Malicious news spread on Social networks having Hidden accounts
title_full_unstemmed Optimum control model of Malicious news spread on Social networks having Hidden accounts
title_short Optimum control model of Malicious news spread on Social networks having Hidden accounts
title_sort optimum control model of malicious news spread on social networks having hidden accounts
topic Hidden attack
Basic influence number
Network alertness
User characteristics
Pontryagin’s maximum principle
url http://www.sciencedirect.com/science/article/pii/S2666720724000985
work_keys_str_mv AT ankurjain optimumcontrolmodelofmaliciousnewsspreadonsocialnetworkshavinghiddenaccounts
AT joydipdhar optimumcontrolmodelofmaliciousnewsspreadonsocialnetworkshavinghiddenaccounts