Social network behavior and public opinion manipulation

L Chen, J Chen, C Xia - Journal of Information Security and Applications, 2022 - Elsevier
The scope of cyberspace weapons is expanding from the physical network domain to the
cognitive information domain. Technologies such as network penetration, public opinion …

Cyber-enabled influence operations as a 'center of gravity'in cyberconflict: The example of Russian foreign interference in the 2016 US federal election

J Vićić, E Gartzke - Journal of Peace Research, 2024 - journals.sagepub.com
Russia's cyber-enabled influence operations (CEIO) have garnered significant public,
academic and policy interest. 126 million Americans were reportedly exposed to Russia's …

Troll and divide: the language of online polarization

A Simchon, WJ Brady, JJ Van Bavel - PNAS nexus, 2022 - academic.oup.com
The affective animosity between the political left and right has grown steadily in many
countries over the past few years, posing a threat to democratic practices and public health …

The past, present, and future of Russia's cyber strategy and forces

B Lilly, J Cheravitch - 2020 12th International Conference on …, 2020 - ieeexplore.ieee.org
Russian cyberattacks against military and civilian infrastructure in the West have become a
persistent challenge. Despite the importance of this topic and the excellent scholarship …

A tale of two cybers-how threat reporting by cybersecurity firms systematically underrepresents threats to civil society

L Maschmeyer, RJ Deibert… - Journal of Information …, 2021 - Taylor & Francis
Public and academic knowledge of cyber conflict relies heavily on data from commercial
threat reporting. There are reasons to be concerned that these data provide a distorted view …

Towards a typology of non-state actors in 'hybrid warfare': proxy, auxiliary, surrogate and affiliated forces

V Rauta - Cambridge Review of International Affairs, 2020 - Taylor & Francis
This article presents a typology of armed non-state actors in hybrid warfare: proxy, auxiliary,
surrogate and affiliated forces. By focusing on the kinetic domain of hybrid warfare, the …

Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …

Destruct, direct and suppress: Sputnik narratives on the Nordic countries

E Deverell, C Wagnsson, EK Olsson - The Journal of International …, 2021 - Taylor & Francis
Projection of strategic narratives to gain competitive advantages is a central feature in the
global competition for status and power. This article presents a comparative narrative …

Cyber Operations during the Russo-Ukrainian War

GB Mueller, B Jensen, B Valeriano, RC Maness… - Center for Strategic Int …, 2023 - JSTOR
• The merits of cyber operations continue to be their utility as a tool of political warfare
because they facilitate an engagement short of war that leverages covert action …

[图书][B] Social media and international relations

S Kreps - 2020 - cambridge.org
The 2016 US election highlighted the potential for foreign governments to employ social
media for strategic advantages, but the particular mechanisms through which social media …