Aos Mulahuwaish , Basheer Qolomany , Kevin Gyorick , Jacques Bou Abdo , Mohammed Aledhari , Junaid Qadir , Kathleen Carley , Ala Al-Fuqaha
{"title":"A survey of social cybersecurity: Techniques for attack detection, evaluations, challenges, and future prospects","authors":"Aos Mulahuwaish , Basheer Qolomany , Kevin Gyorick , Jacques Bou Abdo , Mohammed Aledhari , Junaid Qadir , Kathleen Carley , Ala Al-Fuqaha","doi":"10.1016/j.chbr.2025.100668","DOIUrl":null,"url":null,"abstract":"<div><div>In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.</div></div>","PeriodicalId":72681,"journal":{"name":"Computers in human behavior reports","volume":"18 ","pages":"Article 100668"},"PeriodicalIF":4.9000,"publicationDate":"2025-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers in human behavior reports","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2451958825000831","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PSYCHOLOGY, EXPERIMENTAL","Score":null,"Total":0}
引用次数: 0
Abstract
In today’s age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.