Advertisement

Case Studies of Deviance in Social Media

  • Samer Al-khateeb
  • Nitin Agarwal
Chapter
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)

Abstract

In this chapter, we provide a high-level view of various case studies that include deviant acts , deviant events , and deviant groups . This chapter utilizes the concepts, tools, and methodologies that we presented throughout this book to study, analyze, and have a better understanding of many real-world deviant events, acts, and groups. Here, we briefly highlight case studies of the work we conducted during many deviant cyber campaigns that were projected against NATO forces. In addition to these cases, we shed light on the deviant cyber campaigns conducted by the so-called Islamic State, also known as ISIL, ISIS, or Daesh . We will highlight the major findings of these cases and point the interested reader for more details to other published literature.

Keywords

Deviance in social media Case studies ISIS ISIL Daesh Anti-NATO propaganda Dragoon ride exercise Crimean water crisis Beheading propaganda 

References

  1. 1.
    A. Pavlishak, Water Supply Problem in Crimea to Cost $247—417 million - Kremlin Aide. Available: http://tass.com/russia/729854
  2. 2.
    R. News, Ukraine Builds Dam Cutting Off Crimea Water Supply. Available: https://www.rt.com/news/158028-ukraine-water-supply-crimea/
  3. 3.
    N. Macfarguhar, Aid Elusive, Crimea Farms Face Hurdles. Available: https://www.nytimes.com/2014/07/08/world/europe/aid-elusive-crimea-farms-face-hurdles.html
  4. 4.
    S. Jerome, Ukraine-Russia Conflict Results in “Water War”. Available: http://www.wateronline.com/doc/ukraine-russia-conflict-results-in-water-war-0001
  5. 5.
    S. Kumar, G. Barbier, M.A. Abbasi, H. Liu, Tweettracker: An analysis tool for humanitarian and disaster relief, in ICWSM. Available: http://bit.ly/2nx4gbc
  6. 6.
    M.A. Smith, B. Shneiderman, N. MilicFrayling, E. Mendes Rodrigues, V. Barash, C. Dunne, T. Capone, A. Perer, E. Gleave, Analyzing (social media) networks with NodeXL, in Proceedings of the Fourth International Conference on Communities and Technologies (ACM, New York, 2009), pp. 255–264. Available: http://dl.acm.org/citation.cfm?id=1556497 Google Scholar
  7. 7.
    S. Al-Khateeb, N. Agarwal, Understanding strategic information manoeuvres in network media to advance cyber operations: a case study analysing pro-Russian separatists’ cyber information operations in Crimean water crisis. J. Baltic Secur. 2(1), 6–27 (2016)CrossRefGoogle Scholar
  8. 8.
    N. Otan, Trident Juncture 2015. Available: https://jfcbs.nato.int/trident-juncture
  9. 9.
    L. Alexander, Open-Source Information Reveals Pro-Kremlin Web Campaign. Available: https://globalvoices.org/2015/07/13/open-source-information-reveals-pro-kremlin-web-campaign/
  10. 10.
    M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn. (CCI, Charleston, 2014). Available: https://inteltechniques.com/book1.html
  11. 11.
    B. Etling, J. Kelly, R. Faris, J. Palfrey, Mapping the Arabic Blogosphere: Politics, Culture, and Dissent, vol. 6. Available: http://www.ikhwanweb.com/uploads/lib/HNFNAB99APYNXAK.pdf
  12. 12.
    S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113Google Scholar
  13. 13.
    S. Al-khateeb, M.N. Hussain, N. Agarwal Leveraging social network analysis and cyber forensics approaches to study cyber propaganda Campaigns, in Social Networks and Surveillance for Society, 1st edn. Lecture Notes in Social Networks (Springer, Cham, 2018) no. 2190–5428, p. 86. Available: https://www.springer.com/us/book/9783319782553
  14. 14.
    D.M.A. DoD News, Operation Atlantic Resolve Exercises Begin in Eastern Europe. Available: http://www.defense.gov/news/newsarticle.aspx?id=128441
  15. 15.
    R. T. ‘Tanks? No Thanks!’: Czechs Unhappy about US Military Convoy Crossing Country. Available: http://www.rt.com/news/243073-czech-protest-us-tanks/
  16. 16.
    D. Sindelar, U.S. Convoy: In Czech Republic, Real-Life Supporters Outnumber Virtual Opponents. Available: http://www.rferl.org/content/us-convoy-czech-republic-supporters-virtual-opponents/26928346.html
  17. 17.
    Sputnik, Czechs Plan Multiple Protests of US Army’s Operation Dragoon Ride. Available: http://sputniknews.com/europe/20150328/1020135278.html
  18. 18.
    S. Ghosh, B. Viswanath, F. Kooti, N.K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, K.P. Gummadi, Understanding and combating link farming in the twitter social network, in Proceedings of the 21st International Conference on World Wide Web (ACM, New York, 2012) pp. 61–70. Available: http://dl.acm.org/citation.cfm?id=2187846 Google Scholar
  19. 19.
    F. Sen, R.T. Wigand, N. Agarwal, M. Mete, R. Kasprzyk, Focal structure analysis in large biological networks, in IPCBEE, ser. 1, vol. 70 (IACSIT, Singapore, 2014). Available: http://www.ipcbee.com/vol70/001-ICEEB2014-E0002.pdf
  20. 20.
    N. Agarwal, S. Al-khateeb, R. Galeano, R. Goolsby, Examining the use of botnets and their evolution in propaganda dissemination. J. Def. Strateg. Commun. 2(2), 87–112 (2017). Available: https://www.stratcomcoe.org/nitin-agarwal-etal-examining-use-botnets-and-their-evolution-propaganda-dissemination CrossRefGoogle Scholar
  21. 21.
    S.A. Tatham. Strategic communication: a primer. Defence Academy of the United Kingdom, Advanced Research and Assessment Group (ARAG) (Dec 30, 2008). Available: https://smallwarsjournal.com/documents/stratcommprimer.pdf
  22. 22.
    C. Staff, ISIS Video Appears to Show Beheadings of Egyptian Coptic Christians in Libya. Available: http://www.cnn.com/2015/02/15/middleeast/isis-video-beheadings-christians/
  23. 23.
    T.n. editorial, ISIL executes an Israeli Arab after accusing him of been an Israeli Spy. Available: http://www.tv7israelnews.com/isil-executes-an-israeli-arab-after-accusing-him-of-been-an-israeli-spy/
  24. 24.
    K. Shaheen, ISIS Video Purports to Show Massacre of Two Groups of Ethiopian Christians. Available: https://www.theguardian.com/world/2015/apr/19/isis-video-purports-to-show-massacre-of-two-groups-of-ethiopian-christians
  25. 25.
    S. Al-khateeb, N. Agarwal, Examining Botnet Behaviors for Propaganda Dissemination: A Case Study of ISIL’s Beheading Videos-Based Propaganda (IEEE, Atlantic, 2015), pp. 51–57.Google Scholar
  26. 26.
    N. Abokhodair, D. Yoo, D.W. McDonald, Dissecting a social botnet: Growth, content and influence in twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (ACM, New York, 2015), pp. 839–851. Available: http://dl.acm.org/citation.cfm?id=2675208 Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Samer Al-khateeb
    • 1
  • Nitin Agarwal
    • 2
  1. 1.Department of Journalism, Media & ComputingCreighton UniversityOmahaUSA
  2. 2.Information Science DepartmentUniversity of Arkansas at Little RockLittle RockUSA

Personalised recommendations