Socio-technical mitigation effort to combat cyber propaganda: a systematic literature mapping
This systematic mapping literature aims to identify current research and directions for future studies in terms of combating cyber propaganda in the social media, which is used by both human effort and technological approaches (socio-technical) for mitigation. Out of 5176 retrieved articles, only 98...
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English English English |
| Published: |
Institute of Electrical and Electronics Engineers Inc.
2020
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/81362/ http://irep.iium.edu.my/81362/1/81362-Socio-Technical%20Mitigation%20Effort%20to%20Combat%20Cyber.pdf http://irep.iium.edu.my/81362/2/81362-Socio-Technical%20Mitigation%20Effort%20to%20Combat%20Cyber_SCOPUS.pdf http://irep.iium.edu.my/81362/3/81362-Socio-Technical%20Mitigation%20Effort%20to%20Combat%20Cyber_WOS.pdf |
| Summary: | This systematic mapping literature aims to identify current research and directions for future studies in terms of combating cyber propaganda in the social media, which is used by both human effort and technological approaches (socio-technical) for mitigation. Out of 5176 retrieved articles, only 98 of them were selected for primary studies; classified based on research artifacts, mitigation effort, and the social
media platforms involved in the research. The search was conducted using selected databases and applying selection criteria set for this research. Through the analysis, important research trends were identifed based on human effort and technological approaches in mitigating and combating the cyber-propaganda issues. The authors also identifed various mitigation socio-technical approaches such as identi�cation, detection, image recognition, prediction, truth discovery and comprehension of rumours flow. The study also highlights
areas for further improvements, to complement the performances of existing techniques. Besides, the study provides a brief review of cyber propaganda detection using classi�cation techniques. Hence, it has set forth applicable research focus on the areas dealing with the mitigation of risk borne by cyber propaganda in the social media. |
|---|