An Exploration of Disinformation as a Cybersecurity Threat

  title={An Exploration of Disinformation as a Cybersecurity Threat},
  author={Kevin Matthe Caramancion},
  journal={2020 3rd International Conference on Information and Computer Technologies (ICICT)},
  • Kevin Matthe Caramancion
  • Published 2020
  • Computer Science
  • 2020 3rd International Conference on Information and Computer Technologies (ICICT)
Disinformation or "fake news" has continuously proven to be a pervasive threat in the digital space. The spread and persistence of disinformation especially in the social networking media sites currently factors as one of the most challenging threat for users and content administrators alike. Its ecosystem encompasses several attributing factors including but not limited to humans as information users and source, social communication model as its channel, current trust models in place as… Expand
The Organizational Cybersecurity Success Factors: An Exhaustive Literature Review
The authors reviewed the secondary literatures of organizational cybersecurity posture, focusing on five factors: technology design, management procedures, organizational structure, legal environment, and human competencies, showing security technology can be improved with advanced technology, usability, and design process. Expand
On the Importance of Domain-specific Explanations in AI-based Cybersecurity Systems (Technical Report)
This paper proposes a general architecture that can serve as a roadmap for guiding research efforts towards the development of explainable AI-based cybersecurity systems and proposes combinations of several research lines in a novel way towards tackling the unique challenges that arise in this context. Expand
Understanding the Impact of Contextual Clues in Misinformation Detection
To further reduce the pervasiveness of fake news on social networking sites and increase content integrity, an important yet one of the most basic of defenses has be explored—content descriptors.Expand
Understanding the Association of Personal Outlook in Free Speech Regulation and the Risk of being Mis/Disinformed
This paper explores the relationship between a person's outlook on the issues of freedom of speech (IV1), fake news regulation (IV2), and the risk of him/her falling prey to Mis/DisinformationExpand
Text Mining in Cybersecurity
This article proposes a Systematic Literature Review (SLR) to present the application of text mining in the cybersecurity domain, using a systematic protocol to identify 2,196 studies, out of which 83 were summarized. Expand
Predicting the Retweet Level of COVID-19 Tweets with Neural Network Classifier
  • Z. Qu, Zhen Ding
  • Computer Science
  • 2020 IEEE 19th International Conference on Cognitive Informatics & Cognitive Computing (ICCI*CC)
  • 2020
The proposed convolutional neural network based classifier is robust and capable to process tweets of chosen contents/topics and is able to predict whether a given COVID-19 tweet would be more retweeted, or less retweeted. Expand


Cyberdating: Misinformation and (Dis)trust in Online Interactions
  • Hong Wang, Xin-An Lu
  • Sociology, Computer Science
  • Informing Sci. Int. J. an Emerg. Transdiscipl.
  • 2007
An analysis of the media characteristics of cyber space that tend to render information more malleable and the incidence of misinformation more likely reveals that theMedia characteristics of the Internet facilitate easier manipulation of information and increase the occurrence of misinformation. Expand
Garlin Gilchrist: Fighting fake news and the information apocalypse
ABSTRACT In this interview, Garlin Gilchrist II, executive director of the University of Michigan’s new Center for Social Media Responsibility, discusses potential tools for deterring the spread ofExpand
Identifying and Countering Fake News
Fake news has become a controversial, highly contested issue recently. But in the public discourse, “fake news” is often used to refer to several different phenomena. The lack of clarity around whatExpand
Understanding Media: The Extensions of Man
This reissue of Understanding Media marks the thirtieth anniversary (1964-1994) of Marshall McLuhan's classic expose on the state of the then emerging phenomenon of mass media. Terms and phrases suchExpand
A Qualitative Exploration into Voters' Ethical Perceptions of Political Advertising: Discourse, Disinformation, and Moral Boundaries
Political campaign advertising continues to be a controversial policy topic in advertising and marketing research. It is also a prime subject for investigating the ethical evaluations of consumersExpand
Automatic deception detection: Methods for finding fake news
This research surveys the current state‐of‐the‐art technologies that are instrumental in the adoption and development of fake news detection, as well as various formats and genres. Expand
Fake News Filtering: Semantic Approaches
  • V. Klyuev
  • Computer Science
  • 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO)
  • 2018
Different approaches to combat fake news are discussed, used to determine text features utilizing linguistic natural language processing methods, detect spam bots in social networks to isolate those using machine-learning methods, and confirm the facts in online documents by applying techniques used in search engines. Expand
Fake News or Truth? Using Satirical Cues to Detect Potentially Misleading News
Satire is an attractive subject in deception detection research: it is a type of deception that intentionally incorporates cues revealing its own deceptiveness. Whereas other types of fabricationsExpand
Automatic Detection of Fake News
This paper introduces two novel datasets for the task of fake news detection, covering seven different news domains, and conducts a set of learning experiments to build accurate fake news detectors that can achieve accuracies of up to 76%. Expand
Social Identity in Facebook Community Life
The authors examine the tensions experienced by people between assimilation and differentiation with respect to group identities and role identities, and speculate on how social computing environments could more effectively support identity presentation. Expand