TY - JOUR
T1 - A survey of social cybersecurity
T2 - Techniques for attack detection, evaluations, challenges, and future prospects
AU - Mulahuwaish, Aos
AU - Qolomany, Basheer
AU - Gyorick, Kevin
AU - Abdo, Jacques Bou
AU - Aledhari, Mohammed
AU - Qadir, Junaid
AU - Carley, Kathleen
AU - Al-Fuqaha, Ala
N1 - Publisher Copyright:
© 2025
PY - 2025/5
Y1 - 2025/5
N2 - In today's age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.
AB - In today's age of digital interconnectedness, understanding and addressing the nuances of social cybersecurity have become paramount. Unlike its broader counterparts, information security and cybersecurity, which are focused on safeguarding all forms of sensitive data and digital systems, social cybersecurity places its emphasis on the human and social dimensions of cyber threats. This field is uniquely positioned to address issues such as different social cybersecurity attacks like cyberbullying, cybercrime, spam, terrorist activities, and community detection. The significance of detection methods in social cybersecurity is underscored by the need for timely and proactive responses to these threats. In this comprehensive review, we delve into various techniques, attacks, challenges, potential solutions, and trends within the realm of detecting social cybersecurity attacks. Additionally, we explore the potential of readily available public datasets and tools that could expedite research in this vital domain. Our objective is not only to tackle the existing challenges but also to illuminate potential pathways for future exploration. Through this survey, our primary focus is to provide valuable insights into the rapidly evolving landscape of social cybersecurity. By doing so, we aim to assist researchers and practitioners in developing effective prediction models, enhancing defense strategies, and ultimately fostering a safer digital environment.
KW - Detection
KW - Dynamic network analysis
KW - Social cybersecurity
KW - Social network analysis
UR - https://www.scopus.com/pages/publications/105003727183
U2 - 10.1016/j.chbr.2025.100668
DO - 10.1016/j.chbr.2025.100668
M3 - Review article
AN - SCOPUS:105003727183
SN - 2451-9588
VL - 18
JO - Computers in Human Behavior Reports
JF - Computers in Human Behavior Reports
M1 - 100668
ER -