Cybersecurity Issues, Hybrid Threats and Social Networks

A special issue of Social Sciences (ISSN 2076-0760).

Deadline for manuscript submissions: closed (15 May 2022) | Viewed by 598

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science, University of Pisa, 56124 Pisa, Italy
Interests: cybersecurity and on its impacts on common goods; technology adoption; international relation; intelligence; low attrition conflicts

E-Mail Website
Guest Editor
Department of Computer Science, University of Pisa, 56124 Pisa, Italy
Interests: blockchain technology; bitcoin transactions graph analysis; blockchain based systems; p2p network monitoring; new crypto techniques for blockchains; social networks; social data analysis; blockchain based social networks

Special Issue Information

Dear Colleagues,

As our lives become more and more digital, cybersecurity is becoming more fundamental. In fact, in a world where every company is a software company, as the CEO of Microsoft repeats, and many commercial and social interactions are mediated by information and communication technology, ICT, trusted infrastructures and trusted personal devices to access these infrastructures are fundamental to interact with our friends, our partners, and social and political institution in a safe way that also preserves our privacy.

Cybersecurity challenges to secure our ICT infrastructures are complex mostly because they sit at the intersection of three domains namely the technological, the legal, and the social one. In particular, the social domain plays a dual role because not only social interactions play a role in cyberattacks but also because the results, the impact, of these attacks target this domain. Important examples are ransomware attacks where a malicious agent exploits technological weaknesses, aka vulnerabilities, to penetrate an ITC infrastructure and control its nodes. When controlling a node, the attacker can destroy all its information or encrypt it and reveal the decryption key only after the payment of a ransom. This attack has become popular also because of laws that legalize cryptocurrency like bitcoin or other currencies with stronger anonymity properties. Furthermore, attackers exploit phishing emails to convince users to click on some malicious link and download malware to penetrate the system. Hence, each of the three domains contributes to the spreading of these attacks and, consequently, to the exponential increase of the amount of ransom. Besides financial impact, ransomware have strong social impacts as well and they range from the unavailability of health services when hospitals are attacker to the manipulation of evoting infrastructure or to the leaking of information on habits and preferences of persons. A further confirmation is the large debate on contact tracing and exposure notification applications that most countries have adopted to contain the current pandemic. It is trivial to understand that the social impact of information leaking from these applications ranges from social stigma to ransom or stalking.  The public sector is particularly vulnerable to cyberattacks due to a patchwork of outdated technology and operating systems across healthcare, education, local and central government. 

The social engineering techniques underlying phishing emails has resulted in a highly debated social issue, namely the spreading of fake news and of deep fakes. By fully exploiting ICT technology and advanced social engineering techniques, the spreading of fake news, mostly when integrated with bots, shows that cyber operations have important impacts and destabilizing effects on humans and societies rather than on machines and data. The wide adoption of bots confirms that the social domain is the kingdom of hybrid threats that integrate both social and technological strategies. Discovering and containing the spreading of fake news is critical for almost any social issue as confirmed by the debate that is delaying the vaccination and helping the spreading.

Taking into account the technological, legal, and social domains, the special issue focuses on security and resilience challenges and it is interested in papers that address at least one of the domains but with a preference for those that investigate topics at the intersection of domains.

Prof. Dr. Fabrizio Baiardi
Dr. Laura Ricci
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a double-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Social Sciences is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • cybersecurity issues
  • hybrid threats
  • social networks
  • cyber attacks
  • vulnerability
  • weakness
  • social engineering
  • robustness
  • resilience
  • network cascade

Published Papers

There is no accepted submissions to this special issue at this moment.
Back to TopTop