Received:
2023-02-11 | Accepted:
2023-06-14 | Published:
2023-06-30
Title
The risks of misusing social networks in the context of hybrid threat
Abstract
The world today is ceaselessly under the influence of changing conditions and threats. The contemporary digital age enables the provision of information that serves not only as common information but also as disinformation and hoaxes. This risk is high, specifically on social networks, dramatically impacting society. The paper's main objective is to point out the danger of misusing social networks to spread disinformation as a hybrid threat to influence people's thinking and behaviour, thus endangering democratic processes in developed democratic countries. The study, which focused on the risks of misusing social networks, was conducted using the questionnaire method and was subsequently assessed using statistical tests. The results indicate no link between age and the ability to distinguish desinformation, and that age does not influence the effects of disinformation. However, we did find the opposite result in terms of education, where people with lower education share hoaxes and disinformation more. Alternative media, whose posts are shared by more than 20% of social network users, have a relatively strong presence in our environment. The possibilities of spreading disinformation are also evident in the social impacts on users, who, according to our study, fear lowering their economic well-being. The study focuses on the effects of social networks on individuals' thinking and behaviour. Because we consider this issue insufficiently studied thus far, attention must also be paid to it in the future.
Keywords
disinformation, hoaxes, social impacts, social networks, economic well-being
JEL classifications
H55
, O35
, Z13
URI
http://jssidoi.org/jesi/article/1097
DOI
Pages
357-371
Funding
The contribution was created as a result of the project: Research of educational concepts in the field of hybrid threats within selected EU countries with the subsequent elaboration of the education concept for SR conditions project code in ITMS2014+: 314011CDW7
This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License
References
Alguliyev, R., Aliguliyev, R., & Yusifov, F. (2018). Role of social networks in E-government: Risks and security threats. Online Journal of Communication and Media Technologies, 8(4), 363-376. https://doi.org/10.12973/ojcmt/3957
Search via ReFindit
Aral, S. (2020). The Hype Machine: How Social Media Disrupts Our Elections, Our Economy, and Our Health—and How We Must Adapt. Currency. ISBN 978-0-525-57451-4.
Search via ReFindit
Atkinson, C., & Chiozza, G. (2021). Hybrid threats and the erosion of democracy from within: US surveillance and European security. Chinese Political Science Review, 6(1), 119-142. https://doi.org/10.1007/s41111-020-00161-2
Search via ReFindit
Bondar-Pidhurska, O.V., Karangwa, Ch., & Ammar, A.O.A. (2022). Management of competitiveness of enterprises in conditions of hybrid threats of sustainable development: innovative technologies and ecosconsciousness. 2022. http://dspace.puet.edu.ua/handle/123456789/11588
Search via ReFindit
Dino, C., & Gustilo, L. (2018). FB Digitalking: Standard, Non-Standard, or Hybrid? 3rd International Conference on Education (ICOED). Melaka, Malaysia, 24(11), 8328-8331. https://doi.org/10.1166/asl.2018.12554
Search via ReFindit
Dragos, V., Forrester, B., & Rein, K. (2020). Is hybrid AI suited for hybrid threats? Insights from social media analysis. 2020 IEEE 23rd International Conference on Information Fusion (FUSION). IEEE, 2020. p. 1-7. https://doi.org/10.23919/FUSION45008.2020.9190465
Search via ReFindit
Fire, M., Goldschmidt, R. & Elovici, Y. (2014). Online social networks: threats and solutions. IEEE Communications Surveys & Tutorials, 16(4), 2019-2036. https://doi.org/10.1109/COMST.2014.2321628
Search via ReFindit
Garton, L., Haythornthwaite, C., & Wellman, B. 2006). Studying Online Social Networks. Journal of Computer-Mediated Communication, 3(1) https://doi.org/10.1111/j.1083-6101.1997.tb00062.x
Search via ReFindit
Hawi, N. S., & Samaha, M. (2017). The Relations among Social Media Addiction, Self-Esteem, and Life Satisfaction in University Students. Social Science Computer Review, 35(5), 576–586. https://doi.org/10.1177/0894439316660340
Search via ReFindit
Kaiková, O., et al. (2022). Hybrid threats against Industry 4.0: adversarial training of resilience. In: E3S Web of Conferences. EDP Sciences, 2022. https://doi.org/10.1051/e3sconf/202235303004
Search via ReFindit
Kirichenko, L., Radivilova, T. & Carlsson, A. (2018). Detecting cyber threats through social network analysis: short survey. arXiv preprint arXiv:1805.06680, 2018. https://doi.org/10.48550/arXiv.1805.06680
Search via ReFindit
Linkov, I., et al. (2019). Applying resilience to hybrid threats. IEEE Security & Privacy, 17(5), 78-83. https://doi.org/10.1109/MSEC.2019.2922866
Search via ReFindit
Lonardo, L., (2021). EU law against hybrid threats: A first assessment. European Papers-A Journal on Law and Integration, 6(2), 1075-1096. https://doi.org/10.15166/2499-8249/514
Search via ReFindit
Lukáčová. J., (2019). Hybridné hrozby a ich vplyv na bezpečnostné prostredie - teória, vývoj, prax. Vojenské reflexie. Liptovský Mikuláš: Akadémia ozbrojených síl M.R. Štefánika. 2020, XV, no. 1/2020. ISSN: 1336-9202.
Search via ReFindit
Luo, T., Chen, W., & Liao, Y.H. (2021). Social media use in China before and during COVID-19: Preliminary results from an online retrospective survey. Journal of Psychiatric Research, 140, 35-38. https://doi.org/10.1016/j.jpsychires.2021.05.057
Search via ReFindit
Mareš, M., & Mlejnková, P. (2023). Pan-Slavism and Slavophilia in the Czech Republic within the Context of Hybrid Threats. In: Pan-Slavism and Slavophilia in Contemporary Central and Eastern Europe: Origins, Manifestations and Functions. Cham: Springer International Publishing, p. 309-327. https://doi.org/10.1007/978-3-031-17875-7_15
Search via ReFindit
Milbradt, D., et al. (2023). A Hybrid Robust Adaptive Sliding Mode Controller for partially modelled systems: Discrete-time Lyapunov stability analysis and application. Nonlinear Analysis: Hybrid Systems, 48, 101333. https://doi.org/10.1016/j.nahs.2023.101333
Search via ReFindit
O'Brolcháin, F., Jacquemard, T., Monaghan, D. et al. (2016). The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy. Science and Engineering Ethics, 22, 1-29. https://doi.org/10.1007/s11948-014-9621-1
Search via ReFindit
Palau-Sampio, D., Carratala, A., Tarullo, R., & Crisostomo, P. (2022) Quality recognition as a prescriber against disinformation. Comunicar, 30(72). https://doi.org/10.3916/C72-2022-05
Search via ReFindit
Paradowski, M., Andrzej Jarynowski, A., Jelińska, M& Czopek, K (2021). Out-of-class peer interactions matter for second language acquisition during short-term overseas sojourns: The contributions of Social Network Analysis. Language Teaching, 54(1), 12-24. https://doi.org/10.1017/S0261444820000580
Search via ReFindit
Pathe Duarte, F., (2020). Non-kinetic hybrid threats in Europe–the Portuguese case study (2017-18). Transforming Government: People, Process and Policy, 14(3), 433-451. https://doi.org/10.1108/TG-01-2020-0011
Search via ReFindit
Rainie, L., & Wellman, B. (2012). Networked: The New Social Operating System. Cambridge, Mass.: MIT Press. ISBN 978-0262017190. https://doi.org/10.7551/mitpress/8358.001.0001
Search via ReFindit
Sadeghian, A., Zamani, M., & Shanmugam, B (2013). Security threats in online social networks. In: 2013 International Conference on Informatics and Creative Multimedia. IEEE, p. 254-258. https://doi.org/10.1109/ICICM.2013.50
Search via ReFindit
Sheoran, S., K., & Yadav, P. (2021). An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset. International Journal of Computer Science and Network Security, 21(1), 97-106, https://doi.org/10.22937/IJCSNS.2021.21.1.14
Search via ReFindit
Tagarev, T, & Sharkov, G. (2016). Multi-stakeholder Approach to Cybersecurity and Resilience. Information & Security: An International Journal, 34(1), 59-68. https://doi.org/10.11610/isij.3404
Search via ReFindit
Treverton, G.F. (2018). The intelligence challenges of hybrid threats: Focus on cyber and virtual realm. 2018. ISBN 978-91-86137-75-5
Search via ReFindit
Treverton, G.F. et al. (2018). Addressing hybrid threats. ISBN 978-91-86137-73-1
Search via ReFindit
Tvaronavičienė, M., Plėta, T., Della Casa, S., & Latvys, J. (2020). Cyber security management of critical energy infrastructure in national cybersecurity strategies: cases of USA, UK, France, Estonia and Lithuania. Insights into Regional Development, 2(4), 802-.813. http://doi.org/10.9770/IRD.2020.2.4(6)
Search via ReFindit
Winkler, S., Körner, A., & Breitenecker, F. (2021). Modelling framework for artificial hybrid dynamical systems. Nonlinear Analysis: Hybrid Systems, 42, 101072. https://doi.org/10.1016/j.nahs.2021.101072
Search via ReFindit