{"id":"https://openalex.org/W2464902085","doi":"https://doi.org/10.1109/cycon.2016.7529429","title":"The social side of \u2018cyber power\u2019? Social media and cyber operations","display_name":"The social side of \u2018cyber power\u2019? Social media and cyber operations","publication_year":2016,"publication_date":"2016-05-01","ids":{"openalex":"https://openalex.org/W2464902085","doi":"https://doi.org/10.1109/cycon.2016.7529429","mag":"2464902085"},"language":"en","primary_location":{"id":"doi:10.1109/cycon.2016.7529429","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2016.7529429","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2803669","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5033134106","display_name":"Drew Herrick","orcid":null},"institutions":[{"id":"https://openalex.org/I193531525","display_name":"George Washington University","ror":"https://ror.org/00y4zzh67","country_code":"US","type":"education","lineage":["https://openalex.org/I193531525"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Drew Herrick","raw_affiliation_strings":["Department of Political Science, George Washington University, Washington D.C., USA","George Washington University Department of Political Science"],"affiliations":[{"raw_affiliation_string":"Department of Political Science, George Washington University, Washington D.C., USA","institution_ids":["https://openalex.org/I193531525"]},{"raw_affiliation_string":"George Washington University Department of Political Science","institution_ids":["https://openalex.org/I193531525"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5033134106"],"corresponding_institution_ids":["https://openalex.org/I193531525"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.09235229,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"99","last_page":"111"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9889000058174133,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13369","display_name":"European and Russian Geopolitical Military Strategies","score":0.9686999917030334,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.7678396701812744},{"id":"https://openalex.org/keywords/offensive","display_name":"Offensive","score":0.6920766234397888},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.5459210276603699},{"id":"https://openalex.org/keywords/normative","display_name":"Normative","score":0.5188370943069458},{"id":"https://openalex.org/keywords/cyberwarfare","display_name":"Cyberwarfare","score":0.4775591492652893},{"id":"https://openalex.org/keywords/information-operations","display_name":"Information Operations","score":0.42873457074165344},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3503836393356323},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3466706871986389},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.3376792371273041},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.25331008434295654},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.23583686351776123},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.1187262237071991}],"concepts":[{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.7678396701812744},{"id":"https://openalex.org/C176856949","wikidata":"https://www.wikidata.org/wiki/Q2001676","display_name":"Offensive","level":2,"score":0.6920766234397888},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.5459210276603699},{"id":"https://openalex.org/C44725695","wikidata":"https://www.wikidata.org/wiki/Q288156","display_name":"Normative","level":2,"score":0.5188370943069458},{"id":"https://openalex.org/C171769113","wikidata":"https://www.wikidata.org/wiki/Q849340","display_name":"Cyberwarfare","level":2,"score":0.4775591492652893},{"id":"https://openalex.org/C121858775","wikidata":"https://www.wikidata.org/wiki/Q18600568","display_name":"Information Operations","level":2,"score":0.42873457074165344},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3503836393356323},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3466706871986389},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.3376792371273041},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.25331008434295654},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.23583686351776123},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.1187262237071991},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cycon.2016.7529429","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cycon.2016.7529429","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 8th International Conference on Cyber Conflict (CyCon)","raw_type":"proceedings-article"},{"id":"mag:2464902085","is_oa":true,"landing_page_url":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2803669","pdf_url":null,"source":{"id":"https://openalex.org/S4210172589","display_name":"SSRN Electronic Journal","issn_l":"1556-5068","issn":["1556-5068"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1318003438","host_organization_name":"RELX Group (Netherlands)","host_organization_lineage":["https://openalex.org/I1318003438"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"SSRN Electronic Journal","raw_type":null}],"best_oa_location":{"id":"mag:2464902085","is_oa":true,"landing_page_url":"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2803669","pdf_url":null,"source":{"id":"https://openalex.org/S4210172589","display_name":"SSRN Electronic Journal","issn_l":"1556-5068","issn":["1556-5068"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1318003438","host_organization_name":"RELX Group (Netherlands)","host_organization_lineage":["https://openalex.org/I1318003438"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"SSRN Electronic Journal","raw_type":null},"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"No poverty","id":"https://metadata.un.org/sdg/1"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2356783890","https://openalex.org/W2742682247","https://openalex.org/W2161328926","https://openalex.org/W2044503521","https://openalex.org/W3024755729","https://openalex.org/W2815851361","https://openalex.org/W2809560155","https://openalex.org/W2913406225","https://openalex.org/W2188521245","https://openalex.org/W2011032161","https://openalex.org/W2265927519","https://openalex.org/W2784857437","https://openalex.org/W2110107793","https://openalex.org/W2205626687","https://openalex.org/W324424961","https://openalex.org/W2942552540","https://openalex.org/W2017868812","https://openalex.org/W1943330771","https://openalex.org/W3121726858","https://openalex.org/W2605148562"],"abstract_inverted_index":{"Evaluating":[0],"an":[1,6,53,97],"actor's":[2,54,98],"`cyber":[3],"power'":[4],"is":[5,26,102],"inherently":[7],"complex":[8],"problem":[9],"involving":[10],"a":[11,49,103,143],"laundry":[12],"list":[13],"of":[14,88,126,151],"military,":[15],"normative,":[16],"and":[17,34,39,58,85,109,139,161,166,169,186],"technical":[18,56,108],"variations.":[19],"However,":[20],"one":[21],"important":[22],"but":[23],"under-theorised":[24],"factor":[25],"the":[27,124,149,159],"relationship":[28],"between":[29,163],"military":[30,172],"social":[31,45,76,99,118,152,164,173,182,188],"media":[32,46,77,100,119,153,165,174,183,189],"operations":[33,175,184,190],"cyber":[35,60,66,91,110,155,167],"operations.":[36,92,156],"Policymakers,":[37],"journalists,":[38],"even":[40,59,86],"some":[41],"academics":[42],"often":[43],"treat":[44],"activity":[47,120],"as":[48],"proxy":[50,105],"variable":[51],"for":[52,106,146],"latent":[55],"proficiency":[57],"capability,":[61],"in":[62,75,90,154],"other":[63],"words,":[64],"its":[65,107],"power.":[67],"Actors":[68],"that":[69,96,127],"are":[70,79],"extremely":[71],"successful":[72],"at":[73],"engaging":[74,89],"activities":[78],"assumed":[80],"to":[81,141],"be":[82],"technically":[83],"proficient":[84],"capable":[87],"This":[93,129],"paper":[94,130],"argues":[95],"use":[101],"poor":[104],"security":[111],"competency.":[112],"In":[113],"fact,":[114],"under":[115],"certain":[116],"conditions":[117],"may":[121],"actually":[122],"magnify":[123],"vulnerability":[125],"actor.":[128],"synthesises":[131],"cross-disciplinary":[132],"research":[133],"from":[134],"strategic":[135],"studies,":[136],"political":[137],"science,":[138],"technologists":[140],"develop":[142],"theoretical":[144],"framework":[145],"better":[147],"understanding":[148],"role":[150],"It":[157],"outlines":[158],"similarities":[160],"differences":[162],"security,":[168],"categorises":[170],"different":[171],"into":[176],"three":[177],"types:":[178],"information-gathering":[179],"(IGMO),":[180],"defensive":[181],"(DeSMO),":[185],"offensive":[187],"(OSMO).":[191]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
