a conceptual model for computational evaluation of influence operations in online social networks

Document Type : Original Article

Authors

1 PhD student, Imam Hossein University, Tehran, Iran.

2 Professor, University of Science and Technology, Tehran, Iran

Abstract

Influence operations are considered as one of the types of information operations along with cyber network operations and electronic warfare operations. The spread of online social networks has provided a suitable platform for influence operations. Therefore, it is essential to be able to evaluate influence operations in online social networks. The ability to evaluate influence operation requires the existence of a conceptual model that is connected to a consistent theoretical structure on the one hand, and has the ability to be implemented computationally on the other hand. The aim of this article is to present a conceptual model that provides a basis for computational modeling to evaluate influence operations in online social networks. In this article, after an in-depth and exploratory study in the research literature, using the meta-combination method and interviews with experts, the theoretical framework of cyber cognitive power and the characteristics, concepts, dimensions and components of the conceptual model are presented. Two-step Delphi method was used to evaluate the validity of the presented model. The proposed model was confirmed in terms of validity and reliability and based on the Delphi method, it was agreed by more than eighty percent. In this research, a new conceptual formulation for influence operations in online social networks based on the conceptualization of cognitive capital and cyber cognitive power is presented. The proposed conceptual model, which is presented descriptively, has provided the possibility to evaluate the success indicators of the influence operation. The advantage of the proposed conceptual model is that it evaluates influence operation based on the concept of power and provides computational evaluation of influence operation. Also, this model provides the possibility to identify and detect influence operations in online social networks

Keywords

Main Subjects


Smiley face

https://creativecommons.org/licenses/by/4.0/

[1]          M.J. Mazarr, A. Casey, A. Demus, S.W. Harold, L.J. Matthews, N. Beauchamp-Mustafaga, J.Sladden, Hostile Social Manipulation: Present Realities and Emerging Trends. 2019. doi: 10.7249/rr2713.
[2]          K. W. Dillon, Joint Publication 3-13 Information Operations. Joint Chiefs of Staff, 2014. Accessed: Nov. 05, 2018. [Online]. Available: https://www.researchgate.net/publication/305680531_Joint_Publication_3-13_Information_Operations
[3]          E. V. Larson, R.E. Darilek, D. Gibran, B. Nichiporuk, A. Richardson, L.H. Schwartz, C.Q. Thurston, “Foundations of Effective Influence Operations.” RAND Corporation, 2009. Accessed: Jun. 05, 2016. [Online]. Available: http://www.rand.org/pubs/monographs/MG654.html
[4]          K. Halili, “Strategic Pattern for I.R.I Cyber Power Promotion at International Level,” Supreme National Defence, 2018.
[5]          A. Divsallar, information power: information effects on development theroy, Second. Teesa, 2014.
[6]          M. Castells, Communication Power, Second. 2013.
[7]          M. Jørgensen and L. Phillips, Discourse Analysis as Theory and Method. 2012. doi: 10.4135/9781849208871.
[8]          T. A. van Dijk, “Sociocognitive Discourse Studies,” in Handbook of Discourse Analysis, 2016.
[9]          K. Carrier-Sabourin, Measuring Effects and Success in Influence Operations: Challenges, Limitations and Opportunitites. Royal Military College of Canada, 2011.
[10]        J. Raudeliuniene, V. Davidavičiene, M. Tvaronavičiene, and L. Jonuška, “Evaluation of advertising campaigns on social media networks,” Sustain., 2018, doi: 10.3390/su10040973.
[11]        S. Blazek, “SCOTCH: A framework for rapidly assessing influence operations.” [Online]. Available: https://www.atlanticcouncil.org/blogs/geotech-cues/%0Ascotch-a-framework-for-rapidly-assessing-influence-operations/
[12]        T. A. van Dijk, “2009. ‘Critical Discourse Studies: A Sociocognitive Approach.’ In Methods for Critical Discourse Analysis, ed. by Ruth Wodak & Michael Meyer, 62-86, selected 62-67, 75-80. London: Sage.,” in The Discourse Studies Reader, 2014. doi: 10.1075/z.184.79dij.
[13]        T. A. van Dijk, “Discourse, cognition, society,” in The Discourse Studies Reader: Main Currents in Theory and Analysis, 2014. doi: 10.1075/z.184.79dij.
[14]        J. Friedenberg and G. Silverman, Cognitive Science: An Introduction to the Study of Mind. 2005. [Online]. Available: http://books.google.be/books?id=wGti6_4Qn_QC
[15]        G. Salomon, distributed cognitions: Psychological and educational considerations. New York: Cambridge University Press, 1993.
[16]        G. Bazdar and H. Lashgarian, “Recognition of cognitive warfare in cyberspace based on cognitive science,” in 2th cyber defense conference, tehran, 2014. (In Persian)
[17]        I. Hajizadeh and M. Asghari, Statistical methods and analyzes with a view to research methods in biological and health sciences, 1st ed. jahad daneshgahi, 2012. (In Persian)
[18]        M. R. Hafez Nia, An introduction to research methods in humanities, 19th ed. tehran: samt, 2012. (In Persian)
[19]         K. Hanafiniri, R. Pourjabali, and M. Babaei, Delphi research method (expert consensus technique), 1st ed. dabizesh, 2021. (In Persian)
  • Receive Date: 04 July 2023
  • Revise Date: 18 December 2023
  • Accept Date: 02 January 2024
  • Publish Date: 18 January 2024