<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Journal of Advanced Research 5 (2014) 491-497. URL: https://doi.org/10.1016/j.jare.2014.02.006.
doi:10.1016/j.jare.2014.02.006.
[9] M. T. Baldassarre</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="doi">10.1016/j.jare.2014.02.006</article-id>
      <title-group>
        <article-title>Security and Rights in CyberSpace: Cyber Social Security</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valentina Antoniol</string-name>
          <email>valentina.antoniol@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vita Santa Barletta</string-name>
          <email>vita.barletta@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Fabiana Battista</string-name>
          <email>fabiana.battista@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paolo Buono</string-name>
          <email>paolo.buono@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Danilo Caivano</string-name>
          <email>danilo.caivano@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giuseppe Campesi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Giuseppe Cascione</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonietta Curci</string-name>
          <email>antonietta.curci@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Marco de Gemmis</string-name>
          <email>marco.degemmis@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vincenzo Gattulli</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Rosa Scardigno</string-name>
          <email>rosa.scardigno@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Annita Larissa Sciacovelli</string-name>
          <email>annitalarissa.sciacovelli@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Patrizia Sorianello</string-name>
          <email>patrizia.sorianello@uniba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vincenzo Tamburrano</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Università degli studi di Bari Aldo Moro</institution>
          ,
          <addr-line>Piazza Umberto I, 70121 Bari, Apulia</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2018</year>
      </pub-date>
      <volume>23</volume>
      <fpage>491</fpage>
      <lpage>497</lpage>
      <abstract>
        <p>The convergence of data from social media, mobile devices, and urban sensors is enabling deep analyses of human behavior, fostering the development of innovative services through the Social Sensing paradigm, where users act as human sensors. This vision, enhanced by Natural Language Processing (NLP) techniques applied to textual data from platforms such as X and Facebook, is crucial for extracting meaningful insights from the digital environment. In parallel, the rising interconnection between cyberspace and real-world events necessitates robust cognitive, methodological, and cyber-physical infrastructures to support civil society resilience. This article presents a logical architecture along two dimensions: Horizontal and Vertical. The Horizontal dimension is characterized by the five domains of Cyber Social Security (i.e., Cyber Intimate Partner Violence, Cyber Gender-based Violence and Stereotype, Cyber Hate Speech and Falsehoods, Urban Mapping &amp; Privacy, Ethical and Political Risks). The Vertical dimension identifies the three security operating units: Detection, Response, and Prevention. Leveraging the new knowledge gained in each domain, the intersection between these two dimensions allows for the redefinition of detection rules in Cyber Social Security, formulating new response plans and preventing both known and emerging security threats.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;CSS</kwd>
        <kwd>Cyber Social Security</kwd>
        <kwd>Cybersecurity</kwd>
        <kwd>Generative AI</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Cyber Social Security (CSS) emerges as an indispensable glue for facilitating a positive transposition
of cyberspace-related events into the real (political-social-cultural) world [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Gleichzeitig, it serves
as a protective barrier, preventing the potential transference of risks from the virtual realm to the
physical world [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The application of tools and the use of diversified means of collecting, analyzing, and
cataloguing data enable both the understanding of complex phenomena, based on human behavior, and
the development of services that function as indispensable resources for defining a real improvement in
individual and collective well-being.
      </p>
      <p>The collection and analysis of data, related to the proper interpretation of human and social behavior
(both in micro-physical and macro-physical terms), constitute one of the central nodes of the entire
CSS research work1. Only through the collection and analysis of data can the relationship between
cyberspace and the real world be fruitfully adjusted through the construction of appropriate predictive
and intervention models.</p>
      <p>So, the goal of this research is to address these issues through the proposition of multidisciplinary
methods, techniques and tools (IT, psychological, economic, legal, engineering, related to social sciences)
capable of operating a Cyber-Social risk management in civil society. To this end, it is necessary
to reinterpret the functions of Cyber Security in Cyber Social contexts: Detection, Response, and
Prevention.</p>
      <p>Therefore, in order to design a framework that integrates the diferent perspectives of Cyber Social
Security, the following research goals were identified:
• Innovations for Cyber Social Detection
• Innovations for Cyber Social Response
• Innovations for Cyber Social Prevention</p>
    </sec>
    <sec id="sec-2">
      <title>2. Challenges in Cyber Social Security</title>
      <p>
        Cyber Social Security (CSS) is a complex and multi-disciplinary field that encompasses the study of
cybermediated changes in human behavior and activity, as well as the development of cyber infrastructure
to protect society from cyber threats [
        <xref ref-type="bibr" rid="ref1 ref3">3, 1</xref>
        ]. The rapid growth of social media and the sharing of
information through digital channels has created new vulnerabilities and threats, necessitating the
need for robust security measures [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Therefore, CSS faces numerous challenges that stem from
the ever-evolving landscape of cyber threats and attacks [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. These challenges include the detection
of malware, authentication, steganalysis, and the increase in the extent and nature of cyber-crimes
[
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. Additionally, the innovations in information technology, while creating new economic and
social opportunities, pose challenges to security and expectations of privacy in smart cities [8, 9].
Furthermore, the lack of a universally agreed-upon definition of key terminology in the cybersecurity
domain poses a major challenge to international treaties and arms control agreements [10]. So, the
politics of cybersecurity are influenced by conceptions of time and temporality, shaping it as a political
practice.
      </p>
      <p>The challenges also extend to the need for more focused research to understand how social capital
afects knowledge creation in the context of organizational cyber-security risk-related activities [ 11].
Moreover, the challenges of cybersecurity are compounded by the misuse of technical infrastructure
for cyber deviant and criminal behavior, including the spreading of extremist and terrorism-related
material, online fraud, and cybersecurity attacks [12]. These challenges necessitate a comprehensive
approach to cyber social security, including the development of efective cyber security strategies,
the implementation of cyber security operations centers, and the pursuit of legitimate security and
the common good in contemporary conflict scenarios [ 13, 14, 15]. Additionally, the significance of
process comprehension for conducting targeted attacks and the application of artificial intelligence to
cybersecurity are crucial in addressing these challenges [16, 17]. Furthermore, the need for
liabilitybased trust frameworks and the influence of cyber insurance services on cybersecurity are important
considerations in mitigating these challenges [18].</p>
      <p>The challenges in cyber social security are multifaceted and require a holistic approach that
encompasses technological, social, and legal dimensions to efectively address the evolving cyber threats and
attacks.</p>
    </sec>
    <sec id="sec-3">
      <title>3. CSS Architecture</title>
      <p>
        Social cybersecurity is an emerging scientific area focused on technology and social context [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. In the
realm of cybersecurity, significant attention has been directed towards assaults targeting and exploiting
the cyber infrastructure to disrupt technology, pilfer or obliterate information, and misappropriate
funds or identities [19]. Conversely, within the domain of social cybersecurity, the focus shifts to the
influence or manipulation of individuals, groups, or communities, thereby shaping their behaviors with
a particular emphasis on socio-political and cultural repercussions.
      </p>
      <p>So, in a scenario where cyberspace events impact the real world and influence the political, social,
and cultural spheres, it is essential to have the cognitive, methodological superstructures as well as the
cyber-physical infrastructures necessary to guarantee the resilience of civil society.</p>
      <p>The reinterpretation of cybersecurity functions in the social context will take place along two
dimensions: horizontal and vertical. The horizontal dimension (HD) currently involves the identification
of 4 +1 key domains:
• HD.1: Cyber Intimate Partner Violence (IPV). IPV encompasses a range of abusive and
aggressive behaviors perpetrated by one individual against their intimate partner [20, 21, 22]. These
behaviors manifest in distinct patterns, including physical violence, sexual violence, stalking, and
psychological aggression [21]. Physical violence involves the deliberate use of force with the aim
of causing harm and physical injuries. Sexual violence pertains to sexual advances or actions
carried out without the consent of the victim. Stalking entails repetitive and unwanted attention
and communication that induces fear or apprehension regarding personal safety, whether the
victim’s safety or that of another person. Lastly, psychological aggression involves
communication intended to adversely afect the mental and emotional well-being of the partner, ultimately
establishing control over them. Studies have shown that the duration and severity of these
behaviors can vary significantly, such that they can be isolated incidents or persist over multiple
years [22].</p>
      <p>Therefore, considering the state of the art on Cyber-Intimate Partner Violence, to delineate
prevention controls and functions for managing CSS, the following macro-categories of C-IPV
will be analyzed:
– Cyber Psychological Aggression
– Cyber Sexual Aggression
– Cyber Stalking Behaviors
• HD.2: Cyber Gender-based Violence and Stereotype. Among the several ways the performative
strength of language and discourses can manifest, a deep impact concerns their capability to both
reflect and influence societies, specifically referring to their perceptions and representations of
social phenomena and groups, as in the gender case. Despite the constant eforts to promote
bias-free and non-sexist writing to empower fairness movements, the perception of gender roles
still represents a critical issue, hence the presence of biased socio-cultural expectations until these
days [23]. As a heavily widespread type of unfair social attitudes and behaviors, gender inequality
represents a multifaceted phenomenon implying a considerable loss of human potential: it can
lead to perpetuating a culture of violence, higher gender wage gaps, and fail to represent women
in higher and leadership positions [24].
• HD.3: Cyber Hate Speech and Falsehoods. The goal is to identify the contexts that facilitate verbal
violence and deception, both in everyday conversation and in online language. The subject has a
distinctive character, not only within national borders, but also at the international level. Previous
research has primarily focused on the lexical components of deceit, along with the emotional and
psychological factors. Deception and hate speech pose potential risks for society and can result in
numerous negative psychological and social consequences, whether directly or indirectly caused.
When examining the linguistic aspects surrounding the topic, it is apparent that deception and
hate speech share several characteristics. They carry negative connotations and are intentional.
Additionally, the most vulnerable individuals, such as children, the elderly, women, and the
disabled, are often the preferred targets of deceitful behaviour and hate speech. These behaviours
are not novel as they have been linked to human nature and documented since ancient times.
Nonetheless, in recent years, due to the ever-expanding prevalence of social networks and media,
these phenomena have alarmingly multiplied. Consequently, a new linguistic phenomenon, fake
news, has emerged along with a new social group, known as haters. In-depth analysis is required
for lying and hate speech in both spoken and written language.
• HD.4: Urban Mapping &amp; Privacy. The analysis in the urban context will be performed according
to a vision based on two layers, which identify the initial taxonomy for further exploitation. The
ifrst layer is referred to as the real/physical layer in which we move and act every day: it involves
indoor and outdoor environments, urban spaces, motion solutions, streets, public and private
environments, other individuals, etc.. The second layer is referred to as the digital environment,
which includes the set of social networks, messaging apps, traditional web sites, etc.. It is clear
that the two layers are not independent of each other: they have strong interconnections and
several connection points.
• HD.5: Ethical and Political Risks. In Cyber Social Security, this dimension revolves around the
tension between protecting privacy and the risks of social control through data practices. While
these systems safeguard against cyber threats, fake news, and attacks on critical infrastructure,
the processes of data mining and analysis pose risks of privacy violations and pervasive social
surveillance. This duality reflects two sides of the same coin: the protection of individuals versus
the potential for opaque tracking, manipulation, discrimination, and human rights infringements.
Key ethical concerns include lack of transparency about data collection, usage, and control; risks
of influencing public opinion and behavior; and unequal access to services based on politically or
socially identified groups. The political dimension highlights the transformation of personal data
into economic value, raising issues of fairness and justice in how individuals’ data is used, with a
call to recognize data contributors as collaborators and workers deserving rights and benefits.
Mitigating these risks requires informed consent, anonymization, data minimization, and
adherence to principles of fairness, equality, and respect for human dignity. Ultimately, the
sociopolitical challenge is to design Cyber Social Security technologies that empower communities
and enhance collective welfare, rather than reinforce exploitative, opaque control systems.</p>
      <p>The first 4 domains concur to realize the context of Cyber Social Security where the goal is not only
to identify violence in its domain of appartence (psychological, linguistic, social, ethical, geopolitical,
cyber, technological) but to identify new methods and techniques to redefine and/or identify new factors
for defining such violence through the knowledge and lessons learned from each domain. Instead, for
the fifth domain, ethical and political risks will be analyzed for the management of the social context
and that underlie the Detection-Response-Prevention life cycle.</p>
      <p>The vertical dimension (VD) is identified by the three security operating units:
• HV.1: Detection;
• HV.2: Response;
• HV.3: Prevention.</p>
      <p>These models can be mapped to three organizational structures to ensure the security of people and
information, together with the cyber social security controls contained therein:
1. Security Operation Center in CSS (Detection): characterize, identify, understand and predict
significant cyber-mediated events and changes in human, social, cultural and political behavior as
well as the methods for monitoring and protecting "social" end-points, thus being able to operate
with devices (IT and IoT ) and diversified information sources (OSINT/CLOSINT), taking into
account the national and international legal framework (GDPR, NIS, CyberSecurity Act).
2. Security Incident Response Team in CSS (Response): defining intervention and cooperation
protocols between the main players in civil society in order to guarantee resilience and social security,
including through homeland security technologies and the fight against cyber terrorism and
cybercrime. The review of the Detection-Response-Prevention cycle will also clarify the limits
within which it is possible to find and manage information while protecting the citizens’ right to
privacy and the security of civil society.
3. Security Support Unit in CSS (Prevention): redefine the processes of census and prevention
of "accidents" in the light of new critical assets (individuals, groups, communities, software
applications and infrastructures for the public service, etc.), including elements of physical,
organizational and applicative security as well as socio-political, economic, psychological and
legal context.</p>
      <p>Figure 1 shows the identified logical architecture. The result of the interaction between security
functions and social dimensions helps to redefine detection rules in CSS, formulate new response plans,
and prevent both known and unknown attacks and cyber social incidents based on the new knowledge
gained in each domain. In particular, the intersection of the three security functions with a specific social
dimension enables the redefinition of the Detection-Response-Prevention lifecycle for each domain
(Output of the Horizontal dimension). At the same time, the intersection of the five social dimensions
with a specific security function allows the redefinition of existing activities or the creation of new
processes based on these insights. As a result, security operational units derived from these activities
can be extended (Output of the Vertical dimension). The definition of the three operational units along
the Vertical dimension allow to manage the impact on Cyber Social Security.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Artificial Intelligence in Cyber Social Security</title>
      <p>The integration of Artificial Intelligence (AI) into Cyber Social Security represents a transformative
opportunity to enhance the efectiveness and scalability of detection, response, and prevention
mechanisms across socio-technical domains. Given the complexity and multidimensionality of CSS—spanning
psychological, technological, legal, and socio-political layers—AI provides powerful capabilities to
process, analyze, and learn from heterogeneous data sources, enabling real-time insights and adaptive
intervention strategies. Therefore, AI can act as a cross-cutting enabler across both the Horizontal
Dimension and the Vertical Dimension (Detection, Response, Prevention). By leveraging machine
learning, natural language processing, and social network analysis, AI systems contribute to redefining
detection rules, formulating targeted responses, and anticipating emerging threats that stem from
cyber-mediated behaviors.</p>
      <p>A concrete application of AI within CSS can be illustrated through the domain of Cyber Hate Speech
and Falsehoods, one of the key areas identified in the CSS Horizontal Dimension. This domain deals
with the identification of harmful, deceptive, and emotionally manipulative language disseminated via
digital platforms, often targeting vulnerable social groups and threatening public cohesion.
• Detection (HV1). AI-powered Natural Language Processing (NLP) tools are deployed to analyze
real-time streams of content from platforms like X, YouTube, or Telegram. Transformer-based
models (e.g., BERT, RoBERTa) trained on annotated corpora can automatically flag content
containing hate speech, misinformation, or incitement to violence. These tools can identify
both explicit slurs and implicit or coded language, considering linguistic, cultural, and emotional
context.
• Response (HV2). Once identified, the incidents are automatically categorized and routed to
appropriate authorities. AI systems support incident prioritization based on severity, potential
virality, and impacted communities. Visual dashboards and narrative explanations generated
through explainable AI (XAI) help stakeholders (e.g., social platforms, policy-makers, educators)
understand the nature and trajectory of the threat.
• Prevention (HV3). Longitudinal AI models are used to monitor trends, simulate propagation
patterns, and predict high-risk periods (e.g., elections, social unrest). The insights derived support
the co-creation of digital awareness campaigns, content moderation policies, and community-level
interventions to increase resilience and counter hate normalization online.</p>
      <p>In addition, Generative AI has emerged as a transformative technology with significant implications
across multiple domains. The potential of generative AI in CSS context lies in its ability to synthesize,
analyze, and generate complex content that can enhance detection, prevention, and response strategies
against evolving cyber-social threats.</p>
      <p>Generative AI models, such as large language models (LLMs) and generative adversarial networks
(GANs), enable the creation of advanced threat detection frameworks capable of understanding nuanced
human language and social behaviors online. By generating realistic synthetic data and simulating
cyberattack scenarios, these models help train cybersecurity systems to identify subtle indicators of
malicious activities like social engineering, disinformation campaigns, and hate speech propagation.
This synthetic data augmentation is particularly valuable in overcoming data scarcity issues, allowing
the detection systems to generalize better across diverse threat patterns.</p>
      <p>Concrete examples are presented below, illustrating how generative AI supports each phase of cyber
defense against social engineering, disinformation, and hate speech attacks. Table 1 summarises the
examples.</p>
      <p>• Detection CSS.</p>
      <p>Social Engineering. Generative AI models can produce synthetic phishing emails that mimic the
language and style of recent campaigns. For example, by generating spear-phishing messages that
incorporate personalized user data—such as recent social media activity or local events—security
systems are trained on a richer dataset, improving their ability to detect subtle indicators of
compromise in real-world attacks.</p>
      <p>Disinformation. Similarly, generative AI enables detection of disinformation by analyzing linguistic
cues and inconsistencies in social media posts. For instance, it can detect emerging false narratives
by comparing newly generated content with verified knowledge bases, flagging posts that deviate
significantly in tone, factual accuracy, or style.</p>
      <p>Hate Speech. Generative models help identify novel slang, coded language, or context-dependent
insults that traditional keyword-based filters may miss, thereby increasing the precision of
automated moderation tools.
• Response.</p>
      <p>Social Engineering. When a phishing campaign is detected, generative AI assists incident response
teams by simulating the attack progression and potential impacts, helping to prioritize mitigation
actions. For example, it can generate likely phishing email variants to identify users at risk and
tailor warning messages accordingly.</p>
      <p>Disinformation. In combating disinformation, generative AI can produce fact-checked
counternarratives and public awareness content in multiple languages and styles, accelerating the
dissemination of corrective information. This was notably efective in simulated misinformation
campaigns around health crises, where AI-generated responses improved public engagement and
reduced rumor spread.</p>
      <p>Hate Speech. For hate speech outbreaks, generative AI aids moderators by drafting
contextaware removal justifications and user communication, reducing response times and maintaining
community trust.
• Prevention. Social Engineering, Disinformation, Hate Speech.</p>
      <p>Generative AI supports proactive defense by creating realistic attack simulations for training
purposes. For instance, organizations have used AI-generated phishing emails that evolve
dynamically, challenging employees with up-to-date social engineering tactics and improving their
detection skills.
Additionally, generative AI can simulate emerging threat landscapes by producing hypothetical
attack scenarios that blend new social trends and attacker tactics, enabling security teams to
refine policies and deploy adaptive controls.</p>
      <p>Finally, early warning systems enhanced with generative AI continuously analyze social
media streams and generate predictive alerts about potential disinformation or coordinated hate
campaigns before they escalate.</p>
      <p>Impact
Improved detection of
subtle, targeted phishing
attacks
Early flagging of false
information and disinformation
campaigns
Enhanced moderation
accuracy and reduced false
negatives
Faster risk prioritization and
targeted user alerts
culturally Increased public awareness
and mitigation of
misinformation spread
Reduced moderation
response time and improved
community trust
Enhanced employee
preparedness and resilience
Response</p>
      <p>Phishing incident contain- Simulate attack variants and generate
ment tailored warning messages
Countering misinformation Produce fact-checked,</p>
      <p>adapted counter-narratives
Hate speech moderation</p>
      <p>Draft removal explanations and user
communication</p>
      <p>Dynamic phishing simula- Create evolving phishing email
camPrevention tions for training paigns reflecting current social
engi</p>
      <p>neering tactics
Threat landscape modeling Generate hypothetical social engineer- Proactive policy
adjusting and disinformation scenarios ments and improved
adaptive defense
Early warning alert genera- Analyze social data streams to predict Timely alerts and
preemption and simulate coordinated attacks tive disruption of attack
campaigns</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusion</title>
      <p>It is a common viewpoint that the combination of data coming from social media, smartphones and from
urban sensors can actually enable the ability to carry out in-depth analyzes and understand complex
phenomena based on human behavior, opening new scenarios for the development of numerous
innovative services and applications. By following this research line, the recent paradigm of Social Sensing
further emphasized this vision, since it proposed an integrated model in which users themselves are
turned into sensors, entities that produce simple rough information which is processed and aggregated
in order to generate some valuable human-based findings obtained through the combination and merge
of individual-based data. Beyond sensing applications, as those focusing on tracking vehicles to avoid
trafic congestion or healthcare tracking and predicting people’s lifestyles, a big research efort has been
made to analyze text-based signals, such as those coming from social networks like X or Facebook. The
reason is twofold: first, methodologies for Natural Language Processing (NLP) rely on very consolidated
and efective algorithms, thus it is relatively simpler to process textual data rather than audio, video or
especially environmental-based ones. Second, despite its size grows more slowly than video or audio
data, textual content represents a very rich, interesting and valuable information source. Furthermore,
in a scenario where cyberspace events impact the real world and influence the political, social and
cultural spheres, it is essential to have the cognitive, methodological superstructures as well as the
cyber-physical infrastructures necessary to guarantee the resilience of civil society.</p>
      <p>Therefore, this article presents a logical architecture for Cyber Social Security along both horizontal
and vertical dimensions to enhance security across multiple domains. By integrating the five key CSS
dimensions (i.e., Cyber Intimate Partner Violence, Cyber Gender-based Violence and Stereotype, Cyber
Hate Speech and Falsehoods, Urban Mapping &amp; Privacy, Ethical and Political Risks) with the critical
security functions of Detection, Response, and Prevention, the proposed model enables a more dynamic
and adaptive approach to face cyber social security threats.</p>
      <p>In this context, the integration of Artificial Intelligence (AI) can enhance defense activities,
accelerating the identification of potential social threats across CSS dimensions, increasing resilience and
responsiveness of the social context. Future works concern a deeper investigation of Generative AI
applications in CSS to further refine and expand this architecture.</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgment</title>
      <p>This work was partially supported by the following projects: SERICS - “Security and Rights In the
CyberSpace - SERICS” (PE00000014) under the MUR National Recovery and Resilience Plan funded
by the European Union - NextGenerationEU; Patto territoriale "Sistema universitario pugliese" – CUP
F61B23000370006.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>The author(s) have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>K. M. Carley</surname>
            , G. Cervone,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Agarwal</surname>
          </string-name>
          , H. Liu,
          <string-name>
            <surname>Social</surname>
          </string-name>
          cyber-security, in: R.
          <string-name>
            <surname>Thomson</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <string-name>
            <surname>Dancy</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Hyder</surname>
          </string-name>
          , H. Bisgin (Eds.), Social, Cultural, and Behavioral Modeling, volume
          <volume>10899</volume>
          of Lecture Notes in Computer Science, Springer, Cham,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -93372-6_
          <fpage>42</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Calvano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sciacovelli</surname>
          </string-name>
          ,
          <article-title>Cyber social security in multi-domain operations</article-title>
          ,
          <source>in: 2024 IEEE International Workshop on Technologies for Defense and Security (TechDefense)</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>41</fpage>
          -
          <lpage>46</lpage>
          . doi:
          <volume>10</volume>
          .1109/TechDefense63521.
          <year>2024</year>
          .
          <volume>10863352</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Catalano</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. de Gemmis</surname>
          </string-name>
          , D. Impedovo,
          <article-title>Cyber social security education</article-title>
          , in: L.
          <string-name>
            <surname>T. De Paolis</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Arpaia</surname>
          </string-name>
          , M. Sacco (Eds.),
          <source>Extended Reality</source>
          , Springer Nature Switzerland, Cham,
          <year>2024</year>
          , pp.
          <fpage>240</fpage>
          -
          <lpage>248</lpage>
          . doi:https://doi.org/10.1007/978-3-
          <fpage>031</fpage>
          -71713-0_
          <fpage>16</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Baldassarre</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Barletta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Caivano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Scalera</surname>
          </string-name>
          ,
          <article-title>Privacy oriented software development</article-title>
          ,
          <source>Communications in Computer and Information Science</source>
          <volume>1010</volume>
          (
          <year>2019</year>
          )
          <fpage>18</fpage>
          -
          <lpage>32</lpage>
          . URL: https://www.scopus.com/inward/record.uri?eid=
          <fpage>2</fpage>
          -
          <lpage>s2</lpage>
          .
          <fpage>0</fpage>
          -
          <lpage>85072844530</lpage>
          &amp;doi=10.1007%
          <fpage>2f978</fpage>
          -3
          <source>-030-29238-6_2&amp;partnerID=40&amp;md5=2e236bb140c949fa89b00ef1fb2531bd. doi:10</source>
          .1007/ 978-3-
          <fpage>030</fpage>
          -29238-
          <issue>6</issue>
          _
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bhatti</surname>
          </string-name>
          ,
          <article-title>Cyber security and privacy in the age of social networks</article-title>
          ,
          <source>in: Cyber Security Standards, Practices and Industrial Applications: Systems and Methodologies, IGI Global</source>
          ,
          <year>2012</year>
          , p.
          <fpage>18</fpage>
          . doi:
          <volume>10</volume>
          . 4018/978-1-
          <fpage>60960</fpage>
          -851-4.
          <year>ch004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>H.</given-names>
            <surname>Aldawood</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Skinner, Analysis and findings of social engineering industry experts explorative interviews: Perspectives on measures, tools, and solutions</article-title>
          ,
          <source>IEEE Access 8</source>
          (
          <year>2020</year>
          )
          <fpage>67321</fpage>
          -
          <lpage>67329</lpage>
          . URL: https://doi.org/10.1109/access.
          <year>2020</year>
          .
          <volume>2983280</volume>
          . doi:
          <volume>10</volume>
          .1109/access.
          <year>2020</year>
          .
          <volume>2983280</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>N.</given-names>
            <surname>Sabar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <article-title>A bi-objective hyper-heuristic support vector machines for big data cybersecurity</article-title>
          ,
          <source>IEEE Access 6</source>
          (
          <year>2018</year>
          )
          <fpage>10421</fpage>
          -
          <lpage>10431</lpage>
          . URL: https://doi.org/10.1109/access.
          <year>2018</year>
          .
          <volume>2801792</volume>
          . doi:
          <volume>10</volume>
          .1109/access.
          <year>2018</year>
          .
          <volume>2801792</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>