Case Studies of Deviance in Social Media

  • Samer Al-khateeb
  • Nitin Agarwal
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)


In this chapter, we provide a high-level view of various case studies that include deviant acts , deviant events , and deviant groups . This chapter utilizes the concepts, tools, and methodologies that we presented throughout this book to study, analyze, and have a better understanding of many real-world deviant events, acts, and groups. Here, we briefly highlight case studies of the work we conducted during many deviant cyber campaigns that were projected against NATO forces. In addition to these cases, we shed light on the deviant cyber campaigns conducted by the so-called Islamic State, also known as ISIL, ISIS, or Daesh . We will highlight the major findings of these cases and point the interested reader for more details to other published literature.


Deviance in social media Case studies ISIS ISIL Daesh Anti-NATO propaganda Dragoon ride exercise Crimean water crisis Beheading propaganda 


  1. 1.
    A. Pavlishak, Water Supply Problem in Crimea to Cost $247—417 million - Kremlin Aide. Available:
  2. 2.
    R. News, Ukraine Builds Dam Cutting Off Crimea Water Supply. Available:
  3. 3.
    N. Macfarguhar, Aid Elusive, Crimea Farms Face Hurdles. Available:
  4. 4.
    S. Jerome, Ukraine-Russia Conflict Results in “Water War”. Available:
  5. 5.
    S. Kumar, G. Barbier, M.A. Abbasi, H. Liu, Tweettracker: An analysis tool for humanitarian and disaster relief, in ICWSM. Available:
  6. 6.
    M.A. Smith, B. Shneiderman, N. MilicFrayling, E. Mendes Rodrigues, V. Barash, C. Dunne, T. Capone, A. Perer, E. Gleave, Analyzing (social media) networks with NodeXL, in Proceedings of the Fourth International Conference on Communities and Technologies (ACM, New York, 2009), pp. 255–264. Available: Google Scholar
  7. 7.
    S. Al-Khateeb, N. Agarwal, Understanding strategic information manoeuvres in network media to advance cyber operations: a case study analysing pro-Russian separatists’ cyber information operations in Crimean water crisis. J. Baltic Secur. 2(1), 6–27 (2016)CrossRefGoogle Scholar
  8. 8.
    N. Otan, Trident Juncture 2015. Available:
  9. 9.
    L. Alexander, Open-Source Information Reveals Pro-Kremlin Web Campaign. Available:
  10. 10.
    M. Bazzell, Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn. (CCI, Charleston, 2014). Available:
  11. 11.
    B. Etling, J. Kelly, R. Faris, J. Palfrey, Mapping the Arabic Blogosphere: Politics, Culture, and Dissent, vol. 6. Available:
  12. 12.
    S. Al-khateeb, M.N. Hussain, N. Agarwal, Social cyber forensics approach to study twitter’s and blogs’ influence on propaganda campaigns, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Berlin, 2017), pp. 108–113Google Scholar
  13. 13.
    S. Al-khateeb, M.N. Hussain, N. Agarwal Leveraging social network analysis and cyber forensics approaches to study cyber propaganda Campaigns, in Social Networks and Surveillance for Society, 1st edn. Lecture Notes in Social Networks (Springer, Cham, 2018) no. 2190–5428, p. 86. Available:
  14. 14.
    D.M.A. DoD News, Operation Atlantic Resolve Exercises Begin in Eastern Europe. Available:
  15. 15.
    R. T. ‘Tanks? No Thanks!’: Czechs Unhappy about US Military Convoy Crossing Country. Available:
  16. 16.
    D. Sindelar, U.S. Convoy: In Czech Republic, Real-Life Supporters Outnumber Virtual Opponents. Available:
  17. 17.
    Sputnik, Czechs Plan Multiple Protests of US Army’s Operation Dragoon Ride. Available:
  18. 18.
    S. Ghosh, B. Viswanath, F. Kooti, N.K. Sharma, G. Korlam, F. Benevenuto, N. Ganguly, K.P. Gummadi, Understanding and combating link farming in the twitter social network, in Proceedings of the 21st International Conference on World Wide Web (ACM, New York, 2012) pp. 61–70. Available: Google Scholar
  19. 19.
    F. Sen, R.T. Wigand, N. Agarwal, M. Mete, R. Kasprzyk, Focal structure analysis in large biological networks, in IPCBEE, ser. 1, vol. 70 (IACSIT, Singapore, 2014). Available:
  20. 20.
    N. Agarwal, S. Al-khateeb, R. Galeano, R. Goolsby, Examining the use of botnets and their evolution in propaganda dissemination. J. Def. Strateg. Commun. 2(2), 87–112 (2017). Available: CrossRefGoogle Scholar
  21. 21.
    S.A. Tatham. Strategic communication: a primer. Defence Academy of the United Kingdom, Advanced Research and Assessment Group (ARAG) (Dec 30, 2008). Available:
  22. 22.
    C. Staff, ISIS Video Appears to Show Beheadings of Egyptian Coptic Christians in Libya. Available:
  23. 23.
    T.n. editorial, ISIL executes an Israeli Arab after accusing him of been an Israeli Spy. Available:
  24. 24.
    K. Shaheen, ISIS Video Purports to Show Massacre of Two Groups of Ethiopian Christians. Available:
  25. 25.
    S. Al-khateeb, N. Agarwal, Examining Botnet Behaviors for Propaganda Dissemination: A Case Study of ISIL’s Beheading Videos-Based Propaganda (IEEE, Atlantic, 2015), pp. 51–57.Google Scholar
  26. 26.
    N. Abokhodair, D. Yoo, D.W. McDonald, Dissecting a social botnet: Growth, content and influence in twitter, in Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (ACM, New York, 2015), pp. 839–851. Available: Google Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Samer Al-khateeb
    • 1
  • Nitin Agarwal
    • 2
  1. 1.Department of Journalism, Media & ComputingCreighton UniversityOmahaUSA
  2. 2.Information Science DepartmentUniversity of Arkansas at Little RockLittle RockUSA

Personalised recommendations