Professional Documents
Culture Documents
Societal Impacts
journal homepage: www.journals.elsevier.com/societal-impacts
A R T I C L E I N F O A B S T R A C T
Keywords: Recent scholarly endeavors in the domain of Cyber Intelligence have unveiled its multifaceted implications,
Cyber intelligence intricately interwoven with various Sustainable Development Goals (SDGs), notably encompassing Goal 9 (In
Sustainable open-source intelligence dustry, Innovation, and Infrastructure), Goal 11 (Sustainable Cities and Communities), Goal 16 (Peace, Justice
PESTEL framework
and Strong Institutions), among others. This study intricately dissects the symbiotic nexus between Cyber In
Future directions of cyber research
Societal impact of cyber
telligence research and these SDGs, whilst simultaneously unraveling its profound reverberations across the
diverse dimensions of the PESTEL (Political, Economic, Social, Technological, Environmental, and Legal)
framework. Ten critical impacts inherent in current research works on cyber intelligence were identified, sub
sequently juxtaposing these impacts within the PESTEL dimensions. This analytical process further unraveled an
additional eleven critical impacts yet to be addressed by current research works on cyber intelligence. Addressing
these additional 11 impacts in forthcoming research endeavors is posited as a catalyst for optimizing societal
benefits across the diverse spectra of PESTEL dimensions. Moving on from categorizing and classifying societal
impacts of cyber research within PESTEL framework, this study finally establishes a strategic roadmap of 11
future research directions on cyber intelligence like sustainable cyber security practices, mental health aspects of
cyber victimhood, ethical AI in cybersecurity among others. Fostering a cross-disciplinary dialog, this work
contributes to the broader discourse on harnessing cyber intelligence for societal betterment, mitigating the
potential detrimental effects cyber threats.
https://doi.org/10.1016/j.socimp.2024.100047
Received 11 December 2023; Received in revised form 8 February 2024; Accepted 12 February 2024
Available online 15 February 2024
2949-6977/© 2024 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-
nc-nd/4.0/).
F.K. Sufi Societal Impacts 3 (2024) 100047
2
F.K. Sufi Societal Impacts 3 (2024) 100047
Fig. 1. Generic Methodology of obtaining Open-Source Cyber Intelligence as per [3] [4] [5] [6] [7] [8].
Goal 9 (Industry, Innovation, and Infrastructure) and Goal 11 (Sus These advanced algorithms help us understand Twitter conversa
tainable Cities and Communities), identifying them as the paramount tions and content much like how humans understand using their
SDGs. They offer practical insights and solutions to pressing issues in the brains.
cyber domain, fostering a safer, more innovative, and interconnected • Examination of geopolitical, socioeconomic, psychological, and so
global society. cietal dimensions in the cyber intelligence framework.
The research methodology across the six studies as represented in Low-code-no-code platforms are software development platforms
[3–8] involves a systematic integration of advanced technologies, pri that enable users to create applications with minimal or no coding skills,
marily AI and NLP, to address complex issues in the field of cyber in typically through visual interfaces and pre-built components.
telligence. The following key components encapsulate the overarching
methodology: • Identification of research works using platforms such as Microsoft
Power Automate, Microsoft Power BI, Microsoft SQL Server as
2.1. AI integration depicted in Fig. 1.
• Practical demonstration of implementing a cyber-attack monitoring
Systematic deployment of AI techniques for autonomously collecting algorithm using low-code platforms, emphasizing the accessibility
and analyzing multidimensional cyber-attack data. and applicability of the approach in multiple platforms (e.g., iOS,
Android, Windows). As shown in Fig. 1, this innovative architecture
• Consistent utilization of deep learning for anomaly detection and allows fully automated cyber identification and analysis in a more
prediction. sustainable manner with pervasive accessibilities in all computa
• Integration of advanced AI algorithms for sentiment analysis, loca tional ecosystem.
tion detection, translation, and other analytical dimensions.
Collectively, this methodology provides a transferable and replicable
2.2. Open-source data utilization framework that leverages advanced technologies, ensuring universal
accessibility and applicability. The use of AI, NLP, publicly available
Open-Source data refers to information that are publicly accessible data, and low-code platforms demonstrates a commitment to improve
and available. Automated generation of country-level cyber intelligence social conditions and to understand cybersecurity challenges in a uni
through the amalgamation of social media posts and open-source cyber- versally comprehensible manner. This innovative approach was
attack statistics as shown in Fig. 1. formerly applied to analyze worldwide events for anomaly detection,
prediction, root-cause analysis, and the identification of correlated
• Application of AI-based algorithms, including deep learning and factors [10] [11].
prediction algorithms, to derive actionable insights.
• Utilization of diverse open-intelligence cyber-attack statistics from 3. Results and implications
multiple web links.
These research works present 10 critical societal impacts as critically
2.3. Multilingual analysis analyzed in Fig. 2. Fig. 2 refrains from assigning a specific ranking to the
10 critical social impacts, acknowledging that diverse strategic per
Comprehensive analysis of social media data, particularly Twitter, spectives may lead to varying prioritizations. Within the scope of this
from a diverse user base spanning multiple languages. study, these 10 critical societal impacts were identified, then these
critical societal impacts were framed within the dimensions of Political,
• Application of NLP algorithms, including language detection, trans Economic, Social, Technological, Environment, and Legal (PESTEL) in
lation, sentiment analysis, topic analysis, and thematic analysis. Fig. 3. Next, 11 more societal impacts within PESTEL framework that
3
F.K. Sufi Societal Impacts 3 (2024) 100047
Fig. 2. Critical societal Impact already achieved with research in [3] [4] [5] [6] [7] [8].
could be addressed by future studies were identified (as depicted in 3.1.1. Cybersecurity enhancement
Fig. 4). Finally, the 11 possible societal impacts were translated into 11
future direction of research, so that a pervasive impact on all dimension • Advanced AI Tools: Development of sophisticated AI-driven cyber
of PESTEL could be harnessed. security tools for improved threat detection and prevention.
• Robust Defense Mechanisms: Strengthening of cybersecurity mea
3.1. Impacts of current research on PESTEL dimensions sures in both public and private sectors to mitigate data breaches.
This section describes the 10 critical impacts by the studies in [3] [4] 3.1.2. National security strengthening
[5] [6] [7] [8] as shown in Fig. 2.
• Infrastructure Protection: Enhanced tools for monitoring and pre
dicting cyber threats to safeguard national infrastructure.
4
F.K. Sufi Societal Impacts 3 (2024) 100047
• Governmental Response Efficiency: Improved government capabil 3.1.7. Global cybersecurity collaboration
ities to anticipate and respond effectively to cyber-attacks.
• International Cooperation Enhancement: Fostering international
3.1.3. Economic damage control in cybersecurity collaboration in combating cybercrime and cyber warfare.
• Global Standards Development: Contributing to the development of
• Reduced Financial Losses: Early detection and prevention of cyber global cybersecurity standards and protocols.
attacks to minimize economic impacts on businesses.
• Market Stability Preservation: Protection of business assets to 3.1.8. Social media in cyber intelligence
maintain market stability and consumer trust.
• Real-Time Information Source: Highlighting social media’s role as a
3.1.4. AI and ML technological leap valuable source of real-time cyber threat intelligence.
• Security and Intelligence Diversification: Opening new avenues for
• AI Boundary Expansion: Pushing the boundaries in AI and machine using social media analytics in broader security and intelligence
learning, especially in deep learning and NLP. contexts.
• Innovation Catalyst: Encouraging further exploration and innovation
in AI, with potential cross-disciplinary breakthroughs. 3.1.9. Cyber policy and regulation influence
3.1.5. Strategic cybersecurity decision-making • Guidance on crafting Effective Policies: Providing insights to inform
policymakers in crafting effective cyber laws and regulations.
• Data-Driven Strategies: Enabling decision-makers to formulate • Balanced Policy Development: Aiding in the development of policies
effective cybersecurity strategies based on current trends and that balance security, privacy, and ethical considerations.
predictions.
• Effective Outcome Assurance: Ensuring more effective cybersecurity 3.1.10. Improved cyber crisis management
outcomes through informed decision-making.
• Enhanced Crisis Response: Aiding in faster and more accurate re
3.1.6. Cyber threat awareness and education sponses to cyber incidents for better crisis management.
• Strategic Response Planning: Helping in the development of con
• Elevation of Public Awareness: Increasing public knowledge about tingency plans and strategies for organized responses to cyber
the prevalence and sophistication of cyber threats. emergencies.
• Promotion of Safe Online Practices: Educating individuals and or
ganizations on cybersecurity importance for safer online behavior. The culmination of these research endeavors as represented in [3–8]
yields profound implications for the advancement of knowledge in
addressing cyber threats and fostering societal well-being. The outcomes
underscore several key points with broad implications in society as
shown in Fig. 2 and Fig. 3.
5
F.K. Sufi Societal Impacts 3 (2024) 100047
Fig. 5. Future research endeavors on Cyber Intelligence for maximizing societal impact.
The research aligns with multiple SDGs, particularly Goals 9 (In 3.2.2. Election security enhancement
dustry, Innovation, and Infrastructure), 11 (Sustainable Cities and
Communities), and 17 (Partnerships to achieve the Goal), emphasizing • Development of advanced algorithms for detecting and mitigating
the interdisciplinary nature of cyber intelligence and its impact on so cyber threats specifically targeting electoral systems.
cietal well-being. As opposed to Fig. 3 (that shows critical societal • Research on combating misinformation and ensuring the integrity of
impact already realized by [3–8]), Fig. 4 strategically posits 11 more information during election cycles using AI-driven tools.
critical societal impacts that needs to be addressed in future. Addressing
these 11 critical impacts in next phases of research in cyber intelligence 3.2.3. Cybersecurity solutions for SMEs
would ensure maximum benefit for the society at multiple PESTEL
dimensions. • Designing cost-effective, scalable cyber intelligence tools tailored for
small and medium-sized enterprises.
3.2. Future research direction • Studies on the unique vulnerabilities of SMEs and development of
specialized training programs to enhance their cyber resilience.
Addressing these additional areas of impact (as shown in Section 3.1
and Fig. 4) in automated cyber intelligence solutions requires a multi 3.2.4. Cybersecurity insurance and risk analytics
faceted approach in future research. Here are 11 potential future
research endeavor to materialize possible impacts depicted in Fig. 5: • Integrating advanced cyber intelligence insights into cybersecurity
insurance models and risk assessment frameworks.
3.2.1. Geopolitical dynamics and cyber intelligence • Research on predictive analytics for cyber risk management and its
application in the insurance industry.
• Research on the influence of cyber intelligence in international re
lations and its impact on global power shifts. 3.2.5. Bridging the digital divide in cybersecurity
• Studies on the use of cyber intelligence in understanding and coun
tering foreign influence operations, especially in sensitive geopolit • Investigating strategies to provide equal access to cyber intelligence
ical contexts. tools across different socio-economic groups.
• Developing community-focused cyber intelligence education and
awareness programs.
6
F.K. Sufi Societal Impacts 3 (2024) 100047
3.2.6. Mental health aspects of cyber victimhood manuscript /insert title/ the following is fulfilled:
• Studies on the psychological impact of cyber-attacks and the devel 1) This material is the authors’ own original work, which has not been
opment of support systems for victims. previously published elsewhere.
• Integration of psychological insights into the design of cyber intel 2) The paper is not currently being considered for publication
ligence tools to provide more empathetic responses to victims. elsewhere.
3) The paper reflects the authors’ own research and analysis in a
3.2.7. Ethical AI in cybersecurity truthful and complete manner.
4) The paper properly credits the meaningful contributions of co-
• Research on ethical frameworks and guidelines for the use of AI in authors and co-researchers.
cybersecurity, focusing on bias mitigation and transparency. 5) The results are appropriately placed in the context of prior and
• Development of AI auditing methods to ensure ethical compliance in existing research.
automated cyber intelligence solutions. 6) All sources used are properly disclosed (correct citation). Literally
copying of text must be indicated as such by using quotation marks
3.2.8. Quantum computing and cybersecurity preparedness and giving proper reference.
7) All authors have been personally and actively involved in substantial
• Exploring the implications of quantum computing on current work leading to the paper, and will take public responsibility for its
encryption methods and cyber intelligence practices. content.
• Initiating research on quantum-resistant algorithms and security
protocols. The violation of the Ethical Statement rules may result in severe
consequences.
3.2.9. Sustainable cybersecurity practices To verify originality, your article may be checked by the originality
detection software iThenticate. See also http://www.elsevier.com/edit
• Investigating the environmental impact of cybersecurity operations ors/plagdetect.
and developing green computing practices in cyber intelligence. I agree with the above statements and declare that this submission
• Research on energy-efficient AI algorithms and sustainable data follows the policies of Solid State Ionics as outlined in the Guide for
center designs. Authors and in the Ethical Statement.
These future research directions aim to address the complex and [1] J.R.N.Maria Bada, Chapter 4 - The social and psychological impact of cyberattacks.
Emerging Cyber Threats and Cognitive Vulnerabilities, Academic Press, 2020,
evolving landscape of cyber threats and the societal implications of pp. 73–92.
automated cyber intelligence solutions, ensuring they are effective, [2] Y. Li, Q. Liu, A comprehensive review study of cyber-attacks and cyber security;
ethical, and equitable. As seen from Fig. 5, the highlighted social im Emerging trends and recent developments, Energy Rep. vol. 7 (2021) 8176–8186.
[3] F. Sufi, A global cyber-threat intelligence system with artificial intelligence and
pacts visible within the Now phase have been realized with Release 1.0 convolutional neural network, Decis. Anal. J. vol. 9 (100364) (2023).
of the cyber intelligence solution. Next versions of the solutions (e.g., [4] F. Sufi, Social media analytics on Russia–Ukraine cyber war with natural language
Research 1.1, Release 2.0, and Release 2.1) will address future research processing: perspectives and challenges, Information vol. 14 (9) (2023) 485.
[5] F. Sufi, Novel application of open-source cyber intelligence, Electronics vol. 12 (17)
endeavors specified within Next and Later phases. (2023) 3610.
In conclusion, these studies advance knowledge by providing [6] F. Sufi, A new AI-based semantic cyber intelligence agent, Future Internet vol. 15
actionable insights into cybersecurity challenges. The outcomes high (7) (2023) 231.
[7] F. Sufi, A new social media-driven cyber threat intelligence, Electronics vol. 12 (5)
light the potential for global collaboration, the accessibility of advanced
(2023) 1242.
technologies, and the alignment with broader sustainable development [8] F. Sufi, Algorithms in low-code-no-code for research applications: a practical
goals. By transcending specialized language and fostering interdisci review, Algorithms vol. 16 (2) (2023) 108.
plinary conversations, the implications of this work extend beyond the [9] United Nations, The 17 Goals, [Online]. Available: https://sdgs.un.org/goals.
[Accessed 11 11 2023].
specific field of cyber intelligence, contributing to the broader dialog on [10] F. Sufi, AI-GlobalEvents: a software for analyzing, identifying and explaining
achieving beneficial societal impacts and reducing harmful effects. global events with artificial intelligence, Softw. Impacts vol. 11 (100218) (2022).
[11] F. Sufi, Identifying the drivers of negative news with sentiment, entity and
regression analysis, Int. J. Inf. Manag. Data Insights vol. 2 (1) (2022) 100074.
Ethical statement for solid state ionics