You are on page 1of 7

Societal Impacts 3 (2024) 100047

Contents lists available at ScienceDirect

Societal Impacts
journal homepage: www.journals.elsevier.com/societal-impacts

Open-source cyber intelligence research through PESTEL framework:


Present and future impact
Fahim K. Sufi
School of Public Health and Preventive Medicine, Faculty of Medicine, Nursing and Health Sciences, Monash University, 553 St. Kilda Rd., Level 4, Melbourne, VIC
3004, Australia

A R T I C L E I N F O A B S T R A C T

Keywords: Recent scholarly endeavors in the domain of Cyber Intelligence have unveiled its multifaceted implications,
Cyber intelligence intricately interwoven with various Sustainable Development Goals (SDGs), notably encompassing Goal 9 (In­
Sustainable open-source intelligence dustry, Innovation, and Infrastructure), Goal 11 (Sustainable Cities and Communities), Goal 16 (Peace, Justice
PESTEL framework
and Strong Institutions), among others. This study intricately dissects the symbiotic nexus between Cyber In­
Future directions of cyber research
Societal impact of cyber
telligence research and these SDGs, whilst simultaneously unraveling its profound reverberations across the
diverse dimensions of the PESTEL (Political, Economic, Social, Technological, Environmental, and Legal)
framework. Ten critical impacts inherent in current research works on cyber intelligence were identified, sub­
sequently juxtaposing these impacts within the PESTEL dimensions. This analytical process further unraveled an
additional eleven critical impacts yet to be addressed by current research works on cyber intelligence. Addressing
these additional 11 impacts in forthcoming research endeavors is posited as a catalyst for optimizing societal
benefits across the diverse spectra of PESTEL dimensions. Moving on from categorizing and classifying societal
impacts of cyber research within PESTEL framework, this study finally establishes a strategic roadmap of 11
future research directions on cyber intelligence like sustainable cyber security practices, mental health aspects of
cyber victimhood, ethical AI in cybersecurity among others. Fostering a cross-disciplinary dialog, this work
contributes to the broader discourse on harnessing cyber intelligence for societal betterment, mitigating the
potential detrimental effects cyber threats.

SPECIFICATIONS TABLE (All sections are mandatory unless


marked otherwise)

E-mail address: fahim.sufi@monash.edu.

https://doi.org/10.1016/j.socimp.2024.100047
Received 11 December 2023; Received in revised form 8 February 2024; Accepted 12 February 2024
Available online 15 February 2024
2949-6977/© 2024 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-
nc-nd/4.0/).
F.K. Sufi Societal Impacts 3 (2024) 100047

Subject area 1710


Category/ Education
categories of Political
societal impact Economic
Societal
Technological
Environmental
Legal
Sustainable Please select SDGs from the list below. You can select multiple SDGs.
Development GOAL 4: Quality Education
Goals (SDGS) the GOAL 8: Decent Work and Economic Growth
research GOAL 9: Industry, Innovation and Infrastructure
contributes to GOAL 11: Sustainable Cities and Communities
GOAL 12: Responsible Consumption and Production
GOAL 15: Life on Land
GOAL 16: Peace and Justice Strong Institutions
GOAL 17: Partnerships to achieve the Goal
Resource [1]https://app.powerbi.com/view?
availability r=eyJrIjoiMzRmNjU2YjItNDk2Zi00YWU3LThjYzctYmIyOGYwYzQ1OWExIiwidCI6IjBkMWI4YmRlLWZmYzEtNGY1Yy05NjAwLTJhNzUzZGFjYmEwNSJ9
[2]https://app.powerbi.com/view?
r=eyJrIjoiYWJjOGY5YTUtZDBlNy00MTg1LWFkMTMtM2RmYzYzODQ1NzE1IiwidCI6IjBkMWI4YmRlLWZmYzEtNGY1Yy05NjAwLTJhNzUzZGFjYmEwNSJ9.
Related research [1] F. Sufi, "A global cyber-threat intelligence system with artificial intelligence and convolutional neural network," Decision Analytics Journal, vol. 9, no. 100364,
article OR 2023, DOI: https://doi.org/10.1016/j.dajour.2023.100364
Related [2] F. Sufi, "Social Media Analytics on Russia–Ukraine Cyber War with Natural Language Processing: Perspectives and Challenges," Information, vol. 14, no. 9, p. 485,
supporting 2023, DOI: https://doi.org/10.3390/info14090485
information [3] F. Sufi, "Novel Application of Open-Source Cyber Intelligence," Electronics, vol. 12, no. 17, p. 3610, 2023, DOI: https://doi.org/10.3390/electronics12173610
Please provide a [4] F. Sufi, "A New AI-Based Semantic Cyber Intelligence Agent," Future Internet, vol. 15, no. 7, p. 231, 2023, DOI: https://doi.org/10.3390/fi15070231
link to the [5] F. Sufi, "A New Social Media-Driven Cyber Threat Intelligence," Electronics, vol. 12, no. 5, p. 1242, 2023, DOI: https://doi.org/10.3390/electronics12051242
webpage if [6] F. Sufi, "Algorithms in Low-Code-No-Code for Research Applications: A Practical Review," Algorithms, vol. 16, no. 2, p. 108, 2023, DOI: https://doi.
relevant org/10.3390/a16020108
Stage of research In Progress

1. Social impact utilization of social media data.


The research work in [5] on open-source cyber intelligence directly
In light of contemporary scholarly investigations, it has become addresses Goal 3: Good Health and Well-being. By automating the
increasingly evident that cyber-attacks manifest profound influences at generation of country-level cyber intelligence, the authors contribute to
both psychological and behavioral strata, precipitating far-reaching the well-being of societies by enhancing their resilience against cyber
ramifications at the societal echelon [1]. Beyond the societal sphere, threats. The innovative approach presented in this paper aligns with
these incursions in the digital domain have exhibited multifaceted re­ Goal 12: Responsible Consumption and Production, as it promotes
percussions, encompassing economic, commercial, cultural, and responsible practices in handling cyber-related data.
governmental domains, thereby underscoring their pervasive and com­ Moving to the study in [6], which advocates for an AI-based semantic
plex nature [2]. The collection of six academic papers ([3–8]) provides a cyber intelligence agent, the authors contribute to Goal 8: Decent Work
profound contribution to Sustainable Development Goals (SDG) [9] and Economic Growth. The proposed solution enhances the speed and
from the perspective of Cyber Intelligence using publicly accessible in­ comprehensiveness of cyber intelligence, creating opportunities for
formation, aligning with the overarching goal of advancing societal economic growth while addressing the challenges posed by cyber
well-being and fostering a deeper understanding of critical issues. These threats. Additionally, the research aligns with Goal 15: Life on Land, as it
recent studies hold significant social importance and can lead to trans­ strives to mitigate the adverse effects of cyber threats on individuals’
formative impacts on various levels. psychological well-being.
Most recent research work in [3] pioneers a global cyber intelligence Literature in [7] addresses the projected USD 10.5 trillion in dam­
solution integrating artificial intelligence and convolutional neural ages from cyber threats in 2025, presenting a social media-driven cyber
networks, offering a groundbreaking approach to country-wide cyber threat intelligence framework that employs AI and Natural Language
threat analysis. The study in [3] introduces a global cyber-threat intel­ Processing (NLP) to comprehend contextual information and generate
ligence system, utilizing artificial intelligence (AI) and deep learning, countrywide threat indexes. By generating countrywide threat indexes,
thereby contributing to Goal 9: Industry, Innovation, and Infrastructure. the research aids decision-makers in adjusting cyber preparedness, thus
By autonomously collecting and analyzing multidimensional mitigating the detrimental impacts of cyber threats on societies. The
cyber-attack data, the proposed system aids in creating a resilient and work aligns with Goal 13: Climate Action, as it seeks to address the
innovative foundation for addressing the growing challenges in the projected damages from cyber threats in 2025.
cyber realm. This work is crucial in achieving Goal 16: Peace and Justice Finally, [8] reviews algorithms in low-code-no-code platforms,
Strong Institutions, as it facilitates evidence-based decisions on global emphasizing Goal 4: Quality Education. By exploring the use of these
cyber threats, promoting a secure and just digital landscape. platforms in various research domains, the authors contribute to the
The research paper in [4], focusing on the Russia–Ukraine cyber war, democratization of knowledge and the advancement of education. The
the authors leverage social media analytics and natural language pro­ practical implementation of a cyber-attack monitoring algorithm aligns
cessing to contribute to Goal 11: Sustainable Cities and Communities. By with Goal 6: Clean Water and Sanitation, as it promotes clean and secure
unveiling unprecedented insights into cyber incidents and public senti­ digital environments.
ment, the research enhances understanding of complex cyber conflicts, In essence, these research works (i.e., [3–8]) significantly contribute
ultimately fostering sustainable and secure communities. Additionally, to the common effort to improve society by addressing diverse societal
the paper aligns with Goal 17: Partnerships to achieve the Goal, as it goals and values outlined in the SDGs [9]. In the broader context, cyber
encourages collaboration in addressing global cyber threats through the intelligence research works in [3-8] predominantly focus on addressing

2
F.K. Sufi Societal Impacts 3 (2024) 100047

Fig. 1. Generic Methodology of obtaining Open-Source Cyber Intelligence as per [3] [4] [5] [6] [7] [8].

Goal 9 (Industry, Innovation, and Infrastructure) and Goal 11 (Sus­ These advanced algorithms help us understand Twitter conversa­
tainable Cities and Communities), identifying them as the paramount tions and content much like how humans understand using their
SDGs. They offer practical insights and solutions to pressing issues in the brains.
cyber domain, fostering a safer, more innovative, and interconnected • Examination of geopolitical, socioeconomic, psychological, and so­
global society. cietal dimensions in the cyber intelligence framework.

2. Methodology 2.4. Low-code-no-code platforms

The research methodology across the six studies as represented in Low-code-no-code platforms are software development platforms
[3–8] involves a systematic integration of advanced technologies, pri­ that enable users to create applications with minimal or no coding skills,
marily AI and NLP, to address complex issues in the field of cyber in­ typically through visual interfaces and pre-built components.
telligence. The following key components encapsulate the overarching
methodology: • Identification of research works using platforms such as Microsoft
Power Automate, Microsoft Power BI, Microsoft SQL Server as
2.1. AI integration depicted in Fig. 1.
• Practical demonstration of implementing a cyber-attack monitoring
Systematic deployment of AI techniques for autonomously collecting algorithm using low-code platforms, emphasizing the accessibility
and analyzing multidimensional cyber-attack data. and applicability of the approach in multiple platforms (e.g., iOS,
Android, Windows). As shown in Fig. 1, this innovative architecture
• Consistent utilization of deep learning for anomaly detection and allows fully automated cyber identification and analysis in a more
prediction. sustainable manner with pervasive accessibilities in all computa­
• Integration of advanced AI algorithms for sentiment analysis, loca­ tional ecosystem.
tion detection, translation, and other analytical dimensions.
Collectively, this methodology provides a transferable and replicable
2.2. Open-source data utilization framework that leverages advanced technologies, ensuring universal
accessibility and applicability. The use of AI, NLP, publicly available
Open-Source data refers to information that are publicly accessible data, and low-code platforms demonstrates a commitment to improve
and available. Automated generation of country-level cyber intelligence social conditions and to understand cybersecurity challenges in a uni­
through the amalgamation of social media posts and open-source cyber- versally comprehensible manner. This innovative approach was
attack statistics as shown in Fig. 1. formerly applied to analyze worldwide events for anomaly detection,
prediction, root-cause analysis, and the identification of correlated
• Application of AI-based algorithms, including deep learning and factors [10] [11].
prediction algorithms, to derive actionable insights.
• Utilization of diverse open-intelligence cyber-attack statistics from 3. Results and implications
multiple web links.
These research works present 10 critical societal impacts as critically
2.3. Multilingual analysis analyzed in Fig. 2. Fig. 2 refrains from assigning a specific ranking to the
10 critical social impacts, acknowledging that diverse strategic per­
Comprehensive analysis of social media data, particularly Twitter, spectives may lead to varying prioritizations. Within the scope of this
from a diverse user base spanning multiple languages. study, these 10 critical societal impacts were identified, then these
critical societal impacts were framed within the dimensions of Political,
• Application of NLP algorithms, including language detection, trans­ Economic, Social, Technological, Environment, and Legal (PESTEL) in
lation, sentiment analysis, topic analysis, and thematic analysis. Fig. 3. Next, 11 more societal impacts within PESTEL framework that

3
F.K. Sufi Societal Impacts 3 (2024) 100047

Fig. 2. Critical societal Impact already achieved with research in [3] [4] [5] [6] [7] [8].

could be addressed by future studies were identified (as depicted in 3.1.1. Cybersecurity enhancement
Fig. 4). Finally, the 11 possible societal impacts were translated into 11
future direction of research, so that a pervasive impact on all dimension • Advanced AI Tools: Development of sophisticated AI-driven cyber­
of PESTEL could be harnessed. security tools for improved threat detection and prevention.
• Robust Defense Mechanisms: Strengthening of cybersecurity mea­
3.1. Impacts of current research on PESTEL dimensions sures in both public and private sectors to mitigate data breaches.

This section describes the 10 critical impacts by the studies in [3] [4] 3.1.2. National security strengthening
[5] [6] [7] [8] as shown in Fig. 2.
• Infrastructure Protection: Enhanced tools for monitoring and pre­
dicting cyber threats to safeguard national infrastructure.

Fig. 3. Critical Societal impacts achieved by [3–8] in multiple dimensions of PESTEL.

4
F.K. Sufi Societal Impacts 3 (2024) 100047

Fig. 4. 11 critical societal impacts required to be addressed in future.

• Governmental Response Efficiency: Improved government capabil­ 3.1.7. Global cybersecurity collaboration
ities to anticipate and respond effectively to cyber-attacks.
• International Cooperation Enhancement: Fostering international
3.1.3. Economic damage control in cybersecurity collaboration in combating cybercrime and cyber warfare.
• Global Standards Development: Contributing to the development of
• Reduced Financial Losses: Early detection and prevention of cyber global cybersecurity standards and protocols.
attacks to minimize economic impacts on businesses.
• Market Stability Preservation: Protection of business assets to 3.1.8. Social media in cyber intelligence
maintain market stability and consumer trust.
• Real-Time Information Source: Highlighting social media’s role as a
3.1.4. AI and ML technological leap valuable source of real-time cyber threat intelligence.
• Security and Intelligence Diversification: Opening new avenues for
• AI Boundary Expansion: Pushing the boundaries in AI and machine using social media analytics in broader security and intelligence
learning, especially in deep learning and NLP. contexts.
• Innovation Catalyst: Encouraging further exploration and innovation
in AI, with potential cross-disciplinary breakthroughs. 3.1.9. Cyber policy and regulation influence

3.1.5. Strategic cybersecurity decision-making • Guidance on crafting Effective Policies: Providing insights to inform
policymakers in crafting effective cyber laws and regulations.
• Data-Driven Strategies: Enabling decision-makers to formulate • Balanced Policy Development: Aiding in the development of policies
effective cybersecurity strategies based on current trends and that balance security, privacy, and ethical considerations.
predictions.
• Effective Outcome Assurance: Ensuring more effective cybersecurity 3.1.10. Improved cyber crisis management
outcomes through informed decision-making.
• Enhanced Crisis Response: Aiding in faster and more accurate re­
3.1.6. Cyber threat awareness and education sponses to cyber incidents for better crisis management.
• Strategic Response Planning: Helping in the development of con­
• Elevation of Public Awareness: Increasing public knowledge about tingency plans and strategies for organized responses to cyber
the prevalence and sophistication of cyber threats. emergencies.
• Promotion of Safe Online Practices: Educating individuals and or­
ganizations on cybersecurity importance for safer online behavior. The culmination of these research endeavors as represented in [3–8]
yields profound implications for the advancement of knowledge in
addressing cyber threats and fostering societal well-being. The outcomes
underscore several key points with broad implications in society as
shown in Fig. 2 and Fig. 3.

5
F.K. Sufi Societal Impacts 3 (2024) 100047

Fig. 5. Future research endeavors on Cyber Intelligence for maximizing societal impact.

The research aligns with multiple SDGs, particularly Goals 9 (In­ 3.2.2. Election security enhancement
dustry, Innovation, and Infrastructure), 11 (Sustainable Cities and
Communities), and 17 (Partnerships to achieve the Goal), emphasizing • Development of advanced algorithms for detecting and mitigating
the interdisciplinary nature of cyber intelligence and its impact on so­ cyber threats specifically targeting electoral systems.
cietal well-being. As opposed to Fig. 3 (that shows critical societal • Research on combating misinformation and ensuring the integrity of
impact already realized by [3–8]), Fig. 4 strategically posits 11 more information during election cycles using AI-driven tools.
critical societal impacts that needs to be addressed in future. Addressing
these 11 critical impacts in next phases of research in cyber intelligence 3.2.3. Cybersecurity solutions for SMEs
would ensure maximum benefit for the society at multiple PESTEL
dimensions. • Designing cost-effective, scalable cyber intelligence tools tailored for
small and medium-sized enterprises.
3.2. Future research direction • Studies on the unique vulnerabilities of SMEs and development of
specialized training programs to enhance their cyber resilience.
Addressing these additional areas of impact (as shown in Section 3.1
and Fig. 4) in automated cyber intelligence solutions requires a multi­ 3.2.4. Cybersecurity insurance and risk analytics
faceted approach in future research. Here are 11 potential future
research endeavor to materialize possible impacts depicted in Fig. 5: • Integrating advanced cyber intelligence insights into cybersecurity
insurance models and risk assessment frameworks.
3.2.1. Geopolitical dynamics and cyber intelligence • Research on predictive analytics for cyber risk management and its
application in the insurance industry.
• Research on the influence of cyber intelligence in international re­
lations and its impact on global power shifts. 3.2.5. Bridging the digital divide in cybersecurity
• Studies on the use of cyber intelligence in understanding and coun­
tering foreign influence operations, especially in sensitive geopolit­ • Investigating strategies to provide equal access to cyber intelligence
ical contexts. tools across different socio-economic groups.
• Developing community-focused cyber intelligence education and
awareness programs.

6
F.K. Sufi Societal Impacts 3 (2024) 100047

3.2.6. Mental health aspects of cyber victimhood manuscript /insert title/ the following is fulfilled:

• Studies on the psychological impact of cyber-attacks and the devel­ 1) This material is the authors’ own original work, which has not been
opment of support systems for victims. previously published elsewhere.
• Integration of psychological insights into the design of cyber intel­ 2) The paper is not currently being considered for publication
ligence tools to provide more empathetic responses to victims. elsewhere.
3) The paper reflects the authors’ own research and analysis in a
3.2.7. Ethical AI in cybersecurity truthful and complete manner.
4) The paper properly credits the meaningful contributions of co-
• Research on ethical frameworks and guidelines for the use of AI in authors and co-researchers.
cybersecurity, focusing on bias mitigation and transparency. 5) The results are appropriately placed in the context of prior and
• Development of AI auditing methods to ensure ethical compliance in existing research.
automated cyber intelligence solutions. 6) All sources used are properly disclosed (correct citation). Literally
copying of text must be indicated as such by using quotation marks
3.2.8. Quantum computing and cybersecurity preparedness and giving proper reference.
7) All authors have been personally and actively involved in substantial
• Exploring the implications of quantum computing on current work leading to the paper, and will take public responsibility for its
encryption methods and cyber intelligence practices. content.
• Initiating research on quantum-resistant algorithms and security
protocols. The violation of the Ethical Statement rules may result in severe
consequences.
3.2.9. Sustainable cybersecurity practices To verify originality, your article may be checked by the originality
detection software iThenticate. See also http://www.elsevier.com/edit
• Investigating the environmental impact of cybersecurity operations ors/plagdetect.
and developing green computing practices in cyber intelligence. I agree with the above statements and declare that this submission
• Research on energy-efficient AI algorithms and sustainable data follows the policies of Solid State Ionics as outlined in the Guide for
center designs. Authors and in the Ethical Statement.

3.2.10. International cyber law and governance Funding

• Studies on the development of international legal frameworks and No Funding.


standards for cyber intelligence activities.
• Research on cross-border cyber law enforcement cooperation and Acknowledgements
jurisdictional challenges.
The author would like to thank Prof. Edris Alam of Emergency &
3.2.11. Privacy and data protection in cyber intelligence Disaster Management, Rabdan Academy, Abu Dhabi, UAE for evaluating
and providing his valuable feedback on Cyber Intelligence app. Also,
• Balancing effective cyber intelligence with privacy rights, focusing Special thanks to the COEUS Institute, Kennebunk, Maine, USA, where
on consent, data minimization, and transparency. the author works as a Chief Technology Officer.
• Developing privacy-preserving AI techniques for cyber intelligence,
like federated learning and differential privacy. References

These future research directions aim to address the complex and [1] J.R.N.Maria Bada, Chapter 4 - The social and psychological impact of cyberattacks.
Emerging Cyber Threats and Cognitive Vulnerabilities, Academic Press, 2020,
evolving landscape of cyber threats and the societal implications of pp. 73–92.
automated cyber intelligence solutions, ensuring they are effective, [2] Y. Li, Q. Liu, A comprehensive review study of cyber-attacks and cyber security;
ethical, and equitable. As seen from Fig. 5, the highlighted social im­ Emerging trends and recent developments, Energy Rep. vol. 7 (2021) 8176–8186.
[3] F. Sufi, A global cyber-threat intelligence system with artificial intelligence and
pacts visible within the Now phase have been realized with Release 1.0 convolutional neural network, Decis. Anal. J. vol. 9 (100364) (2023).
of the cyber intelligence solution. Next versions of the solutions (e.g., [4] F. Sufi, Social media analytics on Russia–Ukraine cyber war with natural language
Research 1.1, Release 2.0, and Release 2.1) will address future research processing: perspectives and challenges, Information vol. 14 (9) (2023) 485.
[5] F. Sufi, Novel application of open-source cyber intelligence, Electronics vol. 12 (17)
endeavors specified within Next and Later phases. (2023) 3610.
In conclusion, these studies advance knowledge by providing [6] F. Sufi, A new AI-based semantic cyber intelligence agent, Future Internet vol. 15
actionable insights into cybersecurity challenges. The outcomes high­ (7) (2023) 231.
[7] F. Sufi, A new social media-driven cyber threat intelligence, Electronics vol. 12 (5)
light the potential for global collaboration, the accessibility of advanced
(2023) 1242.
technologies, and the alignment with broader sustainable development [8] F. Sufi, Algorithms in low-code-no-code for research applications: a practical
goals. By transcending specialized language and fostering interdisci­ review, Algorithms vol. 16 (2) (2023) 108.
plinary conversations, the implications of this work extend beyond the [9] United Nations, The 17 Goals, [Online]. Available: https://sdgs.un.org/goals.
[Accessed 11 11 2023].
specific field of cyber intelligence, contributing to the broader dialog on [10] F. Sufi, AI-GlobalEvents: a software for analyzing, identifying and explaining
achieving beneficial societal impacts and reducing harmful effects. global events with artificial intelligence, Softw. Impacts vol. 11 (100218) (2022).
[11] F. Sufi, Identifying the drivers of negative news with sentiment, entity and
regression analysis, Int. J. Inf. Manag. Data Insights vol. 2 (1) (2022) 100074.
Ethical statement for solid state ionics

Hereby, I /insert author name/ consciously assure that for the

You might also like