{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:42:18Z","timestamp":1743054138059,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031195594"},{"type":"electronic","value":"9783031195600"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-19560-0_3","type":"book-chapter","created":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T14:10:15Z","timestamp":1678803015000},"page":"31-38","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fake News and Threats to IoT\u2014The Crucial Aspects of Cyberspace in the Times of Cyberwar"],"prefix":"10.1007","author":[{"given":"Aleksandra","family":"Pawlicka","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,15]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Arquilla, J., Ronfeldt, D.: Cyberwar is coming! Comp. Strateg. 12 (1993). https:\/\/doi.org\/10.1080\/01495939308402915","DOI":"10.1080\/01495939308402915"},{"key":"3_CR2","unstructured":"Brent, L.: NATO\u2019s role in cyberspace. Nato Rev. (2019)"},{"key":"3_CR3","unstructured":"Ballmer, D.: Ukraine Proves Cyber War Has No Borders. BlackBerry (2022)"},{"key":"3_CR4","unstructured":"Cisco: What Is Cybersecurity?. https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-cybersecurity.html"},{"key":"3_CR5","unstructured":"Frank, I., Odunayo, E.: Approach to cyber security issues in nigeria: challenges and solution. Int. J. Cogn. Res. Sci. Eng. Educ. 1 (2013)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1016\/j.bushor.2021.07.010","volume":"64","author":"A Pawlicka","year":"2021","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M., Kozik, R.: A $10 million question and other cybersecurity-related ethical dilemmas amid the COVID-19 pandemic. Bus. Horiz. 64, 729\u2013734 (2021). https:\/\/doi.org\/10.1016\/j.bushor.2021.07.010","journal-title":"Bus. Horiz."},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Wustrich, L., Pahl, M.-O., Liebald, S.: Towards an Extensible IoT Security Taxonomy. In: 2020 IEEE Symposium on Computers and Communications (ISCC). pp. 1\u20136. IEEE (2020). https:\/\/doi.org\/10.1109\/ISCC50000.2020.9219584","DOI":"10.1109\/ISCC50000.2020.9219584"},{"key":"3_CR8","unstructured":"International Telecommunications Union (ITU).: ITU-TX.1205: series X: data networks, open system communications and security: telecommunication security: overview of cybersecurity 2008 (2008)"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"185","DOI":"10.4236\/jis.2016.73014","volume":"07","author":"S Qadir","year":"2016","unstructured":"Qadir, S., Quadri, S.M.K.: Information Availability: An Insight into the Most Important Attribute of Information Security. J. Inf. Secur. 07, 185\u2013194 (2016). https:\/\/doi.org\/10.4236\/jis.2016.73014","journal-title":"J. Inf. Secur."},{"key":"3_CR10","unstructured":"Gargano, F.: Three Common Threat Actors and the One You Might Not Know About."},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M.: Cyberspace threats: Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers\u2019 perspective. In: Proceedings of the 15th International Conference on Availability, Reliability and Security. pp. 1\u201311. ACM, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3407023.3409181","DOI":"10.1145\/3407023.3409181"},{"key":"3_CR12","unstructured":"Ahmad, R., Yunos, Z.: A Dynamic Cyber Terrorism Framework. Int. J. Comput. Sci. Inf. Secur. 10(2) (2012)"},{"key":"3_CR13","unstructured":"Dziundziuk, D.V.: Stopping Cyber terror Countries must work together to thwart efforts of internet Criminals. Per Concordiam, J. Eur. Secur. Def. 2"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Pawlicka, A., Chora\u015b, M., Pawlicki, M.: The stray sheep of cyberspace a.k.a. the actors who claim they break the law for the greater good. Pers. Ubiquitous Comput. 25, 843\u2013852 (2021). https:\/\/doi.org\/10.1007\/s00779-021-01568-7","DOI":"10.1007\/s00779-021-01568-7"},{"key":"3_CR15","unstructured":"Ohlin, D., Govern, K., Oxford, C.F.: Nicol\u00f2 Bussolati \u201c The Rise of Non-State Actors in Cyberwarfare (2015)"},{"key":"3_CR16","unstructured":"Gorwa, R.: Computational Propaganda in Poland: False Amplifiers and the Digital Public Sphere (2017)"},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1515\/jms-2016-0184","volume":"4","author":"J Sigholm","year":"2013","unstructured":"Sigholm, J.: Non-State Actors in Cyberspace Operations. J. Mil. Stud. 4, 1\u201337 (2013). https:\/\/doi.org\/10.1515\/jms-2016-0184","journal-title":"J. Mil. Stud."},{"key":"3_CR18","unstructured":"Oracle: What is IoT? Oracle India (2019)"},{"key":"3_CR19","unstructured":"ENISA: Baseline Security Recommendations for IoT (2017)"},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Bugeja, J., Jacobsson, A., Davidsson, P.: An analysis of malicious threat agents for the smart connected home. In: 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). pp. 557\u2013562. IEEE (2017). https:\/\/doi.org\/10.1109\/PERCOMW.2017.7917623","DOI":"10.1109\/PERCOMW.2017.7917623"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MSP.2018.1331033","volume":"16","author":"E Ronen","year":"2018","unstructured":"Ronen, E., Shamir, A., Weingarten, A.-O., O\u2019Flynn, C.: IoT Goes Nuclear: Creating a Zigbee Chain Reaction. IEEE Secur. Priv. 16, 54\u201362 (2018). https:\/\/doi.org\/10.1109\/MSP.2018.1331033","journal-title":"IEEE Secur. Priv."},{"key":"3_CR22","unstructured":"CSA.: Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products (2016)"},{"key":"3_CR23","unstructured":"Stavridis, J., Weinstein, D.: The Internet of Things Is a Cyberwar Nightmare. Foreign Policy (2016)"},{"key":"3_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-021-06720-1","author":"A Bobbio","year":"2022","unstructured":"Bobbio, A., Campanile, L., Gribaudo, M., Iacono, M., Marulli, F., Mastroianni, M.: A cyber warfare perspective on risks related to health IoT devices and contact tracing. Neural Comput. Appl. (2022). https:\/\/doi.org\/10.1007\/s00521-021-06720-1","journal-title":"Neural Comput. Appl."},{"key":"3_CR25","unstructured":"CISOMAG.: Cybercriminals Will leverage IoT and 5G for Large-Scale Attacks. Cisomag (2022)"},{"key":"3_CR26","unstructured":"Slaney, R.: SecurityScorecard Discovers new botnet, \u2018Zhadnost,\u2019 responsible for Ukraine DDoS attacks. SecurityScorecard (2022)"},{"key":"3_CR27","unstructured":"Bajak, F.: Ukraine says potent Russian hack against power grid thwarted. AP News (2022)"},{"key":"3_CR28","unstructured":"Turk, Z.: Technology as enabler of fake news and a potential tool to combat it. Eur. Parliam. (2018)"},{"key":"3_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocs.2022.101576","volume":"60","author":"R Kozik","year":"2022","unstructured":"Kozik, R., Kula, S., Chora\u015b, M., Wo\u017aniak, M.: Technical solution to counter potential crime: text analysis to detect fake news and disinformation. J. Comput. Sci. 60, 101576 (2022). https:\/\/doi.org\/10.1016\/j.jocs.2022.101576","journal-title":"J. Comput. Sci."},{"key":"3_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.107050","volume":"101","author":"M Chora\u015b","year":"2021","unstructured":"Chora\u015b, M., Demestichas, K., Gie\u0142czyk, A., Herrero, \u00c1., Ksieniewicz, P., Remoundou, K., Urda, D., Wo\u017aniak, M.: Advanced Machine Learning techniques for fake news (online disinformation) detection: a systematic mapping study. Appl. Soft Comput. 101, 107050 (2021). https:\/\/doi.org\/10.1016\/j.asoc.2020.107050","journal-title":"Appl. Soft Comput."},{"key":"3_CR31","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1257\/jep.31.2.211","volume":"31","author":"H Allcott","year":"2017","unstructured":"Allcott, H., Gentzkow, M.: Social media and fake news in the 2016 election. J. Econ. Perspect. 31, 211\u2013236 (2017). https:\/\/doi.org\/10.1257\/jep.31.2.211","journal-title":"J. Econ. Perspect."},{"key":"3_CR32","unstructured":"Cambridge Dictionary: Fake News"},{"key":"3_CR33","unstructured":"Wardle, C.: Fake news. It\u2019s complicated. First Draft (2017)"},{"key":"3_CR34","unstructured":"Lind, D.: President Donald Trump finally admits that \u201cfake news\u201d just means news he doesn\u2019t like. https:\/\/www.vox.com\/policy-and-politics\/2018\/5\/9\/17335306\/trump-tweet-twitter-latest-fake-news-credentials (2018)"},{"key":"3_CR35","unstructured":"Giuliani-Hoffman, F.: \u201cF*** News\u201d should be replaced by these words, Claire Wardle says. CNN Bus. (2017)"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Allcott, H., Gentzkow, M.: Social Media and Fake News in the 2016 Election. J. Econ. Perspect. (2017)","DOI":"10.3386\/w23089"},{"key":"3_CR37","unstructured":"Belluz, J.: Research fraud catalyzed the anti-vaccination movement. Let\u2019s not repeat history (2019)"},{"key":"3_CR38","doi-asserted-by":"publisher","unstructured":"Islam, M.S., Sarkar, T., Khan, S.H., Mostofa Kamal, A.-H., Hasan, S.M.M., Kabir, A., Yeasmin, D., Islam, M.A., Amin Chowdhury, K.I., Anwar, K.S., Chughtai, A.A., Seale, H.: COVID-19\u2013related infodemic and its impact on public health: a global social media analysis. Am. J. Trop. Med. Hyg. 103, 1621\u20131629 (2020). https:\/\/doi.org\/10.4269\/ajtmh.20-0812","DOI":"10.4269\/ajtmh.20-0812"},{"key":"3_CR39","unstructured":"Curtin, L.: The \u2018fake\u2019 news effect. Am. Nurse. (2020)"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Chora\u015b, M., Pawlicka, A., Kozik, R., Wo\u017aniak, M.: How machine learning may prevent the breakdown of democracy by contributing to fake news detection. IT Prof. (2022)","DOI":"10.1109\/MITP.2022.3151312"},{"key":"3_CR41","unstructured":"Alba, D., Satariano, A.: At Least 70 Countries have had disinformation campaigns, study finds. New York TImes (2019)"},{"key":"3_CR42","doi-asserted-by":"publisher","unstructured":"S\u0142ugocki, W., Sowa, B.: Disinformation as a threat to national security on the example of the COVID-19 pandemic. Secur. Def. Q. (2021) https:\/\/doi.org\/10.35467\/sdq\/138876","DOI":"10.35467\/sdq\/138876"},{"key":"3_CR43","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0260080","volume":"16","author":"B Kim","year":"2021","unstructured":"Kim, B., Xiong, A., Lee, D., Han, K.: A systematic review on fake news research through the lens of news creation and consumption: research efforts, challenges, and future directions. PLoS ONE 16, e0260080 (2021). https:\/\/doi.org\/10.1371\/journal.pone.0260080","journal-title":"PLoS ONE"},{"key":"3_CR44","unstructured":"Thomsen, I.: Russian disinformation is part of its war effort in Ukraine. How can the West respond? News@Northeastern (2022)"},{"key":"3_CR45","unstructured":"Martewicz, M.: War in Ukraine sparks panic buying at polish fuel stations. bloomberg (2022)"},{"key":"3_CR46","unstructured":"Jazeera, A.: Do not call Ukraine invasion a \u2018war\u2019, Russia tells media, schools. Al Jazeera. https:\/\/www.aljazeera.com\/news\/2022\/3\/2\/do-not-call-ukraine-invasion-a-war-russia-tells-media-schools (2022)"}],"container-title":["Springer Proceedings in Complexity","Research and Innovation Forum 2022"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-19560-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T14:11:58Z","timestamp":1678803118000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-19560-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031195594","9783031195600"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-19560-0_3","relation":{},"ISSN":["2213-8684","2213-8692"],"issn-type":[{"type":"print","value":"2213-8684"},{"type":"electronic","value":"2213-8692"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"15 March 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RIIFORUM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Research & Innovation Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"riiforum2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/rii-forum.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}