{"id":358,"date":"2025-08-07T09:36:23","date_gmt":"2025-08-07T09:36:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/?p=358"},"modified":"2025-08-07T09:39:14","modified_gmt":"2025-08-07T09:39:14","slug":"article-analysis-paper-are-bot-farms-friend-or-foe","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/article-analysis-paper-are-bot-farms-friend-or-foe\/","title":{"rendered":"Article Analysis Paper: Are Bot Farms Friend or Foe?"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/lh7-rt.googleusercontent.com\/docsz\/AD_4nXcbRWyC0va2QFduJiot0GllPMgAfrvF1pmf5azSZTenP54ZyeEdAyPSWticrBv5IgVYsuSulJX7dbxJZW8NUfA7ixd7jHXP3qeE3NdYfT4KRxAXwdstdnzwzwC6miF_RSje8Dwg_A?key=FAUyoWkmY9r6btqXDVaLZw\" width=\"635\" height=\"221\"><\/p>\n\n\n\n<p class=\"has-text-align-center\">Photo credits: <a href=\"https:\/\/www.reddit.com\/r\/Damnthatsinteresting\/comments\/1dqt70g\/a_phone_bot_far_m_in_action\/?share_id=3F03zgasqul3uJnIgBBBm&amp;utm_content=1&amp;utm_medium=android_app&amp;utm_name=androidcss&amp;utm_source=share&amp;utm_term=3\">Reddit<\/a>, google, <a href=\"https:\/\/cheq.ai\/blog\/bot-farms-what-are-they\/\">cheq.ai<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Abstract<\/strong><\/p>\n\n\n\n<p>Bot farms can come in many shapes, sizes and forms. They can be phone, PC-based<\/p>\n\n\n\n<p>or hybrid. The above picture shows a very small one, but they can be set up at a large<\/p>\n\n\n\n<p>industrial scale to include thousands of fake and automated accounts. The many<\/p>\n\n\n\n<p>articles used for this analysis breaks down how bot farms can be beneficial in parts, but<\/p>\n\n\n\n<p>how it can be utilized to disseminate false narratives and influence public opinion<\/p>\n\n\n\n<p>directly. It relates directly to social science principles because it is tied to human<\/p>\n\n\n\n<p>manipulation like we have never seen before. Understanding the principles might give<\/p>\n\n\n\n<p>us insight, crucial insight needed to be able to understand the intricacies and social<\/p>\n\n\n\n<p>institutions of human behavior, to help us create better policies and defenses. It might<\/p>\n\n\n\n<p>also be related to social economic theories due to the fact that bot farms can be used to<\/p>\n\n\n\n<p>manipulate the economy, by influencing what to buy or what to boycott.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Article Analysis Paper: Are Bot Farms Friend or Foe?<\/strong><\/p>\n\n\n\n<p>It is well known that Russian bot farms, discovered in many cities around Ukraine<\/p>\n\n\n\n<p>were purportedly attempting to sow discord and terror throughout Ukraine&#8217;s political<\/p>\n\n\n\n<p>landscape. Additionally the Department of Justice announced the seizure of 968 social<\/p>\n\n\n\n<p>media accounts and two domains used by Russian actors as well to spread<\/p>\n\n\n\n<p>disinformation in the United States and abroad. So as you can see, bot farms are not<\/p>\n\n\n\n<p>just used to set up only \u201clikes\u201d but it can have important social and political ramifications,<\/p>\n\n\n\n<p>propagate propaganda which can have serious social and political repercussions, used<\/p>\n\n\n\n<p>to sway public opinion, disseminate false information, and even tamper with elections.<\/p>\n\n\n\n<p>The Justice Department is still investigating many of the cases related to bot farms.<\/p>\n\n\n\n<p>A study showed that humans make about 80% of social media chatter regarding<\/p>\n\n\n\n<p>world events, with 20% coming from bots. ClickGuard claims that there are programs<\/p>\n\n\n\n<p> out there that imitates actual user behavior using scripts, to help evade social media<\/p>\n\n\n\n<p>companies&#8217; detection, making it difficult to track or distinguish from the two. It is stated<\/p>\n\n\n\n<p>that humans use different linguistic cues which require understanding and actual<\/p>\n\n\n\n<p>dialogue, bots only use simple words based on whatever categories they choose to<\/p>\n\n\n\n<p>present, they both have different communication structure, so why is it so difficult to<\/p>\n\n\n\n<p>detect?<\/p>\n\n\n\n<p>These findings are based on a comprehensive examination of tweets from over<\/p>\n\n\n\n<p>200 million users on social media during seven different events. When<\/p>\n\n\n\n<p>social-cybersecurity researchers discovered that social media users were made up of<\/p>\n\n\n\n<p>both human and artificial agents known as bots, social media bots became extremely<\/p>\n\n\n\n<p>popular and a global sensation. Depending on how sophisticated and complex their<\/p>\n\n\n\n<p>programming can be, it determines how bots can perform the vast numerous automated<\/p>\n\n\n\n<p>operations, they can click webpages or buttons, can even complete extremely<\/p>\n\n\n\n<p>complicated tasks that resemble actual human behaviors, including posting material,<\/p>\n\n\n\n<p>leaving comments, or completing transactions.<\/p>\n\n\n\n<p>Like we have discussed, there are many challenges that we come into face,<\/p>\n\n\n\n<p>many research that state the obvious, but again our world in cybersecurity is evolving<\/p>\n\n\n\n<p>quickly with every increasing threat, so why not use bots in our favor. To be able to<\/p>\n\n\n\n<p>integrate bots to our fight in cybersecurity capabilities, to be able to have responses in<\/p>\n\n\n\n<p>real time is becoming very common in the cybersecurity world.<\/p>\n\n\n\n<p>They play strategically crucial roles in cybersecurity, automating processes<\/p>\n\n\n\n<p>including incident response, threat detection, and vulnerability screening to mention a<\/p>\n\n\n\n<p>few. They are able to operate continuously non-stop, processing enormous amounts of<\/p>\n\n\n\n<p>data that would be impossible for any human analyst could never manage throughout<\/p>\n\n\n\n<p>their lifetime. Quick fact: Over 50% of all internet traffic is currently processed by vast<\/p>\n\n\n\n<p>bots, demonstrating their widespread use in cyberspace operations, both offensive and<\/p>\n\n\n\n<p>defensive.<\/p>\n\n\n\n<p>The concepts described in this analysis relate to most of the cybersecurity class<\/p>\n\n\n\n<p>materials. Social cybersecurity gives priority to examine how cyber risks affect people<\/p>\n\n\n\n<p>on a social level. Because of its unique situation, this field can tackle problems like<\/p>\n\n\n\n<p>assaults on social media, including spam, cybercrime, cyberbullying, terrorist actions,<\/p>\n\n\n\n<p>and community identification where bots farms can be directly involved. Bots can be<\/p>\n\n\n\n<p>used as detection tools in cybersecurity, by creating different techniques and safeguards<\/p>\n\n\n\n<p>we can potentially get ahead of the problem, and stop social cyberattacks before they<\/p>\n\n\n\n<p>can even spread discounted throughout all users, it could help us be proactive in the<\/p>\n\n\n\n<p>matter. This is a problem that needs to be handled for sure, it does not discriminate, it<\/p>\n\n\n\n<p>affects everyone in one way or another, so it is imperative that it gets regulated at the<\/p>\n\n\n\n<p>highs level so people won&#8217;t be manipulated, since it seems that now at day it has<\/p>\n\n\n\n<p>become easier to influence human beings as never before. We still have many<\/p>\n\n\n\n<p>challenges that we need to figure out as a society, but it seems that with the use of bots,<\/p>\n\n\n\n<p>we are heading in the right direction.<\/p>\n\n\n\n<p>There are many types of bots in cybersecurity that are created and programmed<\/p>\n\n\n\n<p>to do different functions, some are defensive, and some are offensive which<\/p>\n\n\n\n<p>professionals deploy to counterattack malicious bots to include the following:<\/p>\n\n\n\n<p>1- Defensive Bots: which are used to help protect networks like Intrusion<\/p>\n\n\n\n<p>Detection or Incident Detection Bots<\/p>\n\n\n\n<p>2- Offensive Bots: are used to initiate attacks by hackers like DDos Bots, Spam<\/p>\n\n\n\n<p>Bots<\/p>\n\n\n\n<p>3- Recconnaissace Bots: These are my favorite bots, they are like spies looking<\/p>\n\n\n\n<p>for open ports and looking for exploitable weaknesses to provide information about the<\/p>\n\n\n\n<p>malicious targets.<\/p>\n\n\n\n<p>By adopting Bots in cybersecurity we can find many advantages like, there are<\/p>\n\n\n\n<p>fast, don&#8217;t require sleep, are efficient, the amount of data they can process is just<\/p>\n\n\n\n<p>baffling, can identify threats, manage scalability with ease, their consistent and reliable,<\/p>\n\n\n\n<p>are cost-effective and many more, we can write another paper on just there accolades<\/p>\n\n\n\n<p>they can perform.<\/p>\n\n\n\n<p>But like anything, bots are not perfect as well, they can have limitations like<\/p>\n\n\n\n<p>creating false positives, might become victim of the adaptability of the sophistication of<\/p>\n\n\n\n<p>cybercriminals, vulnerability to exploit and many more as well.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>So are bot farms friend or foe? Like any technology it can be used for good or evil, so it<\/p>\n\n\n\n<p>might feel divided because it might create more vulnerabilities, but also much good can<\/p>\n\n\n\n<p>come from it.<\/p>\n\n\n\n<p>Understanding the human mind might help us ride the train in the right direction, by<\/p>\n\n\n\n<p>creating and improving them, for sure it has its advantages, because at the end of the<\/p>\n\n\n\n<p>day we are only human, and we can only process things at a certain level.<\/p>\n\n\n\n<p>Additionally the paper also highlighted numerous principles of social sciences in<\/p>\n\n\n\n<p>cybersecurity, such as the relationship between social science research needed to understand their<\/p>\n\n\n\n<p>creation and placements, the methods needed to incorporate in cybersecurity, human<\/p>\n\n\n\n<p>factors and the psychology it takes on our lives via social media, the importance of<\/p>\n\n\n\n<p>cybersecurity culture and social science via the educational perspective needed to<\/p>\n\n\n\n<p>succeed.<\/p>\n\n\n\n<p>So my vote of confidence goes that if used correctly bots can be a great tool in<\/p>\n\n\n\n<p>cybersecurity, many factors that are positive and are shown in many researches, and<\/p>\n\n\n\n<p>there have been many contributions with the overall positivity that bots can be a<\/p>\n\n\n\n<p>success in the field of Cybersecurity, and one day, if used correctly, might help get us<\/p>\n\n\n\n<p>back in shape getting read of all the misinformation currently shown around the world.<\/p>\n\n\n\n<p> <strong>Resources:<\/strong><\/p>\n\n\n\n<p>Mulahuwaish, A., Qolomany, B., Gyorick, K., Abdo, J. B., Aledhari, M., Qadir, J., Carley,<\/p>\n\n\n\n<p>K., &amp; Al-Fuqaha, A. (2025). A survey of social cybersecurity: Techniques for attack<\/p>\n\n\n\n<p>detection, evaluations, challenges, and future prospects. <em>Computers in Human Behavior<\/em><\/p>\n\n\n\n<p><em>Reports<\/em>, <em>18<\/em>, 100668. https:\/\/doi.org\/10.1016\/j.chbr.2025.100668<\/p>\n\n\n\n<p>Company Blog. (2024, September 17). <em>Bot farms: How they work &amp; threaten your<\/em><\/p>\n\n\n\n<p><em>business<\/em>. DataDome.co. https:\/\/datadome.co\/bot-management-protection\/bot-farm\/<\/p>\n\n\n\n<p>Office of Public Affairs Press Release. (2025, February 6). <em>Justice Department leads<\/em><\/p>\n\n\n\n<p><em>efforts among federal, international, and private sector partners to disrupt covert<\/em><\/p>\n\n\n\n<p><em>Russian government-operated Social Media Bot Farm<\/em>. United States Department of<\/p>\n\n\n\n<p>Justice.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.justice.gov\/archives\/opa\/pr\/justice-department-leads-efforts-among-federal-i\">https:\/\/www.justice.gov\/archives\/opa\/pr\/justice-department-leads-efforts-among-federal-i<\/a><\/p>\n\n\n\n<p>nternational-and-private-sector-partners<\/p>\n\n\n\n<p><em>What is a bot? types, mitigation &amp; challenges<\/em>. SentinelOne. (2025, July 22).<\/p>\n\n\n\n<p><a href=\"https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/what-is-a-bot\/#:~:text=The\">https:\/\/www.sentinelone.com\/cybersecurity-101\/cybersecurity\/what-is-a-bot\/#:~:text=The<\/a><\/p>\n\n\n\n<p>%20Role%20of%20Bots%20in%20Cybersecurity,-The%20role%20of&amp;text=On%20the<\/p>\n\n\n\n<p>%20offensive%20side%2C%20bots,deploy%20countermeasures%20against%20malici<\/p>\n\n\n\n<p>ous%20bots.<\/p>\n\n\n\n<p>Zhang, Y., Song, W., Koura, Y. H., &amp; Su, Y. (2023). Social Bots and Information<\/p>\n\n\n\n<p>Propagation in Social Networks: Simulating Cooperative and Competitive Interaction<\/p>\n\n\n\n<p>Dynamics. <em>Systems<\/em>, <em>11<\/em>(4), 210. https:\/\/doi.org\/10.3390\/systems11040210<\/p>\n\n\n\n<p>Haiz, H. (2024, September 9). <em>The rise of Phone Bot Farms: A shortcut to social media<\/em><\/p>\n\n\n\n<p><em>fame<\/em>. Wake Up Singapore.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-wake-up-singapore wp-block-embed-wake-up-singapore\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"aJmiMYjsrC\"><a href=\"https:\/\/wakeup.sg\/phone-bot-farms-social-media-fame\/\">The Rise of Phone Bot Farms: A Shortcut to Social Media Fame<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The Rise of Phone Bot Farms: A Shortcut to Social Media Fame&#8221; &#8212; Wake Up Singapore\" src=\"https:\/\/wakeup.sg\/phone-bot-farms-social-media-fame\/embed\/#?secret=D4oUmFVlk0#?secret=aJmiMYjsrC\" data-secret=\"aJmiMYjsrC\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Photo credits: Reddit, google, cheq.ai Abstract Bot farms can come in many shapes, sizes and forms. They can be phone, PC-based or hybrid. The above picture shows a very small one, but they can be set up at a large industrial scale to include thousands of fake and automated accounts. The many articles used for&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/2025\/08\/07\/article-analysis-paper-are-bot-farms-friend-or-foe\/\">Read More<\/a><\/div>\n","protected":false},"author":30571,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/358"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/users\/30571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/comments?post=358"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/358\/revisions"}],"predecessor-version":[{"id":361,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/posts\/358\/revisions\/361"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/media?parent=358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/categories?post=358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gonzalezcybersite\/wp-json\/wp\/v2\/tags?post=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}