Analysis and Response Strategy of Cross-Community Rumors Using Mixed Multilayer Method for Enterprise Cyber Warriors

Yi Wei Ma, Chun Yao Chang, Yen Neng Chiang, Jiann Liang Chen, Chih Hung Chen, Wen Tsung Chang, Shun Ching Yang, Ying Hsun Lai*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review


In the age of information explosion, it is easy for people to receive many messages, and it is difficult to verify the authenticity of each message. Therefore, people often quickly and forward the acquired information and share anonymous information, rather than absorbing it after verification. The study questions current Artificial Intelligence (AI) detection methods, arguing that a simple dichotomy cannot distinguish between true and false information. This study proposes a mixed method to analyze events based on the dissemination and interaction of false information in online enterprise communities from the perspective of an observer. The event explores multiple features based on various characteristics, such as motivation, purpose, intention, and behavior. Experimental results show that the proposed method can effectively identify false information with high risk. Additionally, this study discusses the effectiveness and response strategies of the enterprise cyber warrior based on the mixed multi-layer analysis. This study provides a preliminary study of mixed cognitive warfare identification and immediate response behavior for corporate Internet rumors.

Original languageEnglish
Pages (from-to)131386-131393
Number of pages8
JournalIEEE Access
Publication statusPublished - 2022


  • Cross-community rumors
  • enterprise cyber warrior
  • enterprise information management
  • mixed analysis method
  • response strategies

ASJC Scopus subject areas

  • General Computer Science
  • General Materials Science
  • General Engineering
  • Electrical and Electronic Engineering


Dive into the research topics of 'Analysis and Response Strategy of Cross-Community Rumors Using Mixed Multilayer Method for Enterprise Cyber Warriors'. Together they form a unique fingerprint.

Cite this