Tuesday, March 3, 2026

Academic Literature On Deepfakes And Related Topıcs In Taiwan: A Structural Topic Modeling Analysis Of Emerging Research Themes

 Abstract

Since its emergence in 2017, deepfake technology has evolved from a niche innovation into a global concern with significant implications for politics, security, ethics, and privacy. Its ability to generate synthetic yet hyper-realistic content—including video, audio, text, and images—has made it a powerful tool for both creative applications and malicious activities such as disinformation, fraud, and sexual exploitation. Taiwan, which has been repeatedly targeted by deepfake-driven disinformation campaigns and non-consensual content, presents a particularly critical case for understanding how academia engages with the challenges posed by this technology. This study conducts one of the first systematic analyses of academic literature on deepfakes in Taiwan, examining the characteristics, evolution, and thematic focus of the research. Using Structural Topic Modeling (STM) and web-scraping techniques, 143 academic studies—including journal articles, master’s theses, doctoral dissertations, book chapters, and institutional reports—were analyzed to identify dominant research trends and their development over time. The results indicate that academic interest in deepfakes in Taiwan has grown rapidly since 2019, with the majority of publications written in Chinese. Ten major thematic clusters were identified, primarily focusing on detection algorithms, machine learning applications, and legal frameworks for regulating deepfakes. However, the analysis also revealed a relative lack of interdisciplinary studies addressing psychological and sociopolitical aspects—areas more prevalent in global deepfake research. Comparatively, Taiwanese scholarship demonstrates a strong emphasis on technological and legal countermeasures rather than on societal impacts or public perception. Overall, the study highlights Taiwan’s increasing but technically focused academic engagement with deepfakes and emphasizes the need for expanded cross-disciplinary collaboration. Strengthening policy-oriented, ethical, and sociotechnical research will be essential for developing comprehensive national strategies to mitigate the multifaceted risks posed by deepfake technology.


LINK: https://dergipark.org.tr/tr/pub/dasad/article/1797836

Wednesday, February 25, 2026

AI-driven fraud as an emerging cyber risk: Evidence from a global incident-based analysis

The rapid proliferation of artificial intelligence (AI) and deepfake technologies has introduced new and complex risks to individuals, companies, financial systems, and digital trust. While existing research has primarily examined deepfakes in sexual or political contexts, systematic analyses of AI-enabled fraud remain limited. This study addresses this gap by conducting an incident-based analysis of 167 documented cases of AI- and deepfake-enabled fraud worldwide between 2019 and 2025. Drawing on Cyber-Routine Activities Theory (C-RAT), the study examines temporal trends, victim targeting patterns, financial losses, and cross-national variations to assess how emerging AI technologies reshape opportunity structures for cybercrime. The findings reveal a sharp increase in AI-assisted fraud after 2022, coinciding with the public availability of generative AI tools. Victimization patterns shifted from companies toward individuals, while financial losses initially concentrated among companies before increasingly affecting individual victims. Country-level analysis highlights substantial variation, including evidence that targeted regulatory interventions can reduce exposure to AI-enabled fraud, as demonstrated in the People’s Republic of China. Overall, the results support C-RAT’s core assumptions regarding motivated offenders, suitable targets, and capable guardianship, while extending the theory to account for AI-driven cyber threats and systemic forms of guardianship. The study emphasizes that AI-enabled fraud represents a structural social risk inherent in modern digital infrastructures. Effective mitigation requires multi-layered strategies integrating technical controls, organizational investment in cybersecurity, and adaptive regulatory governance.


LINK: https://www.tandfonline.com/doi/full/10.1080/07366981.2026.2631066

Thursday, January 1, 2026

SHIFTING NARRATIVES: A COMPARATIVE ANALYSIS OF ISLAMIC STATE OF IRAQ AND SYRIA (ISIS) SUPPORTERS' TWITTER HASHTAG USAGE IN TÜRKIYE BEFORE AND AFTER ITS TERRITORIAL DEFEAT

This study examines the evolution of hashtags used by Turkish supporters of the Islamic State of Iraq and Syria (ISIS) on Twitter, comparing the predefeat period (2014–2018) with the postdefeat period (2019–2022). The analysis encompasses 312,197 tweets to identify thematic shifts and network structures. In the predefeat phase, hashtags were primarily centered on geopolitical conflicts and political discourse, with prominent hashtags like #islamdevleti (Islamic State) and #incirlikkapatilsin (Incirlik Base must be closed). The network analysis revealed a main cluster of interconnected hashtags alongside smaller, niche groups. Postdefeat, the focus shifted towards humanitarian aid, financial support, and religious themes, with hashtags such as #sadaka (charity) and #infak (alms) becoming more prominent. This period exhibited multiple smaller, independent hashtag clusters, reflecting a more fragmented thematic focus. Despite these changes, core hashtags like #islamdevleti (Islamic State) and #hilafettakip (follow the caliphate) remained consistent, indicating enduring support for ISIS ideologies. The study underscores the adaptability of terrorist propaganda strategies in response to evolving circumstances and highlights the dynamic nature of online extremist activities. The findings contribute to a deeper understanding of how online platforms are leveraged by terrorist supporters to sustain and evolve their narratives over time.


Keywords: Twitter hashtags, terrorist propaganda, social media extremism, ISIS Turkish supporters, hashtag network analysis 


LINK: https://dergipark.org.tr/en/pub/ijshs/article/1853490