SSOAR Logo
    • Deutsch
    • English
  • Deutsch 
    • Deutsch
    • English
  • Einloggen
SSOAR ▼
  • Home
  • Über SSOAR
  • Leitlinien
  • Veröffentlichen auf SSOAR
  • Kooperieren mit SSOAR
    • Kooperationsmodelle
    • Ablieferungswege und Formate
    • Projekte
  • Kooperationspartner
    • Informationen zu Kooperationspartnern
  • Informationen
    • Möglichkeiten für den Grünen Weg
    • Vergabe von Nutzungslizenzen
    • Informationsmaterial zum Download
  • Betriebskonzept
Browsen und suchen Dokument hinzufügen OAI-PMH-Schnittstelle
JavaScript is disabled for your browser. Some features of this site may not work without it.

Download PDF
Volltext herunterladen

(1.031 MB)

Zitationshinweis

Bitte beziehen Sie sich beim Zitieren dieses Dokumentes immer auf folgenden Persistent Identifier (PID):
https://nbn-resolving.org/urn:nbn:de:0168-ssoar-98433-6

Export für Ihre Literaturverwaltung

Bibtex-Export
Endnote-Export

Statistiken anzeigen
Weiterempfehlen
  • Share via E-Mail E-Mail
  • Share via Facebook Facebook
  • Share via Bluesky Bluesky
  • Share via Reddit reddit
  • Share via Linkedin LinkedIn
  • Share via XING XING

How users tweet about a cyber attack: An explorative study using machine learning and social network analysis

[Zeitschriftenartikel]

Vogler, Daniel
Meißner, Florian

Abstract

Cybercrime is a growing threat for firms and customers that emerged with the digitization of business. However, research shows that even though people claim that they are concerned about their privacy online, they do not act correspondingly. This study investigates how prevalent security issues are ... mehr

Cybercrime is a growing threat for firms and customers that emerged with the digitization of business. However, research shows that even though people claim that they are concerned about their privacy online, they do not act correspondingly. This study investigates how prevalent security issues are during a cyber attack among Twitter users. The case under examination is the security breach at the US ticket sales company, Ticketfly, that compromised the information of 26 million users. Tweets related to cybersecurity are detected through the application of automated text classification based on supervised machine learning with support vector machines. Subsequently, the users that wrote security-related tweets are grouped into communities through a social network analysis. The results of this multi-method study show that users concerned about security issues are mostly part of expert communities with already superior knowledge about cybersecurity.... weniger

Thesaurusschlagwörter
Digitalisierung; Internet; Kriminalität; Sicherheitsbewusstsein; Soziale Medien; Twitter

Klassifikation
interaktive, elektronische Medien

Freie Schlagwörter
cybersecurity awareness; cybercrime; data breach; machine learning; text classification; social network analysis

Sprache Dokument
Englisch

Publikationsjahr
2019

Seitenangabe
S. 195-214

Zeitschriftentitel
Journal of Digital Media & Policy, 11 (2019) 2

DOI
https://doi.org/10.1386/jdmp_00016_1

ISSN
2516-3531

Status
Veröffentlichungsversion; begutachtet (peer reviewed)

Lizenz
Digital Peer Publishing Licence - Basismodul


GESIS LogoDFG LogoOpen Access Logo
Home  |  Impressum  |  Betriebskonzept  |  Datenschutzerklärung
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.
 

 


GESIS LogoDFG LogoOpen Access Logo
Home  |  Impressum  |  Betriebskonzept  |  Datenschutzerklärung
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.