SSOAR Logo
    • Deutsch
    • English
  • English 
    • Deutsch
    • English
  • Login
SSOAR ▼
  • Home
  • About SSOAR
  • Guidelines
  • Publishing in SSOAR
  • Cooperating with SSOAR
    • Cooperation models
    • Delivery routes and formats
    • Projects
  • Cooperation partners
    • Information about cooperation partners
  • Information
    • Possibilities of taking the Green Road
    • Grant of Licences
    • Download additional information
  • Operational concept
Browse and search Add new document OAI-PMH interface
JavaScript is disabled for your browser. Some features of this site may not work without it.

Download PDF
Download full text

(1.031Mb)

Citation Suggestion

Please use the following Persistent Identifier (PID) to cite this document:
https://nbn-resolving.org/urn:nbn:de:0168-ssoar-98433-6

Exports for your reference manager

Bibtex export
Endnote export

Display Statistics
Share
  • Share via E-Mail E-Mail
  • Share via Facebook Facebook
  • Share via Bluesky Bluesky
  • Share via Reddit reddit
  • Share via Linkedin LinkedIn
  • Share via XING XING

How users tweet about a cyber attack: An explorative study using machine learning and social network analysis

[journal article]

Vogler, Daniel
Meißner, Florian

Abstract

Cybercrime is a growing threat for firms and customers that emerged with the digitization of business. However, research shows that even though people claim that they are concerned about their privacy online, they do not act correspondingly. This study investigates how prevalent security issues are ... view more

Cybercrime is a growing threat for firms and customers that emerged with the digitization of business. However, research shows that even though people claim that they are concerned about their privacy online, they do not act correspondingly. This study investigates how prevalent security issues are during a cyber attack among Twitter users. The case under examination is the security breach at the US ticket sales company, Ticketfly, that compromised the information of 26 million users. Tweets related to cybersecurity are detected through the application of automated text classification based on supervised machine learning with support vector machines. Subsequently, the users that wrote security-related tweets are grouped into communities through a social network analysis. The results of this multi-method study show that users concerned about security issues are mostly part of expert communities with already superior knowledge about cybersecurity.... view less

Keywords
digitalization; Internet; criminality; sense of security; social media; twitter

Classification
Interactive, electronic Media

Free Keywords
cybersecurity awareness; cybercrime; data breach; machine learning; text classification; social network analysis

Document language
English

Publication Year
2019

Page/Pages
p. 195-214

Journal
Journal of Digital Media & Policy, 11 (2019) 2

DOI
https://doi.org/10.1386/jdmp_00016_1

ISSN
2516-3531

Status
Published Version; peer reviewed

Licence
Basic Digital Peer Publishing Licence


GESIS LogoDFG LogoOpen Access Logo
Home  |  Legal notices  |  Operational concept  |  Privacy policy
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.
 

 


GESIS LogoDFG LogoOpen Access Logo
Home  |  Legal notices  |  Operational concept  |  Privacy policy
© 2007 - 2025 Social Science Open Access Repository (SSOAR).
Based on DSpace, Copyright (c) 2002-2022, DuraSpace. All rights reserved.