Privacy and security on twitter
-
Upload
eman-aldakheel -
Category
Documents
-
view
92 -
download
2
Transcript of Privacy and security on twitter
Privacy and Security on Twitter: A Semantic Network Analysis
Mansour A. Alshaikhsaleh
Lewis UniversityDr. Abdullah, Faisal
Information Security Practicum Spring 2013
Agenda• Introduction• Methodology• Research Questions• Significance of the Study• Literature Review• Results• Discussion• Conclusion
Introduction• Social media• Understanding the societal view
Introduction…• Statement of the Problem:
– The impression of the people views– Studying their ideas – Extract valuable information
Introduction…• Statement of the Problem:
– Analyzing tweets– Visualization
Introduction…• Examines the Twitter
– Semantic network analysis – Discourse analysis
Introduction…• Definition of Terms:
– Defining privacy is challenging– The security in the computer
context
Methodology• Data collection using HootSuite
archives:• Set #1: “privacy”• Set #2: “privacy” and “security”• Set #3: “#privacy” and “#security”• Set #4: “privacy”, “security”, and
“HIPAA”• Set #5: “privacy”, “security”, and
“Facebook”• Set #6: “privacy”, “security”, and
“Online”
Methodology…• Automated Part:
– Semantic data analysis– Data visualization
Methodology…• Manual Part:
– Filter– Randomly selected a sub-sample– Discourse analysis
Research Questions• what are the semantic networks
of “privacy” that developments on Twitter?
• what are the semantic networks of “privacy” and “security” that developments on Twitter?
• Is there a relationship between the two semantic networks?
Significance of the Study and Potential Outcomes• Drawing a semantic map• For private or public institution
Literature Review• Notion of privacy• Dynamic process of access
control• Individual value• Societal value• Cultural universal
Literature Review …• Privacy dimensions
Literature Review …• No complete uniformity
definition
Literature Review …• Marcin and Shiu (2012) studied
Twitter and Wikipedia– Topic trends
Literature Review …• (Chhabra, Aggarwaly,
Benevenutoz & Kumaraguru, 2011) detect phishing– Online social media– URL shortening services
Results• ~100,000 collected tweets
focused on “privacy”
Results …• ~21,000 collected tweets
focused on “privacy” and “security”
Results …• ~3800 collected tweets focused
on “#privacy” and “#security”Sequence Concept Frequency
1 privacy 4125 2 security 4115 3 twitter 1492 4 hootsuite 1054 5 tweetdeck 580 6 data 560 7 iphone 512 8 amp 442 9 tweet 400
10 tweetbutton 397 11 button 395 12 download 360 13 mobile 333 14 infosec 327 15 android 323
15 android 323 16 facebook 306 17 internet 265 18 cloud 264 19 twitterfeed 260 20 https 254 21 online 253 22 apple 219 23 linkedin 214 24 hipaa 212 25 google 201 26 htc 176 27 apps 174 28 buffer 165 29 bufferapp 165 30 news 163
Results …• ~800 collected tweets focused
on “privacy”, “security”, and “HIPAA”Sequence Concept Frequency
1 hipaa 804 2 privacy 658 3 security 592 4 rules 248 5 rule 244 6 hootsuite 230 7 amp 213 8 final 198 9 tweetdeck 193
10 twitter 188 11 web 121 12 breach 120 13 data 110 14 health 103 15 enforcement 96 16 twitterfeed 88
15 enforcement 96 16 twitterfeed 88 17 ocr 84 18 compliance 77 19 patient 76 20 notification 74 21 hhs 71 22 tweet 66 23 iphone 62 24 button 60 25 tweetbutton 60 26 hitech 58 27 jdsupra 58 28 idexperts 53 29 download 52 30 healthcare 47
Results …• ~1000 collected tweets focused
on “privacy”, “security”, and “Facebook”
Results …• ~ 1100 collected tweets
focused on “privacy”, “security”, and “online”Sequence Concept Frequency
1 privacy 761 2 security 724 3 online 713 4 twitter 340 5 hootsuite 326 6 twitterfeed 190 7 facebook 144 8 amp 138 9 tweetdeck 135
10 iphone 90 11 download 83 12 data 82 13 protect 77 14 social 75 15 apple 68 16 password 68
15 apple 68 16 password 68 17 tips 68 18 microsoft 66 19 tweet 64 20 issue 60 21 computer 59 22 safety 59 23 mobile 56 24 cyber 55 25 help 55 26 android 51 27 media 51 28 dlvr 50 29 guide 50 30 button 48
Concept Privacy Privacy and security
Privacy and security with
hashtag
Privacy, security,
and HIPAA
Privacy, security, and
Privacy, security,
and online 1 privacy privacy privacy hipaa facebook privacy 2 twitter security security privacy privacy security 3 iphone twitter twitter security security online 4 download twitterfeed hootsuite rules twitter twitter 5 android amp tweetdeck rule twitterfeed hootsuite 6 mobile hootsuite data hootsuite hootsuite twitterfeed 7 facebook data iphone amp timeline facebook 8 google iphone amp final web amp 9 hootsuite download tweet tweetdeck news tweetdeck
10 blackberry tweetdeck tweetbutton twitter dlvr iphone 11 important android button web settings download 12 blackberry® dlvr download breach amp data 13 ipad tweet mobile data tweetdeck protect 14 need mobile infosec health saranonline social 15 respect Htc android enforcement plugs apple 16 button tweetbutton facebook Twitterfeed gremln password 17 glass button internet Ocr fixes tips 18 people facebook cloud compliance mobile microsoft 19 data google twitterfeed patient iphone tweet 20 sticky internet https notification account issue 21 apple news online hhs hole computer 22 right https apple tweet group safety 23 bill surveillance linkedin iphone online mobile 24 settings apple hipaa button download cyber 25 security hipaa google tweetbutton hacker help 26 online infosec htc hitech apple android 27 act cloud apps jdsupra tweet media 28 users protection buffer idexperts bitly dlvr 29 concerns cispa bufferapp download socialmedia guide 30 personal online news healthcare fraud button
Discussion• The relationship• Privacy is integration• The legal dimension
Discussion …• Individuals views• Concerns
Conclusion• The main source • Analyzing the tweets• Highlighted the main concerns
Thank you…