Social media platforms are commonly employed by law enforcement agencies for collecting Open Source Intelligence (OSNIT) on criminals, and assessing the risk they pose to the environment the live in. However, since no prior research has investigated the relationships between hackers’ use of social media platforms and their likelihood to generate cyber-attacks, this practice is less common among Information Technology Teams. Addressing this empirical gap, we draw on the social learning theory and estimate the relationships between hackers’ use of Facebook, Twitter, and YouTube and the frequency of web defacement attacks they generate in different times (weekdays vs. weekends) and against different targets (USA vs. non-USA websites). To answe...
In the current era of digital devices, the concerns over data privacy and security breaches are ramp...
: Social networks have turned into a piece of the human life beginning from shearing information lik...
The authors present in this work information about social media and data mining usage for that. It ...
Social media platforms are commonly employed by law enforcement agencies for collecting Open Source ...
Although a relatively simple form of hacking, website defacement can have severe consequences both f...
Open Source Intelligence (OSINT) involve the collection or processes of gathering data and profiling...
Abstract Islamic State depends on the recruitment of foreign fighters to execute attacks in their ho...
This paper contends that the hype surrounding the steep rise of social media networking website use ...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...
Today, terrorism is one of the most significant security risks. The spread of infocommunication tech...
Online social network (OSN) accounts are often more usercentric than other types of online accounts...
Social media analytics is a critical research area spawned by the increasing availability of rich an...
Abstract-- With increasing global reliance on the Internet as a medium to transmit information comes...
This paper tests disruption strategies in Twitter networks contain-ing malicious URLs used in d...
Online Social Media (OSM) websites have attracted millions of users by enabling them to socially int...
In the current era of digital devices, the concerns over data privacy and security breaches are ramp...
: Social networks have turned into a piece of the human life beginning from shearing information lik...
The authors present in this work information about social media and data mining usage for that. It ...
Social media platforms are commonly employed by law enforcement agencies for collecting Open Source ...
Although a relatively simple form of hacking, website defacement can have severe consequences both f...
Open Source Intelligence (OSINT) involve the collection or processes of gathering data and profiling...
Abstract Islamic State depends on the recruitment of foreign fighters to execute attacks in their ho...
This paper contends that the hype surrounding the steep rise of social media networking website use ...
The popularity of Twitter for information discovery, coupled with the automatic shortening of URLs t...
Today, terrorism is one of the most significant security risks. The spread of infocommunication tech...
Online social network (OSN) accounts are often more usercentric than other types of online accounts...
Social media analytics is a critical research area spawned by the increasing availability of rich an...
Abstract-- With increasing global reliance on the Internet as a medium to transmit information comes...
This paper tests disruption strategies in Twitter networks contain-ing malicious URLs used in d...
Online Social Media (OSM) websites have attracted millions of users by enabling them to socially int...
In the current era of digital devices, the concerns over data privacy and security breaches are ramp...
: Social networks have turned into a piece of the human life beginning from shearing information lik...
The authors present in this work information about social media and data mining usage for that. It ...