Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 14 de 14
Filter
Add more filters










Publication year range
1.
Soc Netw Anal Min ; 12(1): 117, 2022.
Article in English | MEDLINE | ID: mdl-36035378

ABSTRACT

This paper tests disruption strategies in Twitter networks containing malicious URLs used in drive-by download attacks. Cybercriminals use popular events that attract a large number of Twitter users to infect and propagate malware by using trending hashtags and creating misleading tweets to lure users to malicious webpages. Due to Twitter's 280 character restriction and automatic shortening of URLs, it is particularly susceptible to the propagation of malware involved in drive-by download attacks. Considering the number of online users and the network formed by retweeting a tweet, a cybercriminal can infect millions of users in a short period. Policymakers and researchers have struggled to develop an efficient network disruption strategy to stop malware propagation effectively. We define an efficient strategy as one that considers network topology and dependency on network resilience, where resilience is the ability of the network to continue to disseminate information even when users are removed from it. One of the challenges faced while curbing malware propagation on online social platforms is understanding the cybercriminal network spreading the malware. Combining computational modelling and social network analysis, we identify the most effective strategy for disrupting networks of malicious URLs. Our results emphasise the importance of specific network disruption parameters such as network and emotion features, which have proved to be more effective in disrupting malicious networks compared to random strategies. In conclusion, disruption strategies force cybercriminal networks to become more vulnerable by strategically removing malicious users, which causes successful network disruption to become a long-term effort.

2.
Sensors (Basel) ; 21(15)2021 Jul 22.
Article in English | MEDLINE | ID: mdl-34372228

ABSTRACT

To create products that are better fit for purpose, manufacturers require new methods for gaining insights into product experience in the wild at scale. "Chatty Factories" is a concept that explores the transformative potential of placing IoT-enabled data-driven systems at the core of design and manufacturing processes, aligned to the Industry 4.0 paradigm. In this paper, we propose a model that enables new forms of agile engineering product development via "chatty" products. Products relay their "experiences" from the consumer world back to designers and product engineers through the mediation provided by embedded sensors, IoT, and data-driven design tools. Our model aims to identify product "experiences" to support the insights into product use. To this end, we create an experiment to: (i) collect sensor data at 100 Hz sampling rate from a "Chatty device" (device with sensors) for six common everyday activities that drive produce experience: standing, walking, sitting, dropping and picking up of the device, placing the device stationary on a side table, and a vibrating surface; (ii) pre-process and manually label the product use activity data; (iii) compare a total of four Unsupervised Machine Learning models (three classic and the fuzzy C-means algorithm) for product use activity recognition for each unique sensor; and (iv) present and discuss our findings. The empirical results demonstrate the feasibility of applying unsupervised machine learning algorithms for clustering product use activity. The highest obtained F-measure is 0.87, and MCC of 0.84, when the Fuzzy C-means algorithm is applied for clustering, outperforming the other three algorithms applied.


Subject(s)
Algorithms , Unsupervised Machine Learning , Cluster Analysis , Walking
3.
Rev Socionetwork Strateg ; 15(2): 381-411, 2021.
Article in English | MEDLINE | ID: mdl-35506054

ABSTRACT

The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessment methods for quantifying IoT cyber risk posture. It is considered that IoT represent a complex system with too many uncontrollable risk states for quantitative risk assessment. To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The results from the analysis present the current and a target state for IoT systems, followed by a transformation roadmap, describing how IoT systems can achieve the target state with a new epistemological analysis model. The new epistemological analysis approach enables the assessment of uncontrollable risk states in complex IoT systems-which begin to resemble artificial intelligence-and can be used for a quantitative self-assessment of IoT cyber risk posture.

4.
Environ Syst Decis ; 41(2): 236-247, 2021.
Article in English | MEDLINE | ID: mdl-33251087

ABSTRACT

The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture.

5.
Forensic Sci Int ; 313: 110364, 2020 Aug.
Article in English | MEDLINE | ID: mdl-32593112

ABSTRACT

Forensic science is constantly evolving and transforming, reflecting the numerous technological innovations of recent decades. There are, however, continuing issues with the use of digital data, such as the difficulty of handling large-scale collections of text data. As one way of dealing with this problem, we used machine-learning techniques, particularly natural language processing and Latent Dirichlet Allocation (LDA) topic modeling, to create an unsupervised text reduction method that was then used to study social reactions in the aftermath of the 2017 Manchester Arena bombing. Our database was a set of millions of messages posted on Twitter in the first 24 h after the attack. The findings show that our method improves on the tools presently used by law enforcement and other agencies to monitor social media, particularly following an event that is likely to create widespread social reaction. For example, it makes it possible to track different types of social reactions over time and to identify subevents that have a significant impact on public perceptions.


Subject(s)
Machine Learning , Natural Language Processing , Social Media , Terrorism , Data Mining , Forensic Sciences , Humans , United Kingdom
6.
Death Stud ; 44(12): 793-801, 2020.
Article in English | MEDLINE | ID: mdl-31094663

ABSTRACT

To explore possible distinctive features of online memorials for youth suicides, amid concerns about glorification, we compared public Facebook memorials for suicides and road traffic accident deaths, using Linguistic Inquiry and Word Count software. People who posted on memorial sites wrote at greater length about suicides, using longer words and more quotation marks. Words suggesting causation and achievement were more prevalent in suicide memorials. Thematic content for the two types of death was more similar than different. Suicide memorial posts had more tentative words, non-fluencies, and question marks, suggesting that people were struggling to make sense of these deaths.


Subject(s)
Death, Sudden , Linguistics/methods , Social Media/statistics & numerical data , Suicide/psychology , Accidents, Traffic , Adolescent , Child , Female , Humans , Male , United Kingdom
7.
Arch Suicide Res ; 23(3): 507-522, 2019.
Article in English | MEDLINE | ID: mdl-29856679

ABSTRACT

In the light of concern about the harmful effects of media reporting of suicides and a lack of comparative research, this study compares the number and characteristics of reports on suicides and road traffic accidents (RTAs) in young people (aged 11-18) in newspapers and Twitter during a 6-month period. Tweets about young people's suicides were more numerous than newspaper reports. Twitter and newspaper reports were more strongly correlated for suicides than for RTAs. Recent suicides were less likely to be reported in newspapers than recent deaths by RTA. Bullying-related suicides were especially newsworthy. Suicide prevention organizations should consider routinely monitoring social media reporting.


Subject(s)
Accidents, Traffic/mortality , Bullying , Newspapers as Topic , Social Media , Suicide , Adolescent , Cause of Death , Child , England , Female , Humans , Male
8.
Sociology ; 51(6): 1149-1168, 2017 Dec.
Article in English | MEDLINE | ID: mdl-29276313

ABSTRACT

New and emerging forms of data, including posts harvested from social media sites such as Twitter, have become part of the sociologist's data diet. In particular, some researchers see an advantage in the perceived 'public' nature of Twitter posts, representing them in publications without seeking informed consent. While such practice may not be at odds with Twitter's terms of service, we argue there is a need to interpret these through the lens of social science research methods that imply a more reflexive ethical approach than provided in 'legal' accounts of the permissible use of these data in research publications. To challenge some existing practice in Twitter-based research, this article brings to the fore: (1) views of Twitter users through analysis of online survey data; (2) the effect of context collapse and online disinhibition on the behaviours of users; and (3) the publication of identifiable sensitive classifications derived from algorithms.

9.
Online Soc Netw Media ; 2: 32-44, 2017 Aug.
Article in English | MEDLINE | ID: mdl-29278258

ABSTRACT

The World Wide Web, and online social networks in particular, have increased connectivity between people such that information can spread to millions of people in a matter of minutes. This form of online collective contagion has provided many benefits to society, such as providing reassurance and emergency management in the immediate aftermath of natural disasters. However, it also poses a potential risk to vulnerable Web users who receive this information and could subsequently come to harm. One example of this would be the spread of suicidal ideation in online social networks, about which concerns have been raised. In this paper we report the results of a number of machine classifiers built with the aim of classifying text relating to suicide on Twitter. The classifier distinguishes between the more worrying content, such as suicidal ideation, and other suicide-related topics such as reporting of a suicide, memorial, campaigning and support. It also aims to identify flippant references to suicide. We built a set of baseline classifiers using lexical, structural, emotive and psychological features extracted from Twitter posts. We then improved on the baseline classifiers by building an ensemble classifier using the Rotation Forest algorithm and a Maximum Probability voting classification decision method, based on the outcome of base classifiers. This achieved an F-measure of 0.728 overall (for 7 classes, including suicidal ideation) and 0.69 for the suicidal ideation class. We summarise the results by reflecting on the most significant predictive principle components of the suicidal ideation class to provide insight into the language used on Twitter to express suicidal ideation. Finally, we perform a 12-month case study of suicide-related posts where we further evaluate the classification approach - showing a sustained classification performance and providing anonymous insights into the trends and demographic profile of Twitter users posting content of this type.

10.
Crisis ; 37(5): 392-395, 2016 Sep.
Article in English | MEDLINE | ID: mdl-27040127

ABSTRACT

BACKGROUND: Concern has been expressed about the potentially contagious effect of television soap opera suicides and suicidal language in social media. AIMS: Twitter content was analyzed during the week in which a fictional assisted suicide was broadcast on a British television soap opera, "Coronation Street." METHOD: Tweets were collected if they contained language indicating possible suicidal intent or used the word suicide. The modified Thompson tau method was used to test for any differences in the volume of tweets in both categories on the day of screening. Content analysis broke down the use of the word suicide into six thematic categories. RESULTS: There was no evidence on the day of screening of an increase in tweets expressing possible suicidal intent but there was an increase in tweets containing the word suicide. Content analysis found the most common thematic category to be information or support, followed by the raising of moral issues in relation to suicide. CONCLUSION: It is possible that for certain high-profile media events Twitter may be used more as a civic reactive forum than as a medium for introspection or disclosure of distress.


Subject(s)
Internet , Social Media , Suicide, Assisted , Television , Humans , Suicide , United Kingdom
11.
Comput Commun ; 73(Pt B): 291-300, 2016 Jan 01.
Article in English | MEDLINE | ID: mdl-26973360

ABSTRACT

In this paper we aim to understand the connectivity and communication characteristics of Twitter users who post content subsequently classified by human annotators as containing possible suicidal intent or thinking, commonly referred to as suicidal ideation. We achieve this understanding by analysing the characteristics of their social networks. Starting from a set of human annotated Tweets we retrieved the authors' followers and friends lists, and identified users who retweeted the suicidal content. We subsequently built the social network graphs. Our results show a high degree of reciprocal connectivity between the authors of suicidal content when compared to other studies of Twitter users, suggesting a tightly-coupled virtual community. In addition, an analysis of the retweet graph has identified bridge nodes and hub nodes connecting users posting suicidal ideation with users who were not, thus suggesting a potential for information cascade and risk of a possible contagion effect. This is particularly emphasised by considering the combined graph merging friendship and retweeting links.

12.
EPJ Data Sci ; 5(1): 11, 2016.
Article in English | MEDLINE | ID: mdl-32355598

ABSTRACT

Hateful and antagonistic content published and propagated via the World Wide Web has the potential to cause harm and suffering on an individual basis, and lead to social tension and disorder beyond cyber space. Despite new legislation aimed at prosecuting those who misuse new forms of communication to post threatening, harassing, or grossly offensive language - or cyber hate - and the fact large social media companies have committed to protecting their users from harm, it goes largely unpunished due to difficulties in policing online public spaces. To support the automatic detection of cyber hate online, specifically on Twitter, we build multiple individual models to classify cyber hate for a range of protected characteristics including race, disability and sexual orientation. We use text parsing to extract typed dependencies, which represent syntactic and grammatical relationships between words, and are shown to capture 'othering' language - consistently improving machine classification for different types of cyber hate beyond the use of a Bag of Words and known hateful terms. Furthermore, we build a data-driven blended model of cyber hate to improve classification where more than one protected characteristic may be attacked (e.g. race and sexual orientation), contributing to the nascent study of intersectionality in hate crime.

13.
PLoS One ; 10(3): e0115545, 2015.
Article in English | MEDLINE | ID: mdl-25729900

ABSTRACT

This paper specifies, designs and critically evaluates two tools for the automated identification of demographic data (age, occupation and social class) from the profile descriptions of Twitter users in the United Kingdom (UK). Meta-data data routinely collected through the Collaborative Social Media Observatory (COSMOS: http://www.cosmosproject.net/) relating to UK Twitter users is matched with the occupational lookup tables between job and social class provided by the Office for National Statistics (ONS) using SOC2010. Using expert human validation, the validity and reliability of the automated matching process is critically assessed and a prospective class distribution of UK Twitter users is offered with 2011 Census baseline comparisons. The pattern matching rules for identifying age are explained and enacted following a discussion on how to minimise false positives. The age distribution of Twitter users, as identified using the tool, is presented alongside the age distribution of the UK population from the 2011 Census. The automated occupation detection tool reliably identifies certain occupational groups, such as professionals, for which job titles cannot be confused with hobbies or are used in common parlance within alternative contexts. An alternative explanation on the prevalence of hobbies is that the creative sector is overrepresented on Twitter compared to 2011 Census data. The age detection tool illustrates the youthfulness of Twitter users compared to the general UK population as of the 2011 Census according to proportions, but projections demonstrate that there is still potentially a large number of older platform users. It is possible to detect "signatures" of both occupation and age from Twitter meta-data with varying degrees of accuracy (particularly dependent on occupational groups) but further confirmatory work is needed.


Subject(s)
Algorithms , Social Media , Aging , Demography , Humans , Occupations , Prospective Studies , Social Class
14.
Biomed Inform Insights ; 5(Suppl. 1): 87-97, 2012.
Article in English | MEDLINE | ID: mdl-22879764

ABSTRACT

The authors present a system developed for the 2011 i2b2 Challenge on Sentiment Classification, whose aim was to automatically classify sentences in suicide notes using a scheme of 15 topics, mostly emotions. The system combines machine learning with a rule-based methodology. The features used to represent a problem were based on lexico-semantic properties of individual words in addition to regular expressions used to represent patterns of word usage across different topics. A naïve Bayes classifier was trained using the features extracted from the training data consisting of 600 manually annotated suicide notes. Classification was then performed using the naïve Bayes classifier as well as a set of pattern-matching rules. The classification performance was evaluated against a manually prepared gold standard consisting of 300 suicide notes, in which 1,091 out of a total of 2,037 sentences were associated with a total of 1,272 annotations. The competing systems were ranked using the micro-averaged F-measure as the primary evaluation metric. Our system achieved the F-measure of 53% (with 55% precision and 52% recall), which was significantly better than the average performance of 48.75% achieved by the 26 participating teams.

SELECTION OF CITATIONS
SEARCH DETAIL
...