Social Network Analysis and Mining: Privacy and Security on Twitter

As technologies advance rapidly, privacy and security issues have become one of the top concerns in the digital communication today. Thus, we are trying to understand and drawing a conceptual view that relies on how people perceive privacy and security in this era of dynamic digital proliferation. In order to analyze and see what a person's impression regarding the privacy and security of online merchants, online social network, and other digital media, this research uses one of the most widely used social network, Twitter, to analyze Twitter users' interactions with one another for the purpose of extracting meaningful data to aid in determining users' perception to privacy and security of the digital world. Based on this analysis, we have constructed our study and drawn our conclusions. This research uses statistical learning approach to analyze tweets and efficiently discover privacy and security issues of online merchants, social network, and other prominent digital media outlets. For gathering the essential information, more than two million relevant tweets through the span of two years were used to conduct the study. The results of this research show significant implications for privacy and security from tweeter users' perception.

[1]  Rokia Missaoui,et al.  Social Network Analysis - Community Detection and Evolution , 2015, Lecture Notes in Social Networks.

[2]  C. Feild,et al.  The Effects of a Social Media Policy on Pharmacy Students’ Facebook Security Settings , 2011, American Journal of Pharmaceutical Education.

[3]  Lu Xiao,et al.  Twitter Users’ Privacy Concerns: What do Their Accounts’ First Names Tell Us? , 2018, J. Data Inf. Sci..

[4]  Ben Shneiderman,et al.  Analyzing Social Media Networks with NodeXL: Insights from a Connected World , 2010 .

[5]  Rodolfo Zunino,et al.  Real-time monitoring of Twitter traffic by using semantic networks , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[6]  Dhiraj Murthy,et al.  Understanding Cancer-Based Networks in Twitter Using Social Network Analysis , 2011, 2011 IEEE Fifth International Conference on Semantic Computing.

[7]  Madhat Alsoos,et al.  A Semantic Approach to Enhance HITS Algorithm for Extracting Associated Concepts Using ConceptNet , 2015 .

[8]  Lauren Albrecht,et al.  Using Twitter for Data Collection With Health-Care Consumers , 2018 .

[9]  Marco Saerens,et al.  Algorithms and Models for Network Data and Link Analysis , 2016 .

[10]  Hila Becker,et al.  Hip and trendy: Characterizing emerging trends on Twitter , 2011, J. Assoc. Inf. Sci. Technol..

[11]  Jesse D. Lecy,et al.  A Semantic Network Analysis of Changes in North Korea's Economic Policy , 2012 .

[12]  Diego López-de-Ipiña,et al.  Detection and Extracting of Emergency Knowledge from Twitter Streams , 2012, UCAmI.

[13]  Rada Mihalcea,et al.  TextRank: Bringing Order into Text , 2004, EMNLP.

[14]  Jacob Ratkiewicz,et al.  Predicting the Political Alignment of Twitter Users , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[15]  David J. Hand,et al.  Data Mining the Web: Uncovering Patterns in Web Content, Structure, and Usage by Zdravko Markov, Daniel T. Larose , 2007 .

[16]  Junseok Lee,et al.  Identifying Policy Frames Using Semantic Network Analysis , 2019 .

[17]  Richard D. Waters,et al.  Squawking, tweeting, cooing, and hooting: analyzing the communication patterns of government agencies on Twitter , 2011 .

[18]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[19]  Joydeep Ghosh,et al.  Data Clustering Algorithms And Applications , 2013 .

[20]  Johannes Buchmann,et al.  Internet Privacy: Options for adequate realization , 2013 .

[21]  P. Thompson,et al.  Social Media(tion) and the Reshaping of Public/Private Boundaries in Employment Relations , 2016 .

[22]  A. Floren,et al.  ' " ' " ' " . " ' " " " " " ' " ' " " " " " : ' " 1 , 2001 .

[23]  Shintaro Okazaki,et al.  Using Twitter to engage with customers: a data mining approach , 2015, Internet Res..

[24]  Kyounghee Hazel Kwon,et al.  An Exploration of Social Media in Extreme Events: Rumor Theory and Twitter during the Haiti Earthquake 2010 , 2010, ICIS.

[25]  Stephen T. Margulis,et al.  Three Theories of Privacy: An Overview , 2011, Privacy Online.

[26]  Timothy W. Finin,et al.  Why We Twitter: An Analysis of a Microblogging Community , 2009, WebKDD/SNA-KDD.

[27]  S. Borkowski,et al.  Judith Wagner DeCew, In Pursuit of Privacy: Law, Ethics and the Rise of Technology , 1999 .

[28]  Amy Nicole Langville,et al.  Google's PageRank and beyond - the science of search engine rankings , 2006 .

[29]  Timothy W. Finin,et al.  CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[30]  Moni Naor,et al.  Algorithms and Models for the Web Graph , 2016, Lecture Notes in Computer Science.

[31]  Herman T. Tavani,et al.  PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .

[32]  G. Barnett,et al.  Dynamics of Culture Frames in International News Coverage: A Semantic Network Analysis , 2016 .