SlideShare a Scribd company logo
1 of 28
Privacy and
Security on
Twitter: A
Semantic
Network
Analysis
Mansour A. Alshaikhsaleh
Lewis University
Dr. Abdullah, Faisal
Information Security Practicum
Spring 2013
Agenda
• Introduction
• Methodology
• Research Questions
• Significance of the Study
• Literature Review
• Results
• Discussion
• Conclusion
Introduction
• Social media
• Understanding the societal view
Introduction…
• Statement of the Problem:
– The impression of the people views
– Studying their ideas
– Extract valuable information
Introduction…
• Statement of the Problem:
– Analyzing tweets
– Visualization
Introduction…
• Examines the Twitter
– Semantic network analysis
– Discourse analysis
Introduction…
• Definition of Terms:
– Defining privacy is challenging
– The security in the computer context
Methodology
• Data collection using HootSuite
archives:
• Set #1: “privacy”
• Set #2: “privacy” and “security”
• Set #3: “#privacy” and “#security”
• Set #4: “privacy”, “security”, and “HIPAA”
• Set #5: “privacy”, “security”, and “Facebook”
• Set #6: “privacy”, “security”, and “Online”
Methodology…
• Automated Part:
– Semantic data analysis
– Data visualization
Methodology…
• Manual Part:
– Filter
– Randomly selected a sub-sample
– Discourse analysis
Research Questions
• what are the semantic networks of
“privacy” that developments on
Twitter?
• what are the semantic networks of
“privacy” and “security” that
developments on Twitter?
• Is there a relationship between the
two semantic networks?
Significance of the Study
and Potential Outcomes
• Drawing a semantic map
• For private or public institution
Literature Review
• Notion of privacy
• Dynamic process of access control
• Individual value
• Societal value
• Cultural universal
Literature Review …
• Privacy dimensions
Literature Review …
• No complete uniformity definition
Literature Review …
• Marcin and Shiu (2012) studied
Twitter and Wikipedia
– Topic trends
Literature Review …
• (Chhabra, Aggarwaly, Benevenutoz &
Kumaraguru, 2011) detect phishing
– Online social media
– URL shortening services
Results
• ~100,000 collected tweets focused on
“privacy”
Results …
• ~21,000 collected tweets focused on
“privacy” and “security”
Results …
• ~3800 collected tweets focused on
“#privacy” and “#security”
Sequence Concept Frequency
1 privacy 4125
2 security 4115
3 twitter 1492
4 hootsuite 1054
5 tweetdeck 580
6 data 560
7 iphone 512
8 amp 442
9 tweet 400
10 tweetbutton 397
11 button 395
12 download 360
13 mobile 333
14 infosec 327
15 android 323
Sequence Concept Frequency
1 privacy 4125
2 security 4115
3 twitter 1492
4 hootsuite 1054
5 tweetdeck 580
6 data 560
7 iphone 512
8 amp 442
9 tweet 400
10 tweetbutton 397
11 button 395
12 download 360
13 mobile 333
14 infosec 327
15 android 323
16 facebook 306
17 internet 265
18 cloud 264
19 twitterfeed 260
20 https 254
21 online 253
22 apple 219
23 linkedin 214
24 hipaa 212
25 google 201
26 htc 176
27 apps 174
28 buffer 165
29 bufferapp 165
30 news 163
Results …
• ~800 collected tweets focused on
“privacy”, “security”, and “HIPAA”
Sequence Concept Frequency
1 hipaa 804
2 privacy 658
3 security 592
4 rules 248
5 rule 244
6 hootsuite 230
7 amp 213
8 final 198
9 tweetdeck 193
10 twitter 188
11 web 121
12 breach 120
13 data 110
14 health 103
15 enforcement 96
1 hipaa 804
2 privacy 658
3 security 592
4 rules 248
5 rule 244
6 hootsuite 230
7 amp 213
8 final 198
9 tweetdeck 193
10 twitter 188
11 web 121
12 breach 120
13 data 110
14 health 103
15 enforcement 96
16 twitterfeed 88
17 ocr 84
18 compliance 77
19 patient 76
20 notification 74
21 hhs 71
22 tweet 66
23 iphone 62
24 button 60
25 tweetbutton 60
26 hitech 58
27 jdsupra 58
28 idexperts 53
29 download 52
30 healthcare 47
Results …
• ~1000 collected tweets focused on
“privacy”, “security”, and “Facebook”
Results …
• ~ 1100 collected tweets focused on
“privacy”, “security”, and “online”
Sequence Concept Frequency
1 privacy 761
2 security 724
3 online 713
4 twitter 340
5 hootsuite 326
6 twitterfeed 190
7 facebook 144
8 amp 138
9 tweetdeck 135
10 iphone 90
11 download 83
12 data 82
13 protect 77
14 social 75
15 apple 68
3 online 713
4 twitter 340
5 hootsuite 326
6 twitterfeed 190
7 facebook 144
8 amp 138
9 tweetdeck 135
10 iphone 90
11 download 83
12 data 82
13 protect 77
14 social 75
15 apple 68
16 password 68
17 tips 68
18 microsoft 66
19 tweet 64
20 issue 60
21 computer 59
22 safety 59
23 mobile 56
24 cyber 55
25 help 55
26 android 51
27 media 51
28 dlvr 50
29 guide 50
30 button 48
Concept Privacy
Privacy and
security
Privacy and
security with
hashtag
Privacy,
security,
and HIPAA
Privacy,
security, and
facebook
Privacy,
security,
and online
1 privacy privacy privacy hipaa facebook privacy
2 twitter security security privacy privacy security
3 iphone twitter twitter security security online
4 download twitterfeed hootsuite rules twitter twitter
5 android amp tweetdeck rule twitterfeed hootsuite
6 mobile hootsuite data hootsuite hootsuite twitterfeed
7 facebook data iphone amp timeline facebook
8 google iphone amp final web amp
9 hootsuite download tweet tweetdeck news tweetdeck
10 blackberry tweetdeck tweetbutton twitter dlvr iphone
11 important android button web settings download
12 blackberry® dlvr download breach amp data
13 ipad tweet mobile data tweetdeck protect
14 need mobile infosec health saranonline social
15 respect Htc android enforcement plugs apple
16 button tweetbutton facebook Twitterfeed gremln password
17 glass button internet Ocr fixes tips
18 people facebook cloud compliance mobile microsoft
19 data google twitterfeed patient iphone tweet
20 sticky internet https notification account issue
Discussion
• The relationship
• Privacy is integration
• The legal dimension
Discussion …
• Individuals views
• Concerns
Conclusion
• The main source
• Analyzing the tweets
• Highlighted the main concerns
Thank you…

More Related Content

What's hot

My Cybersecurity Services
My Cybersecurity ServicesMy Cybersecurity Services
My Cybersecurity ServicesKeatron Evans
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyScott Cressman
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!Nutan Kumar Panda
 
SOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPONSOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPONSylvain Martinez
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeRahul Neel Mani
 
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Priyanka Aash
 
Security for Human Beings
Security for Human BeingsSecurity for Human Beings
Security for Human Beingszekivazquez
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application DevelopmentRadu Vunvulea
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application DevelopmentRadu Vunvulea
 

What's hot (9)

My Cybersecurity Services
My Cybersecurity ServicesMy Cybersecurity Services
My Cybersecurity Services
 
How Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differentlyHow Silicon Valley startups are approaching security differently
How Silicon Valley startups are approaching security differently
 
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Black Magic: Listen who whispers your name in the dark!!!
 
SOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPONSOCIAL MEDIA AS A CYBER WEAPON
SOCIAL MEDIA AS A CYBER WEAPON
 
The Ugly Cost of Cyber Crime
The Ugly Cost of Cyber CrimeThe Ugly Cost of Cyber Crime
The Ugly Cost of Cyber Crime
 
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)Exploring DarkWeb For Threat Intelligence (SACON May 2018)
Exploring DarkWeb For Threat Intelligence (SACON May 2018)
 
Security for Human Beings
Security for Human BeingsSecurity for Human Beings
Security for Human Beings
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application Development
 
Secure Application Development
Secure Application DevelopmentSecure Application Development
Secure Application Development
 

Viewers also liked

Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primerjustbecos
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesKrisKasianovitz
 
What Your Tweets Tell Us About You: Identity, Ownership, and Privacy in Twitter
What Your Tweets Tell Us About You: Identity, Ownership, and Privacy in TwitterWhat Your Tweets Tell Us About You: Identity, Ownership, and Privacy in Twitter
What Your Tweets Tell Us About You: Identity, Ownership, and Privacy in TwitterKrisKasianovitz
 
22squared POV: Google+
22squared POV: Google+22squared POV: Google+
22squared POV: Google+22squared
 
Google+ Personal Learning Project
Google+ Personal Learning ProjectGoogle+ Personal Learning Project
Google+ Personal Learning Projectakampers
 
Twitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysisTwitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysiskimili
 

Viewers also liked (9)

Twitter Terms Policy Primer
Twitter Terms Policy PrimerTwitter Terms Policy Primer
Twitter Terms Policy Primer
 
Google +
Google +Google +
Google +
 
Google Plus Review
Google Plus ReviewGoogle Plus Review
Google Plus Review
 
What Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker NotesWhat Your Tweets Tell Us About You, Speaker Notes
What Your Tweets Tell Us About You, Speaker Notes
 
What Your Tweets Tell Us About You: Identity, Ownership, and Privacy in Twitter
What Your Tweets Tell Us About You: Identity, Ownership, and Privacy in TwitterWhat Your Tweets Tell Us About You: Identity, Ownership, and Privacy in Twitter
What Your Tweets Tell Us About You: Identity, Ownership, and Privacy in Twitter
 
22squared POV: Google+
22squared POV: Google+22squared POV: Google+
22squared POV: Google+
 
Google+ Personal Learning Project
Google+ Personal Learning ProjectGoogle+ Personal Learning Project
Google+ Personal Learning Project
 
Google+ 101 Guide
Google+ 101 GuideGoogle+ 101 Guide
Google+ 101 Guide
 
Twitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysisTwitter terms of service and privacy policy analysis
Twitter terms of service and privacy policy analysis
 

Similar to Privacy and security on twitter

Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki WattOpenCredo
 
Analysis and Visualization of Real-Time Twitter Data
Analysis and Visualization of Real-Time Twitter DataAnalysis and Visualization of Real-Time Twitter Data
Analysis and Visualization of Real-Time Twitter DataEducational Technology
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyTom Eston
 
Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Vanguard Visions
 
Content Marketing in (roughly) 10 Steps
Content Marketing in (roughly) 10 StepsContent Marketing in (roughly) 10 Steps
Content Marketing in (roughly) 10 StepsSusan Cato
 
Content Marketing Strategy in (roughly) 10 Steps
Content Marketing Strategy in (roughly) 10 StepsContent Marketing Strategy in (roughly) 10 Steps
Content Marketing Strategy in (roughly) 10 StepsBalance Interactive
 
Chapter 1 introduction to-information_security
Chapter 1   introduction to-information_securityChapter 1   introduction to-information_security
Chapter 1 introduction to-information_securitySyaiful Ahdan
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?Blue Coat
 
Twitter: A Hands-On Learning Session for Researcher
Twitter: A Hands-On Learning Session for ResearcherTwitter: A Hands-On Learning Session for Researcher
Twitter: A Hands-On Learning Session for ResearcherKMb Unit, York University
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearIronCore Labs
 
Building your fan base with content and social tools
Building your fan base with content and social toolsBuilding your fan base with content and social tools
Building your fan base with content and social toolsSusan Cato
 
Unleashing twitter data for fun and insight
Unleashing twitter data for fun and insightUnleashing twitter data for fun and insight
Unleashing twitter data for fun and insightDigital Reasoning
 
Unleashing Twitter Data for Fun and Insight
Unleashing Twitter Data for Fun and InsightUnleashing Twitter Data for Fun and Insight
Unleashing Twitter Data for Fun and InsightMatthew Russell
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
 
Introduction to Twitter in higher education June 2016
Introduction to Twitter in higher education June 2016Introduction to Twitter in higher education June 2016
Introduction to Twitter in higher education June 2016Alex Spiers
 
Chapter 6 network security
Chapter 6   network securityChapter 6   network security
Chapter 6 network securitySyaiful Ahdan
 
20201014 iso27001 iso27701 nist v2 (extended version)
20201014 iso27001 iso27701 nist v2 (extended version)20201014 iso27001 iso27701 nist v2 (extended version)
20201014 iso27001 iso27701 nist v2 (extended version)Peter GEELEN ✔
 
Cyber Security From Zero To Hero
Cyber Security From Zero To HeroCyber Security From Zero To Hero
Cyber Security From Zero To HeroMohammad Khreesha
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersStephen Thomas, CISSP
 

Similar to Privacy and security on twitter (20)

Microservices Manchester: Security, Microservces and Vault by Nicki Watt
Microservices Manchester:  Security, Microservces and Vault by Nicki WattMicroservices Manchester:  Security, Microservces and Vault by Nicki Watt
Microservices Manchester: Security, Microservces and Vault by Nicki Watt
 
Analysis and Visualization of Real-Time Twitter Data
Analysis and Visualization of Real-Time Twitter DataAnalysis and Visualization of Real-Time Twitter Data
Analysis and Visualization of Real-Time Twitter Data
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614Top tips for running your business safely online - 030614
Top tips for running your business safely online - 030614
 
Content Marketing in (roughly) 10 Steps
Content Marketing in (roughly) 10 StepsContent Marketing in (roughly) 10 Steps
Content Marketing in (roughly) 10 Steps
 
Content Marketing Strategy in (roughly) 10 Steps
Content Marketing Strategy in (roughly) 10 StepsContent Marketing Strategy in (roughly) 10 Steps
Content Marketing Strategy in (roughly) 10 Steps
 
Chapter 1 introduction to-information_security
Chapter 1   introduction to-information_securityChapter 1   introduction to-information_security
Chapter 1 introduction to-information_security
 
How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?How Safe Is YOUR Social Network?
How Safe Is YOUR Social Network?
 
Twitter: A Hands-On Learning Session for Researcher
Twitter: A Hands-On Learning Session for ResearcherTwitter: A Hands-On Learning Session for Researcher
Twitter: A Hands-On Learning Session for Researcher
 
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwearThe Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
The Internet is a dog-eat-dog world and your app is clad in Milk Bone underwear
 
Building your fan base with content and social tools
Building your fan base with content and social toolsBuilding your fan base with content and social tools
Building your fan base with content and social tools
 
Unleashing twitter data for fun and insight
Unleashing twitter data for fun and insightUnleashing twitter data for fun and insight
Unleashing twitter data for fun and insight
 
Unleashing Twitter Data for Fun and Insight
Unleashing Twitter Data for Fun and InsightUnleashing Twitter Data for Fun and Insight
Unleashing Twitter Data for Fun and Insight
 
Digital self defense 101 me rit
Digital self defense 101 me ritDigital self defense 101 me rit
Digital self defense 101 me rit
 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
 
Introduction to Twitter in higher education June 2016
Introduction to Twitter in higher education June 2016Introduction to Twitter in higher education June 2016
Introduction to Twitter in higher education June 2016
 
Chapter 6 network security
Chapter 6   network securityChapter 6   network security
Chapter 6 network security
 
20201014 iso27001 iso27701 nist v2 (extended version)
20201014 iso27001 iso27701 nist v2 (extended version)20201014 iso27001 iso27701 nist v2 (extended version)
20201014 iso27001 iso27701 nist v2 (extended version)
 
Cyber Security From Zero To Hero
Cyber Security From Zero To HeroCyber Security From Zero To Hero
Cyber Security From Zero To Hero
 
Cyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th GradersCyber Security for 5th and 6th Graders
Cyber Security for 5th and 6th Graders
 

Privacy and security on twitter

  • 1. Privacy and Security on Twitter: A Semantic Network Analysis Mansour A. Alshaikhsaleh Lewis University Dr. Abdullah, Faisal Information Security Practicum Spring 2013
  • 2. Agenda • Introduction • Methodology • Research Questions • Significance of the Study • Literature Review • Results • Discussion • Conclusion
  • 3. Introduction • Social media • Understanding the societal view
  • 4. Introduction… • Statement of the Problem: – The impression of the people views – Studying their ideas – Extract valuable information
  • 5. Introduction… • Statement of the Problem: – Analyzing tweets – Visualization
  • 6. Introduction… • Examines the Twitter – Semantic network analysis – Discourse analysis
  • 7. Introduction… • Definition of Terms: – Defining privacy is challenging – The security in the computer context
  • 8. Methodology • Data collection using HootSuite archives: • Set #1: “privacy” • Set #2: “privacy” and “security” • Set #3: “#privacy” and “#security” • Set #4: “privacy”, “security”, and “HIPAA” • Set #5: “privacy”, “security”, and “Facebook” • Set #6: “privacy”, “security”, and “Online”
  • 9. Methodology… • Automated Part: – Semantic data analysis – Data visualization
  • 10. Methodology… • Manual Part: – Filter – Randomly selected a sub-sample – Discourse analysis
  • 11. Research Questions • what are the semantic networks of “privacy” that developments on Twitter? • what are the semantic networks of “privacy” and “security” that developments on Twitter? • Is there a relationship between the two semantic networks?
  • 12. Significance of the Study and Potential Outcomes • Drawing a semantic map • For private or public institution
  • 13. Literature Review • Notion of privacy • Dynamic process of access control • Individual value • Societal value • Cultural universal
  • 14. Literature Review … • Privacy dimensions
  • 15. Literature Review … • No complete uniformity definition
  • 16. Literature Review … • Marcin and Shiu (2012) studied Twitter and Wikipedia – Topic trends
  • 17. Literature Review … • (Chhabra, Aggarwaly, Benevenutoz & Kumaraguru, 2011) detect phishing – Online social media – URL shortening services
  • 18. Results • ~100,000 collected tweets focused on “privacy”
  • 19. Results … • ~21,000 collected tweets focused on “privacy” and “security”
  • 20. Results … • ~3800 collected tweets focused on “#privacy” and “#security” Sequence Concept Frequency 1 privacy 4125 2 security 4115 3 twitter 1492 4 hootsuite 1054 5 tweetdeck 580 6 data 560 7 iphone 512 8 amp 442 9 tweet 400 10 tweetbutton 397 11 button 395 12 download 360 13 mobile 333 14 infosec 327 15 android 323 Sequence Concept Frequency 1 privacy 4125 2 security 4115 3 twitter 1492 4 hootsuite 1054 5 tweetdeck 580 6 data 560 7 iphone 512 8 amp 442 9 tweet 400 10 tweetbutton 397 11 button 395 12 download 360 13 mobile 333 14 infosec 327 15 android 323 16 facebook 306 17 internet 265 18 cloud 264 19 twitterfeed 260 20 https 254 21 online 253 22 apple 219 23 linkedin 214 24 hipaa 212 25 google 201 26 htc 176 27 apps 174 28 buffer 165 29 bufferapp 165 30 news 163
  • 21. Results … • ~800 collected tweets focused on “privacy”, “security”, and “HIPAA” Sequence Concept Frequency 1 hipaa 804 2 privacy 658 3 security 592 4 rules 248 5 rule 244 6 hootsuite 230 7 amp 213 8 final 198 9 tweetdeck 193 10 twitter 188 11 web 121 12 breach 120 13 data 110 14 health 103 15 enforcement 96 1 hipaa 804 2 privacy 658 3 security 592 4 rules 248 5 rule 244 6 hootsuite 230 7 amp 213 8 final 198 9 tweetdeck 193 10 twitter 188 11 web 121 12 breach 120 13 data 110 14 health 103 15 enforcement 96 16 twitterfeed 88 17 ocr 84 18 compliance 77 19 patient 76 20 notification 74 21 hhs 71 22 tweet 66 23 iphone 62 24 button 60 25 tweetbutton 60 26 hitech 58 27 jdsupra 58 28 idexperts 53 29 download 52 30 healthcare 47
  • 22. Results … • ~1000 collected tweets focused on “privacy”, “security”, and “Facebook”
  • 23. Results … • ~ 1100 collected tweets focused on “privacy”, “security”, and “online” Sequence Concept Frequency 1 privacy 761 2 security 724 3 online 713 4 twitter 340 5 hootsuite 326 6 twitterfeed 190 7 facebook 144 8 amp 138 9 tweetdeck 135 10 iphone 90 11 download 83 12 data 82 13 protect 77 14 social 75 15 apple 68 3 online 713 4 twitter 340 5 hootsuite 326 6 twitterfeed 190 7 facebook 144 8 amp 138 9 tweetdeck 135 10 iphone 90 11 download 83 12 data 82 13 protect 77 14 social 75 15 apple 68 16 password 68 17 tips 68 18 microsoft 66 19 tweet 64 20 issue 60 21 computer 59 22 safety 59 23 mobile 56 24 cyber 55 25 help 55 26 android 51 27 media 51 28 dlvr 50 29 guide 50 30 button 48
  • 24. Concept Privacy Privacy and security Privacy and security with hashtag Privacy, security, and HIPAA Privacy, security, and facebook Privacy, security, and online 1 privacy privacy privacy hipaa facebook privacy 2 twitter security security privacy privacy security 3 iphone twitter twitter security security online 4 download twitterfeed hootsuite rules twitter twitter 5 android amp tweetdeck rule twitterfeed hootsuite 6 mobile hootsuite data hootsuite hootsuite twitterfeed 7 facebook data iphone amp timeline facebook 8 google iphone amp final web amp 9 hootsuite download tweet tweetdeck news tweetdeck 10 blackberry tweetdeck tweetbutton twitter dlvr iphone 11 important android button web settings download 12 blackberry® dlvr download breach amp data 13 ipad tweet mobile data tweetdeck protect 14 need mobile infosec health saranonline social 15 respect Htc android enforcement plugs apple 16 button tweetbutton facebook Twitterfeed gremln password 17 glass button internet Ocr fixes tips 18 people facebook cloud compliance mobile microsoft 19 data google twitterfeed patient iphone tweet 20 sticky internet https notification account issue
  • 25. Discussion • The relationship • Privacy is integration • The legal dimension
  • 26. Discussion … • Individuals views • Concerns
  • 27. Conclusion • The main source • Analyzing the tweets • Highlighted the main concerns