Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity

06/26/2020
by   Tingmin Wu, et al.
0

Computer users are generally faced with difficulties in making correct security decisions. While an increasingly fewer number of people are trying or willing to take formal security training, online sources including news, security blogs, and websites are continuously making security knowledge more accessible. Analysis of cybersecurity texts can provide insights into the trending topics and identify current security issues as well as how cyber attacks evolve over time. These in turn can support researchers and practitioners in predicting and preparing for these attacks. Comparing different sources may facilitate the learning process for normal users by persisting the security knowledge gained from different cybersecurity context. Prior studies neither systematically analysed the wide-range of digital sources nor provided any standardisation in analysing the trending topics from recent security texts. Although LDA has been widely adopted in topic generation, its generated topics cannot cover the cybersecurity concepts completely and considerably overlap. To address this issue, we propose a semi-automated classification method to generate comprehensive security categories instead of LDA-generated topics. We further compare the identified 16 security categories across different sources based on their popularity and impact. We have revealed several surprising findings. (1) The impact reflected from cyber-security texts strongly correlates with the monetary loss caused by cybercrimes. (2) For most categories, security blogs share the largest popularity and largest absolute/relative impact over time. (3) Websites deliver security information without caring about timeliness much, where one third of the articles do not specify the date and the rest have a time lag in posting emerging security issues.

READ FULL TEXT

page 4

page 5

page 6

page 8

page 10

page 14

page 15

page 16

research
04/11/2023

The efficacy potential of cyber security advice as presented in news articles

Cyber security advice is a broad church: it is thematically expansive, c...
research
08/16/2021

Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling

Due to the variety of cyber-attacks or threats, the cybersecurity commun...
research
06/05/2022

Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter

Current research on users` perspectives of cyber security and privacy re...
research
07/08/2020

NERD: Neural Network for Edict of Risky Data Streams

Cyber incidents can have a wide range of cause from a simple connection ...
research
07/31/2023

Introducing and Interfacing with Cybersecurity – A Cards Approach

Cybersecurity is an important topic which is often viewed as one that is...
research
04/11/2018

How vulnerable are the Indian banks: A cryptographers' view

With the advent of e-commerce and online banking it has become extremely...
research
08/24/2022

"Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine

The Russian Invasion of Ukraine in early 2022 resulted in a rapidly chan...

Please sign up or login with your details

Forgot password? Click here to reset