{"title":"推特上恶意内容的传播及其对安全的影响","authors":"Yaman Roumani","doi":"10.1016/j.im.2024.103971","DOIUrl":null,"url":null,"abstract":"<div><p>While Twitter remains one of the most popular social media networks within the information security community, threat actors continue to abuse the platform to create, share, and spread malicious contents. In this study, we focus on whether Twitter- and vulnerability-related features can help predict vulnerabilities known to be actively exploited. Using a sample of 6004 tweets, results show that Twitter features (tweets and quote tweets) that combine the benefits of both content creation and sharing can predict active exploitation of vulnerabilities. Furthermore, findings show that certain technical and vulnerability-related features are also capable of predicting active exploitations.</p></div>","PeriodicalId":56291,"journal":{"name":"Information & Management","volume":"61 5","pages":"Article 103971"},"PeriodicalIF":8.2000,"publicationDate":"2024-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The diffusion of malicious content on Twitter and its impact on security\",\"authors\":\"Yaman Roumani\",\"doi\":\"10.1016/j.im.2024.103971\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>While Twitter remains one of the most popular social media networks within the information security community, threat actors continue to abuse the platform to create, share, and spread malicious contents. In this study, we focus on whether Twitter- and vulnerability-related features can help predict vulnerabilities known to be actively exploited. Using a sample of 6004 tweets, results show that Twitter features (tweets and quote tweets) that combine the benefits of both content creation and sharing can predict active exploitation of vulnerabilities. Furthermore, findings show that certain technical and vulnerability-related features are also capable of predicting active exploitations.</p></div>\",\"PeriodicalId\":56291,\"journal\":{\"name\":\"Information & Management\",\"volume\":\"61 5\",\"pages\":\"Article 103971\"},\"PeriodicalIF\":8.2000,\"publicationDate\":\"2024-05-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information & Management\",\"FirstCategoryId\":\"91\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0378720624000533\",\"RegionNum\":2,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information & Management","FirstCategoryId":"91","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0378720624000533","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
The diffusion of malicious content on Twitter and its impact on security
While Twitter remains one of the most popular social media networks within the information security community, threat actors continue to abuse the platform to create, share, and spread malicious contents. In this study, we focus on whether Twitter- and vulnerability-related features can help predict vulnerabilities known to be actively exploited. Using a sample of 6004 tweets, results show that Twitter features (tweets and quote tweets) that combine the benefits of both content creation and sharing can predict active exploitation of vulnerabilities. Furthermore, findings show that certain technical and vulnerability-related features are also capable of predicting active exploitations.
期刊介绍:
Information & Management is a publication that caters to researchers in the field of information systems as well as managers, professionals, administrators, and senior executives involved in designing, implementing, and managing Information Systems Applications.