2017
DOI: 10.1504/ijwbc.2017.084384
|View full text |Cite
|
Sign up to set email alerts
|

Security information sharing via Twitter: 'Heartbleed' as a case study

Abstract: Abstract:The current paper outlines an exploratory case study in which we examined the extent to which specific communities of Twitter users engaged with the debate about the security threat known as 'Heartbleed' in the first few days after this threat was exposed. The case study explored which professional groups appeared to lead the debate about Heartbleed, the nature of the communication (tweets and retweets), and evidence about behaviour change. Using keywords from the Twitter user profiles, six occupation… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…This would make Stegaid far more secure in that data is hidden but if discovered, still encrypted. Given recent developments with the Heartbleed bug in OpenSSL (Jeske et al, 2017;Harran et al, 2017) it makes sense to have an additional level of security beyond encryption.…”
Section: Discussionmentioning
confidence: 99%
“…This would make Stegaid far more secure in that data is hidden but if discovered, still encrypted. Given recent developments with the Heartbleed bug in OpenSSL (Jeske et al, 2017;Harran et al, 2017) it makes sense to have an additional level of security beyond encryption.…”
Section: Discussionmentioning
confidence: 99%
“…Apart from spam abuse and security information detection, Twitter was used as an information source for empirical investigations in the field of information security. For example, Jeske et al [17] examined the extent to which specific communities of Twitter users were engaged in the debate about the Heartbleed security bug. Moreover, Syed et al [34] conducted an empirical study to identify the major content categories contained in vulnerability discussions on Twitter and what factors impact the Re-tweeting of these contents.…”
Section: Related Workmentioning
confidence: 99%