A Comprehensive Critique: Cybersecurity in Social Media Analysis
VerifiedAdded on 2023/06/13
|5
|1523
|101
Journal and Reflective Writing
AI Summary
This paper presents a critique of a journal article focusing on cybersecurity and privacy issues in social media. The original article by Gritzalis et al. (2014) explores the security and privacy conflicts in social media, using examples from Twitter and YouTube to highlight potential threats. The critique summarizes the article's purpose, which is to raise awareness about political profiling and provide an analysis of legal measures for protecting user privacy. It discusses the article's methodology, including graph analysis and data collection from a Greek community, and points out the lack of countermeasures and a dim understanding of security. The critique also addresses the ethical and legal issues associated with data processing and user privacy, concluding that while the research collected a significant amount of data, it failed to provide a suitable conclusion and result, emphasizing the need for increased social consciousness and the institutionalization of digital privileges.

Running head: CYBERSECURITY IN SOCIAL MEDIA
CYBERSECURITY IN SOCIAL MEDIA
Name of the Student
Name of the University
Author Note
CYBERSECURITY IN SOCIAL MEDIA
Name of the Student
Name of the University
Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Student Name. Student No. Journal Article Critique.
Gritzalis, D., Kandias, M., Stavrou, V. and Mitrou, L., 2014. History of information: the
case of privacy and security in social media. In Proc. of the History of Information
Conference(pp. 283-310).
Word count: 1009
Gritzalis and other authors demonstrate the security and privacy conflicts in social media
in this particular seminal article with two different terrifying stories in twitter and YouTube
accordingly as such extant threat prediction by evaluating user personality trait of vanity and
increase of user awareness over data processing and categorized license for discriminative
development in YouTube (Gritzalis et al., 2014: 294). The purpose of the article is to increase
awareness over political profiling and provide reader analysis of legal means for stake of user’s
privacy and dignity. In this article they successfully implement a graph analysis using explicit
metrics to define content and measures user influence. They collect information from some
specific Greek community in order to extract result and possible threads occurring while surfing
social media. For illustrate the exact result they analyzed Twitter. For second approach basic
concepts, classifications are defined though real evidence is missing. In the end, they conclude
that how the personalized data exposed in social media can turn to emerging threats.
An asset of the paper authors provides clear understanding of casualties that may affect user
personally or financially (Gritzalis et al., 2014: 297). Author started this report by defining clear
state of the introduction as how the information revealed in social media of individuals, are
utilized to profile target advertisement, behavior prediction and personal profiling. However this
information may be used to provide more personalized user experience (Gunitsky, 2015: 43).
According to the author, there is a high chance of privacy violation for the facility of piloting
automatic psychometric valuations and enlightening multifaceted data concerning religious
beliefs and political, user privacy at stake. Author also state that, it is significant to
institutionalize digital privileges permitted to secure the user personal data in the social media.
Author argues about the uses of OSINT to eminent into two different viewpoint (Gritzalis et al.,
2014: 299). One perspective is violation of the user privacy and other is enhancing personalized
user experience without user consent (Jang-Jaccard and Nepal, 2014: 988). However, there is
other viewpoint of the concern, it can also be utilized to improve safety in dynamic organizations
1
Gritzalis, D., Kandias, M., Stavrou, V. and Mitrou, L., 2014. History of information: the
case of privacy and security in social media. In Proc. of the History of Information
Conference(pp. 283-310).
Word count: 1009
Gritzalis and other authors demonstrate the security and privacy conflicts in social media
in this particular seminal article with two different terrifying stories in twitter and YouTube
accordingly as such extant threat prediction by evaluating user personality trait of vanity and
increase of user awareness over data processing and categorized license for discriminative
development in YouTube (Gritzalis et al., 2014: 294). The purpose of the article is to increase
awareness over political profiling and provide reader analysis of legal means for stake of user’s
privacy and dignity. In this article they successfully implement a graph analysis using explicit
metrics to define content and measures user influence. They collect information from some
specific Greek community in order to extract result and possible threads occurring while surfing
social media. For illustrate the exact result they analyzed Twitter. For second approach basic
concepts, classifications are defined though real evidence is missing. In the end, they conclude
that how the personalized data exposed in social media can turn to emerging threats.
An asset of the paper authors provides clear understanding of casualties that may affect user
personally or financially (Gritzalis et al., 2014: 297). Author started this report by defining clear
state of the introduction as how the information revealed in social media of individuals, are
utilized to profile target advertisement, behavior prediction and personal profiling. However this
information may be used to provide more personalized user experience (Gunitsky, 2015: 43).
According to the author, there is a high chance of privacy violation for the facility of piloting
automatic psychometric valuations and enlightening multifaceted data concerning religious
beliefs and political, user privacy at stake. Author also state that, it is significant to
institutionalize digital privileges permitted to secure the user personal data in the social media.
Author argues about the uses of OSINT to eminent into two different viewpoint (Gritzalis et al.,
2014: 299). One perspective is violation of the user privacy and other is enhancing personalized
user experience without user consent (Jang-Jaccard and Nepal, 2014: 988). However, there is
other viewpoint of the concern, it can also be utilized to improve safety in dynamic organizations
1

Student Name. Student No. Journal Article Critique.
alongside the insider threat. According to the author insider threat is one of the main threat to
focus on in this period. Research recommended that social and technical countermeasures are
likely to deal with it when there is a chance of loss confidential information (Taylor, Fritsch and
Liederbach, 2014: 250). That also may affect facets such as social well-being, financial
prosperity and national security. Author illustrate the broad by taking the help of graph-theoretic
approach and summarize the results in the given tables. This surveys are conducted among a
Greek community in Twitter. They analyzed 1,075,859 user account to extract exact information
and through multiple additional methods they process online data from profile patterns. Author
testified that users are often unaware of their data processing procedure (Gritzalis et al., 2014:
289). Data may processed by several third party for numerous causes such as personalized
advertisement, user activities analysis (Lau, Xia and Ye, 2014: 40). While Balduzzi performed
opinion mining and automated user profiling to summarize conclusion over a mass of users.
Researchers are trying to find solid countermeasures to solve this insider threat. He proposed a
realistic countermeasures approach to evaluate the achievement rate of an attack in the Social
media (Elmaghraby and Losavio, 2014: 497).
Authors deliver a statistical circulation of the cohesion of the users to signify the usage
intensity of the specific social media sites. Author chose Twitter and YouTube as a platform to
collect data of user profiles by thoroughly examine tweets and videos with comments (Gritzalis
et al., 2014: 310). They examine users profile considering seven parameters such as number of
following, amount of follower, amount of favorites, number of playlist, number of tweets and
retweets. They also analyzed general taxonomy of the tweeter and YouTube users to identify the
deviation and differentiations among users (Gritzalis et al., 2014: 284). The research results
were significant as clearly indicates that corrupted-relationship between co-workers assist the
appearance of insider threats but also catalyzes an insider’s malicious performance. This report
also suggested that human resource staff and management may maintain awareness of user well-
being and satisfaction (Kandias et al, 2013: 230). After analyzing twitter’s user activity they used
three step process for homogeneity testing and user screening. For YouTube privacy they extant
a political association detection technique for increase the awareness. They analyzed 12.964 user
profiles with 207,377 videos and 2.043.362 comments. They also collect desired information
from cloud with panoptic on.
2
alongside the insider threat. According to the author insider threat is one of the main threat to
focus on in this period. Research recommended that social and technical countermeasures are
likely to deal with it when there is a chance of loss confidential information (Taylor, Fritsch and
Liederbach, 2014: 250). That also may affect facets such as social well-being, financial
prosperity and national security. Author illustrate the broad by taking the help of graph-theoretic
approach and summarize the results in the given tables. This surveys are conducted among a
Greek community in Twitter. They analyzed 1,075,859 user account to extract exact information
and through multiple additional methods they process online data from profile patterns. Author
testified that users are often unaware of their data processing procedure (Gritzalis et al., 2014:
289). Data may processed by several third party for numerous causes such as personalized
advertisement, user activities analysis (Lau, Xia and Ye, 2014: 40). While Balduzzi performed
opinion mining and automated user profiling to summarize conclusion over a mass of users.
Researchers are trying to find solid countermeasures to solve this insider threat. He proposed a
realistic countermeasures approach to evaluate the achievement rate of an attack in the Social
media (Elmaghraby and Losavio, 2014: 497).
Authors deliver a statistical circulation of the cohesion of the users to signify the usage
intensity of the specific social media sites. Author chose Twitter and YouTube as a platform to
collect data of user profiles by thoroughly examine tweets and videos with comments (Gritzalis
et al., 2014: 310). They examine users profile considering seven parameters such as number of
following, amount of follower, amount of favorites, number of playlist, number of tweets and
retweets. They also analyzed general taxonomy of the tweeter and YouTube users to identify the
deviation and differentiations among users (Gritzalis et al., 2014: 284). The research results
were significant as clearly indicates that corrupted-relationship between co-workers assist the
appearance of insider threats but also catalyzes an insider’s malicious performance. This report
also suggested that human resource staff and management may maintain awareness of user well-
being and satisfaction (Kandias et al, 2013: 230). After analyzing twitter’s user activity they used
three step process for homogeneity testing and user screening. For YouTube privacy they extant
a political association detection technique for increase the awareness. They analyzed 12.964 user
profiles with 207,377 videos and 2.043.362 comments. They also collect desired information
from cloud with panoptic on.
2
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Student Name. Student No. Journal Article Critique.
According to their methodology there are several legal and ethical issues. This approaches are
not totally legal or ethical and violating user privacy results several emerging threats. This report
provides a wide analyze tables that’s are conducted through utilizing several methods on users
account (Gritzalis et al., 2014: 292). They illustrate every process and how they extract the vital
information that’s will be useful to increase the awareness and understand the casualties
(Abawajy, 2014: 239). They also illustrate wide about the emerging threads. However, there is
no countermeasure available in this report. The understanding of security is also dim in this
report.
Overall, the elegant research strategy has stood as a thoughtful drawback to the effort.
The author acquired a huge quantity of information from some specific social sites that was
clearly inefficiently deliberated. They were successful to collect and analyze user’s data but fail
to provide a suitable conclusion and result. Author also discussed about the emerging threats
over users political affiliation using the graph theoretic analysis of the dataset conducted from
both Tweeter and YouTube (Gritzalis et al., 2014: 289). They tinted probable significances of an
assumed application of the defined Panoptic on method. Nevertheless the implementation
possibility, the subsequent threats contain social prejudice, occupied place insights or even
marginalization and stigma of the victims. In conclusion, they adopt a pro-privacy assertiveness
and embrace a legal point of view in the defined methodology alongside the appearance of the
demand for rising social consciousness over emerging threats and the essential for
institutionalization of digital privileges.
3
According to their methodology there are several legal and ethical issues. This approaches are
not totally legal or ethical and violating user privacy results several emerging threats. This report
provides a wide analyze tables that’s are conducted through utilizing several methods on users
account (Gritzalis et al., 2014: 292). They illustrate every process and how they extract the vital
information that’s will be useful to increase the awareness and understand the casualties
(Abawajy, 2014: 239). They also illustrate wide about the emerging threads. However, there is
no countermeasure available in this report. The understanding of security is also dim in this
report.
Overall, the elegant research strategy has stood as a thoughtful drawback to the effort.
The author acquired a huge quantity of information from some specific social sites that was
clearly inefficiently deliberated. They were successful to collect and analyze user’s data but fail
to provide a suitable conclusion and result. Author also discussed about the emerging threats
over users political affiliation using the graph theoretic analysis of the dataset conducted from
both Tweeter and YouTube (Gritzalis et al., 2014: 289). They tinted probable significances of an
assumed application of the defined Panoptic on method. Nevertheless the implementation
possibility, the subsequent threats contain social prejudice, occupied place insights or even
marginalization and stigma of the victims. In conclusion, they adopt a pro-privacy assertiveness
and embrace a legal point of view in the defined methodology alongside the appearance of the
demand for rising social consciousness over emerging threats and the essential for
institutionalization of digital privileges.
3
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Student Name. Student No. Journal Article Critique.
Reference
Abawajy J (2014) User preference of cyber security awareness delivery methods: Behaviour &
Information Technology 33(3):237-248.
Elmaghraby AS, and Losavio MM (2014) Cyber security challenges in Smart Cities: Safety,
security and privacy. Journal of advanced research, 5(4):491-497.
Gunitsky S (2015) Corrupting the cyber-commons: Social media as a tool of autocratic
stability. Perspectives on Politics 13(1):42-54.
Jang-Jaccard J and Nepal S (2014) A survey of emerging threats in cybersecurity. Journal of
Computer and System Sciences 80(5):973-993.
Kandias M, Galbogini K, Mitrou L and Gritzalis D (2013) June Insiders trapped in the mirror
reveal themselves in social media. In International Conference on Network and System Security
220-235.
Kandias M, Stavrou V, Bozovic N and Gritzalis D (2013) November Proactive insider threat
detection through social media: The YouTube case. In Proceedings of the 12th ACM workshop
on Workshop on privacy in the electronic society 261-266.
Lau RY, Xia Y and Ye Y (2014) A probabilistic generative model for mining cybercriminal
networks from online social media. IEEE Computational intelligence magazine 9(1):31-43.
Taylor RW, Fritsch EJ and Liederbach J, (2014) Digital crime and digital terrorism. Prentice
Hall Press, 123-263.
4
Reference
Abawajy J (2014) User preference of cyber security awareness delivery methods: Behaviour &
Information Technology 33(3):237-248.
Elmaghraby AS, and Losavio MM (2014) Cyber security challenges in Smart Cities: Safety,
security and privacy. Journal of advanced research, 5(4):491-497.
Gunitsky S (2015) Corrupting the cyber-commons: Social media as a tool of autocratic
stability. Perspectives on Politics 13(1):42-54.
Jang-Jaccard J and Nepal S (2014) A survey of emerging threats in cybersecurity. Journal of
Computer and System Sciences 80(5):973-993.
Kandias M, Galbogini K, Mitrou L and Gritzalis D (2013) June Insiders trapped in the mirror
reveal themselves in social media. In International Conference on Network and System Security
220-235.
Kandias M, Stavrou V, Bozovic N and Gritzalis D (2013) November Proactive insider threat
detection through social media: The YouTube case. In Proceedings of the 12th ACM workshop
on Workshop on privacy in the electronic society 261-266.
Lau RY, Xia Y and Ye Y (2014) A probabilistic generative model for mining cybercriminal
networks from online social media. IEEE Computational intelligence magazine 9(1):31-43.
Taylor RW, Fritsch EJ and Liederbach J, (2014) Digital crime and digital terrorism. Prentice
Hall Press, 123-263.
4
1 out of 5
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2026 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





