Author:
Scheibmeir Jim A.,Malaiya Yashwant K.
Abstract
AbstractThe Internet of Things technology offers convenience and innovation in areas such as smart homes and smart cities. Internet of Things solutions require careful management of devices and the risk mitigation of potential vulnerabilities within cyber-physical systems. The Internet of Things concept, its implementations, and applications are frequently discussed on social media platforms. This research illuminates the public view of the Internet of Things through a content-based and network analysis of contemporary conversations occurring on the Twitter platform. Tweets can be analyzed with machine learning methods to converge the volume and variety of conversations into predictive and descriptive models. We have reviewed 684,503 tweets collected in a 2-week period. Using supervised and unsupervised machine learning methods, we have identified trends within the realm of IoT and their interconnecting relationships between the most mentioned industries. We have identified characteristics of language sentiment which can help to predict the popularity of IoT conversation topics. We found the healthcare industry as the leading use case industry for IoT implementations. This is not surprising as the current COVID-19 pandemic is driving significant social media discussions. There was an alarming dearth of conversations towards cybersecurity. Recent breaches and ransomware events denote that organizations should spend more time communicating about risks and mitigations. Only 12% of the tweets relating to the Internet of Things contained any mention of topics such as encryption, vulnerabilities, or risk, among other cybersecurity-related terms. We propose an IoT Cybersecurity Communication Scorecard to help organizations benchmark the density and sentiment of their corporate communications regarding security against their specific industry.
Publisher
Springer Science and Business Media LLC
Subject
General Earth and Planetary Sciences,General Energy
Reference50 articles.
1. Girma A. Analysis of security vulnerability and analytics of Internet of Things (IOT) platform. In: Latifi S, editor. Information technology—new generations. Advances in intelligent systems and computing, vol. 738. Cham: Springer; 2018.
2. Ashton K. That Internet of Things thing. RFiD J. 2009;22:97–114.
3. Shi W, Cao J, Zhang Q, Li Y, Xu L. Edge computing: vision and challenges. IEEE JIOT. 2016;3:637–46. https://doi.org/10.1109/JIOT.2016.2579198.
4. James J. Data never sleeps 2.0. 2014. https://www.domo.com/blog/data-never-sleeps-2-0/.
5. Cruickshank IJ, Carley KM. Characterizing communities of hashtag usage on twitter during the 2020 COVID-19 pandemic by multi-view clustering. Appl Netw Sci. 2020. https://doi.org/10.1007/s41109-020-00317-8.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献