Using data mining techniques to explore security issues in smart living environments in Twitter

In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The development of the IoT industry has led to the emergence of connected devices and home assistants that create smart living environments. However,...

Full description

Saved in:
Bibliographic Details
Published inComputer communications Vol. 179; pp. 285 - 295
Main Authors Saura, Jose Ramon, Palacios-Marqués, Daniel, Ribeiro-Soriano, Domingo
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.11.2021
Subjects
Online AccessGet full text
ISSN0140-3664
DOI10.1016/j.comcom.2021.08.021

Cover

Abstract In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The development of the IoT industry has led to the emergence of connected devices and home assistants that create smart living environments. However, the continuously generated data accumulated by these connected devices create security issues and raise user’s privacy concerns. The present study aims to explore the main security issues in smart living environments using data mining techniques. To this end, we applied a three-sentence data mining analysis of 938,258 tweets collected from Twitter under the user-generated data (UGD) framework. First, sentiment analysis was applied using Textblob which was tested with support vector classifier, multinomial naïve bayes, logistic regression, and random forest classifier; as a result, the analyzed tweets were divided into those expressing positive, negative, and neutral sentiment. Next, a Latent Dirichlet Allocation (LDA) algorithm was applied to divide the sample into topics related to security issues in smart living environments. Finally, the insights were extracted by applying a textual analysis process in Python validated with the analysis of frequency and weighted percentage variables and calculating the statistical measure known as mutual information (MI) to analyze the identified n-grams (unigrams and bigrams). As a result of the research 10 topics were identified in which we found that the main security issues are malware, cybersecurity attacks, data storing vulnerabilities, the use of testing software in IoT, and possible leaks due to the lack of user experience. We discussed different circumstances and causes that may affect user security and privacy when using IoT devices and emphasized the importance of UGC in the processing of personal data of IoT device users.
AbstractList In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The development of the IoT industry has led to the emergence of connected devices and home assistants that create smart living environments. However, the continuously generated data accumulated by these connected devices create security issues and raise user’s privacy concerns. The present study aims to explore the main security issues in smart living environments using data mining techniques. To this end, we applied a three-sentence data mining analysis of 938,258 tweets collected from Twitter under the user-generated data (UGD) framework. First, sentiment analysis was applied using Textblob which was tested with support vector classifier, multinomial naïve bayes, logistic regression, and random forest classifier; as a result, the analyzed tweets were divided into those expressing positive, negative, and neutral sentiment. Next, a Latent Dirichlet Allocation (LDA) algorithm was applied to divide the sample into topics related to security issues in smart living environments. Finally, the insights were extracted by applying a textual analysis process in Python validated with the analysis of frequency and weighted percentage variables and calculating the statistical measure known as mutual information (MI) to analyze the identified n-grams (unigrams and bigrams). As a result of the research 10 topics were identified in which we found that the main security issues are malware, cybersecurity attacks, data storing vulnerabilities, the use of testing software in IoT, and possible leaks due to the lack of user experience. We discussed different circumstances and causes that may affect user security and privacy when using IoT devices and emphasized the importance of UGC in the processing of personal data of IoT device users.
Author Saura, Jose Ramon
Ribeiro-Soriano, Domingo
Palacios-Marqués, Daniel
Author_xml – sequence: 1
  givenname: Jose Ramon
  orcidid: 0000-0002-9457-7745
  surname: Saura
  fullname: Saura, Jose Ramon
  email: joseramon.saura@urjc.es
  organization: Rey Juan Carlos University, Madrid, Spain
– sequence: 2
  givenname: Daniel
  surname: Palacios-Marqués
  fullname: Palacios-Marqués, Daniel
  email: dapamar@doe.upv.es
  organization: Universitat Politècnica de València, Valencia, Spain
– sequence: 3
  givenname: Domingo
  surname: Ribeiro-Soriano
  fullname: Ribeiro-Soriano, Domingo
  email: ribeders@uv.es
  organization: University of Alcalá, Madrid, Spain
BookMark eNqFkM1OwzAQhH0oEm3hDTj4BRJsJ80PByRU8SdV4tKeLcdZw1aJXWy30LcnoZw4wGqlWWn0rTQzIxPrLBByxVnKGS-ut6l2_bCpYIKnrEoHmZAp4zlLsqLIz8kshC1jLC_LbErkJqB9pa2KivZoxzuCfrP4vodAo6PwueucBxpA7z3GI8UQRgstDb3ykXZ4GCmwB_TO9mDjt7n-wBjBX5Azo7oAlz86J5uH-_XyKVm9PD4v71aJzhYiJnUrjGmVyUsjWJbnNQhdG122WaPyYURhQJlFJbKi5tBwwUqVla0RDWeNqppsTm5Of7V3IXgwUmNUEZ2NXmEnOZNjPXIrT_XIsR7JKjnIAOe_4J3HIdzxP-z2hMEQ7IDgZdAIVkOLHnSUrcO_H3wBBFWIgQ
CitedBy_id crossref_primary_10_1007_s11042_023_17250_4
crossref_primary_10_1016_j_techfore_2022_121908
crossref_primary_10_1088_2515_7620_ac6657
crossref_primary_10_1016_j_jbusres_2021_12_052
crossref_primary_10_1007_s11135_022_01459_w
crossref_primary_10_1016_j_cose_2022_103008
crossref_primary_10_1007_s13278_024_01254_5
crossref_primary_10_1007_s13132_024_01764_9
crossref_primary_10_1371_journal_pone_0277549
crossref_primary_10_1016_j_eswa_2022_117974
crossref_primary_10_1155_2022_3965720
crossref_primary_10_2147_PRBM_S386089
crossref_primary_10_1155_2022_3834696
crossref_primary_10_3390_math9243150
crossref_primary_10_1007_s42979_022_01415_3
crossref_primary_10_1080_10447318_2022_2147302
crossref_primary_10_3390_electronics11030450
crossref_primary_10_3390_electronics11091416
crossref_primary_10_3390_en16135206
crossref_primary_10_3389_fpsyg_2023_1123236
crossref_primary_10_3390_su142013534
crossref_primary_10_37391_ijeer_12icteee07
crossref_primary_10_3233_AIS_230433
crossref_primary_10_1016_j_asoc_2022_108987
crossref_primary_10_5937_ekonomika2303043I
crossref_primary_10_3389_fpsyg_2022_820813
crossref_primary_10_1016_j_techfore_2021_121456
crossref_primary_10_4018_IJCAC_305211
crossref_primary_10_1016_j_ijpe_2023_108861
crossref_primary_10_1016_j_jbusres_2022_113433
crossref_primary_10_1016_j_giq_2022_101679
crossref_primary_10_1016_j_inffus_2023_101804
crossref_primary_10_1186_s13677_022_00356_9
crossref_primary_10_3389_fnagi_2022_938071
crossref_primary_10_1108_JFBM_04_2022_0050
crossref_primary_10_3390_s24041270
crossref_primary_10_1007_s10479_023_05261_1
crossref_primary_10_1016_j_technovation_2021_102447
crossref_primary_10_1007_s11365_022_00823_4
crossref_primary_10_1108_DTA_10_2022_0406
crossref_primary_10_1016_j_measen_2022_100605
Cites_doi 10.1016/j.knosys.2018.08.011
10.1111/1475-679X.12123
10.3390/fi10120125
10.1016/j.jss.2019.04.058
10.1093/applin/25.3.371
10.1109/JIOT.2020.3000056
10.1007/s11042-016-4162-z
10.1016/j.comcom.2015.07.016
10.5614/itbj.ict.res.appl.2016.10.1.6
10.1109/TVT.2017.2701551
10.1108/EJIM-03-2018-0058
10.1609/icwsm.v4i1.14024
10.1016/j.future.2019.02.060
10.1093/poq/nfs038
10.1109/MPRV.2018.03367733
10.3390/info7030044
10.1016/j.procs.2017.10.105
10.1016/j.ijinfomgt.2020.102129
10.1109/TII.2020.2974555
10.1109/MCE.2019.2953740
10.1016/j.techfore.2021.120681
10.1016/j.future.2017.04.036
10.1016/j.jbusres.2021.03.001
10.1016/j.compind.2018.08.002
10.1016/j.compind.2009.05.010
10.1109/JIOT.2018.2847733
10.1109/JIOT.2016.2619369
10.1093/cybsec/tyz005
10.1016/j.comcom.2015.07.001
10.1016/j.comcom.2020.02.068
10.1016/j.chb.2018.11.022
10.1145/3364223
10.1016/j.clsr.2017.06.007
10.1007/s00180-019-00919-6
10.3390/sym11040519
10.1016/j.clsr.2015.12.001
10.1016/j.comcom.2020.01.016
10.1109/MTS.2018.2826079
10.1109/MCOM.2017.1600267CM
10.1609/aaai.v26i1.8353
10.1109/JPROC.2012.2200563
10.1007/s13347-019-00361-y
10.1007/s11042-016-3735-1
10.1016/j.jik.2020.08.001
10.1109/ICoICT.2018.8528776
10.1109/MC.2011.291
10.1145/2493432.2493494
10.1126/science.aaa8685
10.3390/app10124102
10.1109/COMST.2014.2320093
10.3390/s18051602
10.1109/MSP.2017.4251118
10.1108/INTR-06-2018-0252
10.1109/MCOM.2018.1701204
10.1177/1094428109335949
10.1140/epjds/s13688-016-0085-1
10.1016/j.ipm.2020.102468
10.1016/j.comcom.2020.02.044
10.1016/j.comnet.2014.11.008
10.1162/coli.08-012-R1-06-90
10.1002/cpe.4946
10.1007/s11846-019-00333-8
10.1109/MCC.2016.28
10.69554/TBRU2322
10.1016/j.techfore.2018.09.009
10.1016/j.future.2019.03.042
10.1016/j.comnet.2018.11.028
10.1177/1094428111417451
10.1016/j.indmarman.2021.08.006
10.1177/1094428117745648
10.1007/s11042-018-6894-4
10.14445/22312803/IJCTT-V68I4P142
10.1016/j.asoc.2020.106983
10.1016/j.future.2019.02.055
10.1109/ACCESS.2019.2935200
10.1007/s11846-021-00444-1
10.1016/j.infsof.2018.02.005
10.1016/j.future.2017.03.001
ContentType Journal Article
Copyright 2021 The Authors
Copyright_xml – notice: 2021 The Authors
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.comcom.2021.08.021
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EndPage 295
ExternalDocumentID 10_1016_j_comcom_2021_08_021
S0140366421003212
GroupedDBID --K
--M
.DC
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
6I.
7-5
71M
77K
8P~
9JN
AABNK
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AATTM
AAXKI
AAXUO
AAYFN
ABBOA
ABFNM
ABJNI
ABMAC
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
ADTZH
AEBSH
AECPX
AEIPS
AEKER
AENEX
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AKRWK
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
ANKPU
AOUOD
AXJTR
BJAXD
BKOJK
BLXMC
BNPGV
CS3
DU5
EBS
EFJIC
EO8
EO9
EP2
EP3
FDB
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
IHE
J1W
JJJVA
KOM
LG9
M41
MO0
MS~
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
ROL
RPZ
RXW
SDF
SDG
SDP
SES
SPC
SPCBC
SSH
SST
SSV
SSZ
T5K
WH7
ZMT
~G-
07C
29F
AAQXK
AAYWO
AAYXX
ABWVN
ABXDB
ACNNM
ACRPL
ACVFH
ADCNI
ADJOM
ADMUD
ADNMO
AEUPX
AFJKZ
AFPUW
AFXIZ
AGCQF
AGQPQ
AGRNS
AI.
AIGII
AIIUN
AKBMS
AKYEP
APXCP
ASPBG
AVWKF
AZFZN
CITATION
EJD
F0J
FEDTE
FGOYB
HLZ
HVGLF
HZ~
R2-
RIG
SBC
SEW
TAE
UHS
VH1
VOH
WUQ
XPP
ZY4
ID FETCH-LOGICAL-c352t-9d2ffdaf47f203449e2c9fc7d3ba444426feaf5823691eb1207a37df2b10ba8b3
IEDL.DBID AIKHN
ISSN 0140-3664
IngestDate Thu Apr 24 23:02:31 EDT 2025
Tue Jul 01 02:43:07 EDT 2025
Sun Apr 06 06:54:34 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords UGC
Sentiment analysis
Twitter
Home assistant
Data mining
IoT
Language English
License This is an open access article under the CC BY license.
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c352t-9d2ffdaf47f203449e2c9fc7d3ba444426feaf5823691eb1207a37df2b10ba8b3
ORCID 0000-0002-9457-7745
OpenAccessLink https://www.sciencedirect.com/science/article/pii/S0140366421003212
PageCount 11
ParticipantIDs crossref_citationtrail_10_1016_j_comcom_2021_08_021
crossref_primary_10_1016_j_comcom_2021_08_021
elsevier_sciencedirect_doi_10_1016_j_comcom_2021_08_021
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-11-01
2021-11-00
PublicationDateYYYYMMDD 2021-11-01
PublicationDate_xml – month: 11
  year: 2021
  text: 2021-11-01
  day: 01
PublicationDecade 2020
PublicationTitle Computer communications
PublicationYear 2021
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Khan, Iltaf, Afzal, Abbas (b96) 2020
K.L. Liu, W.J. Li, M. Guo, Emoticon smoothed language models for twitter sentiment analysis, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 26, No. 1, 2012, July.
Das, Degeling, Sadeh (b58) 2018; 17
Emami-Naeini, Bhagavatula, Habib, Degeling, Bauer, Cranor, Sadeh (b56) 2020
Pandey, Pandey (b98) 2019; 22
Xuanyang, Yuchang, Shouhong, Xi (b73) 2006
Salamone, Belussi, Currò, Danza, Ghellere, Guazzi (b120) 2018; 18
Wilson, Wiebe, Hoffmann (b87) 2009; 35
McKenny, Aguinis, Short, Anglin (b72) 2018; 44
Zainuddin, Daud, Ahmad, Maslizan, Abdullah (b14) 2021
Alrawi, Lever, Antonakakis, Monrose (b60) 2019
Ribeiro, Araújo, Gonçalves, Gonçalves, Benevenuto (b76) 2016; 5
Hu, Yang, Lin, Wang (b61) 2020
Short, Broberg, Cogliser, Brigham (b47) 2010; 13
Blythe, Sombatruang, Johnson (b18) 2019; 5
Qi, Procter, Zhang, Guo (b99) 2019; 7
Nzabahimana (b11) 2018
Mohammad (b111) 2020; 68
Webberley, Allen, Whitaker (b55) 2016; 73
Leon (b74) 2009; 60
Täuscher, Bouncken, Pesch (b48) 2020
Chaudhuri (b36) 2016; 1
Rayson, Garside (b105) 2000
Tao, Bhuiyan, Rahman, Wang, Wang, Ahmed, Li (b37) 2019; 98
Zhou, Jia, Peng, Zhang, Liu (b108) 2018; 6
Hardeniya, Perkins, Chopra, Joshi, Mathur (b86) 2016
Ribeiro-Navarrete, Saura, Palacios-Marqués (b2) 2021; 167
Loughran, McDonald (b97) 2016; 54
Sarlan, Nadam, Basri (b52) 2014
Vilela, Rodrigues, Solic, Saleem, Furtado (b127) 2019; 97
McEnery, Hardie (b107) 2013
Bouncken, Kraus (b23) 2021
Geneiatakis, Kounelis, Neisse, Nai-Fovino, Steri, Baldini (b42) 2017
Chen, Zhang, Liu, Ye, Lin (b94) 2019; 163
Arachchige, Bertok, Khalil, Liu, Camtepe, Atiquzzaman (b43) 2020; 16
Bhavsar, Manglani (b83) 2019; 6
Chow (b26) 2017; 15
Gill, Garraghan, Buyya (b34) 2019; 154
Lin, Bergmann (b25) 2016; 7
Caron, Bosua, Maynard, Ahmad (b28) 2016; 32
Saura, Bennett (b84) 2019; 11
G. Bouma, Normalized (pointwise) mutual information in collocation extraction, in: Proceedings of GSCL, 2009, pp. 31–40.
Mahalle, Anggorojati, Prasad, Prasad (b117) 2012
Agrawal, Fu, Menzies (b93) 2018; 98
Lee, Kobsa (b122) 2019; 27
Arabo, Brown, El-Moussa (b112) 2012
Saura, Ribeiro-Soriano, Palacios-Marqués (b64) 2021; 98
Seydoux, Drira, Hernandez, Monteil (b9) 2016
Kong, Qiao, Wu (b109) 2020; 35
Janssen, Luthra, Mangla, Rana, Dwivedi (b68) 2019; 29
Griol, Molina, Callejas (b90) 2017
Jelodar, Wang, Yuan, Feng, Jiang, Li, Zhao (b78) 2019; 78
AlSumait, Barbará, Gentle, Domeniconi (b92) 2009
Gupta, Quamara (b35) 2020; 32
Patel, Doshi (b116) 2019
Alladi, Chamola, Sikdar, Choo (b8) 2020; 9
Karoui, Zitoune, Moriceau (b91) 2017; 117
Radanliev, De Roure, Nicolescu, Huth, Montalvo, Cannady, Burnap (b115) 2018; 102
Iyengar, Sood, Lelkes (b103) 2012; 76
Ammirato, Sofo, Felicetti, Raso (b21) 2019
Santoso, Vun (b39) 2015
Yu, Wang, Liu, Niu (b41) 2018; 56
Bouncken, Qiu (b6) 2021; 2021
Sivaraman, Gharakheili, Fernandes, Clark, Karliychuk (b5) 2018; 37
Hassan, Rehmani, Chen (b32) 2019; 97
Krippendorff (b80) 2018
Komninos, Philippou, Pitsillides (b69) 2014; 16
Grover, Kar, Dwivedi, Janssen (b50) 2019; 145
Hui, Wang, Hou, Wang, Wang, Li, Jin (b40) 2020
Hussain, Hussain, Hassan, Hossain (b44) 2020
Zheng, Xu, Jiang, Gu, Tan, Cheng (b45) 2019
Vijayarani, Janani (b77) 2016; 3
M. De Choudhury, Y.R. Lin, H. Sundaram, K.S. Candan, L. Xie, A. Kelliher, How does the data sampling strategy impact the discovery of information diffusion in social media? in: Proceedings of the International AAAI Conference on Web and Social Media, Vol. 4, No. 1, 2010.
M.W. Wu, K.Y. Su, Corpus-based automatic compound extraction with mutual information and relative frequency count, in: Proceedings of Rocling VI Computational Linguistics Conference VI, 1993, pp. 207–216.
Sicari, Rizzardi, Grieco, Coen-Porisini (b27) 2015; 76
Ma, Wang, Chu (b30) 2013
Saura, Palacios-Marqués, Iturricha-Fernández (b53) 2021; 129
Krippendorff (b75) 2004; 30
Zhang, Cho, Wang, Hsu, Chen, Shieh (b20) 2014
Farahani, Firouzi, Chang, Badaroglu, Constant, Mankodiya (b125) 2018; 78
Liu, Wang, Wang, Xia, Xu (b33) 2019; 148
Zhang, Sun, Zhao, Wang, Chang, Gupta (b63) 2017; 76
Biber (b106) 2004; 25
Mishra, Rajnish, Kumar (b66) 2016
Ishmaev (b124) 2020; 33
Ullah, Nardelli, Wolff, Smolander (b19) 2020; 7
Pollach (b71) 2012; 15
Zhang, Ni, Yang, Liang, Ren, Shen (b62) 2017; 55
Sarkar, Markovski, Gusev, Tomp, Muravyov, Filchenkov, Parundekar, Elias, Ashok, Sujitparapitaya, Shirani, Roldan, Bonta, Kumaresh, Janardhan, Mishra, Pappu, Bhamidipati, He, Zheng, Bandi, Fellah (b89) 2019; 2
Amanullah, Habeeb, Nasaruddin, Gani, Ahmed, Nainar (b121) 2020; 151
Khemissa, Tandjaoui (b126) 2015
Blei, Ng, Jordan (b95) 2003; 3
Wilson, Wiebe, Hoffmann (b88) 2005
Hirschberg, Manning (b82) 2015; 349
Esposito, Ficco, Gupta (b16) 2021; 58
Rana, Cheah, Letchmunan (b79) 2016; 10
Popereshnyak, Suprun, Suprun, Wieckowski (b119) 2018
Reyes-Menendez, Saura, Stephen (b100) 2020; 54
Sahoo, Gupta (b4) 2021; 100
Hiremath, Patil (b85) 2020
Patel, Patel (b22) 2016; 6
Hoffman, Bach, Blei (b104) 2010; 23
Porambage, Ylianttila, Schmitt, Kumar, Gurtov, Vasilakos (b46) 2016; 3
Parra, Trattner, Gómez, Hurtado, Wen, Lin (b65) 2016; 73
F. Kawsar, A.B. Brush, Home computing unplugged: why, where and when people use different connected devices at home, in: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, 2013, September, pp. 627–636.
Bouncken, Barwinski (b10) 2020
Yamazaki, Ueda, Nozawa, Kojima, Okada, Matsumoto, Ishikawa, Shimoyama, Inaba (b57) 2012; 100
Medaglia, Serbanati (b13) 2010; 38
Tawalbeh, Muheidat, Tawalbeh, Quwaider (b15) 2020; 10
Cai, Xu, Jiang, Vasilakos (b114) 2016; 4
Seydoux, Drira, Hernandez, Monteil (b1) 2016
Kim (b38) 2017; 2
Kumar, Patel (b110) 2014; 90
Gupta, Gupta (b31) 2018; 77
Alam, Abid, Guangpei, Yunrong (b54) 2020; 154
Pecorella, Pierucci, Nizzi (b70) 2018; 10
Kraus, Roig-Tierno, Bouncken (b3) 2019; 13
Nugent, Hong, Hallberg, Finlay, Synnes (b17) 2008
Bugeja, Jacobsson, Davidsson (b113) 2016
Jayaraman, Yang, Yavari, Georgakopoulos, Yi (b29) 2017; 76
Sedjelmaci, Senouci, Taleb (b118) 2017; 66
Roman, Najera, Lopez (b59) 2011; 44
Madaan, Ahad, Sastry (b123) 2018; 34
Hosseinian-Far, Ramachandran, Slack (b24) 2018
A. Alamsyah, W. Rizkika, D.D.A. Nugroho, F. Renaldi, S. Saadah, Dynamic large scale data on twitter using sentiment analysis and topic modeling, in: 2018 6th International Conference on Information and Communication Technology, ICoICT, 2018, pp. 254–258.
Kim, Park, Park, Ahn (b49) 2019; 92
Saura (b12) 2021; 6
Esposito (10.1016/j.comcom.2021.08.021_b16) 2021; 58
Patel (10.1016/j.comcom.2021.08.021_b22) 2016; 6
Geneiatakis (10.1016/j.comcom.2021.08.021_b42) 2017
Wilson (10.1016/j.comcom.2021.08.021_b87) 2009; 35
Hussain (10.1016/j.comcom.2021.08.021_b44) 2020
Hardeniya (10.1016/j.comcom.2021.08.021_b86) 2016
Pandey (10.1016/j.comcom.2021.08.021_b98) 2019; 22
Lin (10.1016/j.comcom.2021.08.021_b25) 2016; 7
Hiremath (10.1016/j.comcom.2021.08.021_b85) 2020
Wilson (10.1016/j.comcom.2021.08.021_b88) 2005
Hosseinian-Far (10.1016/j.comcom.2021.08.021_b24) 2018
Short (10.1016/j.comcom.2021.08.021_b47) 2010; 13
10.1016/j.comcom.2021.08.021_b51
Jayaraman (10.1016/j.comcom.2021.08.021_b29) 2017; 76
Khemissa (10.1016/j.comcom.2021.08.021_b126) 2015
Kraus (10.1016/j.comcom.2021.08.021_b3) 2019; 13
Vilela (10.1016/j.comcom.2021.08.021_b127) 2019; 97
Zhang (10.1016/j.comcom.2021.08.021_b62) 2017; 55
Webberley (10.1016/j.comcom.2021.08.021_b55) 2016; 73
Zhou (10.1016/j.comcom.2021.08.021_b108) 2018; 6
Grover (10.1016/j.comcom.2021.08.021_b50) 2019; 145
Rana (10.1016/j.comcom.2021.08.021_b79) 2016; 10
Krippendorff (10.1016/j.comcom.2021.08.021_b75) 2004; 30
Krippendorff (10.1016/j.comcom.2021.08.021_b80) 2018
Täuscher (10.1016/j.comcom.2021.08.021_b48) 2020
Roman (10.1016/j.comcom.2021.08.021_b59) 2011; 44
Leon (10.1016/j.comcom.2021.08.021_b74) 2009; 60
Blei (10.1016/j.comcom.2021.08.021_b95) 2003; 3
Chow (10.1016/j.comcom.2021.08.021_b26) 2017; 15
Agrawal (10.1016/j.comcom.2021.08.021_b93) 2018; 98
Jelodar (10.1016/j.comcom.2021.08.021_b78) 2019; 78
Alladi (10.1016/j.comcom.2021.08.021_b8) 2020; 9
Zhang (10.1016/j.comcom.2021.08.021_b63) 2017; 76
Hui (10.1016/j.comcom.2021.08.021_b40) 2020
10.1016/j.comcom.2021.08.021_b102
10.1016/j.comcom.2021.08.021_b101
Hoffman (10.1016/j.comcom.2021.08.021_b104) 2010; 23
Bouncken (10.1016/j.comcom.2021.08.021_b23) 2021
Saura (10.1016/j.comcom.2021.08.021_b53) 2021; 129
Yamazaki (10.1016/j.comcom.2021.08.021_b57) 2012; 100
Loughran (10.1016/j.comcom.2021.08.021_b97) 2016; 54
Sedjelmaci (10.1016/j.comcom.2021.08.021_b118) 2017; 66
Madaan (10.1016/j.comcom.2021.08.021_b123) 2018; 34
Yu (10.1016/j.comcom.2021.08.021_b41) 2018; 56
Kim (10.1016/j.comcom.2021.08.021_b38) 2017; 2
Rayson (10.1016/j.comcom.2021.08.021_b105) 2000
Ullah (10.1016/j.comcom.2021.08.021_b19) 2020; 7
Arachchige (10.1016/j.comcom.2021.08.021_b43) 2020; 16
Sahoo (10.1016/j.comcom.2021.08.021_b4) 2021; 100
Ribeiro (10.1016/j.comcom.2021.08.021_b76) 2016; 5
Vijayarani (10.1016/j.comcom.2021.08.021_b77) 2016; 3
Hu (10.1016/j.comcom.2021.08.021_b61) 2020
Seydoux (10.1016/j.comcom.2021.08.021_b1) 2016
Porambage (10.1016/j.comcom.2021.08.021_b46) 2016; 3
Janssen (10.1016/j.comcom.2021.08.021_b68) 2019; 29
Zhang (10.1016/j.comcom.2021.08.021_b20) 2014
Ribeiro-Navarrete (10.1016/j.comcom.2021.08.021_b2) 2021; 167
Caron (10.1016/j.comcom.2021.08.021_b28) 2016; 32
Chen (10.1016/j.comcom.2021.08.021_b94) 2019; 163
Iyengar (10.1016/j.comcom.2021.08.021_b103) 2012; 76
Saura (10.1016/j.comcom.2021.08.021_b12) 2021; 6
Alrawi (10.1016/j.comcom.2021.08.021_b60) 2019
Kumar (10.1016/j.comcom.2021.08.021_b110) 2014; 90
Salamone (10.1016/j.comcom.2021.08.021_b120) 2018; 18
Sivaraman (10.1016/j.comcom.2021.08.021_b5) 2018; 37
Seydoux (10.1016/j.comcom.2021.08.021_b9) 2016
Xuanyang (10.1016/j.comcom.2021.08.021_b73) 2006
Reyes-Menendez (10.1016/j.comcom.2021.08.021_b100) 2020; 54
Liu (10.1016/j.comcom.2021.08.021_b33) 2019; 148
Chaudhuri (10.1016/j.comcom.2021.08.021_b36) 2016; 1
Sarlan (10.1016/j.comcom.2021.08.021_b52) 2014
Gupta (10.1016/j.comcom.2021.08.021_b31) 2018; 77
Zheng (10.1016/j.comcom.2021.08.021_b45) 2019
Medaglia (10.1016/j.comcom.2021.08.021_b13) 2010; 38
Lee (10.1016/j.comcom.2021.08.021_b122) 2019; 27
Bhavsar (10.1016/j.comcom.2021.08.021_b83) 2019; 6
Ishmaev (10.1016/j.comcom.2021.08.021_b124) 2020; 33
Gupta (10.1016/j.comcom.2021.08.021_b35) 2020; 32
Pecorella (10.1016/j.comcom.2021.08.021_b70) 2018; 10
Tao (10.1016/j.comcom.2021.08.021_b37) 2019; 98
Arabo (10.1016/j.comcom.2021.08.021_b112) 2012
10.1016/j.comcom.2021.08.021_b81
Karoui (10.1016/j.comcom.2021.08.021_b91) 2017; 117
Bugeja (10.1016/j.comcom.2021.08.021_b113) 2016
Mahalle (10.1016/j.comcom.2021.08.021_b117) 2012
Tawalbeh (10.1016/j.comcom.2021.08.021_b15) 2020; 10
Qi (10.1016/j.comcom.2021.08.021_b99) 2019; 7
Biber (10.1016/j.comcom.2021.08.021_b106) 2004; 25
Hassan (10.1016/j.comcom.2021.08.021_b32) 2019; 97
AlSumait (10.1016/j.comcom.2021.08.021_b92) 2009
Zainuddin (10.1016/j.comcom.2021.08.021_b14) 2021
Khan (10.1016/j.comcom.2021.08.021_b96) 2020
Alam (10.1016/j.comcom.2021.08.021_b54) 2020; 154
Santoso (10.1016/j.comcom.2021.08.021_b39) 2015
Mishra (10.1016/j.comcom.2021.08.021_b66) 2016
Das (10.1016/j.comcom.2021.08.021_b58) 2018; 17
Nugent (10.1016/j.comcom.2021.08.021_b17) 2008
Sarkar (10.1016/j.comcom.2021.08.021_b89) 2019; 2
Farahani (10.1016/j.comcom.2021.08.021_b125) 2018; 78
Popereshnyak (10.1016/j.comcom.2021.08.021_b119) 2018
10.1016/j.comcom.2021.08.021_b7
Pollach (10.1016/j.comcom.2021.08.021_b71) 2012; 15
Saura (10.1016/j.comcom.2021.08.021_b84) 2019; 11
Bouncken (10.1016/j.comcom.2021.08.021_b10) 2020
Komninos (10.1016/j.comcom.2021.08.021_b69) 2014; 16
Saura (10.1016/j.comcom.2021.08.021_b64) 2021; 98
McKenny (10.1016/j.comcom.2021.08.021_b72) 2018; 44
Ammirato (10.1016/j.comcom.2021.08.021_b21) 2019
Amanullah (10.1016/j.comcom.2021.08.021_b121) 2020; 151
Gill (10.1016/j.comcom.2021.08.021_b34) 2019; 154
Nzabahimana (10.1016/j.comcom.2021.08.021_b11) 2018
Parra (10.1016/j.comcom.2021.08.021_b65) 2016; 73
Sicari (10.1016/j.comcom.2021.08.021_b27) 2015; 76
Mohammad (10.1016/j.comcom.2021.08.021_b111) 2020; 68
Cai (10.1016/j.comcom.2021.08.021_b114) 2016; 4
10.1016/j.comcom.2021.08.021_b67
McEnery (10.1016/j.comcom.2021.08.021_b107) 2013
Bouncken (10.1016/j.comcom.2021.08.021_b6) 2021; 2021
Griol (10.1016/j.comcom.2021.08.021_b90) 2017
Kim (10.1016/j.comcom.2021.08.021_b49) 2019; 92
Radanliev (10.1016/j.comcom.2021.08.021_b115) 2018; 102
Ma (10.1016/j.comcom.2021.08.021_b30) 2013
Emami-Naeini (10.1016/j.comcom.2021.08.021_b56) 2020
Blythe (10.1016/j.comcom.2021.08.021_b18) 2019; 5
Kong (10.1016/j.comcom.2021.08.021_b109) 2020; 35
Patel (10.1016/j.comcom.2021.08.021_b116) 2019
Hirschberg (10.1016/j.comcom.2021.08.021_b82) 2015; 349
References_xml – start-page: 1292
  year: 2017
  end-page: 1297
  ident: b42
  article-title: Security and privacy issues for an IoT based smart home
  publication-title: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics
– volume: 92
  start-page: 273
  year: 2019
  end-page: 281
  ident: b49
  article-title: Willingness to provide personal information: Perspective of privacy calculus in IoT services
  publication-title: Comput. Hum. Behav.
– volume: 25
  start-page: 371
  year: 2004
  end-page: 405
  ident: b106
  article-title: If you look at …: Lexical bundles in university teaching and textbooks
  publication-title: Appl. Linguist.
– volume: 10
  year: 2016
  ident: b79
  article-title: Topic modeling in sentiment analysis: A systematic review
  publication-title: J. ICT Res. Appl.
– volume: 3
  start-page: 993
  year: 2003
  end-page: 1022
  ident: b95
  article-title: Latent dirichlet allocation
  publication-title: J. Mach. Learn. Res.
– volume: 6
  start-page: 1606
  year: 2018
  end-page: 1616
  ident: b108
  article-title: The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
  publication-title: IEEE Internet Things J.
– volume: 10
  start-page: 125
  year: 2018
  ident: b70
  article-title: Network sentiment framework to improve security and privacy for smart home
  publication-title: Future Internet
– volume: 98
  start-page: 74
  year: 2018
  end-page: 88
  ident: b93
  article-title: What is wrong with topic modeling? And how to fix it using search-based software engineering
  publication-title: Inf. Softw. Technol.
– volume: 33
  start-page: 411
  year: 2020
  end-page: 432
  ident: b124
  article-title: The ethical limits of blockchain-enabled markets for private IoT data
  publication-title: Philos. Technol.
– reference: M. De Choudhury, Y.R. Lin, H. Sundaram, K.S. Candan, L. Xie, A. Kelliher, How does the data sampling strategy impact the discovery of information diffusion in social media? in: Proceedings of the International AAAI Conference on Web and Social Media, Vol. 4, No. 1, 2010.
– start-page: 1
  year: 2019
  end-page: 7
  ident: b45
  article-title: Challenges of privacy-preserving machine learning in iot
  publication-title: Proceedings of the First International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things
– volume: 349
  start-page: 261
  year: 2015
  end-page: 266
  ident: b82
  article-title: Advances in natural language processing
  publication-title: Science
– volume: 16
  start-page: 1933
  year: 2014
  end-page: 1954
  ident: b69
  article-title: Survey in smart grid and smart home security: Issues, challenges and countermeasures
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 90
  year: 2014
  ident: b110
  article-title: A survey on internet of things: Security and privacy issues
  publication-title: Int. J. Comput. Appl.
– volume: 151
  start-page: 495
  year: 2020
  end-page: 517
  ident: b121
  article-title: Deep learning and big data technologies for IoT security
  publication-title: Comput. Commun.
– volume: 11
  start-page: 519
  year: 2019
  ident: b84
  article-title: A three-stage method for data text mining: Using UGC in business intelligence analysis
  publication-title: Symmetry
– volume: 37
  start-page: 71
  year: 2018
  end-page: 79
  ident: b5
  article-title: Smart IoT devices in the home: Security and privacy implications
  publication-title: IEEE Technol. Soc. Mag.
– volume: 76
  start-page: 405
  year: 2012
  end-page: 431
  ident: b103
  article-title: Affect, not ideologya social identity perspective on polarization
  publication-title: Public Opin. Q.
– volume: 76
  start-page: 18513
  year: 2017
  end-page: 18529
  ident: b63
  article-title: Cyvod: a novel trinity multimedia social network scheme
  publication-title: Multimedia Tools Appl.
– volume: 22
  start-page: 765
  year: 2019
  end-page: 797
  ident: b98
  article-title: Applying natural language processing capabilities in computerized textual analysis to measure organizational culture
  publication-title: Organ. Res. Methods
– start-page: 1
  year: 2020
  end-page: 28
  ident: b10
  article-title: Shared digital identity and rich knowledge ties in global 3D printing - A drizzle in the clouds?
  publication-title: Glob. Strategy J.
– volume: 16
  start-page: 6092
  year: 2020
  end-page: 6102
  ident: b43
  article-title: A trustworthy privacy preserving framework for machine learning in industrial iot systems
  publication-title: IEEE Trans. Ind. Inf.
– start-page: 96
  year: 2021
  end-page: 100
  ident: b14
  article-title: A study on privacy issues in internet of things (IoT)
  publication-title: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy
– start-page: 7459
  year: 2006
  end-page: 7462
  ident: b73
  article-title: Computer aided detection of SARS based on radiographs data mining
  publication-title: 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference
– volume: 100
  start-page: 2429
  year: 2012
  end-page: 2441
  ident: b57
  article-title: Home-assistant robot for an aging society
  publication-title: Proc. IEEE
– volume: 7
  start-page: 44
  year: 2016
  ident: b25
  article-title: IoT privacy and security challenges for smart home environments
  publication-title: Information
– volume: 3
  start-page: 36
  year: 2016
  end-page: 45
  ident: b46
  article-title: The quest for privacy in the internet of things
  publication-title: IEEE Cloud Comput.
– year: 2018
  ident: b80
  article-title: Content Analysis: An Introduction to Its Methodology
– volume: 163
  start-page: 1
  year: 2019
  end-page: 13
  ident: b94
  article-title: Experimental explorations on short text topic mining between LDA and NMF based schemes
  publication-title: Knowl.-Based Syst.
– volume: 73
  start-page: 229
  year: 2016
  end-page: 235
  ident: b55
  article-title: Retweeting beyond expectation: Inferring interestingness in Twitter
  publication-title: Comput. Commun.
– year: 2019
  ident: b21
  article-title: A methodology to support the adoption of IoT innovation and its application to the Italian bank branch security context
  publication-title: Eur. J. Innov. Manag.
– volume: 5
  year: 2019
  ident: b18
  article-title: What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?
  publication-title: J. Cybersecur.
– volume: 78
  start-page: 659
  year: 2018
  end-page: 676
  ident: b125
  article-title: Towards fog-driven IoT ehealth: Promises and challenges of IoT in medicine and healthcare
  publication-title: Future Gener. Comput. Syst.
– volume: 55
  start-page: 122
  year: 2017
  end-page: 129
  ident: b62
  article-title: Security and privacy in smart city applications: Challenges and solutions
  publication-title: IEEE Commun. Mag.
– start-page: 90
  year: 2015
  end-page: 95
  ident: b126
  article-title: A lightweight authentication scheme for E-health applications in the context of internet of things
  publication-title: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies
– start-page: 1
  year: 2015
  end-page: 2
  ident: b39
  article-title: Securing IoT for smart home system
  publication-title: 2015 International Symposium on Consumer Electronics
– start-page: 745
  year: 2013
  ident: b107
  article-title: The history of corpus linguistics
  publication-title: The Oxford Handbook of the History of Linguistics, Vol. 727
– start-page: 1144
  year: 2013
  end-page: 1151
  ident: b30
  article-title: Data management for internet of things: Challenges, approaches and opportunities
  publication-title: 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing
– year: 2020
  ident: b85
  article-title: Enhancing optimized personalized therapy in clinical decision support system using natural language processing
  publication-title: J. King Saud Univ.-Comput. Inf. Sci.
– volume: 7
  year: 2019
  ident: b99
  article-title: Mapping consumer sentiment toward wireless services using geospatial twitter data
  publication-title: IEEE Access
– year: 2020
  ident: b44
  article-title: Machine learning in IoT security: current solutions and future challenges
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 35
  start-page: 515
  year: 2020
  end-page: 538
  ident: b109
  article-title: Real-manufacturing-oriented big data analysis and data value evaluation with domain knowledge
  publication-title: Comput. Statist.
– start-page: 29
  year: 2018
  end-page: 40
  ident: b24
  article-title: Emerging trends in cloud computing, big data, fog computing, IoT and smart living
  publication-title: Technology for Smart Futures
– volume: 17
  start-page: 35
  year: 2018
  end-page: 46
  ident: b58
  article-title: Personalized privacy assistants for the internet of things: Providing users with notice and choice
  publication-title: IEEE Pervasive Comput.
– volume: 154
  start-page: 125
  year: 2019
  end-page: 138
  ident: b34
  article-title: ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices
  publication-title: J. Syst. Softw.
– volume: 35
  start-page: 399
  year: 2009
  end-page: 433
  ident: b87
  article-title: Recognizing contextual polarity: An exploration of features for phrase-level sentiment analysis
  publication-title: Comput. Linguist.
– volume: 23
  start-page: 856
  year: 2010
  end-page: 864
  ident: b104
  article-title: Online learning for latent dirichlet allocation
  publication-title: Adv. Neural Inf. Process. Syst.
– volume: 58
  year: 2021
  ident: b16
  article-title: Blockchain-based authentication and authorization for smart city applications
  publication-title: Inf. Process. Manage.
– start-page: 127
  year: 2018
  end-page: 131
  ident: b119
  article-title: Iot application testing features based on the modelling network
  publication-title: IoT Application Testing Features Based on the Modelling Network. in 2018 XIV-Th International Conference on Perspective Technologies and Methods in MEMS Design
– start-page: 1362
  year: 2019
  end-page: 1380
  ident: b60
  article-title: SoK: Security evaluation of home-based IoT deployments
  publication-title: 2019 IEEE Symposium on Security and Privacy
– volume: 34
  start-page: 125
  year: 2018
  end-page: 133
  ident: b123
  article-title: Data integration in IoT ecosystem: Information linkage as a privacy threat
  publication-title: Comput. Law Secur. Rev.
– start-page: 819
  year: 2012
  end-page: 826
  ident: b112
  article-title: Privacy in the age of mobility and smart devices in smart homes
  publication-title: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing
– year: 2020
  ident: b48
  article-title: Gaining legitimacy by being different: Optimal distinctiveness in crowdfunding platforms
  publication-title: Acad. Manag. J.
– volume: 78
  start-page: 15169
  year: 2019
  end-page: 15211
  ident: b78
  article-title: Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey
  publication-title: Multimedia Tools Appl.
– volume: 100
  year: 2021
  ident: b4
  article-title: Multiple features based approach for automatic fake news detection on social networks using deep learning
  publication-title: Appl. Soft Comput.
– start-page: 561
  year: 2016
  end-page: 576
  ident: b9
  article-title: IoT-O, a core-domain IoT ontology to represent connected devices networks
  publication-title: European Knowledge Acquisition Workshop
– volume: 1
  start-page: 64
  year: 2016
  end-page: 75
  ident: b36
  article-title: Internet of things data protection and privacy in the era of the General Data Protection Regulation
  publication-title: J. Data Protect. Priv.
– start-page: 6
  year: 2020
  ident: b61
  article-title: A case study of the security vetting process of smart-home assistant applications
  publication-title: IEEE Security and Privacy Workshops
– volume: 30
  start-page: 411
  year: 2004
  end-page: 433
  ident: b75
  article-title: Reliability in content analysis: Some common misconceptions and recommendations
  publication-title: Hum. Commun. Res.
– volume: 76
  start-page: 146
  year: 2015
  end-page: 164
  ident: b27
  article-title: Security, privacy and trust in Internet of Things: The road ahead
  publication-title: Comput. Netw.
– volume: 73
  start-page: 301
  year: 2016
  end-page: 314
  ident: b65
  article-title: Twitter in academic events: A study of temporal usage, communication, sentimental and topical patterns in 16 computer science conferences
  publication-title: Comput. Commun.
– start-page: 1
  year: 2017
  end-page: 9
  ident: b90
  article-title: Combining speech-based and linguistic classifiers to recognize emotion in user spoken utterances
  publication-title: Neurocomputing
– start-page: 230
  year: 2014
  end-page: 234
  ident: b20
  article-title: IoT security: ongoing challenges and research opportunities
  publication-title: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications
– volume: 66
  start-page: 9381
  year: 2017
  end-page: 9393
  ident: b118
  article-title: An accurate security game for low-resource IoT devices
  publication-title: IEEE Trans. Veh. Technol.
– volume: 129
  start-page: 271
  year: 2021
  end-page: 281
  ident: b53
  article-title: Ethical Design in Social Media: Assessing the main performance measurements of user online behavior modification
  publication-title: J. Bus. Res.
– reference: A. Alamsyah, W. Rizkika, D.D.A. Nugroho, F. Renaldi, S. Saadah, Dynamic large scale data on twitter using sentiment analysis and topic modeling, in: 2018 6th International Conference on Information and Communication Technology, ICoICT, 2018, pp. 254–258.
– start-page: 347
  year: 2005
  end-page: 354
  ident: b88
  article-title: Recognizing contextual polarity in phrase-level sentiment analysis
  publication-title: Proceedings of human language technology conference and conference on empirical methods in natural language processing
– volume: 68
  year: 2020
  ident: b111
  article-title: Security and privacy concerns of the ‘Internet of Things’(IoT) in IT and its help in the various sectors across the world
  publication-title: Int. J. Comput. Trends Technol.
– volume: 3
  start-page: 37
  year: 2016
  end-page: 47
  ident: b77
  article-title: Text mining: open-source tokenization tools-an analysis
  publication-title: Adv. Comput. Intell. Int. J.
– volume: 15
  start-page: 73
  year: 2017
  end-page: 76
  ident: b26
  article-title: The last mile for IoT privacy
  publication-title: IEEE Secur. Priv.
– start-page: 67
  year: 2009
  end-page: 82
  ident: b92
  article-title: Topic significance ranking of LDA generative models
  publication-title: Joint European Conference on Machine Learning and Knowledge Discovery in Databases
– volume: 29
  start-page: 1589
  year: 2019
  end-page: 1616
  ident: b68
  article-title: Challenges for adopting and implementing IoT in smart cities: An integrated MICMAC-ISM approach
  publication-title: Internet Res.
– volume: 76
  start-page: 540
  year: 2017
  end-page: 549
  ident: b29
  article-title: Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
  publication-title: Future Gener. Comput. Syst.
– reference: K.L. Liu, W.J. Li, M. Guo, Emoticon smoothed language models for twitter sentiment analysis, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 26, No. 1, 2012, July.
– volume: 148
  start-page: 340
  year: 2019
  end-page: 348
  ident: b33
  article-title: Privacy-preserving raw data collection without a trusted authority for IoT
  publication-title: Comput. Netw.
– volume: 117
  start-page: 161
  year: 2017
  end-page: 168
  ident: b91
  article-title: SOUKHRIA: towards an irony detection system for arabic in social media
  publication-title: Procedia Comput. Sci.
– volume: 10
  start-page: 4102
  year: 2020
  ident: b15
  article-title: IoT privacy and security: Challenges and solutions
  publication-title: Appl. Sci.
– reference: M.W. Wu, K.Y. Su, Corpus-based automatic compound extraction with mutual information and relative frequency count, in: Proceedings of Rocling VI Computational Linguistics Conference VI, 1993, pp. 207–216.
– volume: 6
  year: 2016
  ident: b22
  article-title: Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges
  publication-title: Int. J. Eng. Sci. Comput.
– volume: 7
  start-page: 10111
  year: 2020
  end-page: 10119
  ident: b19
  article-title: Twenty-one key factors to choose an iot platform: Theoretical framework and its applications
  publication-title: IEEE Internet Things J.
– volume: 38
  start-page: 9
  year: 2010
  end-page: 395
  ident: b13
  article-title: An overview of privacy and security issues in the internet of things
  publication-title: Internet Things
– volume: 145
  start-page: 438
  year: 2019
  end-page: 460
  ident: b50
  article-title: Polarization and acculturation in US election 2016 outcomes – Can Twitter analytics predict changes in voting preferences
  publication-title: Technol. Forecast. Soc. Change
– volume: 77
  start-page: 4829
  year: 2018
  end-page: 4861
  ident: b31
  article-title: XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud
  publication-title: Multimedia Tools Appl.
– volume: 2021
  year: 2021
  ident: b6
  article-title: The impact of digitalization on organizations - A review of the empirical literature
  publication-title: Int. J. Entrepreneurial Ventur.
– volume: 54
  year: 2020
  ident: b100
  article-title: Exploring key indicators of social identity in the #metoo era: Using discourse analysis in UGC
  publication-title: Int. J. Inf. Manage.
– volume: 44
  start-page: 51
  year: 2011
  end-page: 58
  ident: b59
  article-title: Securing the internet of things
  publication-title: Computer
– reference: F. Kawsar, A.B. Brush, Home computing unplugged: why, where and when people use different connected devices at home, in: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, 2013, September, pp. 627–636.
– volume: 32
  start-page: 4
  year: 2016
  end-page: 15
  ident: b28
  article-title: The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective
  publication-title: Comput. Law Secur. Rev.
– volume: 98
  start-page: 161
  year: 2021
  end-page: 178
  ident: b64
  article-title: Setting B2B Digital Marketing in Artificial Intelligence-based CRMs: A review and directions for future research
  publication-title: Industrial Marketing Management
– volume: 154
  start-page: 129
  year: 2020
  end-page: 137
  ident: b54
  article-title: Social media sentiment analysis through parallel dilated convolutional neural network for smart city applications
  publication-title: Comput. Commun.
– volume: 54
  start-page: 1187
  year: 2016
  end-page: 1230
  ident: b97
  article-title: Textual analysis in accounting and finance: A survey
  publication-title: J. Account. Res.
– volume: 44
  start-page: 2909
  year: 2018
  end-page: 2933
  ident: b72
  article-title: What doesn’t get measured does exist: Improving the accuracy of computer-aided text analysis
  publication-title: J. Manag.
– year: 2016
  ident: b86
  article-title: Natural Language Processing: Python and NLTK
– year: 2020
  ident: b96
  article-title: DST-HRS: A topic driven hybrid recommender system based on deep semantics
  publication-title: Comput. Commun.
– volume: 167
  year: 2021
  ident: b2
  article-title: Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy
  publication-title: Technol. Forecast. Soc. Change
– start-page: 175
  year: 2018
  end-page: 178
  ident: b11
  article-title: Analysis of security and privacy challenges in Internet of Things
  publication-title: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies
– volume: 97
  start-page: 379
  year: 2019
  end-page: 386
  ident: b127
  article-title: Performance evaluation of a Fog-assisted IoT solution for e-Health applications
  publication-title: Future Gener. Comput. Syst.
– volume: 56
  start-page: 14
  year: 2018
  end-page: 18
  ident: b41
  article-title: Security and privacy in the age of the smart internet of things: An overview from a networking perspective
  publication-title: IEEE Commun. Mag.
– volume: 15
  start-page: 263
  year: 2012
  end-page: 287
  ident: b71
  article-title: Taming textual data: The contribution of corpus linguistics to computer-aided text analysis
  publication-title: Organ. Res. Methods
– volume: 102
  start-page: 14
  year: 2018
  end-page: 22
  ident: b115
  article-title: Future developments in cyber risk assessment for the internet of things
  publication-title: Comput. Ind.
– volume: 5
  start-page: 1
  year: 2016
  end-page: 29
  ident: b76
  article-title: Sentibench-a benchmark comparison of state-of-the-practice sentiment analysis methods
  publication-title: EPJ Data Sci.
– volume: 18
  start-page: 1602
  year: 2018
  ident: b120
  article-title: Integrated method for personal thermal comfort assessment and optimization through users’ feedback, IoT and machine learning: a case study
  publication-title: Sensors
– start-page: 685
  year: 2008
  end-page: 690
  ident: b17
  article-title: Assessing the impact of individual sensor reliability within smart living environments
  publication-title: 2008 IEEE International Conference on Automation Science and Engineering
– volume: 13
  start-page: 320
  year: 2010
  end-page: 347
  ident: b47
  article-title: Construct validation using computer-aided text analysis (CATA) an illustration using entrepreneurial orientation
  publication-title: Organ. Res. Methods
– start-page: 212
  year: 2014
  end-page: 216
  ident: b52
  article-title: Twitter sentiment analysis
  publication-title: Proceedings of the 6th International Conference on Information Technology and Multimedia
– volume: 2
  start-page: 1224
  year: 2019
  end-page: 1231
  ident: b89
  article-title: Inferring advertiser sentiment in online articles using Wikipedia footnotes
  publication-title: Adv. Intell. Syst. Comput.
– volume: 13
  start-page: 519
  year: 2019
  end-page: 528
  ident: b3
  article-title: Digital innovation and venturing: An introduction into the digitalization of entrepreneurship
  publication-title: Rev. Manag. Sci.
– volume: 6
  start-page: 92
  year: 2021
  end-page: 102
  ident: b12
  article-title: Using data sciences in digital marketing: Framework, methods, and performance metrics
  publication-title: J. Innov. Knowl.
– start-page: 309
  year: 2012
  end-page: 348
  ident: b117
  article-title: Identity authentication and capability-based access control (iacac) for the internet of things
  publication-title: J. Cyber Secur. Mobil.
– volume: 97
  start-page: 512
  year: 2019
  end-page: 529
  ident: b32
  article-title: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
  publication-title: Future Gener. Comput. Syst.
– volume: 32
  year: 2020
  ident: b35
  article-title: An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols
  publication-title: Concurr. Comput.: Pract. Exper.
– volume: 2
  year: 2017
  ident: b38
  article-title: A survey of IoT security: Risks, requirements, trends, and key technologies
  publication-title: J. Ind. Integr. Manag.
– volume: 98
  start-page: 660
  year: 2019
  end-page: 671
  ident: b37
  article-title: Economic perspective analysis of protecting big data security and privacy
  publication-title: Future Gener. Comput. Syst.
– reference: G. Bouma, Normalized (pointwise) mutual information in collocation extraction, in: Proceedings of GSCL, 2009, pp. 31–40.
– volume: 6
  start-page: 510
  year: 2019
  end-page: 527
  ident: b83
  article-title: Sentiment analysis of Twitter data using Python
  publication-title: Int. Res. J. Eng. Technol.
– start-page: 172
  year: 2016
  end-page: 175
  ident: b113
  article-title: On privacy and security challenges in smart connected homes
  publication-title: 2016 European Intelligence and Security Informatics Conference
– start-page: 1
  year: 2000
  end-page: 6
  ident: b105
  article-title: Comparing corpora using frequency profiling
  publication-title: The Workshop on Comparing Corpora
– start-page: 171
  year: 2019
  end-page: 191
  ident: b116
  article-title: Security challenges in IoT cyber world
  publication-title: Security in Smart Cities: Models, Applications, and Challenges
– start-page: 561
  year: 2016
  end-page: 576
  ident: b1
  article-title: IoT-O, a core-domain IoT ontology to represent connected devices networks
  publication-title: European Knowledge Acquisition Workshop
– year: 2020
  ident: b56
  article-title: Privacy expectations and preferences in an IoT world, 15
– volume: 9
  start-page: 17
  year: 2020
  end-page: 25
  ident: b8
  article-title: Consumer IoT: Security vulnerability case studies and solutions
  publication-title: IEEE Consum. Electron. Mag.
– volume: 27
  start-page: 1
  year: 2019
  end-page: 39
  ident: b122
  article-title: Confident privacy decision-making in IoT environments
  publication-title: ACM Trans. Comput.-Hum. Interact.
– year: 2020
  ident: b40
  article-title: Systematically quantifying IoT privacy leakage in mobile networks
  publication-title: IEEE Internet Things J.
– start-page: 148
  year: 2016
  end-page: 153
  ident: b66
  article-title: Sentiment analysis of Twitter data: Case study on digital India
  publication-title: 2016 International Conference on Information Technology (InCITe) - the Next Generation IT Summit on the Theme - Internet of Things: Connect Your Worlds
– volume: 4
  start-page: 75
  year: 2016
  end-page: 87
  ident: b114
  article-title: IoT-based big data storage systems in cloud computing: perspectives and challenges
  publication-title: IEEE Internet Things J.
– year: 2021
  ident: b23
  article-title: Entrepreneurial ecosystems in an interconnected world: Emergence, governance, and digitalization
  publication-title: Rev. Manag. Sci.
– volume: 60
  start-page: 539
  year: 2009
  end-page: 550
  ident: b74
  article-title: The future of computer-aided innovation
  publication-title: Comput. Ind.
– start-page: 212
  year: 2014
  ident: 10.1016/j.comcom.2021.08.021_b52
  article-title: Twitter sentiment analysis
– volume: 163
  start-page: 1
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b94
  article-title: Experimental explorations on short text topic mining between LDA and NMF based schemes
  publication-title: Knowl.-Based Syst.
  doi: 10.1016/j.knosys.2018.08.011
– volume: 54
  start-page: 1187
  issue: 4
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b97
  article-title: Textual analysis in accounting and finance: A survey
  publication-title: J. Account. Res.
  doi: 10.1111/1475-679X.12123
– volume: 10
  start-page: 125
  issue: 12
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b70
  article-title: Network sentiment framework to improve security and privacy for smart home
  publication-title: Future Internet
  doi: 10.3390/fi10120125
– volume: 154
  start-page: 125
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b34
  article-title: ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices
  publication-title: J. Syst. Softw.
  doi: 10.1016/j.jss.2019.04.058
– volume: 25
  start-page: 371
  issue: 3
  year: 2004
  ident: 10.1016/j.comcom.2021.08.021_b106
  article-title: If you look at …: Lexical bundles in university teaching and textbooks
  publication-title: Appl. Linguist.
  doi: 10.1093/applin/25.3.371
– volume: 7
  start-page: 10111
  issue: 10
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b19
  article-title: Twenty-one key factors to choose an iot platform: Theoretical framework and its applications
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.3000056
– start-page: 1144
  year: 2013
  ident: 10.1016/j.comcom.2021.08.021_b30
  article-title: Data management for internet of things: Challenges, approaches and opportunities
– volume: 76
  start-page: 18513
  issue: 18
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b63
  article-title: Cyvod: a novel trinity multimedia social network scheme
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-016-4162-z
– start-page: 96
  year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b14
  article-title: A study on privacy issues in internet of things (IoT)
– volume: 73
  start-page: 229
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b55
  article-title: Retweeting beyond expectation: Inferring interestingness in Twitter
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2015.07.016
– start-page: 1292
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b42
  article-title: Security and privacy issues for an IoT based smart home
– volume: 10
  issue: 1
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b79
  article-title: Topic modeling in sentiment analysis: A systematic review
  publication-title: J. ICT Res. Appl.
  doi: 10.5614/itbj.ict.res.appl.2016.10.1.6
– volume: 66
  start-page: 9381
  issue: 10
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b118
  article-title: An accurate security game for low-resource IoT devices
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2017.2701551
– start-page: 7459
  year: 2006
  ident: 10.1016/j.comcom.2021.08.021_b73
  article-title: Computer aided detection of SARS based on radiographs data mining
– year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b21
  article-title: A methodology to support the adoption of IoT innovation and its application to the Italian bank branch security context
  publication-title: Eur. J. Innov. Manag.
  doi: 10.1108/EJIM-03-2018-0058
– ident: 10.1016/j.comcom.2021.08.021_b81
  doi: 10.1609/icwsm.v4i1.14024
– volume: 38
  start-page: 9
  year: 2010
  ident: 10.1016/j.comcom.2021.08.021_b13
  article-title: An overview of privacy and security issues in the internet of things
  publication-title: Internet Things
– start-page: 90
  year: 2015
  ident: 10.1016/j.comcom.2021.08.021_b126
  article-title: A lightweight authentication scheme for E-health applications in the context of internet of things
– volume: 97
  start-page: 512
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b32
  article-title: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.02.060
– volume: 76
  start-page: 405
  issue: 3
  year: 2012
  ident: 10.1016/j.comcom.2021.08.021_b103
  article-title: Affect, not ideologya social identity perspective on polarization
  publication-title: Public Opin. Q.
  doi: 10.1093/poq/nfs038
– volume: 17
  start-page: 35
  issue: 3
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b58
  article-title: Personalized privacy assistants for the internet of things: Providing users with notice and choice
  publication-title: IEEE Pervasive Comput.
  doi: 10.1109/MPRV.2018.03367733
– volume: 23
  start-page: 856
  year: 2010
  ident: 10.1016/j.comcom.2021.08.021_b104
  article-title: Online learning for latent dirichlet allocation
  publication-title: Adv. Neural Inf. Process. Syst.
– start-page: 1
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b90
  article-title: Combining speech-based and linguistic classifiers to recognize emotion in user spoken utterances
  publication-title: Neurocomputing
– volume: 7
  start-page: 44
  issue: 3
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b25
  article-title: IoT privacy and security challenges for smart home environments
  publication-title: Information
  doi: 10.3390/info7030044
– volume: 117
  start-page: 161
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b91
  article-title: SOUKHRIA: towards an irony detection system for arabic in social media
  publication-title: Procedia Comput. Sci.
  doi: 10.1016/j.procs.2017.10.105
– volume: 54
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b100
  article-title: Exploring key indicators of social identity in the #metoo era: Using discourse analysis in UGC
  publication-title: Int. J. Inf. Manage.
  doi: 10.1016/j.ijinfomgt.2020.102129
– volume: 16
  start-page: 6092
  issue: 9
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b43
  article-title: A trustworthy privacy preserving framework for machine learning in industrial iot systems
  publication-title: IEEE Trans. Ind. Inf.
  doi: 10.1109/TII.2020.2974555
– volume: 6
  start-page: 510
  issue: 3
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b83
  article-title: Sentiment analysis of Twitter data using Python
  publication-title: Int. Res. J. Eng. Technol.
– start-page: 1
  year: 2015
  ident: 10.1016/j.comcom.2021.08.021_b39
  article-title: Securing IoT for smart home system
– volume: 9
  start-page: 17
  issue: 2
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b8
  article-title: Consumer IoT: Security vulnerability case studies and solutions
  publication-title: IEEE Consum. Electron. Mag.
  doi: 10.1109/MCE.2019.2953740
– volume: 167
  year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b2
  article-title: Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy
  publication-title: Technol. Forecast. Soc. Change
  doi: 10.1016/j.techfore.2021.120681
– volume: 78
  start-page: 659
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b125
  article-title: Towards fog-driven IoT ehealth: Promises and challenges of IoT in medicine and healthcare
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.04.036
– volume: 129
  start-page: 271
  year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b53
  article-title: Ethical Design in Social Media: Assessing the main performance measurements of user online behavior modification
  publication-title: J. Bus. Res.
  doi: 10.1016/j.jbusres.2021.03.001
– volume: 102
  start-page: 14
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b115
  article-title: Future developments in cyber risk assessment for the internet of things
  publication-title: Comput. Ind.
  doi: 10.1016/j.compind.2018.08.002
– start-page: 685
  year: 2008
  ident: 10.1016/j.comcom.2021.08.021_b17
  article-title: Assessing the impact of individual sensor reliability within smart living environments
– volume: 60
  start-page: 539
  issue: 8
  year: 2009
  ident: 10.1016/j.comcom.2021.08.021_b74
  article-title: The future of computer-aided innovation
  publication-title: Comput. Ind.
  doi: 10.1016/j.compind.2009.05.010
– volume: 6
  start-page: 1606
  issue: 2
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b108
  article-title: The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2018.2847733
– start-page: 819
  year: 2012
  ident: 10.1016/j.comcom.2021.08.021_b112
  article-title: Privacy in the age of mobility and smart devices in smart homes
– start-page: 1
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b10
  article-title: Shared digital identity and rich knowledge ties in global 3D printing - A drizzle in the clouds?
  publication-title: Glob. Strategy J.
– start-page: 171
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b116
  article-title: Security challenges in IoT cyber world
– volume: 4
  start-page: 75
  issue: 1
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b114
  article-title: IoT-based big data storage systems in cloud computing: perspectives and challenges
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2016.2619369
– volume: 5
  issue: 1
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b18
  article-title: What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?
  publication-title: J. Cybersecur.
  doi: 10.1093/cybsec/tyz005
– volume: 73
  start-page: 301
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b65
  article-title: Twitter in academic events: A study of temporal usage, communication, sentimental and topical patterns in 16 computer science conferences
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2015.07.001
– year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b85
  article-title: Enhancing optimized personalized therapy in clinical decision support system using natural language processing
  publication-title: J. King Saud Univ.-Comput. Inf. Sci.
– start-page: 309
  year: 2012
  ident: 10.1016/j.comcom.2021.08.021_b117
  article-title: Identity authentication and capability-based access control (iacac) for the internet of things
  publication-title: J. Cyber Secur. Mobil.
– year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b96
  article-title: DST-HRS: A topic driven hybrid recommender system based on deep semantics
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.02.068
– volume: 92
  start-page: 273
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b49
  article-title: Willingness to provide personal information: Perspective of privacy calculus in IoT services
  publication-title: Comput. Hum. Behav.
  doi: 10.1016/j.chb.2018.11.022
– start-page: 6
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b61
  article-title: A case study of the security vetting process of smart-home assistant applications
– volume: 90
  issue: 11
  year: 2014
  ident: 10.1016/j.comcom.2021.08.021_b110
  article-title: A survey on internet of things: Security and privacy issues
  publication-title: Int. J. Comput. Appl.
– volume: 27
  start-page: 1
  issue: 1
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b122
  article-title: Confident privacy decision-making in IoT environments
  publication-title: ACM Trans. Comput.-Hum. Interact.
  doi: 10.1145/3364223
– volume: 6
  issue: 5
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b22
  article-title: Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges
  publication-title: Int. J. Eng. Sci. Comput.
– volume: 34
  start-page: 125
  issue: 1
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b123
  article-title: Data integration in IoT ecosystem: Information linkage as a privacy threat
  publication-title: Comput. Law Secur. Rev.
  doi: 10.1016/j.clsr.2017.06.007
– volume: 30
  start-page: 411
  issue: 3
  year: 2004
  ident: 10.1016/j.comcom.2021.08.021_b75
  article-title: Reliability in content analysis: Some common misconceptions and recommendations
  publication-title: Hum. Commun. Res.
– start-page: 172
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b113
  article-title: On privacy and security challenges in smart connected homes
– volume: 35
  start-page: 515
  issue: 2
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b109
  article-title: Real-manufacturing-oriented big data analysis and data value evaluation with domain knowledge
  publication-title: Comput. Statist.
  doi: 10.1007/s00180-019-00919-6
– start-page: 1
  year: 2000
  ident: 10.1016/j.comcom.2021.08.021_b105
  article-title: Comparing corpora using frequency profiling
– year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b80
– volume: 11
  start-page: 519
  issue: 4
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b84
  article-title: A three-stage method for data text mining: Using UGC in business intelligence analysis
  publication-title: Symmetry
  doi: 10.3390/sym11040519
– volume: 2
  start-page: 1224
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b89
  article-title: Inferring advertiser sentiment in online articles using Wikipedia footnotes
  publication-title: Adv. Intell. Syst. Comput.
– start-page: 347
  year: 2005
  ident: 10.1016/j.comcom.2021.08.021_b88
  article-title: Recognizing contextual polarity in phrase-level sentiment analysis
– volume: 32
  start-page: 4
  issue: 1
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b28
  article-title: The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective
  publication-title: Comput. Law Secur. Rev.
  doi: 10.1016/j.clsr.2015.12.001
– volume: 151
  start-page: 495
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b121
  article-title: Deep learning and big data technologies for IoT security
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.01.016
– volume: 37
  start-page: 71
  issue: 2
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b5
  article-title: Smart IoT devices in the home: Security and privacy implications
  publication-title: IEEE Technol. Soc. Mag.
  doi: 10.1109/MTS.2018.2826079
– volume: 55
  start-page: 122
  issue: 1
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b62
  article-title: Security and privacy in smart city applications: Challenges and solutions
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2017.1600267CM
– volume: 2
  issue: 02
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b38
  article-title: A survey of IoT security: Risks, requirements, trends, and key technologies
  publication-title: J. Ind. Integr. Manag.
– ident: 10.1016/j.comcom.2021.08.021_b67
  doi: 10.1609/aaai.v26i1.8353
– volume: 100
  start-page: 2429
  issue: 8
  year: 2012
  ident: 10.1016/j.comcom.2021.08.021_b57
  article-title: Home-assistant robot for an aging society
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2012.2200563
– volume: 33
  start-page: 411
  issue: 3
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b124
  article-title: The ethical limits of blockchain-enabled markets for private IoT data
  publication-title: Philos. Technol.
  doi: 10.1007/s13347-019-00361-y
– volume: 77
  start-page: 4829
  issue: 4
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b31
  article-title: XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-016-3735-1
– volume: 6
  start-page: 92
  issue: 2
  year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b12
  article-title: Using data sciences in digital marketing: Framework, methods, and performance metrics
  publication-title: J. Innov. Knowl.
  doi: 10.1016/j.jik.2020.08.001
– ident: 10.1016/j.comcom.2021.08.021_b51
  doi: 10.1109/ICoICT.2018.8528776
– volume: 44
  start-page: 51
  issue: 9
  year: 2011
  ident: 10.1016/j.comcom.2021.08.021_b59
  article-title: Securing the internet of things
  publication-title: Computer
  doi: 10.1109/MC.2011.291
– ident: 10.1016/j.comcom.2021.08.021_b7
  doi: 10.1145/2493432.2493494
– volume: 349
  start-page: 261
  issue: 6245
  year: 2015
  ident: 10.1016/j.comcom.2021.08.021_b82
  article-title: Advances in natural language processing
  publication-title: Science
  doi: 10.1126/science.aaa8685
– volume: 10
  start-page: 4102
  issue: 12
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b15
  article-title: IoT privacy and security: Challenges and solutions
  publication-title: Appl. Sci.
  doi: 10.3390/app10124102
– volume: 16
  start-page: 1933
  issue: 4
  year: 2014
  ident: 10.1016/j.comcom.2021.08.021_b69
  article-title: Survey in smart grid and smart home security: Issues, challenges and countermeasures
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/COMST.2014.2320093
– start-page: 175
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b11
  article-title: Analysis of security and privacy challenges in Internet of Things
– start-page: 745
  year: 2013
  ident: 10.1016/j.comcom.2021.08.021_b107
  article-title: The history of corpus linguistics
– volume: 18
  start-page: 1602
  issue: 5
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b120
  article-title: Integrated method for personal thermal comfort assessment and optimization through users’ feedback, IoT and machine learning: a case study
  publication-title: Sensors
  doi: 10.3390/s18051602
– year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b40
  article-title: Systematically quantifying IoT privacy leakage in mobile networks
  publication-title: IEEE Internet Things J.
– volume: 15
  start-page: 73
  issue: 6
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b26
  article-title: The last mile for IoT privacy
  publication-title: IEEE Secur. Priv.
  doi: 10.1109/MSP.2017.4251118
– volume: 29
  start-page: 1589
  issue: 6
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b68
  article-title: Challenges for adopting and implementing IoT in smart cities: An integrated MICMAC-ISM approach
  publication-title: Internet Res.
  doi: 10.1108/INTR-06-2018-0252
– start-page: 67
  year: 2009
  ident: 10.1016/j.comcom.2021.08.021_b92
  article-title: Topic significance ranking of LDA generative models
– volume: 56
  start-page: 14
  issue: 9
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b41
  article-title: Security and privacy in the age of the smart internet of things: An overview from a networking perspective
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2018.1701204
– volume: 13
  start-page: 320
  issue: 2
  year: 2010
  ident: 10.1016/j.comcom.2021.08.021_b47
  article-title: Construct validation using computer-aided text analysis (CATA) an illustration using entrepreneurial orientation
  publication-title: Organ. Res. Methods
  doi: 10.1177/1094428109335949
– volume: 5
  start-page: 1
  issue: 1
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b76
  article-title: Sentibench-a benchmark comparison of state-of-the-practice sentiment analysis methods
  publication-title: EPJ Data Sci.
  doi: 10.1140/epjds/s13688-016-0085-1
– ident: 10.1016/j.comcom.2021.08.021_b102
– volume: 58
  issue: 2
  year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b16
  article-title: Blockchain-based authentication and authorization for smart city applications
  publication-title: Inf. Process. Manage.
  doi: 10.1016/j.ipm.2020.102468
– volume: 154
  start-page: 129
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b54
  article-title: Social media sentiment analysis through parallel dilated convolutional neural network for smart city applications
  publication-title: Comput. Commun.
  doi: 10.1016/j.comcom.2020.02.044
– volume: 3
  start-page: 37
  issue: 1
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b77
  article-title: Text mining: open-source tokenization tools-an analysis
  publication-title: Adv. Comput. Intell. Int. J.
– volume: 76
  start-page: 146
  year: 2015
  ident: 10.1016/j.comcom.2021.08.021_b27
  article-title: Security, privacy and trust in Internet of Things: The road ahead
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2014.11.008
– volume: 35
  start-page: 399
  issue: 3
  year: 2009
  ident: 10.1016/j.comcom.2021.08.021_b87
  article-title: Recognizing contextual polarity: An exploration of features for phrase-level sentiment analysis
  publication-title: Comput. Linguist.
  doi: 10.1162/coli.08-012-R1-06-90
– start-page: 148
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b66
  article-title: Sentiment analysis of Twitter data: Case study on digital India
– start-page: 561
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b1
  article-title: IoT-O, a core-domain IoT ontology to represent connected devices networks
– volume: 44
  start-page: 2909
  issue: 7
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b72
  article-title: What doesn’t get measured does exist: Improving the accuracy of computer-aided text analysis
  publication-title: J. Manag.
– volume: 2021
  year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b6
  article-title: The impact of digitalization on organizations - A review of the empirical literature
  publication-title: Int. J. Entrepreneurial Ventur.
– start-page: 1
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b45
  article-title: Challenges of privacy-preserving machine learning in iot
– volume: 32
  issue: 21
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b35
  article-title: An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols
  publication-title: Concurr. Comput.: Pract. Exper.
  doi: 10.1002/cpe.4946
– volume: 13
  start-page: 519
  issue: 3
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b3
  article-title: Digital innovation and venturing: An introduction into the digitalization of entrepreneurship
  publication-title: Rev. Manag. Sci.
  doi: 10.1007/s11846-019-00333-8
– volume: 3
  start-page: 36
  issue: 2
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b46
  article-title: The quest for privacy in the internet of things
  publication-title: IEEE Cloud Comput.
  doi: 10.1109/MCC.2016.28
– volume: 1
  start-page: 64
  issue: 1
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b36
  article-title: Internet of things data protection and privacy in the era of the General Data Protection Regulation
  publication-title: J. Data Protect. Priv.
  doi: 10.69554/TBRU2322
– volume: 145
  start-page: 438
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b50
  article-title: Polarization and acculturation in US election 2016 outcomes – Can Twitter analytics predict changes in voting preferences
  publication-title: Technol. Forecast. Soc. Change
  doi: 10.1016/j.techfore.2018.09.009
– year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b86
– year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b44
  article-title: Machine learning in IoT security: current solutions and future challenges
  publication-title: IEEE Commun. Surv. Tutor.
– volume: 98
  start-page: 660
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b37
  article-title: Economic perspective analysis of protecting big data security and privacy
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.03.042
– start-page: 230
  year: 2014
  ident: 10.1016/j.comcom.2021.08.021_b20
  article-title: IoT security: ongoing challenges and research opportunities
– start-page: 1362
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b60
  article-title: SoK: Security evaluation of home-based IoT deployments
– volume: 148
  start-page: 340
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b33
  article-title: Privacy-preserving raw data collection without a trusted authority for IoT
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2018.11.028
– volume: 15
  start-page: 263
  issue: 2
  year: 2012
  ident: 10.1016/j.comcom.2021.08.021_b71
  article-title: Taming textual data: The contribution of corpus linguistics to computer-aided text analysis
  publication-title: Organ. Res. Methods
  doi: 10.1177/1094428111417451
– volume: 98
  start-page: 161
  year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b64
  article-title: Setting B2B Digital Marketing in Artificial Intelligence-based CRMs: A review and directions for future research
  publication-title: Industrial Marketing Management
  doi: 10.1016/j.indmarman.2021.08.006
– volume: 22
  start-page: 765
  issue: 3
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b98
  article-title: Applying natural language processing capabilities in computerized textual analysis to measure organizational culture
  publication-title: Organ. Res. Methods
  doi: 10.1177/1094428117745648
– volume: 78
  start-page: 15169
  issue: 11
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b78
  article-title: Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey
  publication-title: Multimedia Tools Appl.
  doi: 10.1007/s11042-018-6894-4
– volume: 68
  issue: 4
  year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b111
  article-title: Security and privacy concerns of the ‘Internet of Things’(IoT) in IT and its help in the various sectors across the world
  publication-title: Int. J. Comput. Trends Technol.
  doi: 10.14445/22312803/IJCTT-V68I4P142
– start-page: 29
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b24
  article-title: Emerging trends in cloud computing, big data, fog computing, IoT and smart living
– volume: 100
  year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b4
  article-title: Multiple features based approach for automatic fake news detection on social networks using deep learning
  publication-title: Appl. Soft Comput.
  doi: 10.1016/j.asoc.2020.106983
– start-page: 127
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b119
  article-title: Iot application testing features based on the modelling network
– volume: 97
  start-page: 379
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b127
  article-title: Performance evaluation of a Fog-assisted IoT solution for e-Health applications
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.02.055
– volume: 3
  start-page: 993
  issue: Jan
  year: 2003
  ident: 10.1016/j.comcom.2021.08.021_b95
  article-title: Latent dirichlet allocation
  publication-title: J. Mach. Learn. Res.
– start-page: 561
  year: 2016
  ident: 10.1016/j.comcom.2021.08.021_b9
  article-title: IoT-O, a core-domain IoT ontology to represent connected devices networks
– volume: 7
  year: 2019
  ident: 10.1016/j.comcom.2021.08.021_b99
  article-title: Mapping consumer sentiment toward wireless services using geospatial twitter data
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2935200
– year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b56
– year: 2020
  ident: 10.1016/j.comcom.2021.08.021_b48
  article-title: Gaining legitimacy by being different: Optimal distinctiveness in crowdfunding platforms
  publication-title: Acad. Manag. J.
– year: 2021
  ident: 10.1016/j.comcom.2021.08.021_b23
  article-title: Entrepreneurial ecosystems in an interconnected world: Emergence, governance, and digitalization
  publication-title: Rev. Manag. Sci.
  doi: 10.1007/s11846-021-00444-1
– ident: 10.1016/j.comcom.2021.08.021_b101
– volume: 98
  start-page: 74
  year: 2018
  ident: 10.1016/j.comcom.2021.08.021_b93
  article-title: What is wrong with topic modeling? And how to fix it using search-based software engineering
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2018.02.005
– volume: 76
  start-page: 540
  year: 2017
  ident: 10.1016/j.comcom.2021.08.021_b29
  article-title: Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2017.03.001
SSID ssj0004773
Score 2.5089936
Snippet In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 285
SubjectTerms Data mining
Home assistant
IoT
Sentiment analysis
Twitter
UGC
Title Using data mining techniques to explore security issues in smart living environments in Twitter
URI https://dx.doi.org/10.1016/j.comcom.2021.08.021
Volume 179
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKu8CAeIryqDywhjZ2YidjVVEVEJ1aqZsVO7YU1KYVCWLjt-NLnFIkBBLZ8rgoOTvnc_x99yF0G_p2uhbGgaeYnekEUmovMYR5if3IDZNhlPrAHX6essk8eFyEixYaNVwYgFW62F_H9CpauyN9583-Jsv6FSyJMiBq2p5JQGm4Q2jMwjbqDB-eJtMveiSvF5oByQgGDYOugnnZ2wNshNixrqrlSfyfR6idUWd8hA5duoiH9RMdo5bOT9DBThHBUySqVX8MUE-8quQe8LYwa4HLNdYVzE7jwknV4crXBc5yXKzsu-JlBn8V8C7nDU7O3jOg-pyh-fh-Npp4TjbBUzabKr04JcakiQm4IVDQL9ZExUbxlMoksBthRicmBKXz2LaUTwY8oTw1RPoDmUSSnqN2vs71BcIyVZRRrQxRJOA6kkZpllIVR1yaNCBdRBtXCeVqioO0xVI04LEXUTtYgIMFKF4Sv4u8rdWmrqnxx_W8aQXxrW8IG_Z_tbz8t-UV2oe9mnV4jdrl65u-selHKXto7-7D77lO9gll6t21
linkProvider Elsevier
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqMgAD4inK0wNraGM7cTKiiqpA26mVulmxY0tBJa1IEBu_HZ-TlCIhkMgY-6Lk7Jxf33cfQjeBb5drQcw8FdqVDpNSe4khoZfYn9yEMohSH7jD40k4nLHHeTBvoX7DhQFYZR37q5juonV9p1t7s7vKsq6DJdEQiJq2ZxJQGt5iAeWA67v9-MJ5MF4dMwOOEao3_DkH8rIPB9AIsSOdy-RJ_J_Hp40xZ7CP9urJIr6r3ucAtXR-iHY3UggeIeHO_DEAPfGLE3vA67SsBS6XWDuQncZFLVSHnacLnOW4eLFfihcZ7CngTcYbFE7fMyD6HKPZ4H7aH3q1aIKn7Fyq9OKUGJMmhnFDIJ1frImKjeIplQmzFwmNTkwAOuexbSef9HhCeWqI9HsyiSQ9Qe18metThGWqaEi1MkQRxnUkjdJhSlUccWlSRjqINq4Sqs4oDsIWC9FAx55F5WABDhagd0n8DvLWVqsqo8Yf9XnTCuJbzxA26P9qefZvy2u0PZyOR2L0MHk6RztQUvEPL1C7fH3Tl3YiUsor19E-AUjo3oA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Using+data+mining+techniques+to+explore+security+issues+in+smart+living+environments+in+Twitter&rft.jtitle=Computer+communications&rft.au=Saura%2C+Jose+Ramon&rft.au=Palacios-Marqu%C3%A9s%2C+Daniel&rft.au=Ribeiro-Soriano%2C+Domingo&rft.date=2021-11-01&rft.issn=0140-3664&rft.volume=179&rft.spage=285&rft.epage=295&rft_id=info:doi/10.1016%2Fj.comcom.2021.08.021&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comcom_2021_08_021
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon