Using data mining techniques to explore security issues in smart living environments in Twitter
In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The development of the IoT industry has led to the emergence of connected devices and home assistants that create smart living environments. However,...
Saved in:
Published in | Computer communications Vol. 179; pp. 285 - 295 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.11.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 0140-3664 |
DOI | 10.1016/j.comcom.2021.08.021 |
Cover
Abstract | In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The development of the IoT industry has led to the emergence of connected devices and home assistants that create smart living environments. However, the continuously generated data accumulated by these connected devices create security issues and raise user’s privacy concerns. The present study aims to explore the main security issues in smart living environments using data mining techniques. To this end, we applied a three-sentence data mining analysis of 938,258 tweets collected from Twitter under the user-generated data (UGD) framework. First, sentiment analysis was applied using Textblob which was tested with support vector classifier, multinomial naïve bayes, logistic regression, and random forest classifier; as a result, the analyzed tweets were divided into those expressing positive, negative, and neutral sentiment. Next, a Latent Dirichlet Allocation (LDA) algorithm was applied to divide the sample into topics related to security issues in smart living environments. Finally, the insights were extracted by applying a textual analysis process in Python validated with the analysis of frequency and weighted percentage variables and calculating the statistical measure known as mutual information (MI) to analyze the identified n-grams (unigrams and bigrams). As a result of the research 10 topics were identified in which we found that the main security issues are malware, cybersecurity attacks, data storing vulnerabilities, the use of testing software in IoT, and possible leaks due to the lack of user experience. We discussed different circumstances and causes that may affect user security and privacy when using IoT devices and emphasized the importance of UGC in the processing of personal data of IoT device users. |
---|---|
AbstractList | In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The development of the IoT industry has led to the emergence of connected devices and home assistants that create smart living environments. However, the continuously generated data accumulated by these connected devices create security issues and raise user’s privacy concerns. The present study aims to explore the main security issues in smart living environments using data mining techniques. To this end, we applied a three-sentence data mining analysis of 938,258 tweets collected from Twitter under the user-generated data (UGD) framework. First, sentiment analysis was applied using Textblob which was tested with support vector classifier, multinomial naïve bayes, logistic regression, and random forest classifier; as a result, the analyzed tweets were divided into those expressing positive, negative, and neutral sentiment. Next, a Latent Dirichlet Allocation (LDA) algorithm was applied to divide the sample into topics related to security issues in smart living environments. Finally, the insights were extracted by applying a textual analysis process in Python validated with the analysis of frequency and weighted percentage variables and calculating the statistical measure known as mutual information (MI) to analyze the identified n-grams (unigrams and bigrams). As a result of the research 10 topics were identified in which we found that the main security issues are malware, cybersecurity attacks, data storing vulnerabilities, the use of testing software in IoT, and possible leaks due to the lack of user experience. We discussed different circumstances and causes that may affect user security and privacy when using IoT devices and emphasized the importance of UGC in the processing of personal data of IoT device users. |
Author | Saura, Jose Ramon Ribeiro-Soriano, Domingo Palacios-Marqués, Daniel |
Author_xml | – sequence: 1 givenname: Jose Ramon orcidid: 0000-0002-9457-7745 surname: Saura fullname: Saura, Jose Ramon email: joseramon.saura@urjc.es organization: Rey Juan Carlos University, Madrid, Spain – sequence: 2 givenname: Daniel surname: Palacios-Marqués fullname: Palacios-Marqués, Daniel email: dapamar@doe.upv.es organization: Universitat Politècnica de València, Valencia, Spain – sequence: 3 givenname: Domingo surname: Ribeiro-Soriano fullname: Ribeiro-Soriano, Domingo email: ribeders@uv.es organization: University of Alcalá, Madrid, Spain |
BookMark | eNqFkM1OwzAQhH0oEm3hDTj4BRJsJ80PByRU8SdV4tKeLcdZw1aJXWy30LcnoZw4wGqlWWn0rTQzIxPrLBByxVnKGS-ut6l2_bCpYIKnrEoHmZAp4zlLsqLIz8kshC1jLC_LbErkJqB9pa2KivZoxzuCfrP4vodAo6PwueucBxpA7z3GI8UQRgstDb3ykXZ4GCmwB_TO9mDjt7n-wBjBX5Azo7oAlz86J5uH-_XyKVm9PD4v71aJzhYiJnUrjGmVyUsjWJbnNQhdG122WaPyYURhQJlFJbKi5tBwwUqVla0RDWeNqppsTm5Of7V3IXgwUmNUEZ2NXmEnOZNjPXIrT_XIsR7JKjnIAOe_4J3HIdzxP-z2hMEQ7IDgZdAIVkOLHnSUrcO_H3wBBFWIgQ |
CitedBy_id | crossref_primary_10_1007_s11042_023_17250_4 crossref_primary_10_1016_j_techfore_2022_121908 crossref_primary_10_1088_2515_7620_ac6657 crossref_primary_10_1016_j_jbusres_2021_12_052 crossref_primary_10_1007_s11135_022_01459_w crossref_primary_10_1016_j_cose_2022_103008 crossref_primary_10_1007_s13278_024_01254_5 crossref_primary_10_1007_s13132_024_01764_9 crossref_primary_10_1371_journal_pone_0277549 crossref_primary_10_1016_j_eswa_2022_117974 crossref_primary_10_1155_2022_3965720 crossref_primary_10_2147_PRBM_S386089 crossref_primary_10_1155_2022_3834696 crossref_primary_10_3390_math9243150 crossref_primary_10_1007_s42979_022_01415_3 crossref_primary_10_1080_10447318_2022_2147302 crossref_primary_10_3390_electronics11030450 crossref_primary_10_3390_electronics11091416 crossref_primary_10_3390_en16135206 crossref_primary_10_3389_fpsyg_2023_1123236 crossref_primary_10_3390_su142013534 crossref_primary_10_37391_ijeer_12icteee07 crossref_primary_10_3233_AIS_230433 crossref_primary_10_1016_j_asoc_2022_108987 crossref_primary_10_5937_ekonomika2303043I crossref_primary_10_3389_fpsyg_2022_820813 crossref_primary_10_1016_j_techfore_2021_121456 crossref_primary_10_4018_IJCAC_305211 crossref_primary_10_1016_j_ijpe_2023_108861 crossref_primary_10_1016_j_jbusres_2022_113433 crossref_primary_10_1016_j_giq_2022_101679 crossref_primary_10_1016_j_inffus_2023_101804 crossref_primary_10_1186_s13677_022_00356_9 crossref_primary_10_3389_fnagi_2022_938071 crossref_primary_10_1108_JFBM_04_2022_0050 crossref_primary_10_3390_s24041270 crossref_primary_10_1007_s10479_023_05261_1 crossref_primary_10_1016_j_technovation_2021_102447 crossref_primary_10_1007_s11365_022_00823_4 crossref_primary_10_1108_DTA_10_2022_0406 crossref_primary_10_1016_j_measen_2022_100605 |
Cites_doi | 10.1016/j.knosys.2018.08.011 10.1111/1475-679X.12123 10.3390/fi10120125 10.1016/j.jss.2019.04.058 10.1093/applin/25.3.371 10.1109/JIOT.2020.3000056 10.1007/s11042-016-4162-z 10.1016/j.comcom.2015.07.016 10.5614/itbj.ict.res.appl.2016.10.1.6 10.1109/TVT.2017.2701551 10.1108/EJIM-03-2018-0058 10.1609/icwsm.v4i1.14024 10.1016/j.future.2019.02.060 10.1093/poq/nfs038 10.1109/MPRV.2018.03367733 10.3390/info7030044 10.1016/j.procs.2017.10.105 10.1016/j.ijinfomgt.2020.102129 10.1109/TII.2020.2974555 10.1109/MCE.2019.2953740 10.1016/j.techfore.2021.120681 10.1016/j.future.2017.04.036 10.1016/j.jbusres.2021.03.001 10.1016/j.compind.2018.08.002 10.1016/j.compind.2009.05.010 10.1109/JIOT.2018.2847733 10.1109/JIOT.2016.2619369 10.1093/cybsec/tyz005 10.1016/j.comcom.2015.07.001 10.1016/j.comcom.2020.02.068 10.1016/j.chb.2018.11.022 10.1145/3364223 10.1016/j.clsr.2017.06.007 10.1007/s00180-019-00919-6 10.3390/sym11040519 10.1016/j.clsr.2015.12.001 10.1016/j.comcom.2020.01.016 10.1109/MTS.2018.2826079 10.1109/MCOM.2017.1600267CM 10.1609/aaai.v26i1.8353 10.1109/JPROC.2012.2200563 10.1007/s13347-019-00361-y 10.1007/s11042-016-3735-1 10.1016/j.jik.2020.08.001 10.1109/ICoICT.2018.8528776 10.1109/MC.2011.291 10.1145/2493432.2493494 10.1126/science.aaa8685 10.3390/app10124102 10.1109/COMST.2014.2320093 10.3390/s18051602 10.1109/MSP.2017.4251118 10.1108/INTR-06-2018-0252 10.1109/MCOM.2018.1701204 10.1177/1094428109335949 10.1140/epjds/s13688-016-0085-1 10.1016/j.ipm.2020.102468 10.1016/j.comcom.2020.02.044 10.1016/j.comnet.2014.11.008 10.1162/coli.08-012-R1-06-90 10.1002/cpe.4946 10.1007/s11846-019-00333-8 10.1109/MCC.2016.28 10.69554/TBRU2322 10.1016/j.techfore.2018.09.009 10.1016/j.future.2019.03.042 10.1016/j.comnet.2018.11.028 10.1177/1094428111417451 10.1016/j.indmarman.2021.08.006 10.1177/1094428117745648 10.1007/s11042-018-6894-4 10.14445/22312803/IJCTT-V68I4P142 10.1016/j.asoc.2020.106983 10.1016/j.future.2019.02.055 10.1109/ACCESS.2019.2935200 10.1007/s11846-021-00444-1 10.1016/j.infsof.2018.02.005 10.1016/j.future.2017.03.001 |
ContentType | Journal Article |
Copyright | 2021 The Authors |
Copyright_xml | – notice: 2021 The Authors |
DBID | 6I. AAFTH AAYXX CITATION |
DOI | 10.1016/j.comcom.2021.08.021 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EndPage | 295 |
ExternalDocumentID | 10_1016_j_comcom_2021_08_021 S0140366421003212 |
GroupedDBID | --K --M .DC .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 6I. 7-5 71M 77K 8P~ 9JN AABNK AACTN AAEDT AAEDW AAFTH AAIKJ AAKOC AALRI AAOAW AAQFI AATTM AAXKI AAXUO AAYFN ABBOA ABFNM ABJNI ABMAC ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE ADTZH AEBSH AECPX AEIPS AEKER AENEX AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHZHX AIALX AIEXJ AIKHN AITUG AKRWK ALMA_UNASSIGNED_HOLDINGS AMRAJ ANKPU AOUOD AXJTR BJAXD BKOJK BLXMC BNPGV CS3 DU5 EBS EFJIC EO8 EO9 EP2 EP3 FDB FIRID FNPLU FYGXN G-Q GBLVA GBOLZ IHE J1W JJJVA KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 ROL RPZ RXW SDF SDG SDP SES SPC SPCBC SSH SST SSV SSZ T5K WH7 ZMT ~G- 07C 29F AAQXK AAYWO AAYXX ABWVN ABXDB ACNNM ACRPL ACVFH ADCNI ADJOM ADMUD ADNMO AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AI. AIGII AIIUN AKBMS AKYEP APXCP ASPBG AVWKF AZFZN CITATION EJD F0J FEDTE FGOYB HLZ HVGLF HZ~ R2- RIG SBC SEW TAE UHS VH1 VOH WUQ XPP ZY4 |
ID | FETCH-LOGICAL-c352t-9d2ffdaf47f203449e2c9fc7d3ba444426feaf5823691eb1207a37df2b10ba8b3 |
IEDL.DBID | AIKHN |
ISSN | 0140-3664 |
IngestDate | Thu Apr 24 23:02:31 EDT 2025 Tue Jul 01 02:43:07 EDT 2025 Sun Apr 06 06:54:34 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | UGC Sentiment analysis Home assistant Data mining IoT |
Language | English |
License | This is an open access article under the CC BY license. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c352t-9d2ffdaf47f203449e2c9fc7d3ba444426feaf5823691eb1207a37df2b10ba8b3 |
ORCID | 0000-0002-9457-7745 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S0140366421003212 |
PageCount | 11 |
ParticipantIDs | crossref_citationtrail_10_1016_j_comcom_2021_08_021 crossref_primary_10_1016_j_comcom_2021_08_021 elsevier_sciencedirect_doi_10_1016_j_comcom_2021_08_021 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-11-01 2021-11-00 |
PublicationDateYYYYMMDD | 2021-11-01 |
PublicationDate_xml | – month: 11 year: 2021 text: 2021-11-01 day: 01 |
PublicationDecade | 2020 |
PublicationTitle | Computer communications |
PublicationYear | 2021 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Khan, Iltaf, Afzal, Abbas (b96) 2020 K.L. Liu, W.J. Li, M. Guo, Emoticon smoothed language models for twitter sentiment analysis, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 26, No. 1, 2012, July. Das, Degeling, Sadeh (b58) 2018; 17 Emami-Naeini, Bhagavatula, Habib, Degeling, Bauer, Cranor, Sadeh (b56) 2020 Pandey, Pandey (b98) 2019; 22 Xuanyang, Yuchang, Shouhong, Xi (b73) 2006 Salamone, Belussi, Currò, Danza, Ghellere, Guazzi (b120) 2018; 18 Wilson, Wiebe, Hoffmann (b87) 2009; 35 McKenny, Aguinis, Short, Anglin (b72) 2018; 44 Zainuddin, Daud, Ahmad, Maslizan, Abdullah (b14) 2021 Alrawi, Lever, Antonakakis, Monrose (b60) 2019 Ribeiro, Araújo, Gonçalves, Gonçalves, Benevenuto (b76) 2016; 5 Hu, Yang, Lin, Wang (b61) 2020 Short, Broberg, Cogliser, Brigham (b47) 2010; 13 Blythe, Sombatruang, Johnson (b18) 2019; 5 Qi, Procter, Zhang, Guo (b99) 2019; 7 Nzabahimana (b11) 2018 Mohammad (b111) 2020; 68 Webberley, Allen, Whitaker (b55) 2016; 73 Leon (b74) 2009; 60 Täuscher, Bouncken, Pesch (b48) 2020 Chaudhuri (b36) 2016; 1 Rayson, Garside (b105) 2000 Tao, Bhuiyan, Rahman, Wang, Wang, Ahmed, Li (b37) 2019; 98 Zhou, Jia, Peng, Zhang, Liu (b108) 2018; 6 Hardeniya, Perkins, Chopra, Joshi, Mathur (b86) 2016 Ribeiro-Navarrete, Saura, Palacios-Marqués (b2) 2021; 167 Loughran, McDonald (b97) 2016; 54 Sarlan, Nadam, Basri (b52) 2014 Vilela, Rodrigues, Solic, Saleem, Furtado (b127) 2019; 97 McEnery, Hardie (b107) 2013 Bouncken, Kraus (b23) 2021 Geneiatakis, Kounelis, Neisse, Nai-Fovino, Steri, Baldini (b42) 2017 Chen, Zhang, Liu, Ye, Lin (b94) 2019; 163 Arachchige, Bertok, Khalil, Liu, Camtepe, Atiquzzaman (b43) 2020; 16 Bhavsar, Manglani (b83) 2019; 6 Chow (b26) 2017; 15 Gill, Garraghan, Buyya (b34) 2019; 154 Lin, Bergmann (b25) 2016; 7 Caron, Bosua, Maynard, Ahmad (b28) 2016; 32 Saura, Bennett (b84) 2019; 11 G. Bouma, Normalized (pointwise) mutual information in collocation extraction, in: Proceedings of GSCL, 2009, pp. 31–40. Mahalle, Anggorojati, Prasad, Prasad (b117) 2012 Agrawal, Fu, Menzies (b93) 2018; 98 Lee, Kobsa (b122) 2019; 27 Arabo, Brown, El-Moussa (b112) 2012 Saura, Ribeiro-Soriano, Palacios-Marqués (b64) 2021; 98 Seydoux, Drira, Hernandez, Monteil (b9) 2016 Kong, Qiao, Wu (b109) 2020; 35 Janssen, Luthra, Mangla, Rana, Dwivedi (b68) 2019; 29 Griol, Molina, Callejas (b90) 2017 Jelodar, Wang, Yuan, Feng, Jiang, Li, Zhao (b78) 2019; 78 AlSumait, Barbará, Gentle, Domeniconi (b92) 2009 Gupta, Quamara (b35) 2020; 32 Patel, Doshi (b116) 2019 Alladi, Chamola, Sikdar, Choo (b8) 2020; 9 Karoui, Zitoune, Moriceau (b91) 2017; 117 Radanliev, De Roure, Nicolescu, Huth, Montalvo, Cannady, Burnap (b115) 2018; 102 Iyengar, Sood, Lelkes (b103) 2012; 76 Ammirato, Sofo, Felicetti, Raso (b21) 2019 Santoso, Vun (b39) 2015 Yu, Wang, Liu, Niu (b41) 2018; 56 Bouncken, Qiu (b6) 2021; 2021 Sivaraman, Gharakheili, Fernandes, Clark, Karliychuk (b5) 2018; 37 Hassan, Rehmani, Chen (b32) 2019; 97 Krippendorff (b80) 2018 Komninos, Philippou, Pitsillides (b69) 2014; 16 Grover, Kar, Dwivedi, Janssen (b50) 2019; 145 Hui, Wang, Hou, Wang, Wang, Li, Jin (b40) 2020 Hussain, Hussain, Hassan, Hossain (b44) 2020 Zheng, Xu, Jiang, Gu, Tan, Cheng (b45) 2019 Vijayarani, Janani (b77) 2016; 3 M. De Choudhury, Y.R. Lin, H. Sundaram, K.S. Candan, L. Xie, A. Kelliher, How does the data sampling strategy impact the discovery of information diffusion in social media? in: Proceedings of the International AAAI Conference on Web and Social Media, Vol. 4, No. 1, 2010. M.W. Wu, K.Y. Su, Corpus-based automatic compound extraction with mutual information and relative frequency count, in: Proceedings of Rocling VI Computational Linguistics Conference VI, 1993, pp. 207–216. Sicari, Rizzardi, Grieco, Coen-Porisini (b27) 2015; 76 Ma, Wang, Chu (b30) 2013 Saura, Palacios-Marqués, Iturricha-Fernández (b53) 2021; 129 Krippendorff (b75) 2004; 30 Zhang, Cho, Wang, Hsu, Chen, Shieh (b20) 2014 Farahani, Firouzi, Chang, Badaroglu, Constant, Mankodiya (b125) 2018; 78 Liu, Wang, Wang, Xia, Xu (b33) 2019; 148 Zhang, Sun, Zhao, Wang, Chang, Gupta (b63) 2017; 76 Biber (b106) 2004; 25 Mishra, Rajnish, Kumar (b66) 2016 Ishmaev (b124) 2020; 33 Ullah, Nardelli, Wolff, Smolander (b19) 2020; 7 Pollach (b71) 2012; 15 Zhang, Ni, Yang, Liang, Ren, Shen (b62) 2017; 55 Sarkar, Markovski, Gusev, Tomp, Muravyov, Filchenkov, Parundekar, Elias, Ashok, Sujitparapitaya, Shirani, Roldan, Bonta, Kumaresh, Janardhan, Mishra, Pappu, Bhamidipati, He, Zheng, Bandi, Fellah (b89) 2019; 2 Amanullah, Habeeb, Nasaruddin, Gani, Ahmed, Nainar (b121) 2020; 151 Khemissa, Tandjaoui (b126) 2015 Blei, Ng, Jordan (b95) 2003; 3 Wilson, Wiebe, Hoffmann (b88) 2005 Hirschberg, Manning (b82) 2015; 349 Esposito, Ficco, Gupta (b16) 2021; 58 Rana, Cheah, Letchmunan (b79) 2016; 10 Popereshnyak, Suprun, Suprun, Wieckowski (b119) 2018 Reyes-Menendez, Saura, Stephen (b100) 2020; 54 Sahoo, Gupta (b4) 2021; 100 Hiremath, Patil (b85) 2020 Patel, Patel (b22) 2016; 6 Hoffman, Bach, Blei (b104) 2010; 23 Porambage, Ylianttila, Schmitt, Kumar, Gurtov, Vasilakos (b46) 2016; 3 Parra, Trattner, Gómez, Hurtado, Wen, Lin (b65) 2016; 73 F. Kawsar, A.B. Brush, Home computing unplugged: why, where and when people use different connected devices at home, in: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, 2013, September, pp. 627–636. Bouncken, Barwinski (b10) 2020 Yamazaki, Ueda, Nozawa, Kojima, Okada, Matsumoto, Ishikawa, Shimoyama, Inaba (b57) 2012; 100 Medaglia, Serbanati (b13) 2010; 38 Tawalbeh, Muheidat, Tawalbeh, Quwaider (b15) 2020; 10 Cai, Xu, Jiang, Vasilakos (b114) 2016; 4 Seydoux, Drira, Hernandez, Monteil (b1) 2016 Kim (b38) 2017; 2 Kumar, Patel (b110) 2014; 90 Gupta, Gupta (b31) 2018; 77 Alam, Abid, Guangpei, Yunrong (b54) 2020; 154 Pecorella, Pierucci, Nizzi (b70) 2018; 10 Kraus, Roig-Tierno, Bouncken (b3) 2019; 13 Nugent, Hong, Hallberg, Finlay, Synnes (b17) 2008 Bugeja, Jacobsson, Davidsson (b113) 2016 Jayaraman, Yang, Yavari, Georgakopoulos, Yi (b29) 2017; 76 Sedjelmaci, Senouci, Taleb (b118) 2017; 66 Roman, Najera, Lopez (b59) 2011; 44 Madaan, Ahad, Sastry (b123) 2018; 34 Hosseinian-Far, Ramachandran, Slack (b24) 2018 A. Alamsyah, W. Rizkika, D.D.A. Nugroho, F. Renaldi, S. Saadah, Dynamic large scale data on twitter using sentiment analysis and topic modeling, in: 2018 6th International Conference on Information and Communication Technology, ICoICT, 2018, pp. 254–258. Kim, Park, Park, Ahn (b49) 2019; 92 Saura (b12) 2021; 6 Esposito (10.1016/j.comcom.2021.08.021_b16) 2021; 58 Patel (10.1016/j.comcom.2021.08.021_b22) 2016; 6 Geneiatakis (10.1016/j.comcom.2021.08.021_b42) 2017 Wilson (10.1016/j.comcom.2021.08.021_b87) 2009; 35 Hussain (10.1016/j.comcom.2021.08.021_b44) 2020 Hardeniya (10.1016/j.comcom.2021.08.021_b86) 2016 Pandey (10.1016/j.comcom.2021.08.021_b98) 2019; 22 Lin (10.1016/j.comcom.2021.08.021_b25) 2016; 7 Hiremath (10.1016/j.comcom.2021.08.021_b85) 2020 Wilson (10.1016/j.comcom.2021.08.021_b88) 2005 Hosseinian-Far (10.1016/j.comcom.2021.08.021_b24) 2018 Short (10.1016/j.comcom.2021.08.021_b47) 2010; 13 10.1016/j.comcom.2021.08.021_b51 Jayaraman (10.1016/j.comcom.2021.08.021_b29) 2017; 76 Khemissa (10.1016/j.comcom.2021.08.021_b126) 2015 Kraus (10.1016/j.comcom.2021.08.021_b3) 2019; 13 Vilela (10.1016/j.comcom.2021.08.021_b127) 2019; 97 Zhang (10.1016/j.comcom.2021.08.021_b62) 2017; 55 Webberley (10.1016/j.comcom.2021.08.021_b55) 2016; 73 Zhou (10.1016/j.comcom.2021.08.021_b108) 2018; 6 Grover (10.1016/j.comcom.2021.08.021_b50) 2019; 145 Rana (10.1016/j.comcom.2021.08.021_b79) 2016; 10 Krippendorff (10.1016/j.comcom.2021.08.021_b75) 2004; 30 Krippendorff (10.1016/j.comcom.2021.08.021_b80) 2018 Täuscher (10.1016/j.comcom.2021.08.021_b48) 2020 Roman (10.1016/j.comcom.2021.08.021_b59) 2011; 44 Leon (10.1016/j.comcom.2021.08.021_b74) 2009; 60 Blei (10.1016/j.comcom.2021.08.021_b95) 2003; 3 Chow (10.1016/j.comcom.2021.08.021_b26) 2017; 15 Agrawal (10.1016/j.comcom.2021.08.021_b93) 2018; 98 Jelodar (10.1016/j.comcom.2021.08.021_b78) 2019; 78 Alladi (10.1016/j.comcom.2021.08.021_b8) 2020; 9 Zhang (10.1016/j.comcom.2021.08.021_b63) 2017; 76 Hui (10.1016/j.comcom.2021.08.021_b40) 2020 10.1016/j.comcom.2021.08.021_b102 10.1016/j.comcom.2021.08.021_b101 Hoffman (10.1016/j.comcom.2021.08.021_b104) 2010; 23 Bouncken (10.1016/j.comcom.2021.08.021_b23) 2021 Saura (10.1016/j.comcom.2021.08.021_b53) 2021; 129 Yamazaki (10.1016/j.comcom.2021.08.021_b57) 2012; 100 Loughran (10.1016/j.comcom.2021.08.021_b97) 2016; 54 Sedjelmaci (10.1016/j.comcom.2021.08.021_b118) 2017; 66 Madaan (10.1016/j.comcom.2021.08.021_b123) 2018; 34 Yu (10.1016/j.comcom.2021.08.021_b41) 2018; 56 Kim (10.1016/j.comcom.2021.08.021_b38) 2017; 2 Rayson (10.1016/j.comcom.2021.08.021_b105) 2000 Ullah (10.1016/j.comcom.2021.08.021_b19) 2020; 7 Arachchige (10.1016/j.comcom.2021.08.021_b43) 2020; 16 Sahoo (10.1016/j.comcom.2021.08.021_b4) 2021; 100 Ribeiro (10.1016/j.comcom.2021.08.021_b76) 2016; 5 Vijayarani (10.1016/j.comcom.2021.08.021_b77) 2016; 3 Hu (10.1016/j.comcom.2021.08.021_b61) 2020 Seydoux (10.1016/j.comcom.2021.08.021_b1) 2016 Porambage (10.1016/j.comcom.2021.08.021_b46) 2016; 3 Janssen (10.1016/j.comcom.2021.08.021_b68) 2019; 29 Zhang (10.1016/j.comcom.2021.08.021_b20) 2014 Ribeiro-Navarrete (10.1016/j.comcom.2021.08.021_b2) 2021; 167 Caron (10.1016/j.comcom.2021.08.021_b28) 2016; 32 Chen (10.1016/j.comcom.2021.08.021_b94) 2019; 163 Iyengar (10.1016/j.comcom.2021.08.021_b103) 2012; 76 Saura (10.1016/j.comcom.2021.08.021_b12) 2021; 6 Alrawi (10.1016/j.comcom.2021.08.021_b60) 2019 Kumar (10.1016/j.comcom.2021.08.021_b110) 2014; 90 Salamone (10.1016/j.comcom.2021.08.021_b120) 2018; 18 Sivaraman (10.1016/j.comcom.2021.08.021_b5) 2018; 37 Seydoux (10.1016/j.comcom.2021.08.021_b9) 2016 Xuanyang (10.1016/j.comcom.2021.08.021_b73) 2006 Reyes-Menendez (10.1016/j.comcom.2021.08.021_b100) 2020; 54 Liu (10.1016/j.comcom.2021.08.021_b33) 2019; 148 Chaudhuri (10.1016/j.comcom.2021.08.021_b36) 2016; 1 Sarlan (10.1016/j.comcom.2021.08.021_b52) 2014 Gupta (10.1016/j.comcom.2021.08.021_b31) 2018; 77 Zheng (10.1016/j.comcom.2021.08.021_b45) 2019 Medaglia (10.1016/j.comcom.2021.08.021_b13) 2010; 38 Lee (10.1016/j.comcom.2021.08.021_b122) 2019; 27 Bhavsar (10.1016/j.comcom.2021.08.021_b83) 2019; 6 Ishmaev (10.1016/j.comcom.2021.08.021_b124) 2020; 33 Gupta (10.1016/j.comcom.2021.08.021_b35) 2020; 32 Pecorella (10.1016/j.comcom.2021.08.021_b70) 2018; 10 Tao (10.1016/j.comcom.2021.08.021_b37) 2019; 98 Arabo (10.1016/j.comcom.2021.08.021_b112) 2012 10.1016/j.comcom.2021.08.021_b81 Karoui (10.1016/j.comcom.2021.08.021_b91) 2017; 117 Bugeja (10.1016/j.comcom.2021.08.021_b113) 2016 Mahalle (10.1016/j.comcom.2021.08.021_b117) 2012 Tawalbeh (10.1016/j.comcom.2021.08.021_b15) 2020; 10 Qi (10.1016/j.comcom.2021.08.021_b99) 2019; 7 Biber (10.1016/j.comcom.2021.08.021_b106) 2004; 25 Hassan (10.1016/j.comcom.2021.08.021_b32) 2019; 97 AlSumait (10.1016/j.comcom.2021.08.021_b92) 2009 Zainuddin (10.1016/j.comcom.2021.08.021_b14) 2021 Khan (10.1016/j.comcom.2021.08.021_b96) 2020 Alam (10.1016/j.comcom.2021.08.021_b54) 2020; 154 Santoso (10.1016/j.comcom.2021.08.021_b39) 2015 Mishra (10.1016/j.comcom.2021.08.021_b66) 2016 Das (10.1016/j.comcom.2021.08.021_b58) 2018; 17 Nugent (10.1016/j.comcom.2021.08.021_b17) 2008 Sarkar (10.1016/j.comcom.2021.08.021_b89) 2019; 2 Farahani (10.1016/j.comcom.2021.08.021_b125) 2018; 78 Popereshnyak (10.1016/j.comcom.2021.08.021_b119) 2018 10.1016/j.comcom.2021.08.021_b7 Pollach (10.1016/j.comcom.2021.08.021_b71) 2012; 15 Saura (10.1016/j.comcom.2021.08.021_b84) 2019; 11 Bouncken (10.1016/j.comcom.2021.08.021_b10) 2020 Komninos (10.1016/j.comcom.2021.08.021_b69) 2014; 16 Saura (10.1016/j.comcom.2021.08.021_b64) 2021; 98 McKenny (10.1016/j.comcom.2021.08.021_b72) 2018; 44 Ammirato (10.1016/j.comcom.2021.08.021_b21) 2019 Amanullah (10.1016/j.comcom.2021.08.021_b121) 2020; 151 Gill (10.1016/j.comcom.2021.08.021_b34) 2019; 154 Nzabahimana (10.1016/j.comcom.2021.08.021_b11) 2018 Parra (10.1016/j.comcom.2021.08.021_b65) 2016; 73 Sicari (10.1016/j.comcom.2021.08.021_b27) 2015; 76 Mohammad (10.1016/j.comcom.2021.08.021_b111) 2020; 68 Cai (10.1016/j.comcom.2021.08.021_b114) 2016; 4 10.1016/j.comcom.2021.08.021_b67 McEnery (10.1016/j.comcom.2021.08.021_b107) 2013 Bouncken (10.1016/j.comcom.2021.08.021_b6) 2021; 2021 Griol (10.1016/j.comcom.2021.08.021_b90) 2017 Kim (10.1016/j.comcom.2021.08.021_b49) 2019; 92 Radanliev (10.1016/j.comcom.2021.08.021_b115) 2018; 102 Ma (10.1016/j.comcom.2021.08.021_b30) 2013 Emami-Naeini (10.1016/j.comcom.2021.08.021_b56) 2020 Blythe (10.1016/j.comcom.2021.08.021_b18) 2019; 5 Kong (10.1016/j.comcom.2021.08.021_b109) 2020; 35 Patel (10.1016/j.comcom.2021.08.021_b116) 2019 Hirschberg (10.1016/j.comcom.2021.08.021_b82) 2015; 349 |
References_xml | – start-page: 1292 year: 2017 end-page: 1297 ident: b42 article-title: Security and privacy issues for an IoT based smart home publication-title: 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics – volume: 92 start-page: 273 year: 2019 end-page: 281 ident: b49 article-title: Willingness to provide personal information: Perspective of privacy calculus in IoT services publication-title: Comput. Hum. Behav. – volume: 25 start-page: 371 year: 2004 end-page: 405 ident: b106 article-title: If you look at …: Lexical bundles in university teaching and textbooks publication-title: Appl. Linguist. – volume: 10 year: 2016 ident: b79 article-title: Topic modeling in sentiment analysis: A systematic review publication-title: J. ICT Res. Appl. – volume: 3 start-page: 993 year: 2003 end-page: 1022 ident: b95 article-title: Latent dirichlet allocation publication-title: J. Mach. Learn. Res. – volume: 6 start-page: 1606 year: 2018 end-page: 1616 ident: b108 article-title: The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved publication-title: IEEE Internet Things J. – volume: 10 start-page: 125 year: 2018 ident: b70 article-title: Network sentiment framework to improve security and privacy for smart home publication-title: Future Internet – volume: 98 start-page: 74 year: 2018 end-page: 88 ident: b93 article-title: What is wrong with topic modeling? And how to fix it using search-based software engineering publication-title: Inf. Softw. Technol. – volume: 33 start-page: 411 year: 2020 end-page: 432 ident: b124 article-title: The ethical limits of blockchain-enabled markets for private IoT data publication-title: Philos. Technol. – reference: M. De Choudhury, Y.R. Lin, H. Sundaram, K.S. Candan, L. Xie, A. Kelliher, How does the data sampling strategy impact the discovery of information diffusion in social media? in: Proceedings of the International AAAI Conference on Web and Social Media, Vol. 4, No. 1, 2010. – start-page: 1 year: 2019 end-page: 7 ident: b45 article-title: Challenges of privacy-preserving machine learning in iot publication-title: Proceedings of the First International Workshop on Challenges in Artificial Intelligence and Machine Learning for Internet of Things – volume: 349 start-page: 261 year: 2015 end-page: 266 ident: b82 article-title: Advances in natural language processing publication-title: Science – volume: 16 start-page: 1933 year: 2014 end-page: 1954 ident: b69 article-title: Survey in smart grid and smart home security: Issues, challenges and countermeasures publication-title: IEEE Commun. Surv. Tutor. – volume: 90 year: 2014 ident: b110 article-title: A survey on internet of things: Security and privacy issues publication-title: Int. J. Comput. Appl. – volume: 151 start-page: 495 year: 2020 end-page: 517 ident: b121 article-title: Deep learning and big data technologies for IoT security publication-title: Comput. Commun. – volume: 11 start-page: 519 year: 2019 ident: b84 article-title: A three-stage method for data text mining: Using UGC in business intelligence analysis publication-title: Symmetry – volume: 37 start-page: 71 year: 2018 end-page: 79 ident: b5 article-title: Smart IoT devices in the home: Security and privacy implications publication-title: IEEE Technol. Soc. Mag. – volume: 76 start-page: 405 year: 2012 end-page: 431 ident: b103 article-title: Affect, not ideologya social identity perspective on polarization publication-title: Public Opin. Q. – volume: 76 start-page: 18513 year: 2017 end-page: 18529 ident: b63 article-title: Cyvod: a novel trinity multimedia social network scheme publication-title: Multimedia Tools Appl. – volume: 22 start-page: 765 year: 2019 end-page: 797 ident: b98 article-title: Applying natural language processing capabilities in computerized textual analysis to measure organizational culture publication-title: Organ. Res. Methods – start-page: 1 year: 2020 end-page: 28 ident: b10 article-title: Shared digital identity and rich knowledge ties in global 3D printing - A drizzle in the clouds? publication-title: Glob. Strategy J. – volume: 16 start-page: 6092 year: 2020 end-page: 6102 ident: b43 article-title: A trustworthy privacy preserving framework for machine learning in industrial iot systems publication-title: IEEE Trans. Ind. Inf. – start-page: 96 year: 2021 end-page: 100 ident: b14 article-title: A study on privacy issues in internet of things (IoT) publication-title: 2021 IEEE 5th International Conference on Cryptography, Security and Privacy – start-page: 7459 year: 2006 end-page: 7462 ident: b73 article-title: Computer aided detection of SARS based on radiographs data mining publication-title: 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference – volume: 100 start-page: 2429 year: 2012 end-page: 2441 ident: b57 article-title: Home-assistant robot for an aging society publication-title: Proc. IEEE – volume: 7 start-page: 44 year: 2016 ident: b25 article-title: IoT privacy and security challenges for smart home environments publication-title: Information – volume: 3 start-page: 36 year: 2016 end-page: 45 ident: b46 article-title: The quest for privacy in the internet of things publication-title: IEEE Cloud Comput. – year: 2018 ident: b80 article-title: Content Analysis: An Introduction to Its Methodology – volume: 163 start-page: 1 year: 2019 end-page: 13 ident: b94 article-title: Experimental explorations on short text topic mining between LDA and NMF based schemes publication-title: Knowl.-Based Syst. – volume: 73 start-page: 229 year: 2016 end-page: 235 ident: b55 article-title: Retweeting beyond expectation: Inferring interestingness in Twitter publication-title: Comput. Commun. – year: 2019 ident: b21 article-title: A methodology to support the adoption of IoT innovation and its application to the Italian bank branch security context publication-title: Eur. J. Innov. Manag. – volume: 5 year: 2019 ident: b18 article-title: What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages? publication-title: J. Cybersecur. – volume: 78 start-page: 659 year: 2018 end-page: 676 ident: b125 article-title: Towards fog-driven IoT ehealth: Promises and challenges of IoT in medicine and healthcare publication-title: Future Gener. Comput. Syst. – volume: 55 start-page: 122 year: 2017 end-page: 129 ident: b62 article-title: Security and privacy in smart city applications: Challenges and solutions publication-title: IEEE Commun. Mag. – start-page: 90 year: 2015 end-page: 95 ident: b126 article-title: A lightweight authentication scheme for E-health applications in the context of internet of things publication-title: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies – start-page: 1 year: 2015 end-page: 2 ident: b39 article-title: Securing IoT for smart home system publication-title: 2015 International Symposium on Consumer Electronics – start-page: 745 year: 2013 ident: b107 article-title: The history of corpus linguistics publication-title: The Oxford Handbook of the History of Linguistics, Vol. 727 – start-page: 1144 year: 2013 end-page: 1151 ident: b30 article-title: Data management for internet of things: Challenges, approaches and opportunities publication-title: 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing – year: 2020 ident: b85 article-title: Enhancing optimized personalized therapy in clinical decision support system using natural language processing publication-title: J. King Saud Univ.-Comput. Inf. Sci. – volume: 7 year: 2019 ident: b99 article-title: Mapping consumer sentiment toward wireless services using geospatial twitter data publication-title: IEEE Access – year: 2020 ident: b44 article-title: Machine learning in IoT security: current solutions and future challenges publication-title: IEEE Commun. Surv. Tutor. – volume: 35 start-page: 515 year: 2020 end-page: 538 ident: b109 article-title: Real-manufacturing-oriented big data analysis and data value evaluation with domain knowledge publication-title: Comput. Statist. – start-page: 29 year: 2018 end-page: 40 ident: b24 article-title: Emerging trends in cloud computing, big data, fog computing, IoT and smart living publication-title: Technology for Smart Futures – volume: 17 start-page: 35 year: 2018 end-page: 46 ident: b58 article-title: Personalized privacy assistants for the internet of things: Providing users with notice and choice publication-title: IEEE Pervasive Comput. – volume: 154 start-page: 125 year: 2019 end-page: 138 ident: b34 article-title: ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices publication-title: J. Syst. Softw. – volume: 35 start-page: 399 year: 2009 end-page: 433 ident: b87 article-title: Recognizing contextual polarity: An exploration of features for phrase-level sentiment analysis publication-title: Comput. Linguist. – volume: 23 start-page: 856 year: 2010 end-page: 864 ident: b104 article-title: Online learning for latent dirichlet allocation publication-title: Adv. Neural Inf. Process. Syst. – volume: 58 year: 2021 ident: b16 article-title: Blockchain-based authentication and authorization for smart city applications publication-title: Inf. Process. Manage. – start-page: 127 year: 2018 end-page: 131 ident: b119 article-title: Iot application testing features based on the modelling network publication-title: IoT Application Testing Features Based on the Modelling Network. in 2018 XIV-Th International Conference on Perspective Technologies and Methods in MEMS Design – start-page: 1362 year: 2019 end-page: 1380 ident: b60 article-title: SoK: Security evaluation of home-based IoT deployments publication-title: 2019 IEEE Symposium on Security and Privacy – volume: 34 start-page: 125 year: 2018 end-page: 133 ident: b123 article-title: Data integration in IoT ecosystem: Information linkage as a privacy threat publication-title: Comput. Law Secur. Rev. – start-page: 819 year: 2012 end-page: 826 ident: b112 article-title: Privacy in the age of mobility and smart devices in smart homes publication-title: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing – year: 2020 ident: b48 article-title: Gaining legitimacy by being different: Optimal distinctiveness in crowdfunding platforms publication-title: Acad. Manag. J. – volume: 78 start-page: 15169 year: 2019 end-page: 15211 ident: b78 article-title: Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey publication-title: Multimedia Tools Appl. – volume: 100 year: 2021 ident: b4 article-title: Multiple features based approach for automatic fake news detection on social networks using deep learning publication-title: Appl. Soft Comput. – start-page: 561 year: 2016 end-page: 576 ident: b9 article-title: IoT-O, a core-domain IoT ontology to represent connected devices networks publication-title: European Knowledge Acquisition Workshop – volume: 1 start-page: 64 year: 2016 end-page: 75 ident: b36 article-title: Internet of things data protection and privacy in the era of the General Data Protection Regulation publication-title: J. Data Protect. Priv. – start-page: 6 year: 2020 ident: b61 article-title: A case study of the security vetting process of smart-home assistant applications publication-title: IEEE Security and Privacy Workshops – volume: 30 start-page: 411 year: 2004 end-page: 433 ident: b75 article-title: Reliability in content analysis: Some common misconceptions and recommendations publication-title: Hum. Commun. Res. – volume: 76 start-page: 146 year: 2015 end-page: 164 ident: b27 article-title: Security, privacy and trust in Internet of Things: The road ahead publication-title: Comput. Netw. – volume: 73 start-page: 301 year: 2016 end-page: 314 ident: b65 article-title: Twitter in academic events: A study of temporal usage, communication, sentimental and topical patterns in 16 computer science conferences publication-title: Comput. Commun. – start-page: 1 year: 2017 end-page: 9 ident: b90 article-title: Combining speech-based and linguistic classifiers to recognize emotion in user spoken utterances publication-title: Neurocomputing – start-page: 230 year: 2014 end-page: 234 ident: b20 article-title: IoT security: ongoing challenges and research opportunities publication-title: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications – volume: 66 start-page: 9381 year: 2017 end-page: 9393 ident: b118 article-title: An accurate security game for low-resource IoT devices publication-title: IEEE Trans. Veh. Technol. – volume: 129 start-page: 271 year: 2021 end-page: 281 ident: b53 article-title: Ethical Design in Social Media: Assessing the main performance measurements of user online behavior modification publication-title: J. Bus. Res. – reference: A. Alamsyah, W. Rizkika, D.D.A. Nugroho, F. Renaldi, S. Saadah, Dynamic large scale data on twitter using sentiment analysis and topic modeling, in: 2018 6th International Conference on Information and Communication Technology, ICoICT, 2018, pp. 254–258. – start-page: 347 year: 2005 end-page: 354 ident: b88 article-title: Recognizing contextual polarity in phrase-level sentiment analysis publication-title: Proceedings of human language technology conference and conference on empirical methods in natural language processing – volume: 68 year: 2020 ident: b111 article-title: Security and privacy concerns of the ‘Internet of Things’(IoT) in IT and its help in the various sectors across the world publication-title: Int. J. Comput. Trends Technol. – volume: 3 start-page: 37 year: 2016 end-page: 47 ident: b77 article-title: Text mining: open-source tokenization tools-an analysis publication-title: Adv. Comput. Intell. Int. J. – volume: 15 start-page: 73 year: 2017 end-page: 76 ident: b26 article-title: The last mile for IoT privacy publication-title: IEEE Secur. Priv. – start-page: 67 year: 2009 end-page: 82 ident: b92 article-title: Topic significance ranking of LDA generative models publication-title: Joint European Conference on Machine Learning and Knowledge Discovery in Databases – volume: 29 start-page: 1589 year: 2019 end-page: 1616 ident: b68 article-title: Challenges for adopting and implementing IoT in smart cities: An integrated MICMAC-ISM approach publication-title: Internet Res. – volume: 76 start-page: 540 year: 2017 end-page: 549 ident: b29 article-title: Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation publication-title: Future Gener. Comput. Syst. – reference: K.L. Liu, W.J. Li, M. Guo, Emoticon smoothed language models for twitter sentiment analysis, in: Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 26, No. 1, 2012, July. – volume: 148 start-page: 340 year: 2019 end-page: 348 ident: b33 article-title: Privacy-preserving raw data collection without a trusted authority for IoT publication-title: Comput. Netw. – volume: 117 start-page: 161 year: 2017 end-page: 168 ident: b91 article-title: SOUKHRIA: towards an irony detection system for arabic in social media publication-title: Procedia Comput. Sci. – volume: 10 start-page: 4102 year: 2020 ident: b15 article-title: IoT privacy and security: Challenges and solutions publication-title: Appl. Sci. – reference: M.W. Wu, K.Y. Su, Corpus-based automatic compound extraction with mutual information and relative frequency count, in: Proceedings of Rocling VI Computational Linguistics Conference VI, 1993, pp. 207–216. – volume: 6 year: 2016 ident: b22 article-title: Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges publication-title: Int. J. Eng. Sci. Comput. – volume: 7 start-page: 10111 year: 2020 end-page: 10119 ident: b19 article-title: Twenty-one key factors to choose an iot platform: Theoretical framework and its applications publication-title: IEEE Internet Things J. – volume: 38 start-page: 9 year: 2010 end-page: 395 ident: b13 article-title: An overview of privacy and security issues in the internet of things publication-title: Internet Things – volume: 145 start-page: 438 year: 2019 end-page: 460 ident: b50 article-title: Polarization and acculturation in US election 2016 outcomes – Can Twitter analytics predict changes in voting preferences publication-title: Technol. Forecast. Soc. Change – volume: 77 start-page: 4829 year: 2018 end-page: 4861 ident: b31 article-title: XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud publication-title: Multimedia Tools Appl. – volume: 2021 year: 2021 ident: b6 article-title: The impact of digitalization on organizations - A review of the empirical literature publication-title: Int. J. Entrepreneurial Ventur. – volume: 54 year: 2020 ident: b100 article-title: Exploring key indicators of social identity in the #metoo era: Using discourse analysis in UGC publication-title: Int. J. Inf. Manage. – volume: 44 start-page: 51 year: 2011 end-page: 58 ident: b59 article-title: Securing the internet of things publication-title: Computer – reference: F. Kawsar, A.B. Brush, Home computing unplugged: why, where and when people use different connected devices at home, in: Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing, 2013, September, pp. 627–636. – volume: 32 start-page: 4 year: 2016 end-page: 15 ident: b28 article-title: The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective publication-title: Comput. Law Secur. Rev. – volume: 98 start-page: 161 year: 2021 end-page: 178 ident: b64 article-title: Setting B2B Digital Marketing in Artificial Intelligence-based CRMs: A review and directions for future research publication-title: Industrial Marketing Management – volume: 154 start-page: 129 year: 2020 end-page: 137 ident: b54 article-title: Social media sentiment analysis through parallel dilated convolutional neural network for smart city applications publication-title: Comput. Commun. – volume: 54 start-page: 1187 year: 2016 end-page: 1230 ident: b97 article-title: Textual analysis in accounting and finance: A survey publication-title: J. Account. Res. – volume: 44 start-page: 2909 year: 2018 end-page: 2933 ident: b72 article-title: What doesn’t get measured does exist: Improving the accuracy of computer-aided text analysis publication-title: J. Manag. – year: 2016 ident: b86 article-title: Natural Language Processing: Python and NLTK – year: 2020 ident: b96 article-title: DST-HRS: A topic driven hybrid recommender system based on deep semantics publication-title: Comput. Commun. – volume: 167 year: 2021 ident: b2 article-title: Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy publication-title: Technol. Forecast. Soc. Change – start-page: 175 year: 2018 end-page: 178 ident: b11 article-title: Analysis of security and privacy challenges in Internet of Things publication-title: 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies – volume: 97 start-page: 379 year: 2019 end-page: 386 ident: b127 article-title: Performance evaluation of a Fog-assisted IoT solution for e-Health applications publication-title: Future Gener. Comput. Syst. – volume: 56 start-page: 14 year: 2018 end-page: 18 ident: b41 article-title: Security and privacy in the age of the smart internet of things: An overview from a networking perspective publication-title: IEEE Commun. Mag. – volume: 15 start-page: 263 year: 2012 end-page: 287 ident: b71 article-title: Taming textual data: The contribution of corpus linguistics to computer-aided text analysis publication-title: Organ. Res. Methods – volume: 102 start-page: 14 year: 2018 end-page: 22 ident: b115 article-title: Future developments in cyber risk assessment for the internet of things publication-title: Comput. Ind. – volume: 5 start-page: 1 year: 2016 end-page: 29 ident: b76 article-title: Sentibench-a benchmark comparison of state-of-the-practice sentiment analysis methods publication-title: EPJ Data Sci. – volume: 18 start-page: 1602 year: 2018 ident: b120 article-title: Integrated method for personal thermal comfort assessment and optimization through users’ feedback, IoT and machine learning: a case study publication-title: Sensors – start-page: 685 year: 2008 end-page: 690 ident: b17 article-title: Assessing the impact of individual sensor reliability within smart living environments publication-title: 2008 IEEE International Conference on Automation Science and Engineering – volume: 13 start-page: 320 year: 2010 end-page: 347 ident: b47 article-title: Construct validation using computer-aided text analysis (CATA) an illustration using entrepreneurial orientation publication-title: Organ. Res. Methods – start-page: 212 year: 2014 end-page: 216 ident: b52 article-title: Twitter sentiment analysis publication-title: Proceedings of the 6th International Conference on Information Technology and Multimedia – volume: 2 start-page: 1224 year: 2019 end-page: 1231 ident: b89 article-title: Inferring advertiser sentiment in online articles using Wikipedia footnotes publication-title: Adv. Intell. Syst. Comput. – volume: 13 start-page: 519 year: 2019 end-page: 528 ident: b3 article-title: Digital innovation and venturing: An introduction into the digitalization of entrepreneurship publication-title: Rev. Manag. Sci. – volume: 6 start-page: 92 year: 2021 end-page: 102 ident: b12 article-title: Using data sciences in digital marketing: Framework, methods, and performance metrics publication-title: J. Innov. Knowl. – start-page: 309 year: 2012 end-page: 348 ident: b117 article-title: Identity authentication and capability-based access control (iacac) for the internet of things publication-title: J. Cyber Secur. Mobil. – volume: 97 start-page: 512 year: 2019 end-page: 529 ident: b32 article-title: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions publication-title: Future Gener. Comput. Syst. – volume: 32 year: 2020 ident: b35 article-title: An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols publication-title: Concurr. Comput.: Pract. Exper. – volume: 2 year: 2017 ident: b38 article-title: A survey of IoT security: Risks, requirements, trends, and key technologies publication-title: J. Ind. Integr. Manag. – volume: 98 start-page: 660 year: 2019 end-page: 671 ident: b37 article-title: Economic perspective analysis of protecting big data security and privacy publication-title: Future Gener. Comput. Syst. – reference: G. Bouma, Normalized (pointwise) mutual information in collocation extraction, in: Proceedings of GSCL, 2009, pp. 31–40. – volume: 6 start-page: 510 year: 2019 end-page: 527 ident: b83 article-title: Sentiment analysis of Twitter data using Python publication-title: Int. Res. J. Eng. Technol. – start-page: 172 year: 2016 end-page: 175 ident: b113 article-title: On privacy and security challenges in smart connected homes publication-title: 2016 European Intelligence and Security Informatics Conference – start-page: 1 year: 2000 end-page: 6 ident: b105 article-title: Comparing corpora using frequency profiling publication-title: The Workshop on Comparing Corpora – start-page: 171 year: 2019 end-page: 191 ident: b116 article-title: Security challenges in IoT cyber world publication-title: Security in Smart Cities: Models, Applications, and Challenges – start-page: 561 year: 2016 end-page: 576 ident: b1 article-title: IoT-O, a core-domain IoT ontology to represent connected devices networks publication-title: European Knowledge Acquisition Workshop – year: 2020 ident: b56 article-title: Privacy expectations and preferences in an IoT world, 15 – volume: 9 start-page: 17 year: 2020 end-page: 25 ident: b8 article-title: Consumer IoT: Security vulnerability case studies and solutions publication-title: IEEE Consum. Electron. Mag. – volume: 27 start-page: 1 year: 2019 end-page: 39 ident: b122 article-title: Confident privacy decision-making in IoT environments publication-title: ACM Trans. Comput.-Hum. Interact. – year: 2020 ident: b40 article-title: Systematically quantifying IoT privacy leakage in mobile networks publication-title: IEEE Internet Things J. – start-page: 148 year: 2016 end-page: 153 ident: b66 article-title: Sentiment analysis of Twitter data: Case study on digital India publication-title: 2016 International Conference on Information Technology (InCITe) - the Next Generation IT Summit on the Theme - Internet of Things: Connect Your Worlds – volume: 4 start-page: 75 year: 2016 end-page: 87 ident: b114 article-title: IoT-based big data storage systems in cloud computing: perspectives and challenges publication-title: IEEE Internet Things J. – year: 2021 ident: b23 article-title: Entrepreneurial ecosystems in an interconnected world: Emergence, governance, and digitalization publication-title: Rev. Manag. Sci. – volume: 60 start-page: 539 year: 2009 end-page: 550 ident: b74 article-title: The future of computer-aided innovation publication-title: Comput. Ind. – start-page: 212 year: 2014 ident: 10.1016/j.comcom.2021.08.021_b52 article-title: Twitter sentiment analysis – volume: 163 start-page: 1 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b94 article-title: Experimental explorations on short text topic mining between LDA and NMF based schemes publication-title: Knowl.-Based Syst. doi: 10.1016/j.knosys.2018.08.011 – volume: 54 start-page: 1187 issue: 4 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b97 article-title: Textual analysis in accounting and finance: A survey publication-title: J. Account. Res. doi: 10.1111/1475-679X.12123 – volume: 10 start-page: 125 issue: 12 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b70 article-title: Network sentiment framework to improve security and privacy for smart home publication-title: Future Internet doi: 10.3390/fi10120125 – volume: 154 start-page: 125 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b34 article-title: ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2019.04.058 – volume: 25 start-page: 371 issue: 3 year: 2004 ident: 10.1016/j.comcom.2021.08.021_b106 article-title: If you look at …: Lexical bundles in university teaching and textbooks publication-title: Appl. Linguist. doi: 10.1093/applin/25.3.371 – volume: 7 start-page: 10111 issue: 10 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b19 article-title: Twenty-one key factors to choose an iot platform: Theoretical framework and its applications publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.3000056 – start-page: 1144 year: 2013 ident: 10.1016/j.comcom.2021.08.021_b30 article-title: Data management for internet of things: Challenges, approaches and opportunities – volume: 76 start-page: 18513 issue: 18 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b63 article-title: Cyvod: a novel trinity multimedia social network scheme publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-4162-z – start-page: 96 year: 2021 ident: 10.1016/j.comcom.2021.08.021_b14 article-title: A study on privacy issues in internet of things (IoT) – volume: 73 start-page: 229 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b55 article-title: Retweeting beyond expectation: Inferring interestingness in Twitter publication-title: Comput. Commun. doi: 10.1016/j.comcom.2015.07.016 – start-page: 1292 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b42 article-title: Security and privacy issues for an IoT based smart home – volume: 10 issue: 1 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b79 article-title: Topic modeling in sentiment analysis: A systematic review publication-title: J. ICT Res. Appl. doi: 10.5614/itbj.ict.res.appl.2016.10.1.6 – volume: 66 start-page: 9381 issue: 10 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b118 article-title: An accurate security game for low-resource IoT devices publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2017.2701551 – start-page: 7459 year: 2006 ident: 10.1016/j.comcom.2021.08.021_b73 article-title: Computer aided detection of SARS based on radiographs data mining – year: 2019 ident: 10.1016/j.comcom.2021.08.021_b21 article-title: A methodology to support the adoption of IoT innovation and its application to the Italian bank branch security context publication-title: Eur. J. Innov. Manag. doi: 10.1108/EJIM-03-2018-0058 – ident: 10.1016/j.comcom.2021.08.021_b81 doi: 10.1609/icwsm.v4i1.14024 – volume: 38 start-page: 9 year: 2010 ident: 10.1016/j.comcom.2021.08.021_b13 article-title: An overview of privacy and security issues in the internet of things publication-title: Internet Things – start-page: 90 year: 2015 ident: 10.1016/j.comcom.2021.08.021_b126 article-title: A lightweight authentication scheme for E-health applications in the context of internet of things – volume: 97 start-page: 512 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b32 article-title: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.02.060 – volume: 76 start-page: 405 issue: 3 year: 2012 ident: 10.1016/j.comcom.2021.08.021_b103 article-title: Affect, not ideologya social identity perspective on polarization publication-title: Public Opin. Q. doi: 10.1093/poq/nfs038 – volume: 17 start-page: 35 issue: 3 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b58 article-title: Personalized privacy assistants for the internet of things: Providing users with notice and choice publication-title: IEEE Pervasive Comput. doi: 10.1109/MPRV.2018.03367733 – volume: 23 start-page: 856 year: 2010 ident: 10.1016/j.comcom.2021.08.021_b104 article-title: Online learning for latent dirichlet allocation publication-title: Adv. Neural Inf. Process. Syst. – start-page: 1 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b90 article-title: Combining speech-based and linguistic classifiers to recognize emotion in user spoken utterances publication-title: Neurocomputing – volume: 7 start-page: 44 issue: 3 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b25 article-title: IoT privacy and security challenges for smart home environments publication-title: Information doi: 10.3390/info7030044 – volume: 117 start-page: 161 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b91 article-title: SOUKHRIA: towards an irony detection system for arabic in social media publication-title: Procedia Comput. Sci. doi: 10.1016/j.procs.2017.10.105 – volume: 54 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b100 article-title: Exploring key indicators of social identity in the #metoo era: Using discourse analysis in UGC publication-title: Int. J. Inf. Manage. doi: 10.1016/j.ijinfomgt.2020.102129 – volume: 16 start-page: 6092 issue: 9 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b43 article-title: A trustworthy privacy preserving framework for machine learning in industrial iot systems publication-title: IEEE Trans. Ind. Inf. doi: 10.1109/TII.2020.2974555 – volume: 6 start-page: 510 issue: 3 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b83 article-title: Sentiment analysis of Twitter data using Python publication-title: Int. Res. J. Eng. Technol. – start-page: 1 year: 2015 ident: 10.1016/j.comcom.2021.08.021_b39 article-title: Securing IoT for smart home system – volume: 9 start-page: 17 issue: 2 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b8 article-title: Consumer IoT: Security vulnerability case studies and solutions publication-title: IEEE Consum. Electron. Mag. doi: 10.1109/MCE.2019.2953740 – volume: 167 year: 2021 ident: 10.1016/j.comcom.2021.08.021_b2 article-title: Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy publication-title: Technol. Forecast. Soc. Change doi: 10.1016/j.techfore.2021.120681 – volume: 78 start-page: 659 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b125 article-title: Towards fog-driven IoT ehealth: Promises and challenges of IoT in medicine and healthcare publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.04.036 – volume: 129 start-page: 271 year: 2021 ident: 10.1016/j.comcom.2021.08.021_b53 article-title: Ethical Design in Social Media: Assessing the main performance measurements of user online behavior modification publication-title: J. Bus. Res. doi: 10.1016/j.jbusres.2021.03.001 – volume: 102 start-page: 14 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b115 article-title: Future developments in cyber risk assessment for the internet of things publication-title: Comput. Ind. doi: 10.1016/j.compind.2018.08.002 – start-page: 685 year: 2008 ident: 10.1016/j.comcom.2021.08.021_b17 article-title: Assessing the impact of individual sensor reliability within smart living environments – volume: 60 start-page: 539 issue: 8 year: 2009 ident: 10.1016/j.comcom.2021.08.021_b74 article-title: The future of computer-aided innovation publication-title: Comput. Ind. doi: 10.1016/j.compind.2009.05.010 – volume: 6 start-page: 1606 issue: 2 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b108 article-title: The effect of iot new features on security and privacy: New threats, existing solutions, and challenges yet to be solved publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2018.2847733 – start-page: 819 year: 2012 ident: 10.1016/j.comcom.2021.08.021_b112 article-title: Privacy in the age of mobility and smart devices in smart homes – start-page: 1 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b10 article-title: Shared digital identity and rich knowledge ties in global 3D printing - A drizzle in the clouds? publication-title: Glob. Strategy J. – start-page: 171 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b116 article-title: Security challenges in IoT cyber world – volume: 4 start-page: 75 issue: 1 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b114 article-title: IoT-based big data storage systems in cloud computing: perspectives and challenges publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2016.2619369 – volume: 5 issue: 1 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b18 article-title: What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages? publication-title: J. Cybersecur. doi: 10.1093/cybsec/tyz005 – volume: 73 start-page: 301 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b65 article-title: Twitter in academic events: A study of temporal usage, communication, sentimental and topical patterns in 16 computer science conferences publication-title: Comput. Commun. doi: 10.1016/j.comcom.2015.07.001 – year: 2020 ident: 10.1016/j.comcom.2021.08.021_b85 article-title: Enhancing optimized personalized therapy in clinical decision support system using natural language processing publication-title: J. King Saud Univ.-Comput. Inf. Sci. – start-page: 309 year: 2012 ident: 10.1016/j.comcom.2021.08.021_b117 article-title: Identity authentication and capability-based access control (iacac) for the internet of things publication-title: J. Cyber Secur. Mobil. – year: 2020 ident: 10.1016/j.comcom.2021.08.021_b96 article-title: DST-HRS: A topic driven hybrid recommender system based on deep semantics publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.02.068 – volume: 92 start-page: 273 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b49 article-title: Willingness to provide personal information: Perspective of privacy calculus in IoT services publication-title: Comput. Hum. Behav. doi: 10.1016/j.chb.2018.11.022 – start-page: 6 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b61 article-title: A case study of the security vetting process of smart-home assistant applications – volume: 90 issue: 11 year: 2014 ident: 10.1016/j.comcom.2021.08.021_b110 article-title: A survey on internet of things: Security and privacy issues publication-title: Int. J. Comput. Appl. – volume: 27 start-page: 1 issue: 1 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b122 article-title: Confident privacy decision-making in IoT environments publication-title: ACM Trans. Comput.-Hum. Interact. doi: 10.1145/3364223 – volume: 6 issue: 5 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b22 article-title: Internet of things-IOT: definition, characteristics, architecture, enabling technologies, application & future challenges publication-title: Int. J. Eng. Sci. Comput. – volume: 34 start-page: 125 issue: 1 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b123 article-title: Data integration in IoT ecosystem: Information linkage as a privacy threat publication-title: Comput. Law Secur. Rev. doi: 10.1016/j.clsr.2017.06.007 – volume: 30 start-page: 411 issue: 3 year: 2004 ident: 10.1016/j.comcom.2021.08.021_b75 article-title: Reliability in content analysis: Some common misconceptions and recommendations publication-title: Hum. Commun. Res. – start-page: 172 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b113 article-title: On privacy and security challenges in smart connected homes – volume: 35 start-page: 515 issue: 2 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b109 article-title: Real-manufacturing-oriented big data analysis and data value evaluation with domain knowledge publication-title: Comput. Statist. doi: 10.1007/s00180-019-00919-6 – start-page: 1 year: 2000 ident: 10.1016/j.comcom.2021.08.021_b105 article-title: Comparing corpora using frequency profiling – year: 2018 ident: 10.1016/j.comcom.2021.08.021_b80 – volume: 11 start-page: 519 issue: 4 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b84 article-title: A three-stage method for data text mining: Using UGC in business intelligence analysis publication-title: Symmetry doi: 10.3390/sym11040519 – volume: 2 start-page: 1224 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b89 article-title: Inferring advertiser sentiment in online articles using Wikipedia footnotes publication-title: Adv. Intell. Syst. Comput. – start-page: 347 year: 2005 ident: 10.1016/j.comcom.2021.08.021_b88 article-title: Recognizing contextual polarity in phrase-level sentiment analysis – volume: 32 start-page: 4 issue: 1 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b28 article-title: The Internet of Things (IoT) and its impact on individual privacy: An Australian perspective publication-title: Comput. Law Secur. Rev. doi: 10.1016/j.clsr.2015.12.001 – volume: 151 start-page: 495 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b121 article-title: Deep learning and big data technologies for IoT security publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.01.016 – volume: 37 start-page: 71 issue: 2 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b5 article-title: Smart IoT devices in the home: Security and privacy implications publication-title: IEEE Technol. Soc. Mag. doi: 10.1109/MTS.2018.2826079 – volume: 55 start-page: 122 issue: 1 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b62 article-title: Security and privacy in smart city applications: Challenges and solutions publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2017.1600267CM – volume: 2 issue: 02 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b38 article-title: A survey of IoT security: Risks, requirements, trends, and key technologies publication-title: J. Ind. Integr. Manag. – ident: 10.1016/j.comcom.2021.08.021_b67 doi: 10.1609/aaai.v26i1.8353 – volume: 100 start-page: 2429 issue: 8 year: 2012 ident: 10.1016/j.comcom.2021.08.021_b57 article-title: Home-assistant robot for an aging society publication-title: Proc. IEEE doi: 10.1109/JPROC.2012.2200563 – volume: 33 start-page: 411 issue: 3 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b124 article-title: The ethical limits of blockchain-enabled markets for private IoT data publication-title: Philos. Technol. doi: 10.1007/s13347-019-00361-y – volume: 77 start-page: 4829 issue: 4 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b31 article-title: XSS-secure as a service for the platforms of online social network-based multimedia web applications in cloud publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-016-3735-1 – volume: 6 start-page: 92 issue: 2 year: 2021 ident: 10.1016/j.comcom.2021.08.021_b12 article-title: Using data sciences in digital marketing: Framework, methods, and performance metrics publication-title: J. Innov. Knowl. doi: 10.1016/j.jik.2020.08.001 – ident: 10.1016/j.comcom.2021.08.021_b51 doi: 10.1109/ICoICT.2018.8528776 – volume: 44 start-page: 51 issue: 9 year: 2011 ident: 10.1016/j.comcom.2021.08.021_b59 article-title: Securing the internet of things publication-title: Computer doi: 10.1109/MC.2011.291 – ident: 10.1016/j.comcom.2021.08.021_b7 doi: 10.1145/2493432.2493494 – volume: 349 start-page: 261 issue: 6245 year: 2015 ident: 10.1016/j.comcom.2021.08.021_b82 article-title: Advances in natural language processing publication-title: Science doi: 10.1126/science.aaa8685 – volume: 10 start-page: 4102 issue: 12 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b15 article-title: IoT privacy and security: Challenges and solutions publication-title: Appl. Sci. doi: 10.3390/app10124102 – volume: 16 start-page: 1933 issue: 4 year: 2014 ident: 10.1016/j.comcom.2021.08.021_b69 article-title: Survey in smart grid and smart home security: Issues, challenges and countermeasures publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2014.2320093 – start-page: 175 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b11 article-title: Analysis of security and privacy challenges in Internet of Things – start-page: 745 year: 2013 ident: 10.1016/j.comcom.2021.08.021_b107 article-title: The history of corpus linguistics – volume: 18 start-page: 1602 issue: 5 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b120 article-title: Integrated method for personal thermal comfort assessment and optimization through users’ feedback, IoT and machine learning: a case study publication-title: Sensors doi: 10.3390/s18051602 – year: 2020 ident: 10.1016/j.comcom.2021.08.021_b40 article-title: Systematically quantifying IoT privacy leakage in mobile networks publication-title: IEEE Internet Things J. – volume: 15 start-page: 73 issue: 6 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b26 article-title: The last mile for IoT privacy publication-title: IEEE Secur. Priv. doi: 10.1109/MSP.2017.4251118 – volume: 29 start-page: 1589 issue: 6 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b68 article-title: Challenges for adopting and implementing IoT in smart cities: An integrated MICMAC-ISM approach publication-title: Internet Res. doi: 10.1108/INTR-06-2018-0252 – start-page: 67 year: 2009 ident: 10.1016/j.comcom.2021.08.021_b92 article-title: Topic significance ranking of LDA generative models – volume: 56 start-page: 14 issue: 9 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b41 article-title: Security and privacy in the age of the smart internet of things: An overview from a networking perspective publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2018.1701204 – volume: 13 start-page: 320 issue: 2 year: 2010 ident: 10.1016/j.comcom.2021.08.021_b47 article-title: Construct validation using computer-aided text analysis (CATA) an illustration using entrepreneurial orientation publication-title: Organ. Res. Methods doi: 10.1177/1094428109335949 – volume: 5 start-page: 1 issue: 1 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b76 article-title: Sentibench-a benchmark comparison of state-of-the-practice sentiment analysis methods publication-title: EPJ Data Sci. doi: 10.1140/epjds/s13688-016-0085-1 – ident: 10.1016/j.comcom.2021.08.021_b102 – volume: 58 issue: 2 year: 2021 ident: 10.1016/j.comcom.2021.08.021_b16 article-title: Blockchain-based authentication and authorization for smart city applications publication-title: Inf. Process. Manage. doi: 10.1016/j.ipm.2020.102468 – volume: 154 start-page: 129 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b54 article-title: Social media sentiment analysis through parallel dilated convolutional neural network for smart city applications publication-title: Comput. Commun. doi: 10.1016/j.comcom.2020.02.044 – volume: 3 start-page: 37 issue: 1 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b77 article-title: Text mining: open-source tokenization tools-an analysis publication-title: Adv. Comput. Intell. Int. J. – volume: 76 start-page: 146 year: 2015 ident: 10.1016/j.comcom.2021.08.021_b27 article-title: Security, privacy and trust in Internet of Things: The road ahead publication-title: Comput. Netw. doi: 10.1016/j.comnet.2014.11.008 – volume: 35 start-page: 399 issue: 3 year: 2009 ident: 10.1016/j.comcom.2021.08.021_b87 article-title: Recognizing contextual polarity: An exploration of features for phrase-level sentiment analysis publication-title: Comput. Linguist. doi: 10.1162/coli.08-012-R1-06-90 – start-page: 148 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b66 article-title: Sentiment analysis of Twitter data: Case study on digital India – start-page: 561 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b1 article-title: IoT-O, a core-domain IoT ontology to represent connected devices networks – volume: 44 start-page: 2909 issue: 7 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b72 article-title: What doesn’t get measured does exist: Improving the accuracy of computer-aided text analysis publication-title: J. Manag. – volume: 2021 year: 2021 ident: 10.1016/j.comcom.2021.08.021_b6 article-title: The impact of digitalization on organizations - A review of the empirical literature publication-title: Int. J. Entrepreneurial Ventur. – start-page: 1 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b45 article-title: Challenges of privacy-preserving machine learning in iot – volume: 32 issue: 21 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b35 article-title: An overview of Internet of Things (IoT): Architectural aspects, challenges, and protocols publication-title: Concurr. Comput.: Pract. Exper. doi: 10.1002/cpe.4946 – volume: 13 start-page: 519 issue: 3 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b3 article-title: Digital innovation and venturing: An introduction into the digitalization of entrepreneurship publication-title: Rev. Manag. Sci. doi: 10.1007/s11846-019-00333-8 – volume: 3 start-page: 36 issue: 2 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b46 article-title: The quest for privacy in the internet of things publication-title: IEEE Cloud Comput. doi: 10.1109/MCC.2016.28 – volume: 1 start-page: 64 issue: 1 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b36 article-title: Internet of things data protection and privacy in the era of the General Data Protection Regulation publication-title: J. Data Protect. Priv. doi: 10.69554/TBRU2322 – volume: 145 start-page: 438 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b50 article-title: Polarization and acculturation in US election 2016 outcomes – Can Twitter analytics predict changes in voting preferences publication-title: Technol. Forecast. Soc. Change doi: 10.1016/j.techfore.2018.09.009 – year: 2016 ident: 10.1016/j.comcom.2021.08.021_b86 – year: 2020 ident: 10.1016/j.comcom.2021.08.021_b44 article-title: Machine learning in IoT security: current solutions and future challenges publication-title: IEEE Commun. Surv. Tutor. – volume: 98 start-page: 660 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b37 article-title: Economic perspective analysis of protecting big data security and privacy publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.03.042 – start-page: 230 year: 2014 ident: 10.1016/j.comcom.2021.08.021_b20 article-title: IoT security: ongoing challenges and research opportunities – start-page: 1362 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b60 article-title: SoK: Security evaluation of home-based IoT deployments – volume: 148 start-page: 340 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b33 article-title: Privacy-preserving raw data collection without a trusted authority for IoT publication-title: Comput. Netw. doi: 10.1016/j.comnet.2018.11.028 – volume: 15 start-page: 263 issue: 2 year: 2012 ident: 10.1016/j.comcom.2021.08.021_b71 article-title: Taming textual data: The contribution of corpus linguistics to computer-aided text analysis publication-title: Organ. Res. Methods doi: 10.1177/1094428111417451 – volume: 98 start-page: 161 year: 2021 ident: 10.1016/j.comcom.2021.08.021_b64 article-title: Setting B2B Digital Marketing in Artificial Intelligence-based CRMs: A review and directions for future research publication-title: Industrial Marketing Management doi: 10.1016/j.indmarman.2021.08.006 – volume: 22 start-page: 765 issue: 3 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b98 article-title: Applying natural language processing capabilities in computerized textual analysis to measure organizational culture publication-title: Organ. Res. Methods doi: 10.1177/1094428117745648 – volume: 78 start-page: 15169 issue: 11 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b78 article-title: Latent Dirichlet allocation (LDA) and topic modeling: models, applications, a survey publication-title: Multimedia Tools Appl. doi: 10.1007/s11042-018-6894-4 – volume: 68 issue: 4 year: 2020 ident: 10.1016/j.comcom.2021.08.021_b111 article-title: Security and privacy concerns of the ‘Internet of Things’(IoT) in IT and its help in the various sectors across the world publication-title: Int. J. Comput. Trends Technol. doi: 10.14445/22312803/IJCTT-V68I4P142 – start-page: 29 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b24 article-title: Emerging trends in cloud computing, big data, fog computing, IoT and smart living – volume: 100 year: 2021 ident: 10.1016/j.comcom.2021.08.021_b4 article-title: Multiple features based approach for automatic fake news detection on social networks using deep learning publication-title: Appl. Soft Comput. doi: 10.1016/j.asoc.2020.106983 – start-page: 127 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b119 article-title: Iot application testing features based on the modelling network – volume: 97 start-page: 379 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b127 article-title: Performance evaluation of a Fog-assisted IoT solution for e-Health applications publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.02.055 – volume: 3 start-page: 993 issue: Jan year: 2003 ident: 10.1016/j.comcom.2021.08.021_b95 article-title: Latent dirichlet allocation publication-title: J. Mach. Learn. Res. – start-page: 561 year: 2016 ident: 10.1016/j.comcom.2021.08.021_b9 article-title: IoT-O, a core-domain IoT ontology to represent connected devices networks – volume: 7 year: 2019 ident: 10.1016/j.comcom.2021.08.021_b99 article-title: Mapping consumer sentiment toward wireless services using geospatial twitter data publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2935200 – year: 2020 ident: 10.1016/j.comcom.2021.08.021_b56 – year: 2020 ident: 10.1016/j.comcom.2021.08.021_b48 article-title: Gaining legitimacy by being different: Optimal distinctiveness in crowdfunding platforms publication-title: Acad. Manag. J. – year: 2021 ident: 10.1016/j.comcom.2021.08.021_b23 article-title: Entrepreneurial ecosystems in an interconnected world: Emergence, governance, and digitalization publication-title: Rev. Manag. Sci. doi: 10.1007/s11846-021-00444-1 – ident: 10.1016/j.comcom.2021.08.021_b101 – volume: 98 start-page: 74 year: 2018 ident: 10.1016/j.comcom.2021.08.021_b93 article-title: What is wrong with topic modeling? And how to fix it using search-based software engineering publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2018.02.005 – volume: 76 start-page: 540 year: 2017 ident: 10.1016/j.comcom.2021.08.021_b29 article-title: Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2017.03.001 |
SSID | ssj0004773 |
Score | 2.5089936 |
Snippet | In present-day in consumers’ homes, there are millions of Internet-connected devices that are known to jointly represent the Internet of Things (IoT). The... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 285 |
SubjectTerms | Data mining Home assistant IoT Sentiment analysis UGC |
Title | Using data mining techniques to explore security issues in smart living environments in Twitter |
URI | https://dx.doi.org/10.1016/j.comcom.2021.08.021 |
Volume | 179 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELZKu8CAeIryqDywhjZ2YidjVVEVEJ1aqZsVO7YU1KYVCWLjt-NLnFIkBBLZ8rgoOTvnc_x99yF0G_p2uhbGgaeYnekEUmovMYR5if3IDZNhlPrAHX6essk8eFyEixYaNVwYgFW62F_H9CpauyN9583-Jsv6FSyJMiBq2p5JQGm4Q2jMwjbqDB-eJtMveiSvF5oByQgGDYOugnnZ2wNshNixrqrlSfyfR6idUWd8hA5duoiH9RMdo5bOT9DBThHBUySqVX8MUE-8quQe8LYwa4HLNdYVzE7jwknV4crXBc5yXKzsu-JlBn8V8C7nDU7O3jOg-pyh-fh-Npp4TjbBUzabKr04JcakiQm4IVDQL9ZExUbxlMoksBthRicmBKXz2LaUTwY8oTw1RPoDmUSSnqN2vs71BcIyVZRRrQxRJOA6kkZpllIVR1yaNCBdRBtXCeVqioO0xVI04LEXUTtYgIMFKF4Sv4u8rdWmrqnxx_W8aQXxrW8IG_Z_tbz8t-UV2oe9mnV4jdrl65u-selHKXto7-7D77lO9gll6t21 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV07T8MwELaqMgAD4inK0wNraGM7cTKiiqpA26mVulmxY0tBJa1IEBu_HZ-TlCIhkMgY-6Lk7Jxf33cfQjeBb5drQcw8FdqVDpNSe4khoZfYn9yEMohSH7jD40k4nLHHeTBvoX7DhQFYZR37q5juonV9p1t7s7vKsq6DJdEQiJq2ZxJQGt5iAeWA67v9-MJ5MF4dMwOOEao3_DkH8rIPB9AIsSOdy-RJ_J_Hp40xZ7CP9urJIr6r3ucAtXR-iHY3UggeIeHO_DEAPfGLE3vA67SsBS6XWDuQncZFLVSHnacLnOW4eLFfihcZ7CngTcYbFE7fMyD6HKPZ4H7aH3q1aIKn7Fyq9OKUGJMmhnFDIJ1frImKjeIplQmzFwmNTkwAOuexbSef9HhCeWqI9HsyiSQ9Qe18metThGWqaEi1MkQRxnUkjdJhSlUccWlSRjqINq4Sqs4oDsIWC9FAx55F5WABDhagd0n8DvLWVqsqo8Yf9XnTCuJbzxA26P9qefZvy2u0PZyOR2L0MHk6RztQUvEPL1C7fH3Tl3YiUsor19E-AUjo3oA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Using+data+mining+techniques+to+explore+security+issues+in+smart+living+environments+in+Twitter&rft.jtitle=Computer+communications&rft.au=Saura%2C+Jose+Ramon&rft.au=Palacios-Marqu%C3%A9s%2C+Daniel&rft.au=Ribeiro-Soriano%2C+Domingo&rft.date=2021-11-01&rft.issn=0140-3664&rft.volume=179&rft.spage=285&rft.epage=295&rft_id=info:doi/10.1016%2Fj.comcom.2021.08.021&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_comcom_2021_08_021 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-3664&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-3664&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-3664&client=summon |