{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T17:59:45Z","timestamp":1775066385082,"version":"3.50.1"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031893599","type":"print"},{"value":"9783031893605","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-89360-5_6","type":"book-chapter","created":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:36:25Z","timestamp":1748072185000},"page":"90-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Social Media Threat Intelligence: A Framework for\u00a0Collecting and\u00a0Categorizing Threat-Related Data"],"prefix":"10.1007","author":[{"given":"Victor","family":"Obojo","sequence":"first","affiliation":[]},{"given":"Haula","family":"Galadima","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Ikuesan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,25]]},"reference":[{"key":"6_CR1","unstructured":"Arikkat, D.R., et al.: Can twitter be used to acquire reliable alerts against novel cyber attacks? (2023)"},{"issue":"5","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1242","DOI":"10.3390\/electronics12051242","volume":"12","author":"F Sufi","year":"2023","unstructured":"Sufi, F.: A new social media-driven cyber threat intelligence. Electronics 12(5), 1242 (2023)","journal-title":"Electronics"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Huang, S.-Y., Ban, T.: Monitoring social media for vulnerability-threat prediction and topic analysis, 1771\u20131776 (2020)","DOI":"10.1109\/TrustCom50675.2020.00243"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Alevizopoulou, S., Koloveas, P., Tryfonopoulos, C., Raftopoulou, P.: Social media monitoring for IOT cyber-threats, 436\u2013441 (2021)","DOI":"10.1109\/CSR51186.2021.9527964"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s11948-018-00081-0","volume":"26","author":"TC King","year":"2020","unstructured":"King, T.C., Aggarwal, N., Taddeo, M., Floridi, L.: Artificial intelligence crime: an interdisciplinary analysis of foreseeable threats and solutions. Sci. Eng. Ethics 26, 89\u2013120 (2020)","journal-title":"Sci. Eng. Ethics"},{"key":"6_CR6","unstructured":"Jakstaite, D., Ricardo, M.: Extracting cyber threat intelligence from social media with case studies in twitter and reddit. Soc. Netw. 25(24), 17"},{"issue":"1","key":"6_CR7","doi-asserted-by":"publisher","first-page":"177","DOI":"10.28956\/gbd.736153","volume":"9","author":"A Ate\u015f","year":"2020","unstructured":"Ate\u015f, A.: Current challenges and trends in intelligence. G\u00fcvenlik Bilimleri Dergisi 9(1), 177\u2013204 (2020)","journal-title":"G\u00fcvenlik Bilimleri Dergisi"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.procs.2018.10.297","volume":"140","author":"S Mansour","year":"2018","unstructured":"Mansour, S.: Social media analysis of user\u2019s responses to terrorism using sentiment analysis and text mining. Procedia Comput. Sci. 140, 95\u2013103 (2018)","journal-title":"Procedia Comput. Sci."},{"issue":"2","key":"6_CR9","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s12065-020-00458-w","volume":"14","author":"SA AlAjlan","year":"2021","unstructured":"AlAjlan, S.A., Saudagar, A.: Machine learning approach for threat detection on social media posts containing Arabic text. Evol. Intel. 14(2), 811\u2013822 (2021)","journal-title":"Evol. Intel."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Sari, A.: Context-aware intelligent systems for fog computing environments for cyber-threat intelligence. In: Fog Computing: Concepts, Frameworks and Technologies, pp. 205\u2013225 (2018)","DOI":"10.1007\/978-3-319-94890-4_10"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"2883","DOI":"10.1007\/s00500-016-2265-0","volume":"21","author":"K-C Lee","year":"2017","unstructured":"Lee, K.-C., Hsieh, C.-H., Wei, L.-J., Mao, C.-H., Dai, J.-H., Kuang, Y.-T.: Sec-buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation. Soft. Comput. 21, 2883\u20132896 (2017)","journal-title":"Soft. Comput."},{"key":"6_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103371","volume":"132","author":"Y Guo","year":"2023","unstructured":"Guo, Y., et al.: A framework for threat intelligence extraction and fusion. Comput. Secur. 132, 103371 (2023)","journal-title":"Comput. Secur."},{"issue":"1","key":"6_CR13","first-page":"5586335","volume":"2021","author":"H Zhang","year":"2021","unstructured":"Zhang, H., Shen, G., Guo, C., Cui, Y., Jiang, C.: Ex-action: automatically extracting threat actions from cyber threat intelligence report based on multimodal learning. Secur. Commun. Netw. 2021(1), 5586335 (2021)","journal-title":"Secur. Commun. Netw."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Staniforth, A.: Open source intelligence and the protection of national security. In: Open Source Intelligence Investigation: From Strategy to Implementation, pp. 11\u201319. Springer (2017)","DOI":"10.1007\/978-3-319-47671-1_2"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Mavroeidis, V., Bromander, S.: Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In: 2017 European Intelligence and Security Informatics Conference (EISIC), pp. 91\u201398 . IEEE (2017)","DOI":"10.1109\/EISIC.2017.20"},{"key":"6_CR16","unstructured":"Iftene, A.: The significance of online monitoring activities for the social media intelligence (SOCMINT). In: Conference on Mathematical Foundations of Informatics, pp. 230\u2013240 (2018)"},{"issue":"12","key":"6_CR17","doi-asserted-by":"publisher","first-page":"0166930","DOI":"10.1371\/journal.pone.0166930","volume":"11","author":"IR Adeyemi","year":"2016","unstructured":"Adeyemi, I.R., Razak, S.A., Salleh, M., Venter, H.S.: Observing consistency in online communication patterns for user re-identification. PLoS ONE 11(12), 0166930 (2016)","journal-title":"PLoS ONE"},{"key":"6_CR18","doi-asserted-by":"publisher","first-page":"8","DOI":"10.3389\/fict.2016.00008","volume":"3","author":"IR Adeyemi","year":"2016","unstructured":"Adeyemi, I.R., Abd Razak, S., Salleh, M.: Understanding online behavior: exploring the probability of online personality trait using supervised machine-learning approach. Front. ICT 3, 8 (2016)","journal-title":"Front. ICT"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"2103","DOI":"10.1007\/s13042-017-0748-7","volume":"10","author":"AR Ikuesan","year":"2019","unstructured":"Ikuesan, A.R., Razak, S.A., Venter, H.S., Salleh, M.: Polychronicity tendency-based online behavioral signature. Int. J. Mach. Learn. Cybern. 10, 2103\u20132118 (2019)","journal-title":"Int. J. Mach. Learn. Cybern."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-89360-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T07:36:29Z","timestamp":1748072189000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-89360-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031893599","9783031893605"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-89360-5_6","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDF2C","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Digital Forensics and Cyber Crime","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubrovnik","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdf2c2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdf2c.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}