{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:18:57Z","timestamp":1751606337738,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3260643","type":"journal-article","created":{"date-parts":[[2023,3,22]],"date-time":"2023-03-22T18:03:24Z","timestamp":1679508204000},"page":"29769-29789","source":"Crossref","is-referenced-by-count":2,"title":["Don\u2019t Be a Victim During a Pandemic! Analysing Security and Privacy Threats in Twitter During COVID-19"],"prefix":"10.1109","volume":"11","author":[{"given":"Bibhas","family":"Sharma","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5349-4943","authenticated-orcid":false,"given":"Ishan","family":"Karunanayake","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5935-0062","authenticated-orcid":false,"given":"Rahat","family":"Masood","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, University of New South Wales, Sydney, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2113-3390","authenticated-orcid":false,"given":"Muhammad","family":"Ikram","sequence":"additional","affiliation":[{"name":"School of Computing, Macquarie University, Macquarie Park, NSW, Australia"}]}],"member":"263","reference":[{"volume-title":"Ten deadly cyber security threats Amid COVID-19 pandemic","year":"2020","author":"Khan","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.247"},{"volume-title":"Cyber Attacks are Making Work-From-Home Expensive for Businesses","year":"2021","author":"Look","key":"ref3"},{"volume-title":"Global Overview Report","year":"2021","author":"Kemp","key":"ref4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3343038"},{"volume-title":"Social Media a Gold Mine for Scammers in 2021","year":"2022","author":"Fletcher","key":"ref6"},{"volume-title":"Social Media Scam: Twitter Bots are Tricking Users Into Making Paypal and Venmo Payments Into Fraudsters\u2019 Accounts","year":"2021","author":"Haworth","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2815904"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3044064"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3037015"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.2196\/21978"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2196\/26627"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0241957"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-020-05988-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/mar.21542"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423651"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186093"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3177652"},{"issue":"11","key":"ref20","doi-asserted-by":"crossref","first-page":"314","DOI":"10.3390\/fi14110314","article-title":"Hate and false metaphors: Implications to emerging e-participation environment","volume":"14","author":"Alathur","year":"2022","journal-title":"Future Internet"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3422337.3447840"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2022.103008","article-title":"Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on Twitter","volume":"125","author":"Pattnaik","year":"2023","journal-title":"Comput. Secur."},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/epidemiologia2030024"},{"volume-title":"Twitter API","year":"2021","key":"ref24"},{"volume-title":"Twarc","year":"2021","key":"ref25"},{"key":"ref26","first-page":"75","article-title":"Multilingual topic models for unaligned text","volume-title":"Proc. 25th Conf. Uncertainty Artif. Intell.","author":"Boyd-Graber"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.12688\/f1000research.3-38.v2"},{"volume-title":"Our World in Data","year":"2021","key":"ref28"},{"volume-title":"Relationship Between Number of COVID-19 Cases and Government Response","year":"2023","key":"ref29"},{"journal-title":"Natural Language Processing With Python","year":"2009","author":"Bird","key":"ref30"},{"issue":"85","key":"ref31","first-page":"2825","article-title":"Scikit-learn: Machine learning in python","volume":"12","author":"Pedregosa","year":"2011","journal-title":"J. Mach. Learn. Res."},{"volume-title":"TLD\u2014TLD 0.12.7 Documentation","year":"2021","author":"Barseghyan","key":"ref32"},{"volume-title":"Fortiguard Labs: Global Threat Research and Response","year":"2021","key":"ref33"},{"issue":"1","key":"ref34","first-page":"216","article-title":"VADER: A parsimonious rule-based model for sentiment analysis of social media text","volume-title":"Proc. Int. AAAI Conf. Web Social Media","volume":"8","author":"Hutto"},{"key":"ref35","volume-title":"Hidden Markov Models: Applications in Computer Vision","volume":"45","author":"Horst","year":"2001"},{"volume-title":"VirusTotal","year":"2021","key":"ref36"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10078240.pdf?arnumber=10078240","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T16:37:57Z","timestamp":1707842277000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10078240\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3260643","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2023]]}}}