{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T03:04:51Z","timestamp":1763348691112,"version":"3.27.0"},"reference-count":93,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T00:00:00Z","timestamp":1726704000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,9,19]]},"DOI":"10.1109\/acit62333.2024.10712528","type":"proceedings-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T17:51:15Z","timestamp":1729101075000},"page":"543-551","source":"Crossref","is-referenced-by-count":1,"title":["Research Hotspots and Trend Analysis of Social Media Security on CiteSpace Knowledge Graph"],"prefix":"10.1109","volume":"12","author":[{"given":"Ruslan","family":"Shevchuk","sequence":"first","affiliation":[{"name":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine"}]},{"given":"Vasyl","family":"Martsenyuk","sequence":"additional","affiliation":[{"name":"University of Bielsko-Biala,Department of Computer Science and Automatics,Bielsko-Biala,Poland"}]},{"given":"Andriy","family":"Melnyk","sequence":"additional","affiliation":[{"name":"West Ukrainian National University,Department of Computer Science,Ternopil,Ukraine"}]}],"member":"263","reference":[{"article-title":"Digital 2024: global overview report","year":"2024","author":"Simon","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2022.2101160"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.osnem.2023.100250"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2023.15202"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3411632"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.61973\/apjisdt.v101.3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-023-01028-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3578503.3583597"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chemosphere.2022.133932"},{"key":"ref10","article-title":"Web of science - web of science group"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10465-9"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1108\/IJICC-06-2020-0067"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/jtf-03-2022-0101"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1517\/14712598.2012.674507"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.09.003"},{"key":"ref16","first-page":"1041","article-title":"Vulnerability disclosure in the age of social media: Exploiting twitter for predicting {Real-World} exploits","volume-title":"in 24th USENIX Security Symposium (USENIX Security 15)","author":"Sabottke"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1257\/jep.31.2.211"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2017.12.002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2818717"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1126\/science.aap9559"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1126\/science.aao2998"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA49011.2020.00096"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2023.01410109"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1080\/21670811.2017.1360143"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1089\/big.2020.0062"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT52158.2021.9548394"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3395046"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132877"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.05335"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc4020004"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/19475683.2017.1280536"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2019.00110"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.013"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2892852"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-14411-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2535-7.ch013"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JISIC.2014.17"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-27057-9_2"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC57223.2023.10074187"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3047337"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11050743"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2023.3239607"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.3390\/jimaging7030047"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2016.7752338"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2017.94"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258359"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-020-02529-3"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2014.6814027"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/7243296"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.392"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8621940"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2011.04.004"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2010.03.001"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.181"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEA.2016.7603735"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45670-5_23"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24306-1_6"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CYBER-Abuja.2015.7360515"},{"key":"ref61","article-title":"Big data: A revolution that will transform how we live, work, and think","author":"Mayer-Sch\u00f6nberger","year":"2013","journal-title":"Houghton Mifflin Harcourt"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.07.006"},{"issue":"2","key":"ref64","article-title":"Big data for social media learning analytics: potentials and challenges","volume":"12","author":"Manca","year":"2016","journal-title":"Journal of e-Learning and Knowledge Society"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.2478\/picbe-2019-0093"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/CSCI.2015.169"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.sftr.2023.100113"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70688-7_8"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.007"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-019-00695-1"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2889302"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.11.010"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321628"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.063"},{"article-title":"The age of surveillance capitalism: The fight for a human future at the new frontier of power: by shoshana zuboff, new york, public affairs-hachette book group, 2019, x+ 692 pp., us 38.00(hardback), isbn978-1-781256848\/ 19.99 (e-book), isbn 9781 78283274 4","year":"2019","author":"Giles","key":"ref75"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1177\/0267323118760317"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055417000144"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.12987\/9780300228175"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780190923624.001.0001"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.22230\/cjc.2012v37n2a2536"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1108\/09564231311326987"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v21i11.7090"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACITT.2019.8779963"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACIT49673.2020.9208879"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-022-01020-5"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-023-08352-z"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.56"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.3191268"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1177\/1461444816660731"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW50202.2020.00184"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3183642"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1392"}],"event":{"name":"2024 14th International Conference on Advanced Computer Information Technologies (ACIT)","start":{"date-parts":[[2024,9,19]]},"location":"Ceske Budejovice, Czech Republic","end":{"date-parts":[[2024,9,21]]}},"container-title":["2024 14th International Conference on Advanced Computer Information Technologies (ACIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10712446\/10712447\/10712528.pdf?arnumber=10712528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T05:29:57Z","timestamp":1729142997000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10712528\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,19]]},"references-count":93,"URL":"https:\/\/doi.org\/10.1109\/acit62333.2024.10712528","relation":{},"subject":[],"published":{"date-parts":[[2024,9,19]]}}}