{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T16:45:29Z","timestamp":1773679529943,"version":"3.50.1"},"reference-count":18,"publisher":"World Scientific Pub Co Pte Ltd","issue":"01","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Semantic Computing"],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:p> Cybersecurity is becoming indispensable for everyone and everything in the times of the Internet of Things (IoT) revolution. Every aspect of human society\u00a0\u2014 be it political, financial, technological, or cultural\u00a0\u2014 is affected by cyber-attacks or incidents in one way or another. Newspapers are an excellent source that perfectly captures this web of cybersecurity. By implementing various NLP techniques such as tf-idf, word embedding and sentiment analysis (SA) (machine learning method), this research will examine the cybersecurity-related articles from 18 major newspapers (English language online version) from six countries (three newspapers from each country) collected within one year from April 2018 till March 2019. The first objective is to extract the crucial events from each country, which we will achieve by our first step\u00a0\u2014 \u2018information extraction.\u2019 The next objective is to find out what kind of sentiments those crucial issues garnered, which we will accomplish from our second step\u00a0\u2014 \u2018SA.\u2019 SA of news articles would also help in understanding each \u2018nation\u2019s mood\u2019 on critical cybersecurity issues, which can aid decision-makers in charting new policies. <\/jats:p>","DOI":"10.1142\/s1793351x22500015","type":"journal-article","created":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T10:46:21Z","timestamp":1649155581000},"page":"135-160","source":"Crossref","is-referenced-by-count":3,"title":["A Hybrid Approach to Analyze Cybersecurity News Articles by Utilizing Information Extraction &amp; Sentiment Analysis Methods"],"prefix":"10.1142","volume":"16","author":[{"given":"Piyush","family":"Ghasiya","sequence":"first","affiliation":[{"name":"Graduate School of Information Science and Electrical Engineering, Kyushu University, 744 Motooka, Nishi-ku, Fukuoka City, Fukuoka 819-0395, Japan"}]},{"given":"Koji","family":"Okamura","sequence":"additional","affiliation":[{"name":"Research Institute for Information Technology, Kyushu University, 744 Motooka, Nishi-ku, Fukuoka City, Fukuoka 819-0395, Japan"}]}],"member":"219","published-online":{"date-parts":[[2022,4,4]]},"reference":[{"key":"S1793351X22500015BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63438-X_1"},{"key":"S1793351X22500015BIB002","first-page":"31","volume-title":"Proc. 2nd Australasian Web Conference","volume":"155","author":"Arulanandam R.","year":"2014"},{"key":"S1793351X22500015BIB003","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03599-4_21"},{"key":"S1793351X22500015BIB004","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICTA.2016.7803115"},{"key":"S1793351X22500015BIB005","doi-asserted-by":"publisher","DOI":"10.3390\/sym12030354"},{"key":"S1793351X22500015BIB006","doi-asserted-by":"publisher","DOI":"10.1145\/2746266.2746277"},{"key":"S1793351X22500015BIB007","doi-asserted-by":"publisher","DOI":"10.3390\/app9193945"},{"key":"S1793351X22500015BIB009","doi-asserted-by":"publisher","DOI":"10.2200\/S00416ED1V01Y201204HLT016"},{"key":"S1793351X22500015BIB010","first-page":"1","volume-title":"Proc. Workshop on Opinion Mining and Sentiment Analysis","volume":"9","author":"Balahur A.","year":"2009"},{"key":"S1793351X22500015BIB012","first-page":"1","volume-title":"Proc. 2016 Pre-ICIS SIGDSA\/IFIP WG8","volume":"3","author":"Gupta B.","year":"2016"},{"key":"S1793351X22500015BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.07.006"},{"key":"S1793351X22500015BIB014","volume-title":"Natural Language Processing with Python: Analyzing Text with the Natural Language Toolkit","author":"Bird S.","year":"2009"},{"issue":"1","key":"S1793351X22500015BIB015","first-page":"216","volume-title":"Proc. Int. AAAI Conf. Web and Social Media","volume":"8","author":"Hutto C.","year":"2014"},{"key":"S1793351X22500015BIB016","first-page":"2200","volume-title":"Proc. 7th Int. Conf. Language Resources and Evaluation","volume":"10","author":"Baccianella S.","year":"2010"},{"key":"S1793351X22500015BIB017","first-page":"142","volume-title":"Proc. 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies","author":"Maas A.","year":"2011"},{"key":"S1793351X22500015BIB018","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139058452"},{"issue":"11","key":"S1793351X22500015BIB020","first-page":"2579","volume":"9","author":"Van der Maaten L.","year":"2008","journal-title":"J. Mach. Learn. Res."},{"key":"S1793351X22500015BIB021","first-page":"2825","volume":"12","author":"Pedregosa F.","year":"2011","journal-title":"J. Mach. Learn. Res."}],"container-title":["International Journal of Semantic Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S1793351X22500015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T12:42:49Z","timestamp":1650976969000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S1793351X22500015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":18,"journal-issue":{"issue":"01","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10.1142\/S1793351X22500015"],"URL":"https:\/\/doi.org\/10.1142\/s1793351x22500015","relation":{},"ISSN":["1793-351X","1793-7108"],"issn-type":[{"value":"1793-351X","type":"print"},{"value":"1793-7108","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3]]}}}