{"id":"https://openalex.org/W2884342610","doi":"https://doi.org/10.1155/2018/7243296","title":"Detecting Potential Insider Threat: Analyzing Insiders\u2019 Sentiment Exposed in Social Media","display_name":"Detecting Potential Insider Threat: Analyzing Insiders\u2019 Sentiment Exposed in Social Media","publication_year":2018,"publication_date":"2018-07-18","ids":{"openalex":"https://openalex.org/W2884342610","doi":"https://doi.org/10.1155/2018/7243296","mag":"2884342610"},"language":"en","primary_location":{"id":"doi:10.1155/2018/7243296","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7243296","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/7243296.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"http://downloads.hindawi.com/journals/scn/2018/7243296.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054413464","display_name":"Won Park","orcid":"https://orcid.org/0000-0001-7643-388X"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Won Park","raw_affiliation_strings":["Institute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0001-7643-388X","affiliations":[{"raw_affiliation_string":"Institute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017781356","display_name":"Youngin You","orcid":"https://orcid.org/0000-0002-1214-9596"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Youngin You","raw_affiliation_strings":["Institute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-1214-9596","affiliations":[{"raw_affiliation_string":"Institute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100767530","display_name":"Kyungho Lee","orcid":"https://orcid.org/0000-0002-5183-5927"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Kyungho Lee","raw_affiliation_strings":["Institute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-5183-5927","affiliations":[{"raw_affiliation_string":"Institute of Cyber Security & Privacy, Korea University, Seoul 02841, Republic of Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100767530"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":2.7658,"has_fulltext":true,"cited_by_count":37,"citation_normalized_percentile":{"value":0.91032389,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":"2018","issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8779506683349609},{"id":"https://openalex.org/keywords/insider-threat","display_name":"Insider threat","score":0.8094733953475952},{"id":"https://openalex.org/keywords/insider","display_name":"Insider","score":0.7411072254180908},{"id":"https://openalex.org/keywords/sentiment-analysis","display_name":"Sentiment analysis","score":0.5646679997444153},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5645566582679749},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.5484215021133423},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.5453753471374512},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.5302590727806091},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4894660711288452},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4372168183326721},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.412314772605896},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41135331988334656},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.33490949869155884},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2606722116470337}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8779506683349609},{"id":"https://openalex.org/C2776633304","wikidata":"https://www.wikidata.org/wiki/Q6038026","display_name":"Insider threat","level":3,"score":0.8094733953475952},{"id":"https://openalex.org/C2778971194","wikidata":"https://www.wikidata.org/wiki/Q1664551","display_name":"Insider","level":2,"score":0.7411072254180908},{"id":"https://openalex.org/C66402592","wikidata":"https://www.wikidata.org/wiki/Q2271421","display_name":"Sentiment analysis","level":2,"score":0.5646679997444153},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5645566582679749},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.5484215021133423},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.5453753471374512},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.5302590727806091},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4894660711288452},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4372168183326721},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.412314772605896},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41135331988334656},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.33490949869155884},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2606722116470337},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2018/7243296","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7243296","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/7243296.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f10ea21e2ba44d6191eaf6b68a416a33","is_oa":false,"landing_page_url":"https://doaj.org/article/f10ea21e2ba44d6191eaf6b68a416a33","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2018 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2018/7243296","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2018/7243296","pdf_url":"http://downloads.hindawi.com/journals/scn/2018/7243296.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6399999856948853,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1360413954","display_name":null,"funder_award_id":"IITP-2018-2015-0-00403","funder_id":"https://openalex.org/F4320324891","funder_display_name":"Iran Telecommunication Research Center"},{"id":"https://openalex.org/G266217951","display_name":null,"funder_award_id":"IITP-2018","funder_id":"https://openalex.org/F4320328359","funder_display_name":"Ministry of Science and ICT, South Korea"}],"funders":[{"id":"https://openalex.org/F4320324891","display_name":"Iran Telecommunication Research Center","ror":"https://ror.org/01a3g2z22"},{"id":"https://openalex.org/F4320328359","display_name":"Ministry of Science and ICT, South Korea","ror":"https://ror.org/01wpjm123"},{"id":"https://openalex.org/F4320335489","display_name":"Institute for Information and Communications Technology Promotion","ror":"https://ror.org/01g0hqq23"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2884342610.pdf","grobid_xml":"https://content.openalex.org/works/W2884342610.grobid-xml"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1495512916","https://openalex.org/W1985690171","https://openalex.org/W2015557099","https://openalex.org/W2083829472","https://openalex.org/W2129079462","https://openalex.org/W2131060714","https://openalex.org/W2174706414","https://openalex.org/W2615509554"],"related_works":["https://openalex.org/W2766781562","https://openalex.org/W4205304595","https://openalex.org/W2792608345","https://openalex.org/W2979782961","https://openalex.org/W308359497","https://openalex.org/W1499596878","https://openalex.org/W3136170567","https://openalex.org/W2947769183","https://openalex.org/W4387194049","https://openalex.org/W2018332730"],"abstract_inverted_index":{"In":[0,140],"the":[1,16,20,42,58,71,74,84,95,102,117,124,134,144,149,156,163,182],"era":[2],"of":[3,5,9,35,47,73],"Internet":[4],"Things":[6],"(IoT),":[7],"impact":[8],"social":[10],"media":[11],"is":[12,25],"increasing":[13],"gradually.":[14],"With":[15],"huge":[17],"progress":[18],"in":[19,38,101],"IoT":[21],"device,":[22],"insider":[23],"threat":[24,96],"becoming":[26],"much":[27],"more":[28],"dangerous.":[29],"Trying":[30],"to":[31,64,94,115,162,172,181],"find":[32,65,116],"what":[33],"kind":[34],"people":[36],"are":[37],"high":[39],"risk":[40],"for":[41,110],"organization,":[43],"about":[44],"one":[45],"million":[46],"tweets":[48],"were":[49,81,113],"analyzed":[50],"by":[51,57,83,159,177],"sentiment":[52,75],"analysis":[53,72,157],"methodology.":[54],"Dataset":[55],"made":[56],"web":[59],"service":[60],"\u201cSentiment140\u201d":[61],"was":[62],"used":[63,114,146],"possible":[66,90,118],"malicious":[67,91,119],"insider.":[68,120],"Based":[69],"on":[70],"level,":[76],"users":[77],"with":[78],"negative":[79],"sentiments":[80],"classified":[82],"criteria":[85],"and":[86,131,153],"then":[87,154],"selected":[88],"as":[89,186],"insiders":[92],"according":[93],"level.":[97],"Machine":[98],"learning":[99,105,129],"algorithms":[100,130],"open-sourced":[103],"machine":[104],"software":[106],"\u201cWeka":[107],"(Waikato":[108],"Environment":[109],"Knowledge":[111],"Analysis)\u201d":[112],"Decision":[121],"Tree":[122],"had":[123,133],"highest":[125,135],"accuracy":[126,136,176],"among":[127,137],"supervised":[128],"K-Means":[132],"unsupervised":[138],"learning.":[139],"addition,":[141],"we":[142],"extract":[143],"frequently":[145],"words":[147],"from":[148],"topic":[150],"modeling":[151],"technique":[152],"verified":[155],"results":[158],"matching":[160],"them":[161],"information":[164],"security":[165],"compliance":[166],"elements.":[167],"These":[168],"findings":[169],"can":[170],"contribute":[171],"achieve":[173],"higher":[174],"detection":[175],"combining":[178],"individual\u2019s":[179],"characteristics":[180],"previous":[183],"studies":[184],"such":[185],"analyzing":[187],"system":[188],"behavior.":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
