Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module

@article{Kandias2017StressLD,
  title={Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module},
  author={Miltiadis Kandias and Dimitris Gritzalis and Vasilis Stavrou and Kostas Nikoloulis},
  journal={Comput. Secur.},
  year={2017},
  volume={69},
  pages={3-17}
}
Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails
TLDR
This is the first work to build user profile and predict insider threats using sentiment analysis of their browsing and email content and suggests that the approach can proactively and accurately detect malicious insiders with extreme or negative emotional tendencies.
Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation
TLDR
This work proposes a novel online insider threat detection system, Warder, which leverages diverse feature dimensions and fuses content and behavior features to create a user's daily profile to facilitate threat detection and demonstrates that Warder outperforms the other two competing approaches.
A Survey on Mental Health Detection in Online Social Network
TLDR
Major findings revealed that the most frequently used method in mental health detection is machine learning techniques, with Support Vector Machine (SVM) as the most chosen algorithm and Twitter is the major data source from OSN with English language used formental health detection.
Potential Malicious Insiders Detection Based on a Comprehensive Security Psychological Model
TLDR
The experimental results illustrate the effectiveness and feasibility of the proposed approach, which has a very low false negative rate, and lay the foundation for a promising insider threat detection approach that integrates the attackers' psychological traits with the attack-chain characteristics.
A Review of Insider Threat Detection: Classification, Machine Learning Techniques, Datasets, Open Challenges, and Recommendations
TLDR
The survey aims to present a taxonomy of contemporary insider types, access, level, motivation, insider profiling, effect security property, and methods used by attackers to conduct attacks and a review of notable recent works on insider threat detection, which covers the analyzed behaviors, machine-learning techniques, dataset, detection methodology, and evaluation metrics.
Application of Machine Learning Methods in Mental Health Detection: A Systematic Review
TLDR
The presented method is an alternative approach to the early detection of mental health problems rather than using traditional strategies, such as collecting data through questionnaires or devices and sensors, which are time-consuming and costly.
The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends
TLDR
The paper at hand describes the current state of OSINT and makes a comprehensive review of the paradigm, focusing on the services and techniques enhancing the cybersecurity field, and analyzes the strong points of this methodology and proposes numerous ways to apply it to cybersecurity.
The effect of ISO/IEC 27001 standard over open-source intelligence
TLDR
The paper proposed and illustrated three OSINT alternatives, demonstrating their existence and distinguishing characteristics, and demonstrated the breadth and dispersion of OSINT solutions.
Examining Mental Disorder/Psychological Chaos through Various ML and DL Techniques: A Critical Review
Mental soundness is a condition of well-being wherein a person understands his/her potential, participates in his or her community and is able to deal effectively with the challenges and obstacles of
...
1
2
...

References

SHOWING 1-10 OF 79 REFERENCES
Proactive insider threat detection through social media: the YouTube case
TLDR
A prediction method by evaluating the predisposition towards law enforcement and authorities, a personal psychosocial trait closely connected to the manifestation of malevolent insiders, is proposed and a methodology to detect users holding a negative attitude towards authorities is proposed.
Insiders Trapped in the Mirror Reveal Themselves in Social Media
TLDR
This paper develops an insider threat prediction method by valuating a users’ personality trait of narcissism, which is deemed to be closely connected to the manifestation of malevolent insiders, and categorizes the users according to a proposed taxonomy.
SOCIAL MEDIA PROFILING : A PANOPTICON OR OMNIOPTICON TOOL ?
TLDR
This research highlights how Web 2.0 and social media (YouTube and Twitter) may become a topos of participatory panopticism, an omniopticon in which the many watch the many, and can reconstruct sensitive information out of seemingly anonymous data/content.
Can We Trust This User? Predicting Insider's Attitude via YouTube Usage Profiling
TLDR
A prediction method by evaluating the predisposition towards law enforcement and authorities, a personal psychosocial trait closely connected to the manifestation of malevolent insiders, is proposed and a methodology to detect users holding negative attitude towards authorities is proposed.
Proactive Insider Threat Detection through Graph Learning and Psychological Context
TLDR
This paper proposes an approach that combines Structural Anomaly Detection from social and information networks and Psychological Profiling of individuals to detect structural anomalies in large-scale information network data, while PP constructs dynamic psychological profiles from behavioral patterns.
The Nature of Emotional Expression in Social Media : Measurement , Inference and Utility
Today, social media platforms like Twitter and Facebook enable in-the-moment reflection of people's attitudes, attention, and emotions in a scale that was never available before. In this paper, we
Facebook and Risks of "De-contextualization" of Information
  • F. Dumortier
  • Computer Science
    Data Protection in a Profiled World
  • 2010
TLDR
This chapter argues that the main privacy risk on Facebook is the one of “de-contextualization” of the information provided by the participants, due to three major characteristics of Facebook: the simplification of social relations, the large information dissemination and the network globalization and normalization effects of Facebook.
Which side are you on? A new Panopticon vs. privacy
TLDR
An extensive graph theoretical and content analysis of the collected dataset is performed and it is shown how and what kind of personal data can be derived via data mining on publicly available YouTube data and how to effectively be prevented from such a threat.
An Insider Threat Prediction Model
TLDR
A novel, interdisciplinary insider threat prediction model is presented, which combines approaches, techniques, and tools from computer science and psychology, and identifies those that require additional monitoring, as they can potentially be dangerous for the information system and the organization.
Social network use and personality
...
1
2
3
4
5
...