| dc.contributor.author | Kanja, George K. | |
| dc.contributor.author | Angolo, Shem M. | |
| dc.contributor.author | Shikali, Casper S. | |
| dc.date.accessioned | 2026-01-21T07:08:39Z | |
| dc.date.available | 2026-01-21T07:08:39Z | |
| dc.date.issued | 2025 | |
| dc.identifier.citation | Journal of information security, volume 16, issue 4, pp 568-594, 2025 | en_US |
| dc.identifier.issn | 2153-1242 | |
| dc.identifier.uri | https://www.scirp.org/pdf/jis_7801155.pdf | |
| dc.identifier.uri | http://repository.seku.ac.ke/xmlui/handle/123456789/8234 | |
| dc.description | https://doi.org/10.4236/jis.2025.164029 | en_US |
| dc.description.abstract | This paper discussed the possibility of utilizing a sentiment analysis of online discussions on X platform (which was previously X) as a predictor of cyber defacement attacks. It bridged a serious gap in the literature on cybersecurity, where the focus has been on technical signatures and little consideration has been made on socio-technical antecedents. The hypothesis that spikes of negative public sentiment might be predictive indicators of ideologically motivated cases of defacement was tested in the study. A hybrid sentiment analysis model was used, which incorporates lexicon-based VADER model with machine learning classifiers, such as Naive Bayes and Long Short-Term Memory networks. The data consisted of 503456 posts related to cybersecurity and the data were compared to the verified cases of defacement in repositories like ZoneH using time-series analysis, Pearson correlation, and cross-correlation functions. Findings indicated that negative sentiment only comprised of 8.6% of the posts with the majority being neutral (50.9) and positive (40.5). The temporal analysis showed that there is not a substantial change in negative sentiment, but short bursts of negative sentiment are associated with cybersecurity disclosure. The cross-correlation analysis showed only weak contemporaneous correlation (r ≈ 0.12, lag = 0 days) but no predictive correlation in negative lags. The stacked ensemble model (Naïve Bayes, BiLSTM, ARIMA) was very strong in classification (Accuracy = 0.8568, F1 = 0.8055, ROC-AUC = 0.9116) but mainly it was very sensitive to concurrent or retrospective signals. The research established that aggregate sentiment does not provide predictive information, socio-technical prediction would combat inactive fine-grained and entity-specific signals combined with technical threat knowledge. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Scientific Research Publishing | en_US |
| dc.subject | sentiment analysis | en_US |
| dc.subject | cyber defacement attacks | en_US |
| dc.subject | x platform | en_US |
| dc.subject | predictive modeling | en_US |
| dc.subject | cybersecurity monitoring | en_US |
| dc.subject | early-warning systems | en_US |
| dc.title | Uncovering sentiment-based predictors of cyber defacement attacks: A case of online discourse on x-platform | en_US |
| dc.type | Article | en_US |