Please use this identifier to cite or link to this item: https://repository.seku.ac.ke/handle/123456789/8234
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKanja, George K.-
dc.contributor.authorAngolo, Shem M.-
dc.contributor.authorShikali, Casper S.-
dc.date.accessioned2026-01-21T07:08:39Z-
dc.date.available2026-01-21T07:08:39Z-
dc.date.issued2025-
dc.identifier.citationJournal of information security, volume 16, issue 4, pp 568-594, 2025en_US
dc.identifier.issn2153-1242-
dc.identifier.urihttps://www.scirp.org/pdf/jis_7801155.pdf-
dc.identifier.urihttp://repository.seku.ac.ke/xmlui/handle/123456789/8234-
dc.descriptionhttps://doi.org/10.4236/jis.2025.164029en_US
dc.description.abstractThis paper discussed the possibility of utilizing a sentiment analysis of online discussions on X platform (which was previously X) as a predictor of cyber defacement attacks. It bridged a serious gap in the literature on cybersecurity, where the focus has been on technical signatures and little consideration has been made on socio-technical antecedents. The hypothesis that spikes of negative public sentiment might be predictive indicators of ideologically motivated cases of defacement was tested in the study. A hybrid sentiment analysis model was used, which incorporates lexicon-based VADER model with machine learning classifiers, such as Naive Bayes and Long Short-Term Memory networks. The data consisted of 503456 posts related to cybersecurity and the data were compared to the verified cases of defacement in repositories like ZoneH using time-series analysis, Pearson correlation, and cross-correlation functions. Findings indicated that negative sentiment only comprised of 8.6% of the posts with the majority being neutral (50.9) and positive (40.5). The temporal analysis showed that there is not a substantial change in negative sentiment, but short bursts of negative sentiment are associated with cybersecurity disclosure. The cross-correlation analysis showed only weak contemporaneous correlation (r ≈ 0.12, lag = 0 days) but no predictive correlation in negative lags. The stacked ensemble model (Naïve Bayes, BiLSTM, ARIMA) was very strong in classification (Accuracy = 0.8568, F1 = 0.8055, ROC-AUC = 0.9116) but mainly it was very sensitive to concurrent or retrospective signals. The research established that aggregate sentiment does not provide predictive information, socio-technical prediction would combat inactive fine-grained and entity-specific signals combined with technical threat knowledge.en_US
dc.language.isoenen_US
dc.publisherScientific Research Publishingen_US
dc.subjectsentiment analysisen_US
dc.subjectcyber defacement attacksen_US
dc.subjectx platformen_US
dc.subjectpredictive modelingen_US
dc.subjectcybersecurity monitoringen_US
dc.subjectearly-warning systemsen_US
dc.titleUncovering sentiment-based predictors of cyber defacement attacks: A case of online discourse on x-platformen_US
dc.typeArticleen_US
Appears in Collections:School of Science and Computing (JA)

Files in This Item:
File Description SizeFormat 
Kanja_Uncovering sentiment-based predictors of cyber defacement attacks....pdfabstract288.82 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.