IDEAS home Printed from https://ideas.repec.org/a/eme/jfcpps/jfc-01-2016-0001.html
   My bibliography  Save this article

Social media content and sentiment analysis on consumer security breaches

Author

Listed:
  • Jianqiang Hao
  • Hongying Dai

Abstract

Purpose - Security breaches have been arising issues that cast a large amount of financial losses and social problems to society and people. Little is known about how social media could be used a surveillance tool to track messages related to security breaches. This paper aims to fill the gap by proposing a framework in studying the social media surveillance on security breaches along with an empirical study to shed light on public attitudes and concerns. Design/methodology/approach - In this study, the authors propose a framework for real-time monitoring of public perception to security breach events using social media metadata. Then, an empirical study was conducted on a sample of 1,13,340 related tweets collected in August 2015 on Twitter. By text mining a large number of unstructured, real-time information, the authors extracted topics, opinions and knowledge about security breaches from the general public. The time series analysis suggests significant trends for multiple topics and the results from sentiment analysis show a significant difference among topics. Findings - The study confirms that social media monitoring provides a supplementary tool for the traditional surveys which are costly and time-consuming to track security breaches. Sentiment score and impact factors are good predictors of real-time public opinions and attitudes to security breaches. Unusual patterns/events of security breaches can be detected in the early stage, which could prevent further destruction by raising public awareness. Research limitations/implications - The sample data were collected from a short period of time on Twitter. Future study could extend the research to a longer period of time or expand key words search to observe the sentiment trend, especially before and after large security breaches, and to track various topics across time. Practical implications - The findings could be useful to inform public policy and guide companies responding to consumer security breaches in shaping public perception. Originality/value - This study is the first of its kind to undertake the analysis of social media (Twitter) content and sentiment on public perception to security breaches.

Suggested Citation

  • Jianqiang Hao & Hongying Dai, 2016. "Social media content and sentiment analysis on consumer security breaches," Journal of Financial Crime, Emerald Group Publishing Limited, vol. 23(4), pages 855-869, October.
  • Handle: RePEc:eme:jfcpps:jfc-01-2016-0001
    DOI: 10.1108/JFC-01-2016-0001
    as

    Download full text from publisher

    File URL: https://www.emerald.com/insight/content/doi/10.1108/JFC-01-2016-0001/full/html?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://www.emerald.com/insight/content/doi/10.1108/JFC-01-2016-0001/full/pdf?utm_source=repec&utm_medium=feed&utm_campaign=repec
    Download Restriction: Access to full text is restricted to subscribers

    File URL: https://libkey.io/10.1108/JFC-01-2016-0001?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Sanaz Ghorbanloo & Sajjad Shokouhyar, 2023. "Consumers' attitude footprint on sustainable development in developed and developing countries: a case study in the electronic industry," Operations Management Research, Springer, vol. 16(3), pages 1444-1475, September.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eme:jfcpps:jfc-01-2016-0001. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Emerald Support (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.