Investigating Cybersecurity News Articles by Applying Topic Modeling Method

Piyush Ghasiya, Koji Okamura

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Machine Learning (ML) and specifically Natural Language Processing (NLP) are increasingly used as tools in the cybersecurity world. These NLP tools bring new capabilities that support both defenders and attackers in their activities, whether it is risk scenarios such as events and threats or security operations. Ours is a unique case study as we are investigating cybersecurity news on a national and global level. This large study covered six countries and 18 major newspapers and analyzed thousands of cybersecurity articles using the Nonnegative Matrix Factorization (NMF) topic modeling method. News making and policymaking complement each other in forming national identities. This research aims to provide the foundation for the field of Cybersecurity in this direction. Our results showed the US dominance and its significance for other countries. This research also highlighted that much of the US media's cybersecurity reporting focuses on domestic issues, unlike other nations.

Original languageEnglish
Title of host publication35th International Conference on Information Networking, ICOIN 2021
PublisherIEEE Computer Society
Pages432-438
Number of pages7
ISBN (Electronic)9781728191003
DOIs
Publication statusPublished - Jan 13 2021
Event35th International Conference on Information Networking, ICOIN 2021 - Jeju Island, Korea, Republic of
Duration: Jan 13 2021Jan 16 2021

Publication series

NameInternational Conference on Information Networking
Volume2021-January
ISSN (Print)1976-7684

Conference

Conference35th International Conference on Information Networking, ICOIN 2021
Country/TerritoryKorea, Republic of
CityJeju Island
Period1/13/211/16/21

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems

Fingerprint

Dive into the research topics of 'Investigating Cybersecurity News Articles by Applying Topic Modeling Method'. Together they form a unique fingerprint.

Cite this