UNC Cyber Threat Activity that Involved Twitter Question

I’m working on a writing discussion question and need an explanation and answer to help me learn.

Module 2 D1: Use of Social Media to Enhance Security

For this post, I would like you to provide an example of an instance where social media was used to enhance security –fields such as public health/disease response, disaster response, environmental issues. As an example this document has examples of where social media tags were used to predict floods and track flu and zika outbreaks (DOCUMENT: The Potential of Social Media Intelligence to Improve People’s Lives

Download The Potential of Social Media Intelligence to Improve People’s Lives

). Be sure to reference credible sources of information (media or scholarly journal articles) to support your case that illustrates a positive impact on security by social media.

Please post at least 300 words in response to these questions and include reference to at least one source, using APA, beyond the materials cited in the course.

Module 2 D2: Social Media and Data Science, Artificial Intelligence, and Machine Learning

In the lecture for this week, we began a discussion of key terms related to the data science, artificial intelligence, and machine learning fields, as well as introducing a connection to their application to social media. For this post, please dig a little further into research related to one of these domains (data science, big data, artificial intelligence, machine learning, or deep learning). Find a scholarly journal article on research being done in these fields with a connection to social media.

  • What did the researchers study?
  • What were their findings?

Please post at least 300 words in response to these questions and include reference to at least one source, using APA, beyond the materials cited in the course.

Module 3 D1: Sentiment Visualizer

Take some time to use the Tweet Sentiment Visualization Tool located at https://www.csc2.ncsu.edu/faculty/healey/tweet_viz/tweet_app/

(Links to an external site.)

Using the tool, select a search term (or terms) of interest and present the results from either the “Sentiment”, “Topics”, Heatmap”, “Tag Cloud”, and/or “Timeline” tabs of the tool. While it will likely help you with the assignment this week to capture something related to a global security issue, you can use any topics such as athletes, celebrities, pop culture, or topics of interest –provided they are suitable for class presentation and discussion.

Please post at least 200 words presenting what you looked at with the sentiment visualizer and your reaction to what was exposed by the tool. Include reference to at least one source, using APA, beyond the materials cited in the course. Please also include an image of your results being discussed! You can capture an image of the results using the Snipping Tool on PCs (go your apps) or Shift+Command+5 on a Mac.

Module 3 D2: Facebook Information Operations

Facebook maintains a page dedicated to its efforts to remove influencee operations from its platform. You can read more about their analysis here: https://about.fb.com/wp-content/uploads/2021/05/IO-Threat-Report-May-20-2021.pdf

(Links to an external site.)

For this post, examine one coordinated inauthentic behavior campaign that was removed by Facebook. You can find monthly reports detailing behavior here: https://about.fb.com/news/tag/coordinated-inauthentic-behavior/

(Links to an external site.)

In your post of at least 200 words you should detail, as relevant to your selected topic:

  • What nations were involved?
  • What is the historical origin of the tensions between the nations?
  • What was the campaign attempting to influence (protests, elections,etc.)?
  • How did the campaign attempt to influence people? Was biases were did the campaign play into?
  • How many people were potentially influenced?
  • Provide examples of the messaging.

Please post at least 200 words in response to the prompts, as relevant. Include reference to at least one source, using APA, beyond the materials cited in the course. Please also include an image of the messaging being discussed! You can capture an image of the results using the Snipping Tool on PCs (go your apps) or Shift+Command+5 on a Mac

Module 4 D1: Government Control of Social Media and the Internet

In the previous weeks assignments, we have heard about government efforts to control social media. In this week’s module, you read and heard about social media as part of uprisings and revolutionary activity within nations. Some research into government activity indicates increasing instances where governments have taken to control or ban access to social media platforms and/or the Internet overall. Sometimes these outages are limited to specific applications or regions –others are entire bans of access. Take some time to research government activity taken against social media and the Internet, with a focus on bans or outages.

  • Select an incident that has been covered in the news media.
  • Describe what happened.
  • Identify the various groups and government officials involved.
  • Analyze the key issues or factors leading to the activity.

Please post at least 200 words in response to the prompts, as relevant. Include reference to at least one source, using APA, beyond the materials cited in the course.

Module 5 D1: Cyber Criminal Use of Social Media

Besides information operations, cyber threat actors take advantage of social media in a number of different ways. This can include:

  • Threat activity targeting social media users
  • Threat activity facilitated by social media platforms
  • Threat activity advertised on social media platforms.

Describe an example or case of cyber threat activity that involved a social media platform. Please post at least 200 words in response to the prompt, as relevant. Include reference to at least one source, using APA, beyond the materials cited in the course.

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: Content is protected !!