<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Cloud risk communication on social media: The case of Premera Blue Cross</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Jean Pierre Guy Gashami</string-name>
          <email>jp.gashami@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christian Fernando Libaque-Saenz</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Myeong-Cheol Park</string-name>
          <email>imcpark@kaist.ac.kr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jae Jeung Rho</string-name>
          <email>jjrho111@kaist.ac.kr</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>2020, Jes u ́s Mar ́ıa</institution>
          ,
          <addr-line>Lima 11</addr-line>
          ,
          <country country="PE">Peru</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Korea Advanced Institute of Science and Technology N22</institution>
          ,
          <addr-line>291 Daehak-ro, Yusong-Gu, Daejon 34141</addr-line>
          ,
          <country>Republic of Korea</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Universidad del Pac ́ıfico Avenida Salaverry</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2015</year>
      </pub-date>
      <fpage>55</fpage>
      <lpage>61</lpage>
      <abstract>
        <p>Cloud computing has been growing at a fast pace. This growth has been fueled by this technology's inherent benefits such as cost reduction and convenience. However, the increasing amount and variety of data processed on the cloud have raised the number of security breaches. Although cloud providers were responsible for data security in the past, the new threats require that both cloud providers and users coordinate efforts to minimize losses and ensure data recovery. Our study aims to explore how cloud providers and users can leverage social media to mitigate data security breaches through effective risk communication. We analyzed public data collected from Twitter regarding the security breach faced by the Premera Blue Cross web application between January and April 2015. Preliminary results indicate that Premera Blue Cross (cloud provider) acted as an information source for Twitterers seeking relevant and accurate information during this security breach. Future steps for this study are discussed.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        1 Introduction
Cloud computing is disrupting consumption
models of information technology (IT) across
industries. For example, around 65% of all major
enterprises in USA are using some form of cloud
computing
        <xref ref-type="bibr" rid="ref32">(Verizon, 2014)</xref>
        , while general
spending on public cloud computing services is
expected to grow by US$921 billion by 2017
        <xref ref-type="bibr" rid="ref9">(Gartner, 2011)</xref>
        . The rapid increase in the use of cloud
computing services by both enterprises and
individual users is driven by benefits such as cost
reduction, mobility, and convenience
        <xref ref-type="bibr" rid="ref10">(Gashami et
al., 2015)</xref>
        . Indeed, users are increasingly
relying on cloud providers to run hardware, software,
and also to properly handle their data. However,
having more data in the cloud, including
sensitive data such as personal, financial, research, and
health information means high potential
        <xref ref-type="bibr" rid="ref11">risks for
users (Zhou et al., 2010</xref>
        ). Not surprisingly, data
risk has been identified as a high threat to cloud
computing
        <xref ref-type="bibr" rid="ref16 ref17 ref5 ref6">(King and Raja, 2012)</xref>
        . For instance,
costs associated with data security breaches in
the healthcare industry alone could reach US$5.6
billion annually (Experian, 2015). Undoubtedly,
security breaches may occur in spite of cloud
providers efforts to ensure data safety
        <xref ref-type="bibr" rid="ref3">(Armbrust et
al., 2010)</xref>
        . Some research even argues that data
security breaches are inevitable in the cloud
        <xref ref-type="bibr" rid="ref30">(Staten
et al., 2014)</xref>
        . To face such security challenges,
cloud providers have developed risk management
frameworks which mainly focus on risk
analysis, risk assessment, and
        <xref ref-type="bibr" rid="ref11">risk mitigation (Zhang
et al., 2010</xref>
        ). These frameworks address
technical and managerial issues; however, it is still
unclear how cloud providers treat users throughout
the analysis, assessment, and mitigation of
security breaches. Existing research suggests that risk
communication with all stakeholders is an
important element of risk management in various
contexts
        <xref ref-type="bibr" rid="ref2 ref20">(Aguirre, 2004; Lagadec, 2002)</xref>
        . On the
cloud front, communication with users may play a
crucial role in limiting potential damages by
raising user awareness of data practices and
protection. Indeed, communicating potential security
breaches to users can lead to actions such as
reinforcing weak passwords, using private keys, or
enabling local backup of data
        <xref ref-type="bibr" rid="ref14 ref28">(Rainie and
Duggan, 2014)</xref>
        . On the other hand, social media such
as Facebook and Twitter have been signaled as the
new avenues for channeling information during
risk management due to their low-or no-cost
policy and their worldwide usage
        <xref ref-type="bibr" rid="ref33">(Wright and
Hinson, 2009)</xref>
        . Natural and health disasters are clear
examples of populations and organizations relying
on social media to alert, organize, or manage
rescue efforts
        <xref ref-type="bibr" rid="ref31">(Theocharis, 2013)</xref>
        .
      </p>
      <p>Despite the relevance of risk communication in
the context of cloud computing and the potential
of social media for information dissemination
during a security breach, to the best of our knowledge
there is no research on the usage of social media
for risk communication during security breaches
in the cloud. The objective of our study is to fill
this gap in the literature. In this first step, we
attempt to address the following research question:</p>
      <p>RQ: Who are the key players disseminating
information of cloud computing data security
breaches on social media?
2
2.1</p>
      <p>Literature Review</p>
      <p>
        Cloud Computing
Cloud computing emerged as a computing model
rooted in various technology innovations such
as virtualization and web services
        <xref ref-type="bibr" rid="ref8">(Foster et al.,
2008)</xref>
        . Cloud computing can be defined as a
computing model that enables the provision of
ubiquitous, network-based, and on-demand services to
users
        <xref ref-type="bibr" rid="ref3">(Armbrust et al., 2010)</xref>
        . With cloud
computing, services and infrastructure that were
traditionally provided locally are remotely accessed,
consumed and paid for through a web browser or an
application interface
        <xref ref-type="bibr" rid="ref22">(Marston et al., 2011)</xref>
        . Cloud
computing can be classified as: private model,
where the cloud is solely operated by a single
organization; public model, where it is open to the
general public; community model, which allows
organizations with common interests to set up and
access the same cloud; and hybrid model, which
is a combination of any of the three previous
models
        <xref ref-type="bibr" rid="ref12 ref24 ref35 ref4">(Mell and Grance, 2011)</xref>
        . Additionally, cloud
computing services can be categorized as:
Software as a Service (SaaS), encompassing web
applications; Platform as a Service (PaaS), which
offers software development environments over the
web; and Infrastructure as a Service (IaaS), which
provides users with access to storage and
comput
        <xref ref-type="bibr" rid="ref26">ational power (Youseff et al., 2008</xref>
        ). All these
types of cloud computing come not only with
benefits but also with potential risks for users
        <xref ref-type="bibr" rid="ref18">(Ko et
al., 2011)</xref>
        .
      </p>
      <p>
        Prior studies recognized data security risk as
a serious threat to cloud computing
        <xref ref-type="bibr" rid="ref13">(Jaeger et
al., 2008)</xref>
        . For example, research by Belian and
Hess (2011) and
        <xref ref-type="bibr" rid="ref34">Wu et al. (2011</xref>
        ) found that
security risks were negatively affecting SaaS use
in ente
        <xref ref-type="bibr" rid="ref11">rprises. Zhang et al. (2010</xref>
        ), on the other
hand, developed an information security
framework for cloud computing that emphasizes the
role of risk analysis, assessment, and mitigation.
Whereas Chan et al. (2012) proposed a risk
framework made up of event identification, risk
assessment, risk response, information and
communication and monitoring. These studies, however,
do not consider the involvement of users in
dataprotection initiatives.
2.2
      </p>
      <p>
        Risk Communication on Social Media
Risk communication can be defined as a process of
exchanging information among interested parties
about the nature, magnitude, significance and
control of a risk
        <xref ref-type="bibr" rid="ref7">(Covello et al., 1998)</xref>
        . Risk
communication has become highly important in risk
mitigation and damage control in areas such as homeland
security
        <xref ref-type="bibr" rid="ref14 ref28">(Jung and Park, 2014)</xref>
        , and earthquake
occurrence
        <xref ref-type="bibr" rid="ref25">(Nigg, 2006)</xref>
        .
      </p>
      <p>
        With the rapid evolution of IT, risk
communication is shifting towards social network sites
(SNS). SNS can be defined as applications based
on Web 2.0 that serve as platforms where users
create and distribute content
        <xref ref-type="bibr" rid="ref15 ref35">(Kaplan and
Haenlein, 2010)</xref>
        . These platforms facilitate sharing
information in real time for a rapid diffusion. For
example, Yates and Paquette (2011) studied the use
of social media during the ea
        <xref ref-type="bibr" rid="ref11">rthquake in Haiti in
2010</xref>
        . Likewise, Bird et al. (2012) addressed how
citizens and rescue organizations relied on social
media during the Queensland and Victo
        <xref ref-type="bibr" rid="ref11">rian floods.
Goolsby (2010</xref>
        ) also highlighted the heavy use of
Twitter in communicating the areas to avoid
during the Mumbai attack in 2009. In short, prior
research focuses on the use of social media in
highrisk environments with potential human or
property loss. However, to the best of our knowledge,
no study has been conducted to understand how
this same channel can be used to prevent or
mitigate data security risks.
      </p>
    </sec>
    <sec id="sec-2">
      <title>Premera Blue Cross is a health insurance company</title>
      <p>
        based in Mountlake Terrace, Washington, USA.
On March 17th, 2015, the company announced
that it had suffered a security breach and that data
from 11 million users might have been
compromised
        <xref ref-type="bibr" rid="ref23 ref24">(Matthews and Yadron, 2015)</xref>
        . The
Premera Blue Cross data security breach is an
example of a typical cyber attack through a web
application. Web applications and services are among
cloud computing key core technologies
        <xref ref-type="bibr" rid="ref22">(Marston
et al., 2011)</xref>
        . Hence, understanding data security
breaches in this technology and the associated risk
mitigation can accurately reflect cloud computing
vulnerabilities
        <xref ref-type="bibr" rid="ref12">(Grobauer et al., 2011)</xref>
        .
3
3.1
      </p>
      <sec id="sec-2-1">
        <title>Data Collection and Analysis</title>
        <sec id="sec-2-1-1">
          <title>Data Collection</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>We collected public data from Twitter based on</title>
      <p>
        the keyword Premera from March 18th, 2015
to March 31st, 2015, spanning a 14-day period.
Twitter is a microblogging SNS that allows users
to send 140-characters messages known as tweets,
respond to tweets using Retweets (RT),
mentions (@user), and hashtags (#wo
        <xref ref-type="bibr" rid="ref11">rd) (Kwak et
al., 2010</xref>
        ). Twitter was chosen in our study
because recent studies found that organizations and
individuals rely heavily on Twitter for risk
communication during protests, environmental
disasters, homeland security risks, or political
campaigns
        <xref ref-type="bibr" rid="ref1 ref14 ref28">(Achrekar et al., 2011; Jung and Park,
2014)</xref>
        . We used NodeXL for data collection.
Node XL, developed by the Social Media
Research Foundation, is a plugin for Microsoft Excel
that allows the collection and analysis of multiple
social media data (Smit
        <xref ref-type="bibr" rid="ref19">h et al., 2010</xref>
        ). NodeXL
was used in our study because it serves as a robust
tool for data analysis and for deriving knowledge
from complex social media interactions
        <xref ref-type="bibr" rid="ref16 ref17 ref5 ref6">(Kim and
Park, 2012)</xref>
        .
3.2
      </p>
      <sec id="sec-3-1">
        <title>Data Analysis</title>
        <p>
          We relied on Social Network Analysis (SNA), a
useful and reliable methodology for data analysis
and visualization. Based on Perer
          <xref ref-type="bibr" rid="ref26">and
Shneidermans (2008</xref>
          ) research, we measured various
network indicators for the collected data. First, we
examined social network graph metrics for the
overall Premera Blue Cross data security breach,
including number of vertices, edges, unique edges,
and duplicate edges. Second, we analyzed
vertices degrees, centrality measures, and page rank.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Third, we plotted vertices metrics to identify information sources and brokers. Table 1 shows the definitions of the key terminologies related to SNA.</title>
      <sec id="sec-4-1">
        <title>Metrics</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Vertex</title>
    </sec>
    <sec id="sec-6">
      <title>Edge</title>
    </sec>
    <sec id="sec-7">
      <title>Degree</title>
    </sec>
    <sec id="sec-8">
      <title>Betweenness</title>
    </sec>
    <sec id="sec-9">
      <title>Centrality</title>
    </sec>
    <sec id="sec-10">
      <title>Bridge Score</title>
    </sec>
    <sec id="sec-11">
      <title>Eigenvector</title>
    </sec>
    <sec id="sec-12">
      <title>Centrality or</title>
      <sec id="sec-12-1">
        <title>Definitions</title>
      </sec>
    </sec>
    <sec id="sec-13">
      <title>A single element count of the primary entity of a network. In the case of Twitter, a vertex represents a Twitter user</title>
    </sec>
    <sec id="sec-14">
      <title>An element that connects two</title>
      <p>vertices. In the Twitter context,
an edge could be a tweet, a
retweet (RT) or a mention (@)
This element measures the
total number of edges connected
to a particular vertex. In-degree
measures the connections
pointing inward to a vertex.
Outdegree measures the connections
originating from a vertex</p>
    </sec>
    <sec id="sec-15">
      <title>A metric that indicates how</title>
      <p>much disruption to other
connections can cause the removal
of a vertex in the network
A metric that measures the
quality of connections of a vertex. A
vertex with higher connections
yields a higher eigenvector value
(PageRank is a variant of this
metric)</p>
    </sec>
    <sec id="sec-16">
      <title>NodeXL calculates graph metrics related to</title>
    </sec>
    <sec id="sec-17">
      <title>SNS by using an algorithm developed by the So</title>
      <p>cial Network Analysis Project (SNAP) at Stanford</p>
    </sec>
    <sec id="sec-18">
      <title>University (Leskovec et al., 2011).</title>
      <p>4</p>
      <sec id="sec-18-1">
        <title>Results and Discussion</title>
        <p>Data collection yielded a total of 15 592 tweets
from 8 689 unique Twitter accounts.
Average geodesic distance is 6.16, with a maximum
geodesic distance of 17, and a graph density of
0.00005451 (see Table 2). These results suggest
low-affinity relationships between Twitter users in
the Premera data security breach network. Table 3
and Table 4 show that top five words and hashtags
were related to Premera Blue Cross data security
breach, suggesting reliability of the collected data.
Graph Metric
Graph Type
Vertices
Unique Edges
Edges with Duplicates
Total Edges
Maximum Geodesic
Distance (Diameter)
Average Geodesic
Distance
Graph Density</p>
        <p>From an inspection of Figure 1, results indicate
that Premera Blue Cross (@premera) took the lead
on Twitter during communication of the crisis
(Betweenness Centrality = 1753201.512, PageRank =
63.020546, In-degree = 205). This result suggests
that the institution that received the attack (i.e.,
Premera) became the source of information for
information seekers. Twitterers concerned about this
data security breach turned to the Premera Blue
Cross Twitter account to gather relevant and
accurate information.</p>
        <p>The Seattle Times (@Seattletimes) is a provider
of news and information established in Seattle
(Washington, USA), the same city in where
Premera Blue Cross Headquarters is located. The
geographical proximity between both institutions
may explain the bridging role played by the former
during the crisis. Considering that a great number
of Premeras stakeholders are located in the Seattle
area, results suggest that these stakeholders turned
to this channel of local news for information about
the Premera Blue Cross crisis.</p>
        <p>Dark Reading (@darkreading), Brian Krebs
(@briankrebs), TechCrunch (@techcrunch), Gary
Davis (@garyjdavis), and SC Magazine
(@sc</p>
        <p>Top Hashtags in
Tweet in Entire
Graph
infosec
premera
security
healthcare
databreach</p>
        <p>Entire
Count
magazine), hereinafter referred to as the tech
community, represent IT security specialists or
technology-specific news media. As Twitter
participants recognize the tech community to be
specialists in information security and hence a reliable
source of information, they relayed information
coming from their accounts, making them pivotal
bridges during the Premera Blue Cross data
security breach.</p>
        <p>
          In other words, Premera Blue Cross
(@Premera) acted as a source of information on
Twitter, while other key actors became intermediaries
in relaying information about this data security
breach. These findings are in line with previous
research suggesting: (1) problem recognition and
level of involvement predict information seeking
and dissemination behavior
          <xref ref-type="bibr" rid="ref12 ref24 ref35 ref4 ref5">(Yates and Paquette,
2011; Bird et al., 2012)</xref>
          , and (2) a limited number
of actors such as public figures, journalists, and
mass media play an intermediary role during
crisis communications
          <xref ref-type="bibr" rid="ref27">(Perko, 2011)</xref>
          .
5 Implications
Our study presents a new perspective that shows
that data security is a cloud stakeholders issue
rather than cloud providers responsibility. Also,
our findings indicate that social media populations
turned toward the application provider for accurate
information during these events. Cloud providers
should be prepared to take the lead, and this can
be achieved by creating and reinforcing their
social media presence. For instance, cloud providers
could engage actively in risk communication by
raising risk awareness on social media and
educating their followers on security procedures.
        </p>
        <p>Second, considering that the tech community
and local news media play an intermediary role
during risk communication on social media, cloud
providers can engage in partnerships with IT
secuA
R
e
g
a
P
(
rity firms and specialists, local news media based
on clients and partners location and recommend
that all stakeholders follow those accounts for
relevant and accurate information to safeguard data
and mitigate damages.
6</p>
        <p>Conclusions
This study highlights the need for a good risk
communication during a security breach, which should
involve all cloud-computing stakeholders. Our
study makes recommendations on the steps to be
taken by cloud providers to ensure that clients and
partners remain reliably informed before and after
any data security breach. Nevertheless, this study
presents some limitations. First, the present study
only analyzes risk communication for a data
security breach coming from web applications, one
of the core technologies of cloud computing.
Second, the present study only considers risk
communication on Twitter, a single popular social media.</p>
        <p>Future steps in our study include the analysis of
communication patterns and the inclusion of
theories that may help to explain the phenomenon
under study.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Achrekar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Gandhe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Lazarus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. H.</given-names>
            <surname>Yu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>B.</given-names>
            <surname>Liu</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Predicting flu trends using Twitter data</article-title>
          .
          <source>In Proc. 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS</source>
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>B. E.</given-names>
            <surname>Aguirre</surname>
          </string-name>
          .
          <year>2004</year>
          .
          <article-title>Homeland security warnings: Lessons learned and unlearned</article-title>
          .
          <source>International Journal of Mass Emergencies and Disasters</source>
          ,
          <volume>22</volume>
          (
          <issue>2</issue>
          ):
          <fpage>103</fpage>
          -
          <lpage>115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Armbrust</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fox</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Griffith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. D.</given-names>
            <surname>Joseph</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Katz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Konwinski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Patterson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rabkin</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Stoica</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zahaira</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>Clearing the clouds away from the true potential and obstacles posed by this computing capability</article-title>
          .
          <source>Communications of the ACM</source>
          ,
          <volume>53</volume>
          (
          <issue>4</issue>
          ):
          <fpage>50</fpage>
          -
          <lpage>58</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Benlian</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Hess</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Opportunities and risks of software-as-a-service: Findings from a survey of IT executives</article-title>
          .
          <source>Decision Support Systems</source>
          ,
          <volume>52</volume>
          (
          <issue>1</issue>
          ):
          <fpage>232</fpage>
          -
          <lpage>246</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Bird</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Ling</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Haynes</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Flooding facebook: The use of social media during the queensland and victorian floods</article-title>
          .
          <source>Australian Journal of Emergency Management</source>
          ,
          <volume>27</volume>
          (
          <issue>1</issue>
          ):
          <fpage>27</fpage>
          -
          <lpage>33</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>W.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Leung</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Pili</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Enterprise risk management for cloud computing</article-title>
          .
          <source>Committee of Sponsoring Organizations of the Treadway Commission.</source>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>V. T.</given-names>
            <surname>Covello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. M.</given-names>
            <surname>Sandman</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Slovic</surname>
          </string-name>
          .
          <year>1998</year>
          .
          <article-title>Risk communication, risk statistics and risk comparisons: A manual for plant managers</article-title>
          .
          <source>Chemical Manufacturers Association</source>
          , Washington D.C.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>I.</given-names>
            <surname>Foster</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Raicu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Lu</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Cloud computing and grid computing 360-degree compared</article-title>
          .
          <source>In Proc. Grid Computing Environments Workshop</source>
          <year>2008</year>
          (GCE
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <surname>Gartner</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Gartner identifies the top 10 strategic technologies for 2012</article-title>
          . Gartner.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>J. P. G.</given-names>
            <surname>Gashami</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. J.</given-names>
            <surname>Rho</surname>
          </string-name>
          , and M.-
          <string-name>
            <given-names>C.</given-names>
            <surname>Park</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Privacy concerns and benefits in SaaS adoption by individual users: A trade-off approach</article-title>
          .
          <source>Information Development. doi:10</source>
          .1177/ 0266666915571428.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Goolsby</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>Social media as crisis platform</article-title>
          .
          <source>ACM Transactions on Intelligent Systems and Technology</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Grobauer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Walloschek</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Stcker</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Understanding cloud computing vulnerabilities</article-title>
          .
          <source>IEEE Security and Privacy</source>
          ,
          <volume>9</volume>
          (
          <issue>2</issue>
          ):
          <fpage>50</fpage>
          -
          <lpage>57</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <surname>P. T. Jaeger</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>and J. M.</given-names>
          </string-name>
          <string-name>
            <surname>Grimes</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Cloud computing and information policy: Computing in a policy cloud?</article-title>
          <source>Journal of Information Technology and Politics</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          ):
          <fpage>269</fpage>
          -
          <lpage>283</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Jung</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. W.</given-names>
            <surname>Park</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>Citizens social media use and homeland security information policy: Some evidences from twitter users during the 2013 North Korea nuclear test</article-title>
          .
          <source>Government Information Quarterly</source>
          ,
          <volume>31</volume>
          (
          <issue>4</issue>
          ):
          <fpage>563</fpage>
          -
          <lpage>573</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Kaplan</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Haenlein</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>Users of the world, unite! the challenges and opportunities of social media</article-title>
          .
          <source>Business Horizons</source>
          ,
          <volume>53</volume>
          (
          <issue>1</issue>
          ):
          <fpage>59</fpage>
          -
          <lpage>68</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Kim</surname>
          </string-name>
          and
          <string-name>
            <given-names>H. W.</given-names>
            <surname>Park</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Measuring twitterbased political participation and deliberation in the South Korean context by using social network and Triple Helix indicators</article-title>
          .
          <source>Scientometrics</source>
          ,
          <volume>90</volume>
          (
          <issue>1</issue>
          ):
          <fpage>121</fpage>
          -
          <lpage>140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>N. J.</given-names>
            <surname>King</surname>
          </string-name>
          and
          <string-name>
            <given-names>V. T.</given-names>
            <surname>Raja</surname>
          </string-name>
          .
          <year>2012</year>
          .
          <article-title>Protecting the privacy and security of sensitive customer data in the cloud</article-title>
          .
          <source>Computer Law and Security Review</source>
          ,
          <volume>28</volume>
          (
          <issue>3</issue>
          ):
          <fpage>308</fpage>
          -
          <lpage>319</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <surname>R. K. L. Ko</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Jagadpramana</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Mowbray</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Pearson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Kirchberg</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          <string-name>
            <surname>Liang</surname>
            , and
            <given-names>B. S.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>TrustCloud: A framework for accountability and trust in cloud computing</article-title>
          .
          <source>In Proc. 2011 IEEE World Congress on Services (SERVICES</source>
          <year>2011</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Kwak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Park</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Moon</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>What is Twitter: A Social Network or a News Media?</article-title>
          <source>In Proc. International World Wide Web Conference Committee (IW3C2).</source>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Lagadec</surname>
          </string-name>
          .
          <year>2002</year>
          .
          <article-title>Crisis management in france: Trends, shifts and perspectives</article-title>
          .
          <source>Journal of Contingencies and Crisis Management</source>
          ,
          <volume>10</volume>
          (
          <issue>4</issue>
          ):
          <fpage>159</fpage>
          -
          <lpage>172</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Leskovec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. J.</given-names>
            <surname>Lang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Dasgupta</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. W.</given-names>
            <surname>Mahoney</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters</article-title>
          .
          <source>Internet Mathematics</source>
          ,
          <volume>6</volume>
          (
          <issue>1</issue>
          ):
          <fpage>29</fpage>
          -
          <lpage>123</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Marston</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bandyopadhyay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>A.</given-names>
            <surname>Ghalsasi</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Cloud computing the business perspective</article-title>
          .
          <source>Decision Support Systems</source>
          ,
          <volume>51</volume>
          (
          <issue>1</issue>
          ):
          <fpage>176</fpage>
          -
          <lpage>189</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <string-name>
            <given-names>A. W.</given-names>
            <surname>Matthews</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Yadron</surname>
          </string-name>
          .
          <year>2015</year>
          .
          <article-title>Premera Blue Cross says cyberattack could affect 11 million members</article-title>
          . http://www.wsj.com. [Online; accessed 15-November-2015].
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>P.</given-names>
            <surname>Mell</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Grance</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>The NIST definition of cloud computing [Recommendations of the National Institute of Standards</article-title>
          and
          <string-name>
            <surname>Technology-Special Publication</surname>
          </string-name>
          800-145]. http://csrc.nist.gov/publications/ nistpubs/800-145/
          <fpage>SP800</fpage>
          -145.pdf. [Online; accessed 15-November-2015].
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>J. M.</given-names>
            <surname>Nigg</surname>
          </string-name>
          .
          <year>2006</year>
          .
          <article-title>Communication under conditions of uncertainty: Understanding earthquake forecasting</article-title>
          .
          <source>Journal of Communication</source>
          ,
          <volume>32</volume>
          (
          <issue>1</issue>
          ):
          <fpage>27</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Perer</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Shneiderman</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Integrating statistics and visualization: Case Studies of gaining clarity during exploratory data analysis</article-title>
          .
          <source>In Proc. Human Factors in Computing Systems (CHI'08).</source>
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Perko</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Importance of risk communication during and after a nuclear accident</article-title>
          .
          <source>Integrated Environmental Assessment and Management</source>
          ,
          <volume>7</volume>
          (
          <issue>3</issue>
          ):
          <fpage>388</fpage>
          -
          <lpage>392</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Rainie</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Duggan</surname>
          </string-name>
          .
          <year>2014</year>
          . Heartbleeds Impact. http://www.pewinternet.org/
          <year>2014</year>
          /04/30/heartbleeds-impact/. [Online; accessed 15-March-2016].
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Shneiderman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Milic-Frayling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. M.</given-names>
            <surname>Rodrigues</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Barash</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Dunne</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Capone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Perer</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Gleave</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>NodeXL: A free and open network overview, discovery and exploration add-in for</article-title>
          <source>Excel</source>
          <year>2007</year>
          /
          <year>2010</year>
          . http://nodexl. codeplex.com/. [Online; accessed 15-
          <fpage>March2016</fpage>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Staten</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. E.</given-names>
            <surname>Nelson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bartoletti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Herbert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Martorelli</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Baltazar</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>Predictions 2015: The days of fighting the cloud are over</article-title>
          .
          <source>Forrester.</source>
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Theocharis</surname>
          </string-name>
          .
          <year>2013</year>
          .
          <article-title>The wealth of (occupation) networks? communication patterns and information distribution in a twitter protest network</article-title>
          .
          <source>Journal of Information Technology and Politics</source>
          ,
          <volume>10</volume>
          (
          <issue>1</issue>
          ):
          <fpage>35</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          <string-name>
            <surname>Verizon</surname>
          </string-name>
          .
          <year>2014</year>
          .
          <article-title>2014 data breach investigations report</article-title>
          .
          <source>Verizon Business Journal</source>
          ,
          <year>2014</year>
          (1):
          <fpage>1</fpage>
          -
          <lpage>60</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Wright</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Hinson</surname>
          </string-name>
          .
          <year>2009</year>
          .
          <article-title>An analysis of the increasing impact of social and other new media on public relations practice</article-title>
          .
          <source>In Proc. 12th Annual International Public Relations Research Conference.</source>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          <string-name>
            <surname>W.-W. Wu</surname>
            ,
            <given-names>L. W.</given-names>
          </string-name>
          <string-name>
            <surname>Lan</surname>
            , and
            <given-names>Y.-T.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Exploring decisive factors affecting an organizations saas adoption: A case study</article-title>
          .
          <source>International Journal of Information Management</source>
          ,
          <volume>31</volume>
          (
          <issue>6</issue>
          ):
          <fpage>556</fpage>
          -
          <lpage>563</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Yates</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Paquette</surname>
          </string-name>
          .
          <year>2011</year>
          .
          <article-title>Emergency knowledge management and social media technologies: A case study of the 2010 haitian earthquake</article-title>
          .
          <source>International Journal of Information Management</source>
          ,
          <volume>31</volume>
          (
          <issue>1</issue>
          ):
          <fpage>6</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <given-names>L.</given-names>
            <surname>Youseff</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Butrico</surname>
          </string-name>
          , and
          <string-name>
            <given-names>D.</given-names>
            <surname>Silva</surname>
          </string-name>
          .
          <year>2008</year>
          .
          <article-title>Toward a unified ontology of cloud computing</article-title>
          .
          <source>In Proc. Grid Computing Environments Workshop (GCE</source>
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Wuwong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>and X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>Information security risk management framework for the cloud computing environments</article-title>
          .
          <source>In Proc. IEEE 10th International Conference on Computer and Information Technology (CIT</source>
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          <string-name>
            <surname>M. Zhou</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Zhang</surname>
            ,
            <given-names>W.</given-names>
            Xie, W.
          </string-name>
          <string-name>
            <surname>Qian</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Zhou</surname>
          </string-name>
          .
          <year>2010</year>
          .
          <article-title>Security and privacy in cloud computing: A survey</article-title>
          .
          <source>In Proc. 6th International Conference on Semantics, Knowledge and Grids.</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>