<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Data Mining Usage for Social Networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>National Aviation University</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ukraine ganna.martyniuk@gmail.com</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>0000</fpage>
      <lpage>0003</lpage>
      <abstract>
        <p>The authors present in this work information about social media and data mining usage for that. It is represented information about social networking sites, where Facebook dominates the industry by boasting an account of 85% of the internet users worldwide. Applying data mining techniques to large social media data sets has the potential to continue to improve search results for everyday search engines, realize specialized target marketing for businesses, help psychologist study behavior, provide new insights into social structure for sociologists, personalize web services for consumers, and even help detect and prevent spam for all of us. The most common data mining applications related to social networking sites is represented. Authors have also given information about different data mining techniques and list of these techniques. It is important to protect personal privacy when working with social network data. Recent publications highlight the need to protect privacy as it has been shown that even anonymizing this type of data can still reveal personal information when advanced data analysis techniques are used. A whole range of different threat of social networks is represented. Authors explain cyber hygiene behaviors in social networks, such as backing up data, identity theft and online behavior.</p>
      </abstract>
      <kwd-group>
        <kwd>social media</kwd>
        <kwd>data mining</kwd>
        <kwd>cyber hygiene</kwd>
        <kwd>media platforms</kwd>
        <kwd>threats of social networks</kwd>
        <kwd>data mining techniques</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Social media plays a vital role in our daily life. Websites like Facebook, Twitter, and
Instagram are the most common social channels used to connect with our loved ones.
With over 2.77 billion social media users today, such social media websites make a
perfect platform for identity thefts. With huge user database of private information, it
is the responsibility of social media platforms to keep personal information safe [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Many companies are eager to analyze huge amounts of social network data to take
advantage of this social phenomenon. Social network data mining is one of the hottest
research topics. The application of efficient data mining techniques has made it
possible for users to discover valuable, accurate and useful knowledge from social network
data [
        <xref ref-type="bibr" rid="ref1 ref5 ref9">1, 5, 9</xref>
        ]. But today there is a whole range of different threats in social networks.
At this paper will be described data mining usage as threat in social networks.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Publications analysis. Problem statement</title>
      <p>
        The use of the Internet social networks makes it possible to communicate with old
friends, make new acquaintances, express their thoughts on a very wide audience, join
groups of interest. By coverage of audiences some groups in social networks and
popular bloggers can compete with many media. According to efficiency information
transmission social networks are often superior to most of media, they are able to
disseminate information around the world in seconds, thereby expediting the progress
of operation, but this does not mean that television and radio have lost their popularity
[
        <xref ref-type="bibr" rid="ref1 ref10 ref3 ref5 ref8">1, 3, 5, 8, 10</xref>
        ].
      </p>
      <p>
        The structure of the social media data is unorganized and is displayed in different
forms such as: text, voice, images, and videos [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Moreover, the social media
provides an enormous amount of continuous real time data that makes traditional
statistical methods unsuitable to analyze this massive data [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. Therefore, the data mining
techniques can play an important role in overcoming this problem.
      </p>
      <p>
        But in [
        <xref ref-type="bibr" rid="ref13 ref14">14, 13</xref>
        ] describes that data mining can be used in conjunction of social
media to deliver malware for cybercrime. So authors present in this paper data mining
usage and describe threats for social networks.
3
      </p>
    </sec>
    <sec id="sec-3">
      <title>Social networking sites</title>
      <p>
        A social networking site is an online platform which people use to build social
networks or social relationship with other people who share similar personal or career
interests, activities, backgrounds or real-life connections [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>The social network is distributed across various computer networks. The social
networks are inherently computer networks, linking people, organization, and knowledge.
Social networking services vary in format and the number of features. They can
incorporate a range of new information and communication tools, operating on desktops and
on laptops, on mobile devices such as tablet computers and smartphones. They may
feature digital photo/video/sharing and "web logging" diary entries online (blogging).
Social networking sites provide a space for interaction to continue beyond in person
interactions. These computers mediated interactions link members of various networks
and may help to both maintain and develop new social ties.</p>
      <p>Social networking sites provide excellent sources of data for studying collaboration
relationships, group structure, and who-talks-to-whom. The most common graph
structure based on a social networking site is intuitive; users are represented as nodes
and their relationships are represented as links. Users can link to group nodes as well.</p>
      <p>
        Social networking sites allow users to share ideas, digital photos and videos, posts,
and to inform others about online or real-world activities and events with people in
their network. Depending on the social media platform, members may be able to
contact any other member. In other cases, members can contact anyone they have a
connection to, and subsequently anyone that contact has a connection to, and so on.
In today’s social networking era, Facebook dominates the industry by boasting an
account of 85% of the internet users worldwide (Fig. 1) [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
Social networking apps are going to grow even bigger as people adopt them into their
everyday lives. Here we have listed the mobile-first social media platforms. But the
Facebook mobile app would dominate this list with 1.37 billion monthly active users.
As smartphones’ adoption continues, the share of the desktop use of social media
platforms will fall [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>Data mining in social media</title>
      <p>
        Applying data mining techniques to large social media data sets has the potential to
continue to improve search results for everyday search engines, realize specialized
target marketing for businesses, help psychologist study behavior, provide new
insights into social structure for sociologists, personalize web services for consumers,
and even help detect and prevent spam for all of us [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Additionally, the open access
to data provides researches with unprecedented amounts of information to improve
performance and optimize data mining techniques. The advancement of the data
mining field itself relies on large data sets and social media is an ideal data source in the
frontier of data mining for developing and testing new data mining techniques for
academic and corporate data mining researchers.
      </p>
      <p>
        The driving factors for data mining social networking sites is the “unique
opportunity to understand the impact of a person’s position in the network on everything
from their tastes to their moods to their health.” [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The most common data mining
applications related to social networking sites include:
      </p>
      <p>1. Group detection – One of the most popular applications of data mining to social
networking sites is finding and identifying a group. In general, group detection applied
to social networking sites is based on analyzing the structure of the network and finding
individuals that associate more with each other than with other users. Understanding
what groups an individual belongs to can help lead to insights about the individual such
as what activities, goods, and services, an individual might be interested in.</p>
      <p>
        2. Group profiling – Once a group is found, the next logical question to ask is
‘What is this group about’ (i.e., the group profile)? The ability to automatically profile
a group is useful for a variety purposes ranging from purely scientific interests to
specific marketing of goods, services, and ideas [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. With millions of groups present
in online social media, it is not practical to attempt to answer the question for each
group manually.
      </p>
      <p>3. Recommendation systems – A recommendation system analyzes social
networking data and recommends new friends or new groups to a user. The ability to
recommend group membership to an individual is advantageous for a group that would like
to have additional members and can be helpful to an individual who is looking to find
other individuals or a group of people with similar interests or goals. Again, large
numbers of individuals and groups make this an almost impossible task without an
automated system. Additionally, group characteristics change over time. For those
reasons, data mining algorithms drive the inherent recommendations made to users.
From the moment a user profile is entered into a social networking site, the site
provides suggestions to expand the user’s social network. Much of the appeal of social
networking sites is a direct result of the automated recommendations which allow a
user to rapidly create and expand an online social network with relatively little effort
on the user’s part.</p>
      <p>
        Data mining is a powerful tool which will facilitate to seek out hidden patterns and
various relationship between the data. Data processing discovers hidden facts from
massive databases. The overall objective of the data mining technique is to extract
information from a huge data set and transform it into a comprehensible structure for
more use. The different data Mining techniques are [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]:
      </p>
      <p>I. Characterization – used to generalize, summarize and possibly different data
characteristics.</p>
      <p>II. Classification – is a process in which the given data is classified into different
classes.</p>
      <p>III. Regression – is process similar to classification, the major difference is that the
object to be predicted is continuous rather than discrete.</p>
      <p>IV. Association – discovers the association between various data bases and the
association between the attributes of single database.</p>
      <p>V. Clustering – involves grouping of data into several new classes such that it
describes the data. It breaks large data set into smaller groups to make the designing and
implementation process to be simple.</p>
      <p>VI. Change Detection – this method identifies the significant changes in the data
from the previously measured values.</p>
      <p>VII. Deviation Detection – focuses on the major deviations between the actual
values of the objects and its expected values. This method finds out the deviation
according to the time as well the deviation among different subsets of data.</p>
      <p>VIII. Link Analysis – traces the connections between the objects to develop models
based on the patterns in the relationships by applying graph theory techniques.</p>
      <p>IX. Sequential Pattern Mining – involves the discovery of the frequently occurring
patterns in the data.</p>
      <p>Social network finds its application in several business activities like
Coinnovation, Customer service, General promoting, increasing spoken promoting,
marketing research, plan generation and new development, publicity, worker
communication and reputation management.</p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] identified 19 data mining techniques that had been applied by researchers in
the area of social media. The list of these techniques is presented below:
 AdaBoost,
 Artificial Neural Network (ANN),
 Apriori,
 Bayesian Networks (BN),
 Decision Trees (DT),
 Density Based Algorithm (DBA),
 Fuzzy,
 Genetic Algorithm (GA),
 Hierarchical Clustering (HC),
 K-Means,
 k-nearest Neighbors (k-NN),
 Linear Discriminant Analysis (LDA),
 Linear-Regression (Lin-R),
 Logistic Regression (LR),
 Markov,
 Maximum Entropy (ME),
 Novel,


      </p>
      <sec id="sec-4-1">
        <title>Support Vector Machine (SVM), Wrapper.</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Cyber hygiene behaviors in social media</title>
      <p>
        It is important to protect personal privacy when working with social network data.
Recent publications highlight the need to protect privacy as it has been shown that
even anonymizing this type of data can still reveal personal information when
advanced data analysis techniques are used [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Privacy settings also can limit the ability
of data mining applications to consider every piece of information in a social network.
However, some nefarious techniques can be employed to usurp privacy settings.
      </p>
      <p>
        These days is a whole range of different threat in social networks [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
1. Social engineering is the most popular tactic for cyber criminals. Social
networks allow attackers to find confidential information that can be used for property
and moral damages.
      </p>
      <p>2. Friends. The trust to those who entered in the “friends” list is always higher than
to random people. On the one hand, this is good, since forming a loyal audience
around the company, brand or person. But on the other hand, it is an opportunity for
attackers.</p>
      <p>3. Possibility of substitution of person or masquerade: for sure it is not clear
exactly who hide their actions behind the name of friends or hiding behind photos friends
in social network profile.</p>
      <p>4. Stealing passwords and phishing. As the identification of social networks uses
passwords, it is sufficient to know the sequence of characters and can be possible to
send advertising, some information on behalf of others, or to motivate recipients to
any negative action, in particular to pass on the link and run the malicious code, and
do other (often illegal) cases.</p>
      <p>5. URL shortening services usage. In recent years, URL shortening services allow
to mask unwanted website address under the short link are especially popular.</p>
      <p>6. Using the same user names and passwords on the corporate network and external
social resources. As a result, hacking profiles of social network users significantly
increases the risk of penetration to corporate resources on behalf of one of the
company’s employees.</p>
      <p>7.Web-attack. As social networks are web-based applications, they can be used by
hackers to organize attacks on vulnerabilities in browsers. The tools for such attacks
can be Trojan applications, fake antiviruses, social worms, which are used to spread
own friends lists and other. Their main goal is to get into the information system of
social network visitor and gain a foothold in it.</p>
      <p>8. Information leakage and compromising company employee’s behavior. Social
networks can be used to organize leaks of important information for the company, as
well as to undermine its reputation.</p>
      <p>
        According these threats in [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] was prepared cyber hygiene behaviors (fig.3).
      </p>
      <sec id="sec-5-1">
        <title>More information of these behaviors will be presented below.</title>
        <p>5.1</p>
        <sec id="sec-5-1-1">
          <title>Backing up data</title>
          <p>Data backup is a process of duplicating data to allow retrieval of the duplicate set
after a data loss event. Today, there are many kinds of data backup services that help
enterprises and organizations ensure that data is secure and that critical information is
not lost in a natural disaster, theft situation or other kind of emergency.</p>
          <p>In the early days of personal computers (PC), the common data backup method
was to download data from a computer’s hard drive onto a set of small floppy disks,
which were stored in physical containers. Since then, the emergence of solid-state
technologies, wireless systems and other innovations have led to situations where IT
managers have the option of backing up data remotely or downloading huge amounts
of data into small portable devices. Cloud services and related options facilitate easy
remote data storage, so that data is secure if an entire facility or location is
compromised, while RAID, or mirror, technologies provide automated backup options.</p>
          <p>In addition to remote data backup, there are new methods, such as failback and
failover systems that automatically switch the destination of data when a primary
destination is negatively affected in any way. All of these new options help make data
security stronger as many business and government operations become increasingly
reliant on various types of stored data.</p>
          <p>Today, more than 3 in 4 (78%) persons are backing up their data using one of the
methods below. However, most of them (57%) are still leaving themselves susceptible
to risk by only backing up using one method, rather than backing up online (cloud)
and offline (external hard drive, USB memory, etc.). Among those who are backing
up their information by uploading it to the cloud, only 2 in 5 (43%) are taking the
extra step in ensuring that it’s stored in an encrypted format.
5.2</p>
        </sec>
        <sec id="sec-5-1-2">
          <title>Identity theft</title>
          <p>Identity theft is the unauthorized collection of personal information and its subsequent
use for criminal reasons such as to open credit cards and bank accounts, redirect mail,
set up cellphone service, rent vehicles and even get a job. These actions can mean
severe consequences for the victim, who will be left with bills, charges and a
damaged credit score.</p>
          <p>There are many ways in which an individual's identity can be stolen, but people
may be particularly vulnerable to this crime online, where savvy criminals can gain
access to personal information through a number of avenues. According to the U.S.
Federal Trade Commission, approximately nine million Americans have their
identities stolen each year. This theft is increasingly being perpetrated electronically.</p>
          <p>Identity thieves have a number of avenues for stealing personal information via
electronic means. These include:</p>
          <p>Retrieving stored data from discarded electronic equipment such as PCs,
cellphones and USB memory sticks.</p>
          <p>Stealing personal information using malware such as keystroke logging or spyware.</p>
          <p>Hacking computer systems and databases to gain unauthorized access to large
amounts of personal data. Phishing, or impersonating trusted organizations (such as
the IRS, a bank or large retailer) via email or SMS messages and prompting users to
enter personal financial information.</p>
          <p>Compromising weak login passwords (often through calculated guesswork) to gain
access to a user's online accounts. Using social networking sites to attain enough
personal details to guess email passwords or impersonate the victim in other ways online.</p>
          <p>Diverting victims' emails to attain personal information such as bank and credit
card statements, or to prevent the victim from discovering that new accounts have
been opened in his or her name.</p>
          <p>There are some steps consumers can take to protect their identities, including
ensuring that any transactions they make online use secure data encryption, limiting the
amount of personal information they share online, remaining alert to phishing scams
and keeping a close eye on their banking and credit card statements.
5.3</p>
        </sec>
        <sec id="sec-5-1-3">
          <title>Online behavior</title>
          <p>
            According to [
            <xref ref-type="bibr" rid="ref14">14</xref>
            ] only 36% of Americans who use social media are making sure that
all of their accounts are private. The most common social media platform that
Americans have kept public is Facebook (fig. 4).
Most Americans are not yet adopting some of the key online habits that help ensure
proper cyber hygiene. Less than half (49%) are regularly practicing at least 5 of the
online habits shown below (Fig. 5).
Meanwhile, threats go beyond technology and external hackers. Human fallibility is
often the root cause of breaches. Cyber hygiene must become engrained in an
organization’s daily routine to be effective.
6
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>The rise of social networks gives very strong effects to set of techniques developed
for mining social networks. Social media and its analysis is an important field for
research emerged from sociology, psychology, statistics and graph theory. But, on the
other hand, Social media-enabled cyber crimes are generating at least $3.25bn a year
in global revenue and one in five organizations has been infected with malware
distributed via social media. The authors present in this work information about social
networking sites, the most common data mining applications and a whole range of
different threat of social networks. After that authors explain cyber hygiene behaviors
in social networks, such as backing up data, identity theft and online behavior.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Aggarwal</surname>
            <given-names>C</given-names>
          </string-name>
          (
          <year>2011</year>
          ).
          <article-title>Introduction to social network data analytics</article-title>
          .
          <source>Springer US. Retrieved from DOI:10.1007/978-1-4419-8462-3.</source>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Alexandra</surname>
            <given-names>S</given-names>
          </string-name>
          (
          <year>2019</year>
          ).
          <article-title>10 Tips for Keeping Your Personal Data Safe on Social Media</article-title>
          . In: Cybersecurity Today. Retrieved from https://securitytoday.com/Articles/2019/04/04/10-
          <article-title>Tips-for-Keeping-Your-Personal-Data-Safe-on-Social-Media.aspx?Page=2.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Barbier</surname>
            <given-names>G</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            <given-names>H</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>Data Mining in Social Media</article-title>
          . In:
          <article-title>Aggarwal CC (ed) Social Network Data Analytics</article-title>
          , Watson Research Center, New York, p
          <fpage>327</fpage>
          -
          <lpage>352</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Cortizo</surname>
            <given-names>JC</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carrero</surname>
            <given-names>FM</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gomez</surname>
            <given-names>JM</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monsale</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puertas</surname>
            <given-names>P</given-names>
          </string-name>
          (
          <year>2009</year>
          )
          <article-title>Introduction to mining social media</article-title>
          . In:
          <string-name>
            <surname>Cortizo</surname>
            <given-names>JC</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carrero</surname>
            <given-names>FM</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gomez</surname>
            <given-names>JM</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monsale</surname>
            <given-names>B</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puertas</surname>
            <given-names>P</given-names>
          </string-name>
          <source>(eds) Proceedings of the 1. 1st International Workshop on Mining Social Media</source>
          , p
          <fpage>1</fpage>
          -
          <lpage>3</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Jan</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruby</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Najeeb</surname>
            <given-names>PT</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muttoo</surname>
            <given-names>MA</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>Social Network Analysis and Data Mining</article-title>
          .
          <source>International Journal of Computer Science and Mobile Computing</source>
          <volume>6</volume>
          (
          <issue>6</issue>
          ):
          <fpage>401</fpage>
          -
          <lpage>407</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Kallas</surname>
            <given-names>P</given-names>
          </string-name>
          (
          <year>2018</year>
          )
          <article-title>Top 15 Most Popular Social Networking Sites and Apps</article-title>
          . Retrieved from https://www.dreamgrow.com/top-15
          <string-name>
            <surname>-</surname>
          </string-name>
          most
          <article-title>-popular-social-networking-sites.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Kavanaugh</surname>
            <given-names>AL</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fox</surname>
            <given-names>EA</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sheetz</surname>
            <given-names>SD</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            <given-names>LT</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shoemaker</surname>
            <given-names>DJ</given-names>
          </string-name>
          , et al. (
          <year>2012</year>
          )
          <article-title>Social media use by government: From the routine to the critical, Gov</article-title>
          . Inf. Q.
          <volume>29</volume>
          :
          <fpage>480</fpage>
          -
          <lpage>491</lpage>
          . DOI:
          <volume>10</volume>
          .1016/j.giq.
          <year>2012</year>
          .
          <volume>06</volume>
          .002.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kirichenko</surname>
            <given-names>L</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Radiviliva</surname>
            <given-names>T</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Carlsson</surname>
            <given-names>A</given-names>
          </string-name>
          (
          <year>2017</year>
          )
          <article-title>Detecting Cyber Threats Through Social Network Analysis: Short Survey</article-title>
          .
          <source>Socio Economic Challenges</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>20</fpage>
          -
          <lpage>34</lpage>
          . DOI:
          <volume>10</volume>
          .21272/sec.
          <year>2017</year>
          .1-
          <fpage>03</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Injadat</surname>
            <given-names>MN</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Salo</surname>
            <given-names>F</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nassif</surname>
            <given-names>AB</given-names>
          </string-name>
          (
          <year>2016</year>
          )
          <article-title>Data Mining Techniques in Social Media: A Survey. Neurocomputing</article-title>
          . DOI:
          <volume>10</volume>
          .1016/j.neucom.
          <year>2016</year>
          .
          <volume>06</volume>
          .045.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Irfan</surname>
            <given-names>A</given-names>
          </string-name>
          (
          <year>2019</year>
          )
          <article-title>The Most Popular Social Media Platforms of 2019</article-title>
          . In: Digital Information World. Retrieved from https://www.digitalinformationworld.com/
          <year>2019</year>
          /01/most-popularglobal
          <article-title>-social-networks-apps-infographic</article-title>
          .html.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Murthy</surname>
            <given-names>D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gross</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Takata</surname>
            <given-names>A</given-names>
          </string-name>
          (
          <year>2013</year>
          )
          <article-title>Emergent Data Mining Tools for Social Network Analysis</article-title>
          . In: Bhatnagar V (
          <article-title>ed) Data Mining in Dynamic Social Networks and Fuzzy Systems</article-title>
          , Information Science Reference, Hershey, pp.
          <fpage>41</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Russell</surname>
            <given-names>MA</given-names>
          </string-name>
          (
          <year>2011</year>
          )
          <article-title>Mining the Social Web: Analyzing Data from Facebook,Twitter</article-title>
          , LinkedIn, and
          <article-title>Other Social Media Sites</article-title>
          .
          <source>O'Reilly</source>
          , 332 p.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Torsten</surname>
            <given-names>G</given-names>
          </string-name>
          (
          <year>2019</year>
          )
          <article-title>Cyber Hygiene 101: Implementing Basics Can Go a Long Way</article-title>
          . https://www.securityweek.com/cyber-hygiene-101
          <string-name>
            <surname>-</surname>
          </string-name>
          implementing
          <article-title>-basics-can-go-long-way.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14. Wakefield Research:
          <article-title>Cyber Hygiene Risk Index. Assessment of Americans' Cybersecurity Practices (</article-title>
          <year>2019</year>
          ). Retrieved from https://www-cdn.webroot.com
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Zuber M A</surname>
          </string-name>
          <article-title>Survey of Data Mining Techniques for Social Network Analysis</article-title>
          ,
          <source>Int. J. Res. Comput. Eng. Electron</source>
          .
          <volume>3</volume>
          (
          <issue>2014</issue>
          ), pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Anisimova</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vasylenko</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fedushko</surname>
            <given-names>S</given-names>
          </string-name>
          .
          <article-title>Social Networks as a Tool for a Higher Education Institution Image Creation</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          . Vol
          <volume>2392</volume>
          : COAPSN-2019. P.
          <volume>54</volume>
          -
          <fpage>65</fpage>
          (
          <year>2019</year>
          ). http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2392</volume>
          /paper5.pdf
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Yavorska</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prihunov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Syerov</surname>
            <given-names>Y.</given-names>
          </string-name>
          <article-title>Libraries in Social Networks: Opportunities and Presentations</article-title>
          .
          <source>CEUR Workshop</source>
          . Vol 2392: COAPSN-2019. P.
          <volume>242</volume>
          -
          <fpage>251</fpage>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18. S. Gnatyuk,
          <source>Critical Aviation Information Systems Cybersecurity</source>
          ,
          <article-title>Meeting Security Challenges Through Data Analytics and Decision Support, NATO SPS Series, D: Information and Communication Security</article-title>
          . IOS Press Ebooks, Vol.
          <volume>47</volume>
          , №3, рр.
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Gnatyuk</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kinzeryavyy</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kyrychenko</surname>
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aleksander</surname>
            <given-names>M.</given-names>
          </string-name>
          et al,
          <source>Secure Hash Function Constructing for Future Communication Systems and Networks, Advances in Intelligent Systems and Computing</source>
          , Vol.
          <volume>902</volume>
          , pp.
          <fpage>561</fpage>
          -
          <lpage>569</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>