Asee peer logo

Curating Tweets: A Framework for Using Twitter for Workplace Learning

Download Paper |

Conference

2019 ASEE Annual Conference & Exposition

Location

Tampa, Florida

Publication Date

June 15, 2019

Start Date

June 15, 2019

End Date

June 19, 2019

Conference Session

Technical Session 13: Digital Learning

Tagged Division

Computers in Education

Page Count

19

DOI

10.18260/1-2--32574

Permanent URL

https://peer.asee.org/32574

Download Count

168

Request a correction

Paper Authors

biography

Hieu-Trung Le George Mason University

visit author page

Hieu-Trung Le is pursuing his PhD in Information Technology at George Mason University. He is currently a cybersecurity architect at a large organization, with expertise in leading IT and security engineering implementation, risk management, vulnerability assessment, and ethical hacking. He provides consulting services for both the federal and commercial sectors and served as the subject matter expert for information security domains. His research focuses on engineering education, using social media data and tools to help improve learning for students and professionals in the cybersecurity field.

visit author page

biography

Aditya Johri George Mason University Orcid 16x16 orcid.org/0000-0001-9018-7574

visit author page

Aditya Johri is Associate Professor in the department of Information Sciences & Technology. Dr. Johri studies the use of information and communication technologies (ICT) for learning and knowledge sharing, with a focus on cognition in informal environments. He also examine the role of ICT in supporting distributed work among globally dispersed workers and in furthering social development in emerging economies. He received the U.S. National Science Foundation’s Early Career Award in 2009. He is co-editor of the Cambridge Handbook of Engineering Education Research (CHEER) published by Cambridge University Press, New York, NY. Dr. Johri earned his Ph.D. in Learning Sciences and Technology Design at Stanford University and a B.Eng. in Mechanical Engineering at Delhi College of Engineering.

visit author page

biography

Aqdas Malik George Mason University

visit author page

Aqdas Malik is a Postdoctoral Research Fellow at the Department of Information Sciences and Technology, George Mason University. His multidisciplinary academic and industry experience spans two key disciplines: Human-Computer Interaction and Social Media Communication and Analytics. He is currently engaged in a number of research projects funded by the National Science Foundation (NSF). In some of his recent projects he has applied big data techniques and tools to investigate the role of social media in engaging public and under-represented communities towards STEM education and informal learning.

visit author page

Download Paper |

Abstract

Cybersecurity is a rapidly evolving field where professionals constantly need to keep up with new technologies and retrain. In this paper, we present a study that analyzed social media data and use the findings to aid professionals and students to learn more effectively using Twitter. We analyzed 23,000 cybersecurity related tweets posted on Twitter across two hashtags #cybersecurity and #infosec. Our analysis created a framework that explains how using descriptive, content, and network analysis can generate information that can help professionals learn. In addition, our analysis provided insights on the tweets and the cybersecurity community that use them. These insights include: Most tweets covered multiple topics and used three or more hashtags. Companies and other organizations had the highest numbers of followers, but individual users, experts in the field, were the most retweeted. Popular users, based on follower counts, were not necessarily the most influential (based on retweets). In terms of content, popular tweets consisted of infographics that packed a lot of information. Tweets were commonly used to announce file dumps of hacks and data leaks. Many highly used hashtags represented current threats and the overall sentiment of cybersecurity tweets are negative. Highly connected users on Twitter served as hubs across the three primary sub communities identified in the data. Insights from his study can assist with improving workforce development by guiding professionals in getting pertinent information and keeping up to date with the latest security threats and news.

Le, H., & Johri, A., & Malik, A. (2019, June), Curating Tweets: A Framework for Using Twitter for Workplace Learning Paper presented at 2019 ASEE Annual Conference & Exposition , Tampa, Florida. 10.18260/1-2--32574

ASEE holds the copyright on this document. It may be read by the public free of charge. Authors may archive their work on personal websites or in institutional repositories with the following citation: © 2019 American Society for Engineering Education. Other scholars may excerpt or quote from these materials with the same citation. When excerpting or quoting from Conference Proceedings, authors should, in addition to noting the ASEE copyright, list all the original authors and their institutions and name the host city of the conference. - Last updated April 1, 2015