id author title date pages extension mime words sentences flesch summary cache txt cord-235946-6vu34vce Beskow, David M. Social Cybersecurity Chapter 13: Casestudy with COVID-19 Pandemic 2020-08-23 .txt text/plain 8974 508 60 With the pandemic as the backdrop of life as we write this book, it seemed appropriate to use the social cybersecurity tools that we discussed in the previous chapters to identify and understand information operations related to There are still many questions as well as competing narratives about the origins and nature of the COVID-19 coronavirus disease. This chapter will showcase the use of social cybersecurity tools and theory to identify and characterize information operations in the COVID-19 related Twitter Stream. Finally, at the end of our exploratory data analysis, we will try to find out if any accounts have been suspended by Twitter since contributing content to our stream. The adjusted performance is provided in Table Since the Bot-Hunter Tier 1 algorithm is our primary algorithm, we've visualized the probability distribution for all COVID-19 Accounts in Figure 6a with threshold = 0.5 and threshold = 0.65. ./cache/cord-235946-6vu34vce.txt ./txt/cord-235946-6vu34vce.txt