SlideShare a Scribd company logo
1 of 32
Download to read offline
SESSION ID:
The	Newest	Element	of	Risk	
Metrics:	Social	Media
GRC-T10R
Ian	Amit
Vice	President

ZeroFOX	inc.

@iiamit
Basic	Mo<va<on	-	ho?est/easiest	vector!
“…	in	previous	years,	we	saw	phishing	messages	come	and	go	and	
reported	that	the	overall	effecAveness	of	phishing	campaigns	was	
between	10	and	20%.	This	year,	we	noted	that	some	of	these	stats	
went	higher,	with	23%	of	recipients	now	opening	phishing	messages	
and	11%	clicking	on	a?achments.	Some	stats	were	lower,	though,	
with	a	slight	decline	in	users	actually	going	to	phishing	sites	and	
giving	up	passwords.”		
“For	two	years,	more	than	two-thirds	of	incidents	that	comprise	the	
Cyber-Espionage	paNern	have	featured	phishing.”	
2015	DBIR
2
Why	do	I	want	this?
Everyone	is	on	social	media.	Whether	you	tell	your	employees	that	they	can	or	can’t.	
OrganizaAons	find	that	they	conduct	business	communicaAons	over	social	media.	
The	gap	between	online	and	physical	is	very	narrow	when	factoring	in	social	media.	
ANackers	target	organizaAons	through	the	path	of	least	resistance.	Social	media	is	the	
easiest	as:	
There	are	less	(if	any)	controls	over	it.	
It	provides	a	more	personalized	“experience”	for	the	user	(unlike	email).	
It	is	more	interacAve	and	aNackers	can	quickly	adapt	their	approach.	
It	is	easy	to	impersonate	someone	on	social	media	and	impact	the	organizaAon.
3
Who	is	poten<ally	affected?
Are	you	engaged	in	a	“controversial”	pracAce?
4
Financial	Services DIB Healthcare
Pharma Agribusiness LEA
Energy
Can	I	really	predict	risk	based	on	SM	ac<vity?
SenAment	analysis	and	the	German	elecAons	
PredicAng	ElecAons	with	TwiNer:		What	140	Characters	Reveal	
about	PoliAcal	SenAment	
“TwiNer	can	be	seen	as	a	valid	real-Ame	indicator	of	poliAcal	
senAment.”	
hNp://www.aaai.org/ocs/index.php/ICWSM/ICWSM10/paper/
viewFile/1441/1852
5
6
#RSAC
Coming	up	with	a	solu<on
Framework	for	measuring	the	risk	of	a	person/organizaAon’s	social	
media	acAvity
What	is	it	that	we	need	to	address?
A	framework	for	you	to	look	at	how	inflammatory	or	“risky”	
individuals	in	your	organizaAon	are.		Individuals:	
like	execuAves,		
technical	contractors	&	employees	who,	you	know,	might	have	admin	
access,	and/or	
employees	suscepAble	to	other	risk	categories	like	Fraud,	ReputaAon,	
and	Strategic	risk.
8
What	will	I	get	out	of	this?
The	ability	to	build	a	scorecard	allowing	you	to	rank	employee	risk.	
The	ability	to	drill	down	into	the	SM	behaviors	that	contribute	to	
risk	
And	subsequently	lower	a	risk	profile	through	applying	controls	to	
select	elements	idenAfied	through	the	process.	
The	ability	to	enhance	OSINT	funcAons	with	SM-focused	funcAons
9
Basic	concepts	behind	the	model
We	uAlized	the	GQM	approach:	
Conceptual	level	(goal)		
Goals	defined	for	an	object	for	a	variety	of	reasons,	with	respect	to	various	
models,	from	various	points	of	view.	
OperaAonal	level	(ques<on)		
QuesAons	are	used	to	define	models	of	the	object	of	study	and	then	focuses	on	
that	object	to	characterize	the	assessment	or	achievement	of	a	specific	goal.	
QuanAtaAve	level	(metric)		
Metrics,	based	on	the	models,	is	associated	with	every	quesAon	in	order	to	
answer	it	in	a	measurable	way.
10
GQM
11
Victor	Basili
Goals	establish	
what	we	want	to	
accomplish.
Questions	help	us	
understand	how	to	
meet	the	goal.		They	
address	context.
Metrics	identify	the	
measurements	that	
are	needed	to	answer	
the	questions.
Goal 1 Goal 2
Q1 Q2 Q3 Q4 Q5
M1 M2 M3 M4 M5 M6 M7
11
Our	GQM	data
Goal:	Provide	a	social	media	risk	scorecard	for	a	person/
organizaAon.	
QuesAons:	How	would	one’s	OA	affect	the	likelihood	of	a	threat?	
How	would	one’s	OA	affects	the	impact	of	a	threat,	and	the	areas	of	
impact?	How	does	unsancAoned	presence	of	someone	affect	said	
threats?	
Metrics:	Provide	a	qualitaAve*	approach	to	measuring	the	overall	
risk,	as	well	as	specific	aspects	of	the	social	media	presence.
12
*And when we say qualitative we lie a little bit…
More	Goals
1.	Provide	a	measurable	way	to	quanAfy	risk	associated	with	online	acAvity	of	
the	organizaAon	and	it's	employees.	
2.	Provide	another	measure	for	quanAfying	risk	of	working	with	3rd	parAes	
and	contractors.	
3.	Create	a	score	for	execuAves	to	measure	their	social	media	exposure	(from	
an	exec	protecAon	perspecAve,	insider	trading,	etc...)	
4.	Create	a	score	for	measuring	and	comparing	intra	and	extra	industry	social	
media	risk	raAngs	
5.	Be	able	to	quanAfy	the	effect	of	changing	controls,	processes	and	policies	
on	the	risk	associated	with	social	media.
13
Mindmap	(see	external	references)
14
Developing	the	scoreboard
Started	with	the	basics,	comparaAve	measurements…		
QualitaAve	approach	dictates	trying	to	leave	quanAtaAve	elements	
out	(which	we	kind’a	try	to).	So	the	compromise	was	to	provide	a	
fairly	detailed	breakdown	of	elements,	and	instead	of	measuring	
them	on	a	scale,	only	indicate	presence	(1	or	0).	
AggregaAon	didn't	work	(per-se),	Averaging	would	not	take	into	
account	the	full	magnitude	of	the	largest	elements,	MAX()	would	
not	factor	in	contribuAon	from	smaller	ones.	We	have	to	provide	
more	accurate	weights…
15
Scoring	Approach
Ended	up	with	providing	a	weighAng	system	for	the	major	elements	
and	their	importance	to	the	organizaAon	(context?!).		
Given	X	points	to	distribute	between	Y	elements.	Weight	=	Y’/X	
where	Y’	is	the	number	of	points	given	to	each	element.	
Sum(Y’…Y’’)=1	
Apply	weighAng	to	the	scorecard	to	get	weighted	risk	score.	(where	
weights	are	appropriate	for	the	organizaAon’s	operaAonal	context).
16
Weigh<ng
17 Sample
Scorecard	roadmap
Current:	
Breakdown	of	Likelihood,	Manifesta<on,	Impact,	and	an	esAmated	
factor	of	the	number	of	online	threats	(by	compounding	monitored	
instances	of	threat	actors	with	the	medium	used).	
Future:	
Add	breakdown	to	personal	vs	corporate	risk,	and	further	semanAcs	
such	as	exposure	to	malicious	content,	negaAve	senAment,	
informaAon	leaks,	etc…
18
What	kind	of	data	is	needed?
OrganizaAon	size,	and	the	size	of	the	management.	
How	many	in	the	organizaAon	are	monitored	(and	in	management)	
Locality	informaAon	(HQ,	offices,	size	per	locaAon)	
ChaNer	-	menAoning,	conversing	with,	and	talking	about	monitored	assets.	
Also	-	assets	posAng/conversing/menAoning	others.	
ImpersonaAons	-	who	is	being	impersonated?	What’s	the	intent	(nefarious	
vs.	parody)	
SenAment	analysis	-	in	chaNer,	broken	down	to	management	vs	company	vs	
individuals	(per	locaAon),	and	by	distance	from	asset	(1st,	2nd,	3rd	degree)
19
How	can	YOU	do	it?
STEP	1:		Determine	how	your	organizaAon	will	support	profiling.	
None	at	all	
None	but	publicly	available	informaAon	
VoliAonal	
Enforced
20
How	can	YOU	do	it?
STEP	2:		Determine	who	you	might	want	to	protect	
privileged	IT	users	
execuAves/board	members	
markeAng/PR	people	
sales
21
How	can	YOU	do	it?
STEP	3:		Determine	where	you	will	profile	them	
Social	Media	sites	
Web	sites	
Blog	comments
22
How	can	YOU	do	it?
STEP	4:		Collect	<ALL>	the	data.	
Extract	/	Tranform	/	Load	
Scrape	/	Transform	/	Load	
Analysis	post	scrape	
Analysis	in	real-ish	Ame	(storm	uw)

(twiNer	api	->	spout	->	bolt	for	processing)
23
How	can	YOU	do	it?
STEP	5:		Store	the	data.	
Whatever	you	want.		
24
How	can	YOU	do	it?
STEP	6A:		Analysis	
Amish	hand	craued	
Score	comments	regarding	the	factors	that	contribute	to	the		likelihood/
manifestaAon/impact	elements	of	the	model	
Use	freebie	tools	or	do	it	yourself	
tools	like…	
hNps://tone-analyzer-demo.mybluemix.net/	
hNps://watson-pi-demo.mybluemix.net/	
Score	in	our	handy-dandy	excel	tool	(or	some	variaAon	thereof)
25
How	can	YOU	do	it?	(automated	analysis)
26
How	can	YOU	do	it?
STEP	6B:		DIY	BIG	DATA	MAGICS	
SenAment	analysis	(list	from	hNp://breakthroughanalysis.com/2012/01/08/what-are-the-most-powerful-
open-source-senAment-analysis-tools/)	
Python	NLTK	(Natural	Language	Toolkit),	hNp://www.nltk.org/,	but	see	also	hNp://text-processing.com/
demo/senAment/	
–	R,	TM	(text	mining)	module,	hNp://cran.r-project.org/web/packages/tm/index.html,	including	
tm.plugin.senAment.	
–	RapidMiner,	hNp://rapid-i.com/content/view/184/196/.	
–	GATE,	te	General	Architecture	for	Text	Engineering,	hNp://gate.ac.uk/senAment/.	
Apache	UIMA	is	the	Unstructured	InformaAon	Management	Architecture,	hNp://uima.apache.org/	—	also	
senAment	classifiers	for	the	WEKA	data-mining	workbench,	hNp://www.cs.waikato.ac.nz/ml/weka/.	See	
hNp://www.unal.edu.co/diracad/einternacional/Weka.pdf	for	one	example.	
Stanford	NLP	tools,	hNp://www-nlp.stanford.edu/souware/	
LingPipe,	(pseudo-open	source).	See	hNp://alias-i.com/lingpipe/demos/tutorial/senAment/read-me.html.
27
How	can	YOU	do	it?
STEP	7:		SCORECARD!	
Output	via	model	
Remember,	it’s	the	factors	of	stress	not	necessarily	a	“risk	score”	that	
maNers.	
UlAmate	goal	is	protect,	be	that	via	technology	or	behavioral	controls.	
Also	applicable	-	legal,	financial	hedging,	insurance,	etc…
28
Where	can	you	get	it?
The	Society	of	InformaAon	Risk	Analysts	
hNp://www.societyinforisk.org	
As	well	as	on	the	SMRM	site:	
hNp://risk-metrics.com/
29
Take-away
1. Check	what	is	your	current	social	media	security	policy	(if	you	have	
one).	
2. Do	you	have	a	current	risk	model	that	incorporates	social	media	as	
part	of	it	(aNack	surface	/	informaAon	leak	/	intelligence)	
3. Measure	your	current	social	media	risk	posture	for	key	individuals	
in	your	organizaAon.	
And	then	in	2-3	months	-	measure	again	to	see	whether	any	changes	
you	have	implemented	in	light	of	the	iniAal	measurement	had	the	
right	impact.
30
#RSAC
Thank	you!	
Ques<ons?
Ian	Amit:	@iiamit			|			ian@zerofox.com			|			hNp://www.iamit.org
Resources
SenAment	analysis	and	german	elecAons:	hNp://www.aaai.org/ocs/index.php/ICWSM/ICWSM10/paper/viewFile/1441/1852	
Analyze	tone	of	text:	hNps://tone-analyzer-demo.mybluemix.net/	
Analyze	personality	based	on	text:	hNps://watson-pi-demo.mybluemix.net/	
SenAment	analysis	(list	from	hNp://breakthroughanalysis.com/2012/01/08/what-are-the-most-powerful-open-source-
senAment-analysis-tools/)	
Python	NLTK	(Natural	Language	Toolkit),	hNp://www.nltk.org/,	but	see	also	hNp://text-processing.com/demo/senAment/	
R,	TM	(text	mining)	module,	hNp://cran.r-project.org/web/packages/tm/index.html,	including	tm.plugin.senAment.	
RapidMiner,	hNp://rapid-i.com/content/view/184/196/.	
GATE,	te	General	Architecture	for	Text	Engineering,	hNp://gate.ac.uk/senAment/.	
Apache	UIMA	is	the	Unstructured	InformaAon	Management	Architecture,	hNp://uima.apache.org/	—	also	senAment	
classifiers	for	the	WEKA	data-mining	workbench,	hNp://www.cs.waikato.ac.nz/ml/weka/.	See	hNp://www.unal.edu.co/
diracad/einternacional/Weka.pdf	for	one	example.	
Stanford	NLP	tools,	hNp://www-nlp.stanford.edu/souware/	
LingPipe,	(pseudo-open	source).	See	hNp://alias-i.com/lingpipe/demos/tutorial/senAment/read-me.html.
32

More Related Content

What's hot

Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesΔρ. Γιώργος K. Κασάπης
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Guy Pearce
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameTatainteractive1
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Echoworx
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreatHammerNJ
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB'sGuise Bule
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Phishing website method
Phishing website methodPhishing website method
Phishing website methodarelyf_7
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Kim Jensen
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 

What's hot (19)

Cyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequenciesCyber Claims: GDPR and business email compromise drive greater frequencies
Cyber Claims: GDPR and business email compromise drive greater frequencies
 
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website DefendersDistil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
Distil Networks 2017 Bad Bot Report: 6 High Risk Lessons for Website Defenders
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?Cybersecurity: Whose job is it anyway?
Cybersecurity: Whose job is it anyway?
 
Corporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious GameCorporate Cybersecurity: A Serious Game
Corporate Cybersecurity: A Serious Game
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreat
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Cyber Defense For SMB's
Cyber Defense For SMB'sCyber Defense For SMB's
Cyber Defense For SMB's
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Phishing website method
Phishing website methodPhishing website method
Phishing website method
 
Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009Scansafe Annual Global Threat Report 2009
Scansafe Annual Global Threat Report 2009
 
BLURRING BOUNDARIES
BLURRING BOUNDARIESBLURRING BOUNDARIES
BLURRING BOUNDARIES
 
BBB April 2017 Market Monitor
BBB April 2017 Market Monitor  BBB April 2017 Market Monitor
BBB April 2017 Market Monitor
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 

Viewers also liked

Spreading the risk, piling up the opportunities - offshore wind diversification
Spreading the risk, piling up the opportunities - offshore wind diversification Spreading the risk, piling up the opportunities - offshore wind diversification
Spreading the risk, piling up the opportunities - offshore wind diversification StephenGeoMills
 
Diversification and Economic Development
Diversification and Economic DevelopmentDiversification and Economic Development
Diversification and Economic DevelopmentDany Bahar
 
Mangold essential elements of risk assessment
Mangold essential elements of risk assessmentMangold essential elements of risk assessment
Mangold essential elements of risk assessmentLTDH2013
 
Diversification Bias
Diversification BiasDiversification Bias
Diversification BiasRussell James
 
Uncertainty, Risk, and Risk Management
Uncertainty, Risk, and Risk ManagementUncertainty, Risk, and Risk Management
Uncertainty, Risk, and Risk ManagementJulio Huato
 
Inernational banking and money morket
Inernational banking and money morketInernational banking and money morket
Inernational banking and money morketBabasab Patil
 
Slides money banking risk reward capm
Slides money banking risk reward capmSlides money banking risk reward capm
Slides money banking risk reward capmJulio Huato
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk managementKannan Subbiah
 
Financial instruments derivatives ppt @ bec doms bagalkot mba finance
Financial instruments derivatives ppt @ bec doms bagalkot mba financeFinancial instruments derivatives ppt @ bec doms bagalkot mba finance
Financial instruments derivatives ppt @ bec doms bagalkot mba financeBabasab Patil
 
Malimu variance and standard deviation
Malimu variance and standard deviationMalimu variance and standard deviation
Malimu variance and standard deviationMiharbi Ignasm
 
Quality risk management
Quality risk managementQuality risk management
Quality risk managementimran bakshi
 
Company gone For diversification.
Company gone For diversification.Company gone For diversification.
Company gone For diversification.Praveen Kumar
 
hedging risk and exposure
 hedging risk and exposure    hedging risk and exposure
hedging risk and exposure deepak gupta
 
Risk and Uncertainty
Risk and UncertaintyRisk and Uncertainty
Risk and UncertaintyBrad Stollery
 
Financial Instruments
Financial InstrumentsFinancial Instruments
Financial InstrumentsMoumita Sen
 
Standard deviation
Standard deviationStandard deviation
Standard deviationKen Plummer
 

Viewers also liked (20)

Spreading the risk, piling up the opportunities - offshore wind diversification
Spreading the risk, piling up the opportunities - offshore wind diversification Spreading the risk, piling up the opportunities - offshore wind diversification
Spreading the risk, piling up the opportunities - offshore wind diversification
 
Diversification and Economic Development
Diversification and Economic DevelopmentDiversification and Economic Development
Diversification and Economic Development
 
Mangold essential elements of risk assessment
Mangold essential elements of risk assessmentMangold essential elements of risk assessment
Mangold essential elements of risk assessment
 
Diversification Bias
Diversification BiasDiversification Bias
Diversification Bias
 
Uncertainty, Risk, and Risk Management
Uncertainty, Risk, and Risk ManagementUncertainty, Risk, and Risk Management
Uncertainty, Risk, and Risk Management
 
Inernational banking and money morket
Inernational banking and money morketInernational banking and money morket
Inernational banking and money morket
 
Slides money banking risk reward capm
Slides money banking risk reward capmSlides money banking risk reward capm
Slides money banking risk reward capm
 
Hedging
Hedging Hedging
Hedging
 
Financial instruments
Financial instrumentsFinancial instruments
Financial instruments
 
Introduction to risk management
Introduction to risk managementIntroduction to risk management
Introduction to risk management
 
Financial instruments derivatives ppt @ bec doms bagalkot mba finance
Financial instruments derivatives ppt @ bec doms bagalkot mba financeFinancial instruments derivatives ppt @ bec doms bagalkot mba finance
Financial instruments derivatives ppt @ bec doms bagalkot mba finance
 
Malimu variance and standard deviation
Malimu variance and standard deviationMalimu variance and standard deviation
Malimu variance and standard deviation
 
Quality risk management
Quality risk managementQuality risk management
Quality risk management
 
Company gone For diversification.
Company gone For diversification.Company gone For diversification.
Company gone For diversification.
 
hedging risk and exposure
 hedging risk and exposure    hedging risk and exposure
hedging risk and exposure
 
Ias 32
Ias 32Ias 32
Ias 32
 
Risk and Uncertainty
Risk and UncertaintyRisk and Uncertainty
Risk and Uncertainty
 
Financial Instruments
Financial InstrumentsFinancial Instruments
Financial Instruments
 
Variance And Standard Deviation
Variance And Standard DeviationVariance And Standard Deviation
Variance And Standard Deviation
 
Standard deviation
Standard deviationStandard deviation
Standard deviation
 

Similar to Analyzing Social Media Risk with a GQM Framework

Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101Welch LLP
 
Balancing Security &amp; Authencity Final
Balancing Security &amp; Authencity FinalBalancing Security &amp; Authencity Final
Balancing Security &amp; Authencity FinalCindy Kim
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?EMC
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...IRJET Journal
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enBankir_Ru
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook Kristin Judge
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Cybercrime and Corporate Reputation
Cybercrime and Corporate ReputationCybercrime and Corporate Reputation
Cybercrime and Corporate ReputationIpsos UK
 

Similar to Analyzing Social Media Risk with a GQM Framework (20)

Sel03129 usen
Sel03129 usenSel03129 usen
Sel03129 usen
 
Symantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government SectorSymantec's Internet Security Threat Report for the Government Sector
Symantec's Internet Security Threat Report for the Government Sector
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
Balancing Security &amp; Authencity Final
Balancing Security &amp; Authencity FinalBalancing Security &amp; Authencity Final
Balancing Security &amp; Authencity Final
 
The economics of digital identity
The economics of digital identityThe economics of digital identity
The economics of digital identity
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?Managing Cyber Risk: Are Companies Safeguarding Their Assets?
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
Research Paper on Spreading Awareness About Phishing Attack Is Effective In R...
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Whitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_enWhitepaper 2015 industry_drilldown_finance_en
Whitepaper 2015 industry_drilldown_finance_en
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Cybercrime and Corporate Reputation
Cybercrime and Corporate ReputationCybercrime and Corporate Reputation
Cybercrime and Corporate Reputation
 
Istr19 en
Istr19 enIstr19 en
Istr19 en
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Analyzing Social Media Risk with a GQM Framework