35 datasets found
  1. Global data breaches of selected alternative social media platforms...

    • statista.com
    Updated Jul 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global data breaches of selected alternative social media platforms 2021-2022 [Dataset]. https://www.statista.com/statistics/1359595/data-breaches-alternative-social-media-platforms-worldwide/
    Explore at:
    Dataset updated
    Jul 11, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2021 - Aug 2022
    Area covered
    United States
    Description

    Despite being launched relatively recently and not having a significant user base, alternative social media platforms have become targets for hackers. Parler, the platform often associated with conservatives and used as an alternative to Twitter, saw a breach of more than ** terabytes of data in January 2021. Cybersecurity specialists, though, say there was no evidence that the platform was hacked. Instead, the vulnerability was in the platform's architecture, which resulted in the data breach. Another alt-tech platform, Gab, was hacked two months after Parler's incident. Around ** gigabytes of sensitive user data were exposed in this incident. During the Gettr hack in July 2021, third parties got unauthorized access to ** thousand e-mail addresses of users. The BitChute hack that occurred in August 2022 affected nearly three million users.

  2. Z

    Data from: Climate Security on Twitter

    • data.niaid.nih.gov
    Updated Jul 12, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Tucci, Giulia (2024). Climate Security on Twitter [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_7946472
    Explore at:
    Dataset updated
    Jul 12, 2024
    Dataset provided by
    Tucci, Giulia
    Carneiro, Bia
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This is a dataset containing IDs of tweets that reflect climate security dialogues on Twitter, from January 2014 to March 2022.

  3. Positivity by topic, computed as the percentage of positive tweets that...

    • plos.figshare.com
    xls
    Updated Jun 17, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Arkaitz Zubiaga; Rob Procter; Carsten Maple (2023). Positivity by topic, computed as the percentage of positive tweets that exceed negative tweets. [Dataset]. http://doi.org/10.1371/journal.pone.0209472.t001
    Explore at:
    xlsAvailable download formats
    Dataset updated
    Jun 17, 2023
    Dataset provided by
    PLOShttp://plos.org/
    Authors
    Arkaitz Zubiaga; Rob Procter; Carsten Maple
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Topics are sorted by positivity, most positive first.

  4. f

    Top news headlines bearing positive or negative sentiment by year.

    • plos.figshare.com
    xls
    Updated May 30, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Arkaitz Zubiaga; Rob Procter; Carsten Maple (2023). Top news headlines bearing positive or negative sentiment by year. [Dataset]. http://doi.org/10.1371/journal.pone.0209472.t003
    Explore at:
    xlsAvailable download formats
    Dataset updated
    May 30, 2023
    Dataset provided by
    PLOS ONE
    Authors
    Arkaitz Zubiaga; Rob Procter; Carsten Maple
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Top news headlines bearing positive or negative sentiment by year.

  5. H

    Replication Data for: AI Ethics on Blockchain: Topic Analysis on Twitter...

    • dataverse.harvard.edu
    Updated Jul 15, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Yihang Fu; Zesen Zhuang; Luyao Zhang (2023). Replication Data for: AI Ethics on Blockchain: Topic Analysis on Twitter Data for Blockchain Security [Dataset]. http://doi.org/10.7910/DVN/CTBEF7
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Jul 15, 2023
    Dataset provided by
    Harvard Dataverse
    Authors
    Yihang Fu; Zesen Zhuang; Luyao Zhang
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Blockchain has empowered computer systems to be more secure using a distributed network. However, the current blockchain design suffers from fairness issues in transaction ordering. Miners are able to reorder transactions to generate profits, the so-called miner extractable value (MEV). Existing research recognizes MEV as a severe security issue and proposes potential solutions, including prominent Flashbots. However, previous studies have mostly analyzed blockchain data, which might not capture the impacts of MEV in a much broader AI society. Thus, in this research, we applied natural language processing (NLP) methods to comprehensively analyze topics in tweets on MEV. We collected more than 20000 tweets with #MEV and #Flashbots hashtags and analyzed their topics. Our results show that the tweets discussed profound topics of ethical concern, including security, equity, emotional sentiments, and the desire for solutions to MEV. We also identify the co-movements of MEV activities on blockchain and social media platforms. Our study contributes to the literature at the interface of blockchain security, MEV solutions, and AI ethics.

  6. Department of Homeland Security (DHS I-157)

    • catalog.data.gov
    • data.wu.ac.at
    Updated Jan 24, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2025). Department of Homeland Security (DHS I-157) [Dataset]. https://catalog.data.gov/dataset/department-of-homeland-security-dhs-i-157
    Explore at:
    Dataset updated
    Jan 24, 2025
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Description

    This match identifies those resident aliens who should have their Social Security and/or Supplemental Security Income benefit payment suspended because they have been deported from the United States.

  7. D

    Social Media Security Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Dec 3, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2024). Social Media Security Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-social-media-security-market
    Explore at:
    pptx, pdf, csvAvailable download formats
    Dataset updated
    Dec 3, 2024
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Social Media Security Market Outlook



    The global social media security market size is anticipated to reach $5.8 billion by 2032, growing from $1.9 billion in 2023, with a compound annual growth rate (CAGR) of 12.5% during the forecast period. The increasing prevalence of social media platforms and the corresponding rise in cybersecurity threats are key growth factors in this market. Organizations are becoming more alert to the vulnerabilities associated with social media, leading to increased investments in robust security solutions targeted at protecting online presence and data. The expanding digital footprint across industries is driving demand for integrated security solutions.



    The growth of the social media security market is significantly influenced by the exponential increase in social media users globally. With billions of users engaging on platforms such as Facebook, Twitter, Instagram, and LinkedIn, the risk of data breaches, phishing attacks, and cyberbullying has intensified. Social media platforms have evolved into prime targets for cybercriminals, prompting businesses to implement advanced security measures. The need to safeguard personal data, intellectual property, and brand reputation is propelling the market, as companies strive to maintain customer trust and compliance with data protection regulations.



    Another critical driver of market growth is the increasing regulatory emphasis on data protection and privacy. Governments worldwide are enacting stringent regulations to ensure the security of personal information on social media platforms. The implementation of laws like GDPR in Europe and CCPA in the United States underscores the need for robust security measures, compelling organizations to adopt advanced social media security solutions. Additionally, the collaboration between regulatory bodies and security service providers to enhance the security infrastructure is further boosting market growth.



    The integration of artificial intelligence (AI) and machine learning (ML) technologies into social media security solutions is revolutionizing the market landscape. These technologies offer enhanced capabilities for threat detection and response by analyzing large volumes of data in real-time, identifying patterns, and predicting potential threats. The ability to provide proactive security measures through AI and ML is gaining traction among enterprises, driving the adoption of advanced security solutions. Furthermore, AI and ML enable the automation of security processes, reducing the workload on IT teams and improving overall efficiency.



    Regionally, North America is expected to dominate the social media security market due to the high adoption of social media platforms, advanced technological infrastructure, and the presence of key market players. The United States, in particular, exhibits significant growth potential, supported by increasing investments in cybersecurity and a strong focus on regulatory compliance. Meanwhile, the Asia Pacific region is projected to witness the highest growth rate due to the rapid digitization of economies, increasing internet penetration, and growing awareness of cybersecurity threats. Emerging economies like India and China are key contributors to this growth, as they continue to experience a surge in social media usage.



    Component Analysis



    The social media security market is primarily segmented into solutions and services. Solutions include software products designed to address various security threats on social media platforms. As businesses increasingly recognize the importance of safeguarding their online presence, the demand for comprehensive security solutions is rising. These solutions encompass a range of functionalities such as threat detection, data encryption, access control, and identity management, enabling organizations to protect their brand reputation and customer information. The integration of advanced technologies like AI and ML into these solutions further enhances their capabilities, offering real-time threat analysis and response.



    Services, on the other hand, are rapidly gaining traction as organizations seek external expertise to manage and optimize their social media security strategies. These services include consulting, implementation, support, and managed services. The growing complexity of security threats and the need for continuous monitoring and management are driving the demand for professional services. Organizations are increasingly outsourcing their security needs to specialized service providers to leverage their expertise, reduce operational costs, and ensure compliance with regu

  8. f

    Top 10 most active countries, ranked by overall positivity towards the IoT.

    • plos.figshare.com
    xls
    Updated May 31, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Arkaitz Zubiaga; Rob Procter; Carsten Maple (2023). Top 10 most active countries, ranked by overall positivity towards the IoT. [Dataset]. http://doi.org/10.1371/journal.pone.0209472.t002
    Explore at:
    xlsAvailable download formats
    Dataset updated
    May 31, 2023
    Dataset provided by
    PLOS ONE
    Authors
    Arkaitz Zubiaga; Rob Procter; Carsten Maple
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Top 10 most active countries, ranked by overall positivity towards the IoT.

  9. f

    Data for all 643,251 tweets.

    • plos.figshare.com
    txt
    Updated May 30, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Otto Kolbinger; Melanie Knopp (2023). Data for all 643,251 tweets. [Dataset]. http://doi.org/10.1371/journal.pone.0242728.s005
    Explore at:
    txtAvailable download formats
    Dataset updated
    May 30, 2023
    Dataset provided by
    PLOS ONE
    Authors
    Otto Kolbinger; Melanie Knopp
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Each line includes the following information: game in which the tweet appeared (“Game”), the number of minutes passed since kickoff (“MinuteSinceKickOff”), whether the tweet is related to the VAR (“VAR”) and the sentiment (“Sentiment”). “NewID” is an ID assigned by us, which allows us to relate this information to the original tweet. (CSV)

  10. Personnel Security and Suitability Program Data (PSSPD)

    • catalog.data.gov
    Updated Aug 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2025). Personnel Security and Suitability Program Data (PSSPD) [Dataset]. https://catalog.data.gov/dataset/personnel-security-and-suitability-program-data-psspd
    Explore at:
    Dataset updated
    Aug 11, 2025
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Description

    Personnel Security and Suitability Program Data.

  11. Security Request Documentation System

    • catalog.data.gov
    • data.amerigeoss.org
    Updated Aug 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2025). Security Request Documentation System [Dataset]. https://catalog.data.gov/dataset/security-request-documentation-system
    Explore at:
    Dataset updated
    Aug 11, 2025
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Description

    An Electronic Repository created to streamline the storing/recording of various Security Requests.

  12. Title XVI / Supplemental Security Record Point In Time (SSRPT)

    • catalog.data.gov
    Updated Sep 19, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2025). Title XVI / Supplemental Security Record Point In Time (SSRPT) [Dataset]. https://catalog.data.gov/dataset/title-xvi-supplemental-security-record-point-in-time-ssrpt
    Explore at:
    Dataset updated
    Sep 19, 2025
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Description

    This is the point-in-time database to house temporary Supplemental Security Record (SSR) images produced during the course of the operating day before they can be updated to the actual SSR in the nightly batch cycle.

  13. Security Administration Reports Application

    • catalog.data.gov
    • s.cnmilf.com
    • +1more
    Updated Sep 19, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2025). Security Administration Reports Application [Dataset]. https://catalog.data.gov/dataset/security-administration-reports-application
    Explore at:
    Dataset updated
    Sep 19, 2025
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Description

    Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the Security Reports. This is in accordance with the federal Identity, Credential, and Access Management (ICAM) segment architecture.

  14. Security Request Documentation Process

    • catalog.data.gov
    • data.wu.ac.at
    Updated Aug 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2025). Security Request Documentation Process [Dataset]. https://catalog.data.gov/dataset/security-request-documentation-process
    Explore at:
    Dataset updated
    Aug 11, 2025
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Description

    An Electronic Repository created to streamline the storing/recording of various Security Requests, including SSA-120s/1121s, ATSAFE-613, E-mails, etc

  15. Monthly cyberattacks on global mobile users worldwide 2020-2023

    • statista.com
    Updated Oct 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Monthly cyberattacks on global mobile users worldwide 2020-2023 [Dataset]. https://www.statista.com/statistics/1305965/mobile-users-cyber-attacks/
    Explore at:
    Dataset updated
    Oct 10, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    Mobile devices connected to the internet are vulnerable to targeted attacks and security threats. In December 2023, the number of global mobile cyberattacks was approximately 5.4 million, up by 147 percent compared to December 2022. Cyberattacks targeting mobile devices have been decreasing since the end of 2020, after experiencing an annual peak of almost 6.4 million in October 2020. Mobile concerns: Smishing While mobile operating systems come with vulnerabilities requiring patching and regular maintenance, watchful usage can reduce the risk for users of incurring security threats. Smishing attacks are especially reliant on users’ accidental mistakes or naivety. Smishing, or SMS phishing, uses text messages to lure users into accessing fake websites requesting personal data, or into clicking on malicious download links that could infect the device with malware. In the first quarter of 2024, AdWare and RiskTool were the most encountered types of mobile malware worldwide, while Trojan malware accounted for 11 percent of the total. Smishing attacks do not interest regular users alone, but can also target organizations and professionals. In 2023, it was found that the share of IT professionals and organizations targeted by smishing attacks was at 75 percent. Mobile app privacy According to a survey of global consumers carried out in August 2021, both Android and iOS users appeared equally keen to stop using an app if their privacy expectations were not met. Mobile apps have to collect different types of data for functionality purposes, including app diagnostic and device data for location-based services. However, mobile apps also collect other types of more personal user data, such as search history, browsing history, health data, and financial information. The data can be then used by the company that collected them in the first place (1st party data), or with entities that do not have a direct relationship with the users, and obtain data from the main tracking source (3rd party data). Social media apps, like other app categories, rely on acquiring 3rd party data from users for their advertisement business. As of February 2022, TikTok was found to have the highest number of potential 3rd party trackers, followed by Telegram, and Twitter.

  16. Department of Homeland Security (DHS I-131)

    • catalog.data.gov
    • data.amerigeoss.org
    • +1more
    Updated Jan 24, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2025). Department of Homeland Security (DHS I-131) [Dataset]. https://catalog.data.gov/dataset/department-of-homeland-security-dhs-i-131
    Explore at:
    Dataset updated
    Jan 24, 2025
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Description

    This identifies resident aliens who should have their Supplemental Security Income benefit payment suspended because they have voluntarily left the United States for a period of 30 consecutive days or more.

  17. Supplemental Security Income (SSI) Living Arrangements by Region: Beginning...

    • data.ny.gov
    • catalog.data.gov
    • +1more
    application/rdfxml +5
    Updated Sep 29, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    New York State Office of Temporary and Disability Assistance (2025). Supplemental Security Income (SSI) Living Arrangements by Region: Beginning 2002 [Dataset]. https://data.ny.gov/Human-Services/Supplemental-Security-Income-SSI-Living-Arrangemen/iuu6-qurh
    Explore at:
    csv, xml, tsv, json, application/rssxml, application/rdfxmlAvailable download formats
    Dataset updated
    Sep 29, 2025
    Dataset authored and provided by
    New York State Office of Temporary and Disability Assistance
    Description

    These data are monthly listings of the number of recipients in each living arrangement classification in the Supplemental Security Income Program, by region.

  18. Social Security Administration (SSA) Public Data Listing (PDL)

    • catalog.data.gov
    • gimi9.com
    • +4more
    Updated Sep 19, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2025). Social Security Administration (SSA) Public Data Listing (PDL) [Dataset]. https://catalog.data.gov/dataset/social-security-administration-ssa-public-data-listing-pdl
    Explore at:
    Dataset updated
    Sep 19, 2025
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Description

    Provides a list of all data assets maintained by the Social Security Administration. It consist of Public Data Listing in the Enterprise Data Inventory.

  19. Massachusetts Supplemental - Ciampa vs. Schweiker

    • data.wu.ac.at
    • catalog.data.gov
    Updated Jan 30, 2015
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Social Security Administration (2015). Massachusetts Supplemental - Ciampa vs. Schweiker [Dataset]. https://data.wu.ac.at/schema/data_gov/OGZhNDliMDEtMDIzMS00ODJlLWIxZjUtZGEzZWMyNjZjNDFm
    Explore at:
    Dataset updated
    Jan 30, 2015
    Dataset provided by
    Social Security Administrationhttp://ssa.gov/
    Area covered
    a1d036a76527504455b7f144ce84d483cd9d8e65
    Description

    Result of a Court Case. To identify to Massachusetts all individuals who are ineligible for SSI benefits during the past calendar year, potentially as a result of Title 2 BRI.

  20. Supplemental Security Income (SSI) Recipient Category of Assistance:...

    • data.ny.gov
    • catalog.data.gov
    • +3more
    application/rdfxml +5
    Updated Sep 29, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    New York State Office of Temporary and Disability Assistance (2025). Supplemental Security Income (SSI) Recipient Category of Assistance: Beginning 2002 [Dataset]. https://data.ny.gov/Human-Services/Supplemental-Security-Income-SSI-Recipient-Categor/959f-28y9
    Explore at:
    csv, json, xml, tsv, application/rssxml, application/rdfxmlAvailable download formats
    Dataset updated
    Sep 29, 2025
    Dataset authored and provided by
    New York State Office of Temporary and Disability Assistance
    Description

    These data are monthly listings of the number of recipients in each living arrangement classification in the Supplemental Security Income Program, by category of assistance (aged, blind or disabled).

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Global data breaches of selected alternative social media platforms 2021-2022 [Dataset]. https://www.statista.com/statistics/1359595/data-breaches-alternative-social-media-platforms-worldwide/
Organization logo

Global data breaches of selected alternative social media platforms 2021-2022

Explore at:
Dataset updated
Jul 11, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
Jan 2021 - Aug 2022
Area covered
United States
Description

Despite being launched relatively recently and not having a significant user base, alternative social media platforms have become targets for hackers. Parler, the platform often associated with conservatives and used as an alternative to Twitter, saw a breach of more than ** terabytes of data in January 2021. Cybersecurity specialists, though, say there was no evidence that the platform was hacked. Instead, the vulnerability was in the platform's architecture, which resulted in the data breach. Another alt-tech platform, Gab, was hacked two months after Parler's incident. Around ** gigabytes of sensitive user data were exposed in this incident. During the Gettr hack in July 2021, third parties got unauthorized access to ** thousand e-mail addresses of users. The BitChute hack that occurred in August 2022 affected nearly three million users.

Search
Clear search
Close search
Google apps
Main menu