Examples include how #webarchives have been used to:
* examine how webpages have been changed
* corroborate or refute posted screenshots
* study archived social media posts
* investigate metadata and past behavior of particular social media accounts
/2
If you've downloaded your Twitter archive, note that the "Your archive.html" page renders links in your tweets as t .co links. If Twitter dies, so does the t .co redirection service.
See below to further preserve the links in your tweets.
Inside your Twitter archive, the file data/tweets.js contains your tweet data, including information about links.
The snippet here shows the "urls" structure corresponding to the t .co in my previous tweet. It includes the t .co "url" as well as the "expanded_url".
If you want to be able to later resolve the t .co URLs, you can push them to the @waybackmachine now.
Use this awk line to grab all of the t .co URLs in your tweets.js file:
awk -F '\"' '/\"url\" :/ {print $4}' tweets.js
🎉🎓Congratulations to @CorrenMcCoy for the successful defense of her PhD dissertation, "A Relevance Model for Threat-Centric Ranking of Cyber Vulnerabilities". This is great work -- we are so proud! @phonedude_mln, @Faryane, Ross Gore from @VMASC_ODU @WebSciDL@oducs@ODUSCI
🧵
Motivation: Most vulnerabilities released on Patch Tuesday are rated Important. If everything's important, then nothing is. @CorrenMcCoy
RQ1: What factors can be used to model security threats based on the attacker's skill level and motivation?
RQ2: What characteristics can be used to develop a vulnerability ranking policy that improves ROI of applied mitigations? @CorrenMcCoy