A QUALITATIVE STUDY OF TWITTER REPORTED THREATS AND SECURITY VULNERABILITIES FOR THE APPLICATION OF PROGRAMMING INTERFACE BASED ON CLOUD COMPUTING TECHNOLOGY