Muutke küpsiste eelistusi

Using Social Media for Global Security [Pehme köide]

  • Formaat: Paperback / softback, 456 pages, kõrgus x laius x paksus: 231x188x50 mm, kaal: 674 g, illustrations
  • Ilmumisaeg: 29-Jan-2013
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118442318
  • ISBN-13: 9781118442319
Teised raamatud teemal:
  • Formaat: Paperback / softback, 456 pages, kõrgus x laius x paksus: 231x188x50 mm, kaal: 674 g, illustrations
  • Ilmumisaeg: 29-Jan-2013
  • Kirjastus: John Wiley & Sons Inc
  • ISBN-10: 1118442318
  • ISBN-13: 9781118442319
Teised raamatud teemal:

Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!

During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behavior/security professionals, Using Social Media for Global Security offers pages of instruction and detail on cutting-edge social media technologies, analyzing social media data, and building crowdsourcing platforms.

The book teaches how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read.

  • Illustrates linguistic, correlative, and network analysis of OSINT
  • Examines using crowdsourcing technologies to work and engage with populations globally to solve security problems
  • Explores how to ethically deal with social media data without compromising people’s rights to privacy and freedom of expression
  • Shows activists fighting against oppressive regimes how they can protect their identities online

If you're responsible for maintaining local, national or global security, you'll want to read Using Social Media for Global Security.

Introduction xxv
Part I Understanding the Influence of Social Media Globally
1(42)
Chapter 1 Understanding Social Media's Impact on Global Security
3(14)
Organizing Revolutions and Riots
4(6)
Arab Spring
4(4)
London Riots
8(2)
Recruiting Terrorists and Encouraging Attacks
10(1)
Glorifying and Promoting Gang Culture and Violence
11(2)
Acknowledging Social Media's Impact
13(1)
Summary
14(3)
Chapter 2 Understanding Global Social Media Use
17(26)
Defining Social Media
17(2)
Grasping Social Media's Popularity and Appeal
19(3)
Growth of Social Media
19(1)
Philosophy Behind Social Media
20(2)
Social Media Technologies
22(18)
Platform Types
22(7)
Device Types
29(5)
Social Media Use Differences Globally
34(1)
North America (U.S. and Canada)
35(1)
Latin America
36(1)
Europe
36(1)
East Asia
37(1)
Southeast Asia
38(1)
South Asia
38(1)
Middle East
38(1)
Africa
39(1)
Summary
40(3)
Part II Analyzing Social Media Data to Solve Security Problems
43(134)
Chapter 3 Introduction to Social Media Analytics
45(26)
Defining Analysis
45(3)
What Is Analysis
46(1)
Limits of Analysis
46(1)
What Is Not Analysis
47(1)
Analysis Overview
48(13)
Preliminary Procedure
49(3)
The Analytical Processes
52(6)
Analysis Dos and Don'ts
58(3)
Analysis Methodologies
61(8)
Variables
62(1)
Methodologies in this Book
63(5)
Methodologies Not in this Book
68(1)
Summary
69(2)
Chapter 4 Collecting and Managing Social Media Data
71(34)
Understanding Social Media Data
71(3)
Determining Collection Needs
74(10)
What Data Will Solve the Problem?
75(1)
How Much Data Is Enough?
76(3)
Who Has the Data?
79(3)
Will They Give the Data?
82(2)
Collecting the Data
84(7)
Data Framework
85(1)
APIs
85(4)
RSS Feeds
89(1)
Crawlers
89(2)
Filtering the Data
91(2)
Storing and Managing the Data
93(6)
Relational Databases
94(2)
Non-Relational Databases
96(3)
Third-Party Solutions
99(3)
Summary
102(3)
Chapter 5 Mapping and Analyzing Social Networks
105(36)
Key Concepts and Definitions
105(8)
Elements of Social Networks
107(3)
Influence and Memes in Social Networks
110(1)
Algorithms in SNA
111(2)
Choosing SNA Software Program
113(2)
First Example --- Identify Influencers
115(15)
Creating the Data Set
116(5)
Visually Map the Network
121(3)
Analyze the Network
124(6)
Second Example --- Identify Influencers
130(4)
Create the Data Set
131(1)
Visually Map the Network
131(1)
Analyze the Network
132(2)
Third Example --- Determine Top Memes
134(3)
Create the Data Set
135(1)
Analyze the Network
136(1)
Summary
137(4)
Chapter 6 Understanding and Forecasting Events
141(36)
Introduction to Analyzing Events
141(4)
Social Media Data as Intelligence
142(1)
Monitoring Attacks through Social Media
143(2)
Understanding Forecasting
145(4)
Forecasting vs. Predicting
146(1)
Forecasting Properly
147(2)
Conducting Language and Sentiment Analysis
149(12)
Determining Authorship
151(5)
Tracking and Forecasting the Behavior of Rioting Violent Crowds
156(5)
Correlation and Regression Analysis
161(9)
Creating Tools to Provide Early Warnings for Famines with Artificial Data
163(7)
Volumetric Analysis
170(4)
Creating Tools to Provide Early Warnings for Famines with Artificial Data
170(4)
Summary
174(3)
Part III Crowdsourcing Intelligence, Solutions, and Influence
177(150)
Chapter 7 Introduction to Crowdsourcing
179(18)
What Is Crowdsourcing?
179(5)
Defining Crowdsourcing and Its Relevance
180(2)
Bolstering Crowdsourcing with Social Media
182(2)
Why Use Crowdsourcing?
184(3)
Solve More Problems and Get More Information
184(1)
Work Quickly
185(1)
Work Discreetly
186(1)
Save Money
186(1)
Relevant Examples of Crowdsourcing
187(4)
OpenIDEO
187(2)
DARPA Shredder Challenge
189(1)
GCHQ Spy Recruitment Challenge
190(1)
M-Farm
190(1)
Knowing When to Crowdsource
191(3)
When to Crowdsource
191(2)
When Not to Crowdsource
193(1)
Summary
194(3)
Chapter 8 Building and Running Crowdsourcing Platforms
197(28)
Overview of the Process
197(2)
Select Objective and Scope
199(1)
Refine Problem to Establish Clear Objective
199(1)
Decide the Scope of the Platform
199(1)
Analyze the Target Audience and Media Environment
200(6)
Determine the Target Audience
201(2)
Analyze the Target Audience
203(1)
Analyze the Media Environment
204(1)
Get the Information to Do the Analyses
205(1)
Design the Platform
206(8)
Determine the Platform's Look and Feel
207(2)
Determine the Platform's Incentive Structure
209(5)
Build the Platform
214(1)
Market the Platform
215(3)
Manage the Platform
218(2)
Measure the Platform's Performance
220(2)
Create and Choose Metrics
220(1)
Collect Data to Populate Metrics
221(1)
Wash, Rinse, Repeat
222(1)
Summary
222(3)
Chapter 9 Crowdsourcing Intelligence
225(40)
Understanding the Scope of Crowdsourced Intelligence
225(3)
Uniqueness of Crowdsourced Intelligence
226(1)
Direct and Indirect Crowdsourced Intelligence
226(2)
Appreciating the Limits of Crowdsourcing Intelligence
228(3)
Uncooperative Target Audience
228(1)
Higher Risk for Participants
229(1)
Misinformation
229(1)
Misinterpretation
230(1)
Hawthorne Effect
231(1)
Tweaking the Process for Intelligence Collection Platforms
231(2)
Collect Intelligence from Hard-to-Reach Areas through SMS
233(9)
Define Objective and Scope
233(1)
Analyze the Target Audience and Media Environment
234(2)
Design the Platform
236(2)
Build the Platform
238(3)
Market the Platform
241(1)
Manage the Platform
241(1)
Measure the Platform's Performance
241(1)
Wash, Rinse, Repeat
242(1)
Collect Intelligence from the Community for Law Enforcement
242(11)
Define Objective and Scope
243(1)
Analyze the Target Audience and Media Environment
244(1)
Design the Platform
245(5)
Build the Platform
250(1)
Market the Platform
251(1)
Manage the Platform
251(1)
Measure the Platform's Performance
252(1)
Wash, Rinse, Repeat
252(1)
Collect Intelligence to Bolster Disaster Relief
253(10)
Define Objective and Scope
254(1)
Analyze the Target Audience and Media Environment
254(1)
Design the Platform
255(2)
Build the Platform
257(3)
Market the Platform
260(1)
Manage the Platform
261(1)
Measure the Platform's Performance
262(1)
Wash, Rinse, Repeat
263(1)
Summary
263(2)
Chapter 10 Crowdsourcing Solutions
265(36)
Understanding the Scope of Crowdsourced Solutions
265(9)
Formulating the Right Type of Problem
266(3)
Formulating the Right Crowdsourcing Approach
269(5)
Appreciating the Limits of Crowdsourcing Solutions
274(1)
Unsolvable Problem
274(1)
Incorrect Solutions
274(1)
Adversarial Participants
274(1)
Political Fallout
275(1)
Tweaking the Process for Solution Platforms
275(1)
Crowdsourcing Translations during Disaster Relief
276(11)
Define Objective and Scope
277(1)
Analyze Target Audience and Media Environment
278(1)
Design the Platform
279(2)
Build the Platform
281(3)
Market the Platform
284(1)
Manage the Platform
285(1)
Measure the Platform's Performance
286(1)
Wash, Rinse, Repeat
286(1)
Crowdsource Tools to Identify Antagonistic Actors in Video Feeds
287(10)
Define Objective and Scope
288(1)
Analyze Target Audience and Media Environment
289(1)
Design the Platform
290(4)
Build the Platform
294(1)
Market the Platform
294(1)
Manage the Platform
295(1)
Measure the Platform's Performance
296(1)
Wash, Rinse, Repeat
296(1)
Summary
297(4)
Chapter 11 Influencing Crowds
301(26)
Understanding the Scope of Influencing through Crowdsourcing
301(4)
Delineating Influence Goals
302(2)
Grasping How Influence Happens
304(1)
Process of Influencing Others
305(4)
Conceptual Overview of Influence Process
306(1)
Real-World Implications of Influence Process
307(2)
Appreciating the Limits of Influencing Crowds
309(1)
Unrealistic Expectations
309(1)
Adversarial Participants
309(1)
Political Fallout
310(1)
Unknown Unknowns
310(1)
Tweaking the Process for Influence Platforms
310(1)
Influencing to Collect Intelligence on Corrupt Officials
311(12)
Define Objectives and Scope
312(1)
Analyze Target Audience and the Media Environment
312(1)
Define Objectives and Scope, Redux
313(2)
Design the Platform
315(6)
Build the Platform
321(1)
Market the Platform
321(1)
Moderate the Platform
322(1)
Measure the Platform's Performance
323(1)
Wash, Rinse, Repeat
323(1)
Summary
323(4)
Part IV Broadening Your Horizon
327(60)
Chapter 12 Advanced and Emerging Analytical Methodologies
329(24)
Expanding the Scope of Analysis
329(1)
Cluster Analysis
330(5)
The Process of Clustering
331(2)
The Relevance of Clustering
333(2)
Geo-Spatial Network Analysis
335(6)
The Process of Geo-Spatial Network Analysis
336(1)
The Relevance of Geo-Spatial Network Analysis
337(4)
Agent Modeling
341(8)
The Relevance of Agent Modeling
342(1)
The Process of Agent Modeling
343(6)
Summary
349(4)
Chapter 13 Delivering Services through Crowdsourcing
353(18)
Delivering Education
353(10)
Understanding How People Learn
354(2)
Delivering Education through Tablets and Mobile Phones (First Method)
356(5)
Delivering Education through Mobile Phones Only (Second Method)
361(1)
Side-Benefits of Delivering Education
362(1)
Delivering Health
363(6)
Diagnosing Health Problems
363(3)
Collecting Health Information
366(3)
Summary
369(2)
Chapter 14 Protecting Privacy and Yourself
371(16)
Considering Privacy and Free Speech
371(2)
Reasons to Consider Privacy and Free Speech
372(1)
Appreciating the Complexity Involved
372(1)
Acting Legally and Ethically
373(5)
Analyze Non-Personal Open Source Intelligence
374(1)
Follow Rules of Social Media Data Sources
374(1)
Do Not Involve Children
375(1)
Identify Extra Restrictions
375(1)
Do Not Store People's Personal Information
376(1)
Help Your Participants Protect Themselves
376(1)
Solicit Professional Help When Possible
377(1)
Value Privacy and Strive for a Good Reputation
377(1)
Imagine and Prepare for the Worst-Case Scenario
378(1)
Be Aware of Changes in Laws and Norms
378(1)
Protecting Your Identity and Speech
378(6)
Set Basic Security Settings
380(1)
Do Not Post Sensitive Information
380(1)
Be Wary of Enabling Location Services
380(1)
Use Technologies That Anonymize You
380(2)
Use Social Media Platforms That Hide Your Identity
382(1)
Identify Who Is Behind What and Why
382(1)
Use Common Sense and Be Reasonable
382(2)
Summary
384(3)
Appendix Extra Information and Resources
387(4)
Social Media Platforms
387(2)
Software Tools
389(2)
Index 391
Ravi Gupta is an entrepreneur who develops and commercializes technologies that use biological principles. He has created social media platforms, data processing algorithms, and crowdsourcing techniques to understand and solve security problems. Hugh Brooks is a security consultant for government and private clients. With a focus on creativity, he has produced innovative solutions for crowd-driven applications, behavior modeling, mobile health and education, and cyber security.