Introduction |
|
xxv | |
|
Part I Understanding the Influence of Social Media Globally |
|
|
1 | (42) |
|
Chapter 1 Understanding Social Media's Impact on Global Security |
|
|
3 | (14) |
|
Organizing Revolutions and Riots |
|
|
4 | (6) |
|
|
4 | (4) |
|
|
8 | (2) |
|
Recruiting Terrorists and Encouraging Attacks |
|
|
10 | (1) |
|
Glorifying and Promoting Gang Culture and Violence |
|
|
11 | (2) |
|
Acknowledging Social Media's Impact |
|
|
13 | (1) |
|
|
14 | (3) |
|
Chapter 2 Understanding Global Social Media Use |
|
|
17 | (26) |
|
|
17 | (2) |
|
Grasping Social Media's Popularity and Appeal |
|
|
19 | (3) |
|
|
19 | (1) |
|
Philosophy Behind Social Media |
|
|
20 | (2) |
|
Social Media Technologies |
|
|
22 | (18) |
|
|
22 | (7) |
|
|
29 | (5) |
|
Social Media Use Differences Globally |
|
|
34 | (1) |
|
North America (U.S. and Canada) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
38 | (1) |
|
|
39 | (1) |
|
|
40 | (3) |
|
Part II Analyzing Social Media Data to Solve Security Problems |
|
|
43 | (134) |
|
Chapter 3 Introduction to Social Media Analytics |
|
|
45 | (26) |
|
|
45 | (3) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (13) |
|
|
49 | (3) |
|
|
52 | (6) |
|
|
58 | (3) |
|
|
61 | (8) |
|
|
62 | (1) |
|
Methodologies in this Book |
|
|
63 | (5) |
|
Methodologies Not in this Book |
|
|
68 | (1) |
|
|
69 | (2) |
|
Chapter 4 Collecting and Managing Social Media Data |
|
|
71 | (34) |
|
Understanding Social Media Data |
|
|
71 | (3) |
|
Determining Collection Needs |
|
|
74 | (10) |
|
What Data Will Solve the Problem? |
|
|
75 | (1) |
|
|
76 | (3) |
|
|
79 | (3) |
|
|
82 | (2) |
|
|
84 | (7) |
|
|
85 | (1) |
|
|
85 | (4) |
|
|
89 | (1) |
|
|
89 | (2) |
|
|
91 | (2) |
|
Storing and Managing the Data |
|
|
93 | (6) |
|
|
94 | (2) |
|
|
96 | (3) |
|
|
99 | (3) |
|
|
102 | (3) |
|
Chapter 5 Mapping and Analyzing Social Networks |
|
|
105 | (36) |
|
Key Concepts and Definitions |
|
|
105 | (8) |
|
Elements of Social Networks |
|
|
107 | (3) |
|
Influence and Memes in Social Networks |
|
|
110 | (1) |
|
|
111 | (2) |
|
Choosing SNA Software Program |
|
|
113 | (2) |
|
First Example --- Identify Influencers |
|
|
115 | (15) |
|
|
116 | (5) |
|
|
121 | (3) |
|
|
124 | (6) |
|
Second Example --- Identify Influencers |
|
|
130 | (4) |
|
|
131 | (1) |
|
|
131 | (1) |
|
|
132 | (2) |
|
Third Example --- Determine Top Memes |
|
|
134 | (3) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
137 | (4) |
|
Chapter 6 Understanding and Forecasting Events |
|
|
141 | (36) |
|
Introduction to Analyzing Events |
|
|
141 | (4) |
|
Social Media Data as Intelligence |
|
|
142 | (1) |
|
Monitoring Attacks through Social Media |
|
|
143 | (2) |
|
Understanding Forecasting |
|
|
145 | (4) |
|
Forecasting vs. Predicting |
|
|
146 | (1) |
|
|
147 | (2) |
|
Conducting Language and Sentiment Analysis |
|
|
149 | (12) |
|
|
151 | (5) |
|
Tracking and Forecasting the Behavior of Rioting Violent Crowds |
|
|
156 | (5) |
|
Correlation and Regression Analysis |
|
|
161 | (9) |
|
Creating Tools to Provide Early Warnings for Famines with Artificial Data |
|
|
163 | (7) |
|
|
170 | (4) |
|
Creating Tools to Provide Early Warnings for Famines with Artificial Data |
|
|
170 | (4) |
|
|
174 | (3) |
|
Part III Crowdsourcing Intelligence, Solutions, and Influence |
|
|
177 | (150) |
|
Chapter 7 Introduction to Crowdsourcing |
|
|
179 | (18) |
|
|
179 | (5) |
|
Defining Crowdsourcing and Its Relevance |
|
|
180 | (2) |
|
Bolstering Crowdsourcing with Social Media |
|
|
182 | (2) |
|
|
184 | (3) |
|
Solve More Problems and Get More Information |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
186 | (1) |
|
|
186 | (1) |
|
Relevant Examples of Crowdsourcing |
|
|
187 | (4) |
|
|
187 | (2) |
|
|
189 | (1) |
|
GCHQ Spy Recruitment Challenge |
|
|
190 | (1) |
|
|
190 | (1) |
|
Knowing When to Crowdsource |
|
|
191 | (3) |
|
|
191 | (2) |
|
|
193 | (1) |
|
|
194 | (3) |
|
Chapter 8 Building and Running Crowdsourcing Platforms |
|
|
197 | (28) |
|
|
197 | (2) |
|
Select Objective and Scope |
|
|
199 | (1) |
|
Refine Problem to Establish Clear Objective |
|
|
199 | (1) |
|
Decide the Scope of the Platform |
|
|
199 | (1) |
|
Analyze the Target Audience and Media Environment |
|
|
200 | (6) |
|
Determine the Target Audience |
|
|
201 | (2) |
|
Analyze the Target Audience |
|
|
203 | (1) |
|
Analyze the Media Environment |
|
|
204 | (1) |
|
Get the Information to Do the Analyses |
|
|
205 | (1) |
|
|
206 | (8) |
|
Determine the Platform's Look and Feel |
|
|
207 | (2) |
|
Determine the Platform's Incentive Structure |
|
|
209 | (5) |
|
|
214 | (1) |
|
|
215 | (3) |
|
|
218 | (2) |
|
Measure the Platform's Performance |
|
|
220 | (2) |
|
Create and Choose Metrics |
|
|
220 | (1) |
|
Collect Data to Populate Metrics |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
222 | (3) |
|
Chapter 9 Crowdsourcing Intelligence |
|
|
225 | (40) |
|
Understanding the Scope of Crowdsourced Intelligence |
|
|
225 | (3) |
|
Uniqueness of Crowdsourced Intelligence |
|
|
226 | (1) |
|
Direct and Indirect Crowdsourced Intelligence |
|
|
226 | (2) |
|
Appreciating the Limits of Crowdsourcing Intelligence |
|
|
228 | (3) |
|
Uncooperative Target Audience |
|
|
228 | (1) |
|
Higher Risk for Participants |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
Tweaking the Process for Intelligence Collection Platforms |
|
|
231 | (2) |
|
Collect Intelligence from Hard-to-Reach Areas through SMS |
|
|
233 | (9) |
|
Define Objective and Scope |
|
|
233 | (1) |
|
Analyze the Target Audience and Media Environment |
|
|
234 | (2) |
|
|
236 | (2) |
|
|
238 | (3) |
|
|
241 | (1) |
|
|
241 | (1) |
|
Measure the Platform's Performance |
|
|
241 | (1) |
|
|
242 | (1) |
|
Collect Intelligence from the Community for Law Enforcement |
|
|
242 | (11) |
|
Define Objective and Scope |
|
|
243 | (1) |
|
Analyze the Target Audience and Media Environment |
|
|
244 | (1) |
|
|
245 | (5) |
|
|
250 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
Measure the Platform's Performance |
|
|
252 | (1) |
|
|
252 | (1) |
|
Collect Intelligence to Bolster Disaster Relief |
|
|
253 | (10) |
|
Define Objective and Scope |
|
|
254 | (1) |
|
Analyze the Target Audience and Media Environment |
|
|
254 | (1) |
|
|
255 | (2) |
|
|
257 | (3) |
|
|
260 | (1) |
|
|
261 | (1) |
|
Measure the Platform's Performance |
|
|
262 | (1) |
|
|
263 | (1) |
|
|
263 | (2) |
|
Chapter 10 Crowdsourcing Solutions |
|
|
265 | (36) |
|
Understanding the Scope of Crowdsourced Solutions |
|
|
265 | (9) |
|
Formulating the Right Type of Problem |
|
|
266 | (3) |
|
Formulating the Right Crowdsourcing Approach |
|
|
269 | (5) |
|
Appreciating the Limits of Crowdsourcing Solutions |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
Tweaking the Process for Solution Platforms |
|
|
275 | (1) |
|
Crowdsourcing Translations during Disaster Relief |
|
|
276 | (11) |
|
Define Objective and Scope |
|
|
277 | (1) |
|
Analyze Target Audience and Media Environment |
|
|
278 | (1) |
|
|
279 | (2) |
|
|
281 | (3) |
|
|
284 | (1) |
|
|
285 | (1) |
|
Measure the Platform's Performance |
|
|
286 | (1) |
|
|
286 | (1) |
|
Crowdsource Tools to Identify Antagonistic Actors in Video Feeds |
|
|
287 | (10) |
|
Define Objective and Scope |
|
|
288 | (1) |
|
Analyze Target Audience and Media Environment |
|
|
289 | (1) |
|
|
290 | (4) |
|
|
294 | (1) |
|
|
294 | (1) |
|
|
295 | (1) |
|
Measure the Platform's Performance |
|
|
296 | (1) |
|
|
296 | (1) |
|
|
297 | (4) |
|
Chapter 11 Influencing Crowds |
|
|
301 | (26) |
|
Understanding the Scope of Influencing through Crowdsourcing |
|
|
301 | (4) |
|
Delineating Influence Goals |
|
|
302 | (2) |
|
Grasping How Influence Happens |
|
|
304 | (1) |
|
Process of Influencing Others |
|
|
305 | (4) |
|
Conceptual Overview of Influence Process |
|
|
306 | (1) |
|
Real-World Implications of Influence Process |
|
|
307 | (2) |
|
Appreciating the Limits of Influencing Crowds |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
|
310 | (1) |
|
Tweaking the Process for Influence Platforms |
|
|
310 | (1) |
|
Influencing to Collect Intelligence on Corrupt Officials |
|
|
311 | (12) |
|
Define Objectives and Scope |
|
|
312 | (1) |
|
Analyze Target Audience and the Media Environment |
|
|
312 | (1) |
|
Define Objectives and Scope, Redux |
|
|
313 | (2) |
|
|
315 | (6) |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
Measure the Platform's Performance |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
323 | (4) |
|
Part IV Broadening Your Horizon |
|
|
327 | (60) |
|
Chapter 12 Advanced and Emerging Analytical Methodologies |
|
|
329 | (24) |
|
Expanding the Scope of Analysis |
|
|
329 | (1) |
|
|
330 | (5) |
|
The Process of Clustering |
|
|
331 | (2) |
|
The Relevance of Clustering |
|
|
333 | (2) |
|
Geo-Spatial Network Analysis |
|
|
335 | (6) |
|
The Process of Geo-Spatial Network Analysis |
|
|
336 | (1) |
|
The Relevance of Geo-Spatial Network Analysis |
|
|
337 | (4) |
|
|
341 | (8) |
|
The Relevance of Agent Modeling |
|
|
342 | (1) |
|
The Process of Agent Modeling |
|
|
343 | (6) |
|
|
349 | (4) |
|
Chapter 13 Delivering Services through Crowdsourcing |
|
|
353 | (18) |
|
|
353 | (10) |
|
Understanding How People Learn |
|
|
354 | (2) |
|
Delivering Education through Tablets and Mobile Phones (First Method) |
|
|
356 | (5) |
|
Delivering Education through Mobile Phones Only (Second Method) |
|
|
361 | (1) |
|
Side-Benefits of Delivering Education |
|
|
362 | (1) |
|
|
363 | (6) |
|
Diagnosing Health Problems |
|
|
363 | (3) |
|
Collecting Health Information |
|
|
366 | (3) |
|
|
369 | (2) |
|
Chapter 14 Protecting Privacy and Yourself |
|
|
371 | (16) |
|
Considering Privacy and Free Speech |
|
|
371 | (2) |
|
Reasons to Consider Privacy and Free Speech |
|
|
372 | (1) |
|
Appreciating the Complexity Involved |
|
|
372 | (1) |
|
Acting Legally and Ethically |
|
|
373 | (5) |
|
Analyze Non-Personal Open Source Intelligence |
|
|
374 | (1) |
|
Follow Rules of Social Media Data Sources |
|
|
374 | (1) |
|
|
375 | (1) |
|
Identify Extra Restrictions |
|
|
375 | (1) |
|
Do Not Store People's Personal Information |
|
|
376 | (1) |
|
Help Your Participants Protect Themselves |
|
|
376 | (1) |
|
Solicit Professional Help When Possible |
|
|
377 | (1) |
|
Value Privacy and Strive for a Good Reputation |
|
|
377 | (1) |
|
Imagine and Prepare for the Worst-Case Scenario |
|
|
378 | (1) |
|
Be Aware of Changes in Laws and Norms |
|
|
378 | (1) |
|
Protecting Your Identity and Speech |
|
|
378 | (6) |
|
Set Basic Security Settings |
|
|
380 | (1) |
|
Do Not Post Sensitive Information |
|
|
380 | (1) |
|
Be Wary of Enabling Location Services |
|
|
380 | (1) |
|
Use Technologies That Anonymize You |
|
|
380 | (2) |
|
Use Social Media Platforms That Hide Your Identity |
|
|
382 | (1) |
|
Identify Who Is Behind What and Why |
|
|
382 | (1) |
|
Use Common Sense and Be Reasonable |
|
|
382 | (2) |
|
|
384 | (3) |
|
Appendix Extra Information and Resources |
|
|
387 | (4) |
|
|
387 | (2) |
|
|
389 | (2) |
Index |
|
391 | |