Bibliografie

Detailansicht

Using Social Media for Global Security

ISBN/EAN: 9781118442319
Umbreit-Nr.: 4264697

Sprache: Englisch
Umfang: XXXIII, 417 S.
Format in cm: 2.7 x 23.5 x 18.7
Einband: kartoniertes Buch

Erschienen am 05.02.2013
Auflage: 1/2013
€ 38,90
(inklusive MwSt.)
Nicht lieferbar
  • Zusatztext
    • InhaltsangabeIntroduction xxv Part I Understanding the Influence of Social Media Globally 1 Chapter 1 Understanding Social Media's Impact on Global Security 3 Organizing Revolutions and Riots 4 Arab Spring 4 London Riots 8 Recruiting Terrorists and Encouraging Attacks 10 Glorifying and Promoting Gang Culture and Violence 11 Acknowledging Social Media's Impact 13 Summary 14 Chapter 2 Understanding Global Social Media Use 17 Defining Social Media 17 Grasping Social Media's Popularity and Appeal 19 Growth of Social Media 19 Philosophy Behind Social Media 20 Social Media Technologies 22 Platform Types 22 Device Types 29 Social Media Use Differences Globally 34 North America (U.S. and Canada) 35 Latin America 36 Europe 36 East Asia 37 Southeast Asia 38 South Asia 38 Middle East 38 Africa 39 Summary 40 Part II Analyzing Social Media Data to Solve Security Problems 43 Chapter 3 Introduction to Social Media Analytics 45 Defining Analysis 45 What Is Analysis 46 Limits of Analysis 46 What Is Not Analysis 47 Analysis Overview 48 Preliminary Procedure 49 The Analytical Processes 52 Analysis Dos and Don'ts 58 Analysis Methodologies 61 Variables 62 Methodologies in this Book 63 Methodologies Not in this Book 68 Summary 69 Chapter 4 Collecting and Managing Social Media Data 71 Understanding Social Media Data 71 Determining Collection Needs 74 What Data Will Solve the Problem? 75 How Much Data Is Enough? 76 Who Has the Data? 79 Will They Give the Data? 82 Collecting the Data 84 Data Framework 85 APIs 85 RSS Feeds 89 Crawlers 89 Filtering the Data 91 Storing and Managing the Data 93 Relational Databases 94 NonRelational Databases 96 ThirdParty Solutions 99 Summary 102 Chapter 5 Mapping and Analyzing Social Networks 105 Key Concepts and Defi nitions 105 Elements of Social Networks 107 Infl uence and Memes in Social Networks 110 Algorithms in SNA 111 Choosing SNA Software Program 113 First Example -- Identify Influencers 115 Creating the Data Set 116 Visually Map the Network 121 Analyze the Network 124 Second Example -- Identify Infl uencers 130 Create the Data Set 131 Visually Map the Network 131 Analyze the Network 132 Third Example -- Determine Top Memes 134 Create the Data Set 135 Analyze the Network 136 Summary 137 Chapter 6 Understanding and Forecasting Events 141 Introduction to Analyzing Events 141 Social Media Data as Intelligence 142 Monitoring Attacks through Social Media 143 Understanding Forecasting 145 Forecasting vs. Predicting 146 Forecasting Properly 147 Conducting Language and Sentiment Analysis 149 Determining Authorship 151 Tracking and Forecasting the Behavior of Rioting Violent Crowds 156 Correlation and Regression Analysis 161 Creating Tools to Provide Early Warnings for Famines with Artificial Data 163 Volumetric Analysis 170 Creating Tools to Provide Early Warnings for Famines with Artificial Data 170 Summary 174 Part III Crowdsourcing Intelligence, Solutions, and Influence 177 Chapter 7 Introduction to Crowdsourcing 179 What Is Crowdsourcing? 179 Defining Crowdsourcing and Its Relevance 180 Bolstering Crowdsourcing with Social Media 182 Why Use Crowdsourcing? 184 Solve More Problems and Get More Information 184 Work Quickly 185 Work Discreetly 186 Save Money 186 Relevant Examples of Crowdsourcing 187 OpenIDEO 187 DARPA Shredder Challenge 189 GCHQ Spy Recruitment Challenge 190 MFarm 190 Knowing When to Crowdsource 191 When to Crowdsource 191 When Not to Crowdsource 193 Summary 194 Chapter 8 Building and Running Crowdsourcing Platforms 197 Overview of the Process 197 Select Objective and Scope 199 Refine Problem to Establish Clear Objective 199 Decide the Scope of the Platform 199 Ana

  • Kurztext
    • "Social Media mapping is the new achilles-heel of associations and thoughts, which were formerly unseen. Gupta and Brooks are without question the master of this cartography" David Tinsley, Former U.S Drug Enforcement Administration Special Agent. CEO, 5 Stones Intelligence "A thoughtprovoking "howto" book on leveraging and exploiting social media across military operations. Without these insights, today's leaders will be left in the dark while today's generation passes them by." John N. Sims, Former U.S. Air Force Special Operations Commander. CEO, enkidu7 How an agent for change can be a force for security During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, globally-and cost-effectively. You'll discover how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, or to forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. With its dramatic case studies pulled from the headlines, this crucial book is a must-read. * Illustrates linguistic, correlative, and network analysis of OSINT * Examines the use of crowdsourcing technologies to work with and engage populations globally to solve security problems * Explores how to ethically deal with social media data without compromising people's rights to privacy and freedom of expression * Shows activists fighting against oppressive regimes how to protect their identities online Visit the companion website at www.wiley.com/go/usingsocialmediaforglobalsecurity for updates, data files referenced in the book, and additional information

  • Autorenportrait
    • Ravi Gupta is an entrepreneur who develops and commercializes technologies that use biological principles. He has created social media platforms, data processing algorithms, and crowdsourcing techniques to understand and solve security problems. Hugh Brooks is a security consultant for government and private clients. With a focus on creativity, he has produced innovative solutions for crowd-driven applications, behavior modeling, mobile health and education, and cyber security.
Lädt …