Using Social Media for Global Security

ISBN-10: 1118442318
ISBN-13: 9781118442319
Edition: 2013
List price: $39.99
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Essential reading for cybersecurity professionals, security analysts, policy experts, decision–makers, and law enforcement!During the Occupy Wall Street and Arab Spring movements, the world witnessed the power of social media to dramatically shape  More...

what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Italian Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
Portuguese Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
Spanish Grammar Online content $4.95 $1.99
Add to cart
Study Briefs
German Grammar Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $39.99
Copyright year: 2013
Publisher: John Wiley & Sons, Incorporated
Publication date: 1/29/2013
Binding: Paperback
Pages: 456
Size: 7.50" wide x 9.25" long x 1.25" tall
Weight: 1.452
Language: English

Essential reading for cybersecurity professionals, security analysts, policy experts, decision–makers, and law enforcement!During the Occupy Wall Street and Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision–makers and security experts how to use the social world to improve security nationally and globally––and cost–effectively. Authored by two social media/crowd behavior/security experts, Using Social Media for Global Security offers pages of instruction and detail on cutting–edge social media technologies, analytical methods, software tools, and data collection. You′ll learn how to build data aggregators and "crawlers," and buy commercially available data. The book explores how to map and influence online social networks, identify key influencers, crowdsource intelligence, and forecast riots and famines through analytics. Topics include ethics of using social media data and much more. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must–read. Shows how to use social media to inexpensively improve security nationally and globallyExamines cutting–edge technologies, analytical methods, software tools, and data collection techniquesProvides gripping, real–world case studies of global events, including the Arab Spring, Occupy Wall Street, and the London RiotsShows you how to build data aggregators, analyze online social networks, build crowdsourcing platforms, and much moreIf you′re responsible for maintaining national or global security, you′ll want to read Using Social Media for Global Security.

Introduction
Understanding the Influence of Social Media Globally
Understanding Social Media's Impact on Global Security
Organizing Revolutions and Riots
Arab Spring
London Riots
Recruiting Terrorists and Encouraging Attacks
Glorifying and Promoting Gang Culture and Violence
Acknowledging Social Media's Impact
Summary
Understanding Global Social Media Use
Defining Social Media
Grasping Social Media's Popularity and Appeal
Growth of Social Media
Philosophy Behind Social Media
Social Media Technologies
Platform Types
Device Types
Social Media Use Differences Globally
North America (U.S. and Canada)
Latin America
Europe
East Asia
Southeast Asia
South Asia
Middle East
Africa
Summary
Analyzing Social Media Data to Solve Security Problems
Introduction to Social Media Analytics
Defining Analysis
What Is Analysis
Limits of Analysis
What Is Not Analysis
Analysis Overview
Preliminary Procedure
The Analytical Processes
Analysis Dos and Don'ts
Analysis Methodologies
Variables
Methodologies in this Book
Methodologies Not in this Book
Summary
Collecting and Managing Social Media Data
Understanding Social Media Data
Determining Collection Needs
What Data Will Solve the Problem?
How Much Data Is Enough?
Who Has the Data?
Will They Give the Data?
Collecting the Data
Data Framework
APIs
RSS Feeds
Crawlers
Filtering the Data
Storing and Managing the Data
Relational Databases
Non-Relational Databases
Third-Party Solutions
Summary
Mapping and Analyzing Social Networks
Key Concepts and Definitions
Elements of Social Networks
Influence and Memes in Social Networks
Algorithms in SNA
Choosing SNA Software Program
First Example - Identify Influencers
Creating the Data Set
Visually Map the Network
Analyze the Network
Second Example - Identify Influencers
Create the Data Set
Visually Map the Network
Analyze the Network
Third Example - Determine Top Memes
Create the Data Set
Analyze the Network
Summary
Understanding and Forecasting Events
Introduction to Analyzing Events
Social Media Data as Intelligence
Monitoring Attacks through Social Media
Understanding Forecasting
Forecasting vs. Predicting
Forecasting Properly
Conducting Language and Sentiment Analysis
Determining Authorship
Tracking and Forecasting the Behavior of Rioting Violent Crowds
Correlation and Regression Analysis
Creating Tools to Provide Early Warnings for Famines with Artificial Data
Volumetric Analysis
Creating Tools to Provide Early Warnings for Famines with Artificial Data
Summary
Crowdsourcing Intelligence, Solutions, and Influence
Introduction to Crowdsourcing
What Is Crowdsourcing?
Defining Crowdsourcing and Its Relevance
Bolstering Crowdsourcing with Social Media
Why Use Crowdsourcing?
Solve More Problems and Get More Information
Work Quickly
Work Discreetly
Save Money
Relevant Examples of Crowdsourcing
OpenIDEO
DARPA Shredder Challenge
GCHQ Spy Recruitment Challenge
M-Farm
Knowing When to Crowdsource
When to Crowdsource
When Not to Crowdsource
Summary
Building and Running Crowdsourcing Platforms
Overview of the Process
Select Objective and Scope
Refine Problem to Establish Clear Objective
Decide the Scope of the Platform
Analyze the Target Audience and Media Environment
Determine the Target Audience
Analyze the Target Audience
Analyze the Media Environment
Get the Information to Do the Analyses
Design the Platform
Determine the Platform's Look and Feel
Determine the Platform's Incentive Structure
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Create and Choose Metrics
Collect Data to Populate Metrics
Wash, Rinse, Repeat
Summary
Crowdsourcing Intelligence
Understanding the Scope of Crowdsourced Intelligence
Uniqueness of Crowdsourced Intelligence
Direct and Indirect Crowdsourced Intelligence
Appreciating the Limits of Crowdsourcing Intelligence
Uncooperative Target Audience
Higher Risk for Participants
Misinformation
Misinterpretation
Hawthorne Effect
Tweaking the Process for Intelligence Collection Platforms
Collect Intelligence from Hard-to-Reach Areas through SMS
Define Objective and Scope
Analyze the Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Collect Intelligence from the Community for Law Enforcement
Define Objective and Scope
Analyze the Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Collect Intelligence to Bolster Disaster Relief
Define Objective and Scope
Analyze the Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Summary
Crowdsourcing Solutions
Understanding the Scope of Crowdsourced Solutions
Formulating the Right Type of Problem
Formulating the Right Crowdsourcing Approach
Appreciating the Limits of Crowdsourcing Solutions
Unsolvable Problem
Incorrect Solutions
Adversarial Participants
Political Fallout
Tweaking the Process for Solution Platforms
Crowdsourcing Translations during Disaster Relief
Define Objective and Scope
Analyze Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Crowdsource Tools to Identify Antagonistic Actors in Video Feeds
Define Objective and Scope
Analyze Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Summary
Influencing Crowds
Understanding the Scope of Influencing through Crowdsourcing
Delineating Influence Goals
Grasping How Influence Happens
Process of Influencing Others
Conceptual Overview of Influence Process
Real-World Implications of Influence Process
Appreciating the Limits of Influencing Crowds
Unrealistic Expectations
Adversarial Participants
Political Fallout
Unknown Unknowns
Tweaking the Process for Influence Platforms
Influencing to Collect Intelligence on Corrupt Officials
Define Objectives and Scope
Analyze Target Audience and the Media Environment
Define Objectives and Scope, Redux
Design the Platform
Build the Platform
Market the Platform
Moderate the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Summary
Broadening Your Horizon
Advanced and Emerging Analytical Methodologies
Expanding the Scope of Analysis
Cluster Analysis
The Process of Clustering
The Relevance of Clustering
Geo-Spatial Network Analysis
The Process of Geo-Spatial Network Analysis
The Relevance of Geo-Spatial Network Analysis
Agent Modeling
The Relevance of Agent Modeling
The Process of Agent Modeling
Summary
Delivering Services through Crowdsourcing
Delivering Education
Understanding How People Learn
Delivering Education through Tablets and Mobile Phones (First Method)
Delivering Education through Mobile Phones Only (Second Method)
Side-Benefits of Delivering Education
Delivering Health
Diagnosing Health Problems
Collecting Health Information
Summary
Protecting Privacy and Yourself
Considering Privacy and Free Speech
Reasons to Consider Privacy and Free Speech
Appreciating the Complexity Involved
Acting Legally and Ethically
Analyze Non-Personal Open Source Intelligence
Follow Rules of Social Media Data Sources
Do Not Involve Children
Identify Extra Restrictions
Do Not Store People's Personal Information
Help Your Participants Protect Themselves
Solicit Professional Help When Possible
Value Privacy and Strive for a Good Reputation
Imagine and Prepare for the Worst-Case Scenario
Be Aware of Changes in Laws and Norms
Protecting Your Identity and Speech
Set Basic Security Settings
Do Not Post Sensitive Information
Be Wary of Enabling Location Services
Use Technologies That Anonymize You
Use Social Media Platforms That Hide Your Identity
Identify Who Is Behind What and Why
Use Common Sense and Be Reasonable
Summary
Appendix: Extra Information and Resources
Social Media Platforms
Software Tools
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×