| |
| |
Introduction | |
| |
| |
| |
Understanding the Influence of Social Media Globally | |
| |
| |
| |
Understanding Social Media's Impact on Global Security | |
| |
| |
Organizing Revolutions and Riots | |
| |
| |
Arab Spring | |
| |
| |
London Riots | |
| |
| |
Recruiting Terrorists and Encouraging Attacks | |
| |
| |
Glorifying and Promoting Gang Culture and Violence | |
| |
| |
Acknowledging Social Media's Impact | |
| |
| |
Summary | |
| |
| |
| |
Understanding Global Social Media Use | |
| |
| |
Defining Social Media | |
| |
| |
Grasping Social Media's Popularity and Appeal | |
| |
| |
Growth of Social Media | |
| |
| |
Philosophy Behind Social Media | |
| |
| |
Social Media Technologies | |
| |
| |
Platform Types | |
| |
| |
Device Types | |
| |
| |
Social Media Use Differences Globally | |
| |
| |
North America (U.S. and Canada) | |
| |
| |
Latin America | |
| |
| |
Europe | |
| |
| |
East Asia | |
| |
| |
Southeast Asia | |
| |
| |
South Asia | |
| |
| |
Middle East | |
| |
| |
Africa | |
| |
| |
Summary | |
| |
| |
| |
Analyzing Social Media Data to Solve Security Problems | |
| |
| |
| |
Introduction to Social Media Analytics | |
| |
| |
Defining Analysis | |
| |
| |
What Is Analysis | |
| |
| |
Limits of Analysis | |
| |
| |
What Is Not Analysis | |
| |
| |
Analysis Overview | |
| |
| |
Preliminary Procedure | |
| |
| |
The Analytical Processes | |
| |
| |
Analysis Dos and Don'ts | |
| |
| |
Analysis Methodologies | |
| |
| |
Variables | |
| |
| |
Methodologies in this Book | |
| |
| |
Methodologies Not in this Book | |
| |
| |
Summary | |
| |
| |
| |
Collecting and Managing Social Media Data | |
| |
| |
Understanding Social Media Data | |
| |
| |
Determining Collection Needs | |
| |
| |
What Data Will Solve the Problem? | |
| |
| |
How Much Data Is Enough? | |
| |
| |
Who Has the Data? | |
| |
| |
Will They Give the Data? | |
| |
| |
Collecting the Data | |
| |
| |
Data Framework | |
| |
| |
APIs | |
| |
| |
RSS Feeds | |
| |
| |
Crawlers | |
| |
| |
Filtering the Data | |
| |
| |
Storing and Managing the Data | |
| |
| |
Relational Databases | |
| |
| |
Non-Relational Databases | |
| |
| |
Third-Party Solutions | |
| |
| |
Summary | |
| |
| |
| |
Mapping and Analyzing Social Networks | |
| |
| |
Key Concepts and Definitions | |
| |
| |
Elements of Social Networks | |
| |
| |
Influence and Memes in Social Networks | |
| |
| |
Algorithms in SNA | |
| |
| |
Choosing SNA Software Program | |
| |
| |
First Example - Identify Influencers | |
| |
| |
Creating the Data Set | |
| |
| |
Visually Map the Network | |
| |
| |
Analyze the Network | |
| |
| |
Second Example - Identify Influencers | |
| |
| |
Create the Data Set | |
| |
| |
Visually Map the Network | |
| |
| |
Analyze the Network | |
| |
| |
Third Example - Determine Top Memes | |
| |
| |
Create the Data Set | |
| |
| |
Analyze the Network | |
| |
| |
Summary | |
| |
| |
| |
Understanding and Forecasting Events | |
| |
| |
Introduction to Analyzing Events | |
| |
| |
Social Media Data as Intelligence | |
| |
| |
Monitoring Attacks through Social Media | |
| |
| |
Understanding Forecasting | |
| |
| |
Forecasting vs. Predicting | |
| |
| |
Forecasting Properly | |
| |
| |
Conducting Language and Sentiment Analysis | |
| |
| |
Determining Authorship | |
| |
| |
Tracking and Forecasting the Behavior of Rioting Violent Crowds | |
| |
| |
Correlation and Regression Analysis | |
| |
| |
Creating Tools to Provide Early Warnings for Famines with Artificial Data | |
| |
| |
Volumetric Analysis | |
| |
| |
Creating Tools to Provide Early Warnings for Famines with Artificial Data | |
| |
| |
Summary | |
| |
| |
| |
Crowdsourcing Intelligence, Solutions, and Influence | |
| |
| |
| |
Introduction to Crowdsourcing | |
| |
| |
What Is Crowdsourcing? | |
| |
| |
Defining Crowdsourcing and Its Relevance | |
| |
| |
Bolstering Crowdsourcing with Social Media | |
| |
| |
Why Use Crowdsourcing? | |
| |
| |
Solve More Problems and Get More Information | |
| |
| |
Work Quickly | |
| |
| |
Work Discreetly | |
| |
| |
Save Money | |
| |
| |
Relevant Examples of Crowdsourcing | |
| |
| |
OpenIDEO | |
| |
| |
DARPA Shredder Challenge | |
| |
| |
GCHQ Spy Recruitment Challenge | |
| |
| |
M-Farm | |
| |
| |
Knowing When to Crowdsource | |
| |
| |
When to Crowdsource | |
| |
| |
When Not to Crowdsource | |
| |
| |
Summary | |
| |
| |
| |
Building and Running Crowdsourcing Platforms | |
| |
| |
Overview of the Process | |
| |
| |
Select Objective and Scope | |
| |
| |
Refine Problem to Establish Clear Objective | |
| |
| |
Decide the Scope of the Platform | |
| |
| |
Analyze the Target Audience and Media Environment | |
| |
| |
Determine the Target Audience | |
| |
| |
Analyze the Target Audience | |
| |
| |
Analyze the Media Environment | |
| |
| |
Get the Information to Do the Analyses | |
| |
| |
Design the Platform | |
| |
| |
Determine the Platform's Look and Feel | |
| |
| |
Determine the Platform's Incentive Structure | |
| |
| |
Build the Platform | |
| |
| |
Market the Platform | |
| |
| |
Manage the Platform | |
| |
| |
Measure the Platform's Performance | |
| |
| |
Create and Choose Metrics | |
| |
| |
Collect Data to Populate Metrics | |
| |
| |
Wash, Rinse, Repeat | |
| |
| |
Summary | |
| |
| |
| |
Crowdsourcing Intelligence | |
| |
| |
Understanding the Scope of Crowdsourced Intelligence | |
| |
| |
Uniqueness of Crowdsourced Intelligence | |
| |
| |
Direct and Indirect Crowdsourced Intelligence | |
| |
| |
Appreciating the Limits of Crowdsourcing Intelligence | |
| |
| |
Uncooperative Target Audience | |
| |
| |
Higher Risk for Participants | |
| |
| |
Misinformation | |
| |
| |
Misinterpretation | |
| |
| |
Hawthorne Effect | |
| |
| |
Tweaking the Process for Intelligence Collection Platforms | |
| |
| |
Collect Intelligence from Hard-to-Reach Areas through SMS | |
| |
| |
Define Objective and Scope | |
| |
| |
Analyze the Target Audience and Media Environment | |
| |
| |
Design the Platform | |
| |
| |
Build the Platform | |
| |
| |
Market the Platform | |
| |
| |
Manage the Platform | |
| |
| |
Measure the Platform's Performance | |
| |
| |
Wash, Rinse, Repeat | |
| |
| |
Collect Intelligence from the Community for Law Enforcement | |
| |
| |
Define Objective and Scope | |
| |
| |
Analyze the Target Audience and Media Environment | |
| |
| |
Design the Platform | |
| |
| |
Build the Platform | |
| |
| |
Market the Platform | |
| |
| |
Manage the Platform | |
| |
| |
Measure the Platform's Performance | |
| |
| |
Wash, Rinse, Repeat | |
| |
| |
Collect Intelligence to Bolster Disaster Relief | |
| |
| |
Define Objective and Scope | |
| |
| |
Analyze the Target Audience and Media Environment | |
| |
| |
Design the Platform | |
| |
| |
Build the Platform | |
| |
| |
Market the Platform | |
| |
| |
Manage the Platform | |
| |
| |
Measure the Platform's Performance | |
| |
| |
Wash, Rinse, Repeat | |
| |
| |
Summary | |
| |
| |
| |
Crowdsourcing Solutions | |
| |
| |
Understanding the Scope of Crowdsourced Solutions | |
| |
| |
Formulating the Right Type of Problem | |
| |
| |
Formulating the Right Crowdsourcing Approach | |
| |
| |
Appreciating the Limits of Crowdsourcing Solutions | |
| |
| |
Unsolvable Problem | |
| |
| |
Incorrect Solutions | |
| |
| |
Adversarial Participants | |
| |
| |
Political Fallout | |
| |
| |
Tweaking the Process for Solution Platforms | |
| |
| |
Crowdsourcing Translations during Disaster Relief | |
| |
| |
Define Objective and Scope | |
| |
| |
Analyze Target Audience and Media Environment | |
| |
| |
Design the Platform | |
| |
| |
Build the Platform | |
| |
| |
Market the Platform | |
| |
| |
Manage the Platform | |
| |
| |
Measure the Platform's Performance | |
| |
| |
Wash, Rinse, Repeat | |
| |
| |
Crowdsource Tools to Identify Antagonistic Actors in Video Feeds | |
| |
| |
Define Objective and Scope | |
| |
| |
Analyze Target Audience and Media Environment | |
| |
| |
Design the Platform | |
| |
| |
Build the Platform | |
| |
| |
Market the Platform | |
| |
| |
Manage the Platform | |
| |
| |
Measure the Platform's Performance | |
| |
| |
Wash, Rinse, Repeat | |
| |
| |
Summary | |
| |
| |
| |
Influencing Crowds | |
| |
| |
Understanding the Scope of Influencing through Crowdsourcing | |
| |
| |
Delineating Influence Goals | |
| |
| |
Grasping How Influence Happens | |
| |
| |
Process of Influencing Others | |
| |
| |
Conceptual Overview of Influence Process | |
| |
| |
Real-World Implications of Influence Process | |
| |
| |
Appreciating the Limits of Influencing Crowds | |
| |
| |
Unrealistic Expectations | |
| |
| |
Adversarial Participants | |
| |
| |
Political Fallout | |
| |
| |
Unknown Unknowns | |
| |
| |
Tweaking the Process for Influence Platforms | |
| |
| |
Influencing to Collect Intelligence on Corrupt Officials | |
| |
| |
Define Objectives and Scope | |
| |
| |
Analyze Target Audience and the Media Environment | |
| |
| |
Define Objectives and Scope, Redux | |
| |
| |
Design the Platform | |
| |
| |
Build the Platform | |
| |
| |
Market the Platform | |
| |
| |
Moderate the Platform | |
| |
| |
Measure the Platform's Performance | |
| |
| |
Wash, Rinse, Repeat | |
| |
| |
Summary | |
| |
| |
| |
Broadening Your Horizon | |
| |
| |
| |
Advanced and Emerging Analytical Methodologies | |
| |
| |
Expanding the Scope of Analysis | |
| |
| |
Cluster Analysis | |
| |
| |
The Process of Clustering | |
| |
| |
The Relevance of Clustering | |
| |
| |
Geo-Spatial Network Analysis | |
| |
| |
The Process of Geo-Spatial Network Analysis | |
| |
| |
The Relevance of Geo-Spatial Network Analysis | |
| |
| |
Agent Modeling | |
| |
| |
The Relevance of Agent Modeling | |
| |
| |
The Process of Agent Modeling | |
| |
| |
Summary | |
| |
| |
| |
Delivering Services through Crowdsourcing | |
| |
| |
Delivering Education | |
| |
| |
Understanding How People Learn | |
| |
| |
Delivering Education through Tablets and Mobile Phones (First Method) | |
| |
| |
Delivering Education through Mobile Phones Only (Second Method) | |
| |
| |
Side-Benefits of Delivering Education | |
| |
| |
Delivering Health | |
| |
| |
Diagnosing Health Problems | |
| |
| |
Collecting Health Information | |
| |
| |
Summary | |
| |
| |
| |
Protecting Privacy and Yourself | |
| |
| |
Considering Privacy and Free Speech | |
| |
| |
Reasons to Consider Privacy and Free Speech | |
| |
| |
Appreciating the Complexity Involved | |
| |
| |
Acting Legally and Ethically | |
| |
| |
Analyze Non-Personal Open Source Intelligence | |
| |
| |
Follow Rules of Social Media Data Sources | |
| |
| |
Do Not Involve Children | |
| |
| |
Identify Extra Restrictions | |
| |
| |
Do Not Store People's Personal Information | |
| |
| |
Help Your Participants Protect Themselves | |
| |
| |
Solicit Professional Help When Possible | |
| |
| |
Value Privacy and Strive for a Good Reputation | |
| |
| |
Imagine and Prepare for the Worst-Case Scenario | |
| |
| |
Be Aware of Changes in Laws and Norms | |
| |
| |
Protecting Your Identity and Speech | |
| |
| |
Set Basic Security Settings | |
| |
| |
Do Not Post Sensitive Information | |
| |
| |
Be Wary of Enabling Location Services | |
| |
| |
Use Technologies That Anonymize You | |
| |
| |
Use Social Media Platforms That Hide Your Identity | |
| |
| |
Identify Who Is Behind What and Why | |
| |
| |
Use Common Sense and Be Reasonable | |
| |
| |
Summary | |
| |
| |
Appendix: Extra Information and Resources | |
| |
| |
Social Media Platforms | |
| |
| |
Software Tools | |
| |
| |
Index | |