Skip to content

Using Social Media for Global Security

Best in textbook rentals since 2012!

ISBN-10: 1118442318

ISBN-13: 9781118442319

Edition: 2013

Authors: Ravi Gupta, Hugh Brooks

List price: $39.99
Blue ribbon 30 day, 100% satisfaction guarantee!
Out of stock
We're sorry. This item is currently unavailable.
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Essential reading for cybersecurity professionals, security analysts, policy experts, decision–makers, and law enforcement!During the Occupy Wall Street and Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision–makers and security experts how to use the social world to improve security nationally and globally––and cost–effectively. Authored by two social media/crowd behavior/security experts, Using Social Media for Global Security offers pages of instruction and detail on cutting–edge social media technologies, analytical methods, software tools, and data collection. You′ll learn how to build data…    
Customers also bought

Book details

List price: $39.99
Copyright year: 2013
Publisher: John Wiley & Sons, Incorporated
Publication date: 1/29/2013
Binding: Paperback
Pages: 456
Size: 7.50" wide x 9.25" long x 1.25" tall
Weight: 1.452
Language: English

Introduction
Understanding the Influence of Social Media Globally
Understanding Social Media's Impact on Global Security
Organizing Revolutions and Riots
Arab Spring
London Riots
Recruiting Terrorists and Encouraging Attacks
Glorifying and Promoting Gang Culture and Violence
Acknowledging Social Media's Impact
Summary
Understanding Global Social Media Use
Defining Social Media
Grasping Social Media's Popularity and Appeal
Growth of Social Media
Philosophy Behind Social Media
Social Media Technologies
Platform Types
Device Types
Social Media Use Differences Globally
North America (U.S. and Canada)
Latin America
Europe
East Asia
Southeast Asia
South Asia
Middle East
Africa
Summary
Analyzing Social Media Data to Solve Security Problems
Introduction to Social Media Analytics
Defining Analysis
What Is Analysis
Limits of Analysis
What Is Not Analysis
Analysis Overview
Preliminary Procedure
The Analytical Processes
Analysis Dos and Don'ts
Analysis Methodologies
Variables
Methodologies in this Book
Methodologies Not in this Book
Summary
Collecting and Managing Social Media Data
Understanding Social Media Data
Determining Collection Needs
What Data Will Solve the Problem?
How Much Data Is Enough?
Who Has the Data?
Will They Give the Data?
Collecting the Data
Data Framework
APIs
RSS Feeds
Crawlers
Filtering the Data
Storing and Managing the Data
Relational Databases
Non-Relational Databases
Third-Party Solutions
Summary
Mapping and Analyzing Social Networks
Key Concepts and Definitions
Elements of Social Networks
Influence and Memes in Social Networks
Algorithms in SNA
Choosing SNA Software Program
First Example - Identify Influencers
Creating the Data Set
Visually Map the Network
Analyze the Network
Second Example - Identify Influencers
Create the Data Set
Visually Map the Network
Analyze the Network
Third Example - Determine Top Memes
Create the Data Set
Analyze the Network
Summary
Understanding and Forecasting Events
Introduction to Analyzing Events
Social Media Data as Intelligence
Monitoring Attacks through Social Media
Understanding Forecasting
Forecasting vs. Predicting
Forecasting Properly
Conducting Language and Sentiment Analysis
Determining Authorship
Tracking and Forecasting the Behavior of Rioting Violent Crowds
Correlation and Regression Analysis
Creating Tools to Provide Early Warnings for Famines with Artificial Data
Volumetric Analysis
Creating Tools to Provide Early Warnings for Famines with Artificial Data
Summary
Crowdsourcing Intelligence, Solutions, and Influence
Introduction to Crowdsourcing
What Is Crowdsourcing?
Defining Crowdsourcing and Its Relevance
Bolstering Crowdsourcing with Social Media
Why Use Crowdsourcing?
Solve More Problems and Get More Information
Work Quickly
Work Discreetly
Save Money
Relevant Examples of Crowdsourcing
OpenIDEO
DARPA Shredder Challenge
GCHQ Spy Recruitment Challenge
M-Farm
Knowing When to Crowdsource
When to Crowdsource
When Not to Crowdsource
Summary
Building and Running Crowdsourcing Platforms
Overview of the Process
Select Objective and Scope
Refine Problem to Establish Clear Objective
Decide the Scope of the Platform
Analyze the Target Audience and Media Environment
Determine the Target Audience
Analyze the Target Audience
Analyze the Media Environment
Get the Information to Do the Analyses
Design the Platform
Determine the Platform's Look and Feel
Determine the Platform's Incentive Structure
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Create and Choose Metrics
Collect Data to Populate Metrics
Wash, Rinse, Repeat
Summary
Crowdsourcing Intelligence
Understanding the Scope of Crowdsourced Intelligence
Uniqueness of Crowdsourced Intelligence
Direct and Indirect Crowdsourced Intelligence
Appreciating the Limits of Crowdsourcing Intelligence
Uncooperative Target Audience
Higher Risk for Participants
Misinformation
Misinterpretation
Hawthorne Effect
Tweaking the Process for Intelligence Collection Platforms
Collect Intelligence from Hard-to-Reach Areas through SMS
Define Objective and Scope
Analyze the Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Collect Intelligence from the Community for Law Enforcement
Define Objective and Scope
Analyze the Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Collect Intelligence to Bolster Disaster Relief
Define Objective and Scope
Analyze the Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Summary
Crowdsourcing Solutions
Understanding the Scope of Crowdsourced Solutions
Formulating the Right Type of Problem
Formulating the Right Crowdsourcing Approach
Appreciating the Limits of Crowdsourcing Solutions
Unsolvable Problem
Incorrect Solutions
Adversarial Participants
Political Fallout
Tweaking the Process for Solution Platforms
Crowdsourcing Translations during Disaster Relief
Define Objective and Scope
Analyze Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Crowdsource Tools to Identify Antagonistic Actors in Video Feeds
Define Objective and Scope
Analyze Target Audience and Media Environment
Design the Platform
Build the Platform
Market the Platform
Manage the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Summary
Influencing Crowds
Understanding the Scope of Influencing through Crowdsourcing
Delineating Influence Goals
Grasping How Influence Happens
Process of Influencing Others
Conceptual Overview of Influence Process
Real-World Implications of Influence Process
Appreciating the Limits of Influencing Crowds
Unrealistic Expectations
Adversarial Participants
Political Fallout
Unknown Unknowns
Tweaking the Process for Influence Platforms
Influencing to Collect Intelligence on Corrupt Officials
Define Objectives and Scope
Analyze Target Audience and the Media Environment
Define Objectives and Scope, Redux
Design the Platform
Build the Platform
Market the Platform
Moderate the Platform
Measure the Platform's Performance
Wash, Rinse, Repeat
Summary
Broadening Your Horizon
Advanced and Emerging Analytical Methodologies
Expanding the Scope of Analysis
Cluster Analysis
The Process of Clustering
The Relevance of Clustering
Geo-Spatial Network Analysis
The Process of Geo-Spatial Network Analysis
The Relevance of Geo-Spatial Network Analysis
Agent Modeling
The Relevance of Agent Modeling
The Process of Agent Modeling
Summary
Delivering Services through Crowdsourcing
Delivering Education
Understanding How People Learn
Delivering Education through Tablets and Mobile Phones (First Method)
Delivering Education through Mobile Phones Only (Second Method)
Side-Benefits of Delivering Education
Delivering Health
Diagnosing Health Problems
Collecting Health Information
Summary
Protecting Privacy and Yourself
Considering Privacy and Free Speech
Reasons to Consider Privacy and Free Speech
Appreciating the Complexity Involved
Acting Legally and Ethically
Analyze Non-Personal Open Source Intelligence
Follow Rules of Social Media Data Sources
Do Not Involve Children
Identify Extra Restrictions
Do Not Store People's Personal Information
Help Your Participants Protect Themselves
Solicit Professional Help When Possible
Value Privacy and Strive for a Good Reputation
Imagine and Prepare for the Worst-Case Scenario
Be Aware of Changes in Laws and Norms
Protecting Your Identity and Speech
Set Basic Security Settings
Do Not Post Sensitive Information
Be Wary of Enabling Location Services
Use Technologies That Anonymize You
Use Social Media Platforms That Hide Your Identity
Identify Who Is Behind What and Why
Use Common Sense and Be Reasonable
Summary
Appendix: Extra Information and Resources
Social Media Platforms
Software Tools
Index