Skip to main content
main-content

Tipp

Weitere Kapitel dieses Buchs durch Wischen aufrufen

2016 | OriginalPaper | Buchkapitel

Social Media in Identifying Threats to Ensure Safe Life in a Modern City

verfasst von: Aleksandr Dorofeev, Alexey Markov, Valentin Tsirlov

Erschienen in: Digital Transformation and Global Society

Verlag: Springer International Publishing

share
TEILEN

Abstract

The article is devoted to the issues of identifying security threats to a citizen using Open Source Intelligence. To refine the search for information on the Internet about a person or event that poses a potential security threat it was suggested to use a structured method of collecting and analyzing information based on decomposition of data and connections between data. The method of testing alternative hypothesis was used. The article provides classification of open information sources. A conceptual model that allows experts to perform substantiated sequential information search was developed. The article gives real-life examples that confirm efficiency of the suggested methodological approach to the search and analysis of information.
Literatur
1.
Zurück zum Zitat Hurlburt, G.F., Voas, J.: Big data, networked worlds. Computer 47(4), 84–87 (2014) CrossRef Hurlburt, G.F., Voas, J.: Big data, networked worlds. Computer 47(4), 84–87 (2014) CrossRef
2.
Zurück zum Zitat Benes, L.: OSINT, new technologies, education: expanding opportunities and threats. a new paradigm. J. Strateg. Secur. 6(3), 22–37 (2013) CrossRef Benes, L.: OSINT, new technologies, education: expanding opportunities and threats. a new paradigm. J. Strateg. Secur. 6(3), 22–37 (2013) CrossRef
3.
Zurück zum Zitat Bershadskaya, L., Chugunov, A., Trutnev, D.: Information society development in Russia: measuring progress and gap. In: 1st Conference on Electronic Governance and Open Society: Challenges in Eurasia, pp. 7–13. ACM, New York (2014) Bershadskaya, L., Chugunov, A., Trutnev, D.: Information society development in Russia: measuring progress and gap. In: 1st Conference on Electronic Governance and Open Society: Challenges in Eurasia, pp. 7–13. ACM, New York (2014)
4.
Zurück zum Zitat Pilkevich, S.V., Eremeev, M.A.: Model of socially important internet resources. In: Trudy SPIIRAN, vol. 2, no. 39, pp. 62–83 (2015). (in Russian) Pilkevich, S.V., Eremeev, M.A.: Model of socially important internet resources. In: Trudy SPIIRAN, vol. 2, no. 39, pp. 62–83 (2015). (in Russian)
5.
Zurück zum Zitat Doroveev, A., Markov, A.: Structured monitoring of open personal data on the Internet. Monitoring pravoprimeneniya [Monitoring of Law Enforcement] 1(102), 41–53 (2016). (in Russian) Doroveev, A., Markov, A.: Structured monitoring of open personal data on the Internet. Monitoring pravoprimeneniya [Monitoring of Law Enforcement] 1(102), 41–53 (2016). (in Russian)
6.
Zurück zum Zitat Colbaugh, R., Glass, K.: Analyzing social media content for security informatics. In: Intelligence and Security Informatics Conference, pp. 45–51. IEEE (2013) Colbaugh, R., Glass, K.: Analyzing social media content for security informatics. In: Intelligence and Security Informatics Conference, pp. 45–51. IEEE (2013)
7.
Zurück zum Zitat Knoke, D.: Emerging Trends in Social Network Analysis of Terrorism and Counterterrorism. Emerging Trends in the Social and Behavioral Sciences. An Interdisciplinary, Searchable, and Linkable Resource. WOL, 1–15 May 2015 Knoke, D.: Emerging Trends in Social Network Analysis of Terrorism and Counterterrorism. Emerging Trends in the Social and Behavioral Sciences. An Interdisciplinary, Searchable, and Linkable Resource. WOL, 1–15 May 2015
8.
Zurück zum Zitat Bazzell, M.: Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn. CreateSpace Independent Publishing Platform (2015) Bazzell, M.: Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information, 4th edn. CreateSpace Independent Publishing Platform (2015)
10.
Zurück zum Zitat Minto, B.: The Pyramid Principle: Logic in Writing and Thinking, 3rd edn. Prentice Hall, Upper Saddle River (2010) Minto, B.: The Pyramid Principle: Logic in Writing and Thinking, 3rd edn. Prentice Hall, Upper Saddle River (2010)
11.
Zurück zum Zitat Heuer Jr., R.J., Pherson, R.H.: Structured Analytic Techniques for Intelligence Analysis, Spi edn. CQ Press, Washington, D.C. (2014) Heuer Jr., R.J., Pherson, R.H.: Structured Analytic Techniques for Intelligence Analysis, Spi edn. CQ Press, Washington, D.C. (2014)
12.
Zurück zum Zitat Pherson, K.H., Pherson, R.H.: Critical Thinking for Strategic Intelligence. CQ Press, Washington, D.C. (2012) Pherson, K.H., Pherson, R.H.: Critical Thinking for Strategic Intelligence. CQ Press, Washington, D.C. (2012)
13.
Zurück zum Zitat Layton, R., Perez, C., Birregah, B., Watters, P., Lemercier, M.: Indirect information linkage for OSINT through authorship analysis of aliases. In: Li, J., Cao, L., Wang, C., Tan, K.C., Liu, B., Pei, J., Tseng, V.S. (eds.) PAKDD 2013 Workshops. LNCS, vol. 7867, pp. 36–46. Springer, Heidelberg (2013). doi: 10.​1007/​978-3-642-40319-4_​4 CrossRef Layton, R., Perez, C., Birregah, B., Watters, P., Lemercier, M.: Indirect information linkage for OSINT through authorship analysis of aliases. In: Li, J., Cao, L., Wang, C., Tan, K.C., Liu, B., Pei, J., Tseng, V.S. (eds.) PAKDD 2013 Workshops. LNCS, vol. 7867, pp. 36–46. Springer, Heidelberg (2013). doi: 10.​1007/​978-3-642-40319-4_​4 CrossRef
14.
Zurück zum Zitat Bowman, M., Debray, S.K., Peterson, L.L.: Reasoning about naming systems. ACM Trans. Program. Lang. Syst. 15(5), 795–825 (1993) CrossRef Bowman, M., Debray, S.K., Peterson, L.L.: Reasoning about naming systems. ACM Trans. Program. Lang. Syst. 15(5), 795–825 (1993) CrossRef
15.
Zurück zum Zitat Mazzola, L., Tsois, A., Dimitrova, T., Camossi, E.: Contextualisation of geographical scraped data to support human judgment and classification. In: Intelligence and Security Informatics Conference, pp. 151–154. IEEE (2013) Mazzola, L., Tsois, A., Dimitrova, T., Camossi, E.: Contextualisation of geographical scraped data to support human judgment and classification. In: Intelligence and Security Informatics Conference, pp. 151–154. IEEE (2013)
16.
Zurück zum Zitat Skillicorn, D., Bourassa, M.A.J.: A framework for analyst focus from computed significance. In: Wiil, U.K. (ed.) Counterterrorism and Open Source Intelligence, pp. 33–47. Springer, Heidelberg (2011) CrossRef Skillicorn, D., Bourassa, M.A.J.: A framework for analyst focus from computed significance. In: Wiil, U.K. (ed.) Counterterrorism and Open Source Intelligence, pp. 33–47. Springer, Heidelberg (2011) CrossRef
17.
Zurück zum Zitat Clark, R.M.: Intelligence Analysis: A Target-Centric Approach, 4th edn. CQ Press, Washington, D.C. (2012) Clark, R.M.: Intelligence Analysis: A Target-Centric Approach, 4th edn. CQ Press, Washington, D.C. (2012)
18.
Zurück zum Zitat Dorofeev, A., Markov, A., Tsirlov, V.: Structured approach to the social network analysis of information about a certain individual. In: 2nd International Conference on Electronic Governance and Open Society: Challenges in Eurasia, pp. 174–178. ACM, New York (2015) Dorofeev, A., Markov, A., Tsirlov, V.: Structured approach to the social network analysis of information about a certain individual. In: 2nd International Conference on Electronic Governance and Open Society: Challenges in Eurasia, pp. 174–178. ACM, New York (2015)
19.
Zurück zum Zitat Doroveev, A.V., Markov, A.S.: Information security management: basic concepts. Voprosy kiberbezopasnosti [Cybersecurity Issues] 1(2), 67–73 (2014). (in Russian) Doroveev, A.V., Markov, A.S.: Information security management: basic concepts. Voprosy kiberbezopasnosti [Cybersecurity Issues] 1(2), 67–73 (2014). (in Russian)
Metadaten
Titel
Social Media in Identifying Threats to Ensure Safe Life in a Modern City
verfasst von
Aleksandr Dorofeev
Alexey Markov
Valentin Tsirlov
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-49700-6_44

Premium Partner