1,125 research outputs found
State of the art 2015: a literature review of social media intelligence capabilities for counter-terrorism
Overview
This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities they provide, the possible insights they offer, and the ethical and legal questions they raise. These techniques are considered relevant and valuable in so far as they can help to maintain public safety by preventing terrorism, preparing for it, protecting the public from it and pursuing its perpetrators. The report also considers how far this can be achieved against the backdrop of radically changing technology and public attitudes towards surveillance. This is an updated version of a 2013 report paper on the same subject, State of the Art. Since 2013, there have been significant changes in social media, how it is used by terrorist groups, and the methods being developed to make sense of it.
The paper is structured as follows:
Part 1 is an overview of social media use, focused on how it is used by groups of interest to those involved in counter-terrorism. This includes new sections on trends of social media platforms; and a new section on Islamic State (IS).
Part 2 provides an introduction to the key approaches of social media intelligence (henceforth âSOCMINTâ) for counter-terrorism.
Part 3 sets out a series of SOCMINT techniques. For each technique a series of capabilities and insights are considered, the validity and reliability of the method is considered, and how they might be applied to counter-terrorism work explored.
Part 4 outlines a number of important legal, ethical and practical considerations when undertaking SOCMINT work
Towards an ethical framework for publishing Twitter data in social research: taking into account usersâ views, online context and algorithmic estimation
New and emerging forms of data, including posts harvested from social media sites such as Twitter, have become part of the sociologistâs data diet. In particular, some researchers see an advantage in the perceived âpublicâ nature of Twitter posts, representing them in publications without seeking informed consent. While such practice may not be at odds with Twitterâs terms of service, we argue there is a need to interpret these through the lens of social science research methods, that imply a more reflexive ethical approach than provided in âlegalâ accounts of the permissible use of these data in research publications. To challenge some existing practice in Twitter based research, this paper brings to the fore i) views of Twitter users through analysis of online survey data, ii) the effect of context collapse and online disinhibition on the behaviors of users, and iii) the publication of identifiable sensitive classifications derived from algorithms
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
The Grievance Dictionary: Understanding Threatening Language Use
This paper introduces the Grievance Dictionary, a psycholinguistic dictionary
which can be used to automatically understand language use in the context of
grievance-fuelled violence threat assessment. We describe the development the
dictionary, which was informed by suggestions from experienced threat
assessment practitioners. These suggestions and subsequent human and
computational word list generation resulted in a dictionary of 20,502 words
annotated by 2,318 participants. The dictionary was validated by applying it to
texts written by violent and non-violent individuals, showing strong evidence
for a difference between populations in several dictionary categories. Further
classification tasks showed promising performance, but future improvements are
still needed. Finally, we provide instructions and suggestions for the use of
the Grievance Dictionary by security professionals and (violence) researchers.Comment: pre-prin
- âŠ