語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Deviance in Social Media and Social ...
~
SpringerLink (Online service)
Deviance in Social Media and Social Cyber Forensics = Uncovering Hidden Relations Using Open Source Information (OSINF) /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Deviance in Social Media and Social Cyber Forensics/ by Samer Al-khateeb, Nitin Agarwal.
其他題名:
Uncovering Hidden Relations Using Open Source Information (OSINF) /
作者:
Al-khateeb, Samer.
其他作者:
Agarwal, Nitin.
面頁冊數:
XXI, 101 p. 39 illus.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-13690-1
ISBN:
9783030136901
Deviance in Social Media and Social Cyber Forensics = Uncovering Hidden Relations Using Open Source Information (OSINF) /
Al-khateeb, Samer.
Deviance in Social Media and Social Cyber Forensics
Uncovering Hidden Relations Using Open Source Information (OSINF) /[electronic resource] :by Samer Al-khateeb, Nitin Agarwal. - 1st ed. 2019. - XXI, 101 p. 39 illus.online resource. - SpringerBriefs in Cybersecurity,2193-973X. - SpringerBriefs in Cybersecurity,.
Chapter1: Deviance in Social Media -- Chapter2: Social Network Measures and Analysis -- Chapter3: Tools and Methodologies for Data Collection, Analysis, and Visualization -- Chapter4: Social Cyber Forensics (SCF): Uncovering Hidden Relationships -- Chapter5: Case Studies of Deviance on Social Media.
This book describes the methodologies and tools used to conduct social cyber forensic analysis. By applying these methodologies and tools on various events observed in the case studies contained within, their effectiveness is highlighted. They blend computational social network analysis and cyber forensic concepts and tools in order to identify and study information competitors. Through cyber forensic analysis, metadata associated with propaganda-riddled websites are extracted. This metadata assists in extracting social network information such as friends and followers along with communication network information such as networks depicting flows of information among the actors such as tweets, replies, retweets, mentions, and hyperlinks. Through computational social network analysis, the authors identify influential actors and powerful groups coordinating the disinformation campaign. A blended social cyber forensic approach allows them to study cross-media affiliations of the information competitors. For instance, narratives are framed on blogs and YouTube videos, and then Twitter and Reddit, for instance, will be used to disseminate the message. Social cyber forensic methodologies enable researchers to study the role of modern information and communication technologies (ICTs) in the evolution of information campaign and coordination. In addition to the concepts and methodologies pertaining to social cyber forensics, this book also offers a collection of resources for readers including several datasets that were collected during case studies, up-to-date reference and literature surveys in the domain, and a suite of tools that students, researchers, and practitioners alike can utilize. Most importantly, the book demands a dialogue between information science researchers, public affairs officers, and policy makers to prepare our society to deal with the lawless “wild west” of modern social information systems triggering debates and studies on cyber diplomacy.
ISBN: 9783030136901
Standard No.: 10.1007/978-3-030-13690-1doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Deviance in Social Media and Social Cyber Forensics = Uncovering Hidden Relations Using Open Source Information (OSINF) /
LDR
:03736nam a22004095i 4500
001
1006414
003
DE-He213
005
20200705005608.0
007
cr nn 008mamaa
008
210106s2019 gw | s |||| 0|eng d
020
$a
9783030136901
$9
978-3-030-13690-1
024
7
$a
10.1007/978-3-030-13690-1
$2
doi
035
$a
978-3-030-13690-1
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Al-khateeb, Samer.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1180964
245
1 0
$a
Deviance in Social Media and Social Cyber Forensics
$h
[electronic resource] :
$b
Uncovering Hidden Relations Using Open Source Information (OSINF) /
$c
by Samer Al-khateeb, Nitin Agarwal.
250
$a
1st ed. 2019.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
XXI, 101 p. 39 illus.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Cybersecurity,
$x
2193-973X
505
0
$a
Chapter1: Deviance in Social Media -- Chapter2: Social Network Measures and Analysis -- Chapter3: Tools and Methodologies for Data Collection, Analysis, and Visualization -- Chapter4: Social Cyber Forensics (SCF): Uncovering Hidden Relationships -- Chapter5: Case Studies of Deviance on Social Media.
520
$a
This book describes the methodologies and tools used to conduct social cyber forensic analysis. By applying these methodologies and tools on various events observed in the case studies contained within, their effectiveness is highlighted. They blend computational social network analysis and cyber forensic concepts and tools in order to identify and study information competitors. Through cyber forensic analysis, metadata associated with propaganda-riddled websites are extracted. This metadata assists in extracting social network information such as friends and followers along with communication network information such as networks depicting flows of information among the actors such as tweets, replies, retweets, mentions, and hyperlinks. Through computational social network analysis, the authors identify influential actors and powerful groups coordinating the disinformation campaign. A blended social cyber forensic approach allows them to study cross-media affiliations of the information competitors. For instance, narratives are framed on blogs and YouTube videos, and then Twitter and Reddit, for instance, will be used to disseminate the message. Social cyber forensic methodologies enable researchers to study the role of modern information and communication technologies (ICTs) in the evolution of information campaign and coordination. In addition to the concepts and methodologies pertaining to social cyber forensics, this book also offers a collection of resources for readers including several datasets that were collected during case studies, up-to-date reference and literature surveys in the domain, and a suite of tools that students, researchers, and practitioners alike can utilize. Most importantly, the book demands a dialogue between information science researchers, public affairs officers, and policy makers to prepare our society to deal with the lawless “wild west” of modern social information systems triggering debates and studies on cyber diplomacy.
650
0
$a
Computer security.
$3
557122
650
0
$a
Social sciences—Data processing.
$3
1280453
650
0
$a
Social sciences—Computer programs.
$3
1280454
650
0
$a
Computer crimes.
$3
564161
650
0
$a
Physics.
$3
564049
650
0
$a
Data mining.
$3
528622
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Computational Social Sciences.
$3
1141127
650
2 4
$a
Cybercrime.
$3
1109747
650
2 4
$a
Applications of Graph Theory and Complex Networks.
$3
1113468
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
677765
700
1
$a
Agarwal, Nitin.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1024814
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783030136895
776
0 8
$i
Printed edition:
$z
9783030136918
830
0
$a
SpringerBriefs in Cybersecurity,
$x
2193-973X
$3
1254278
856
4 0
$u
https://doi.org/10.1007/978-3-030-13690-1
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入