04676nam 22007575 450 99646545750331620200731111755.03-030-41251-210.1007/978-3-030-41251-7(CKB)4100000011363789(DE-He213)978-3-030-41251-7(MiAaPQ)EBC6275272(PPN)258305037(EXLCZ)99410000001136378920200731d2020 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierOpen Source Intelligence and Cyber Crime[electronic resource] Social Media Analytics /edited by Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn1st ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (V, 251 p. 88 illus., 69 illus. in color.) Lecture Notes in Social Networks,2190-54283-030-41250-4 Chapter1. Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns -- Chapter2. Cognitively-Inspired Inference for Malware Task Indentation -- Chapter3. Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web -- Chapter4. Protecting the Web from Misinformation -- Chapter5. Social Media for Mental Health: Data, Methods, and Findings -- Chapter6. Twitter Bots and the Swedish Election -- Chapter7. Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study -- Chapter8. You are Known by Your Friends: Leveraging Network Metrics for Bot Detection in Twitter -- Chapter9. Inferring Systemic Nets with Applications to Islamist Forums.This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics. Chapter Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.Lecture Notes in Social Networks,2190-5428Computer securityComputational intelligenceSociophysicsEconophysicsComputer crimesData miningMachine learningSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computational Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/T11014Data-driven Science, Modeling and Theory Buildinghttps://scigraph.springernature.com/ontologies/product-market-codes/P33030Cybercrimehttps://scigraph.springernature.com/ontologies/product-market-codes/1B7000Data Mining and Knowledge Discoveryhttps://scigraph.springernature.com/ontologies/product-market-codes/I18030Machine Learninghttps://scigraph.springernature.com/ontologies/product-market-codes/I21010Computer security.Computational intelligence.Sociophysics.Econophysics.Computer crimes.Data mining.Machine learning.Systems and Data Security.Computational Intelligence.Data-driven Science, Modeling and Theory Building.Cybercrime.Data Mining and Knowledge Discovery.Machine Learning.327.1202854678Tayebi Mohammad Aedthttp://id.loc.gov/vocabulary/relators/edtGlässer Uweedthttp://id.loc.gov/vocabulary/relators/edtSkillicorn David Bedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996465457503316Open Source Intelligence and Cyber Crime2260455UNISA