LEADER 04414nam 22006375 450 001 9910337561403321 005 20251113185412.0 010 $a3-030-13690-6 024 7 $a10.1007/978-3-030-13690-1 035 $a(CKB)4100000007823525 035 $a(MiAaPQ)EBC5743815 035 $a(DE-He213)978-3-030-13690-1 035 $a(PPN)235669709 035 $a(EXLCZ)994100000007823525 100 $a20190401d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDeviance in Social Media and Social Cyber Forensics $eUncovering Hidden Relations Using Open Source Information (OSINF) /$fby Samer Al-khateeb, Nitin Agarwal 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (116 pages) 225 1 $aSpringerBriefs in Cybersecurity,$x2193-9748 311 08$a3-030-13689-2 327 $aChapter1: Deviance in Social Media -- Chapter2: Social Network Measures and Analysis -- Chapter3: Tools and Methodologies for Data Collection, Analysis, and Visualization -- Chapter4: Social Cyber Forensics (SCF): Uncovering Hidden Relationships -- Chapter5: Case Studies of Deviance on Social Media. 330 $aThis book describes the methodologies and tools used to conduct social cyber forensic analysis. By applying these methodologies and tools on various events observed in the case studies contained within, their effectiveness is highlighted. They blend computational social network analysis and cyber forensic concepts and tools in order to identify and study information competitors. Through cyber forensic analysis, metadata associated with propaganda-riddled websites are extracted. This metadata assists in extracting social network information such as friends and followers along with communication network information such as networks depicting flows of information among the actors such as tweets, replies, retweets, mentions, and hyperlinks. Through computational social network analysis, the authors identify influential actors and powerful groups coordinating the disinformation campaign. A blended social cyber forensic approach allows them to study cross-media affiliations of the information competitors. For instance, narratives are framed on blogs and YouTube videos, and then Twitter and Reddit, for instance, will be used to disseminate the message. Social cyber forensic methodologies enable researchers to study the role of modern information and communication technologies (ICTs) in the evolution of information campaign and coordination. In addition to the concepts and methodologies pertaining to social cyber forensics, this book also offers a collection of resources for readers including several datasets that were collected during case studies, up-to-date reference and literature surveys in the domain, and a suite of tools that students, researchers, and practitioners alike can utilize. Most importantly, the book demands a dialogue between information science researchers, public affairs officers, and policy makers to prepare our society to deal with the lawless ?wild west? of modern social information systems triggering debates and studies on cyber diplomacy. 410 0$aSpringerBriefs in Cybersecurity,$x2193-9748 606 $aData protection 606 $aSociology$xMethodology 606 $aComputer crimes 606 $aGraph theory 606 $aData mining 606 $aData and Information Security 606 $aSociological Methods 606 $aCybercrime 606 $aGraph Theory 606 $aData Mining and Knowledge Discovery 615 0$aData protection. 615 0$aSociology$xMethodology. 615 0$aComputer crimes. 615 0$aGraph theory. 615 0$aData mining. 615 14$aData and Information Security. 615 24$aSociological Methods. 615 24$aCybercrime. 615 24$aGraph Theory. 615 24$aData Mining and Knowledge Discovery. 676 $a302.30285 700 $aAl-khateeb$b Samer$4aut$4http://id.loc.gov/vocabulary/relators/aut$01057973 702 $aAgarwal$b Nitin$4aut$4http://id.loc.gov/vocabulary/relators/aut 906 $aBOOK 912 $a9910337561403321 996 $aDeviance in Social Media and Social Cyber Forensics$92496071 997 $aUNINA