Open source intelligence and cyber crime: social media analytics

This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics com...

Full description

Saved in:  
Bibliographic Details
Contributors: Tayebi, Mohammad A. (Editor) ; Glässer, Uwe (Editor) ; Skillicorn, David B. (Editor)
Format: Electronic/Print Book
Language:English
Published: Cham Springer [2020]
In:Year: 2020
Online Access: Table of Contents
Blurb
Volltext (doi)
Availability in Tübingen:Present in Tübingen.
UB: KB 21 A 901
Check availability: HBZ Gateway
Keywords:
Related Items:Erscheint auch als: 1726030512

MARC

LEADER 00000cam a2200000 4500
001 1727432193
003 DE-627
005 20240629123734.0
007 tu
008 200819s2020 xx ||||| 00| ||eng c
020 |a 9783030412500  |9 978-3-030-41250-0 
020 |a 9783030412531  |9 978-3-030-41253-1 
024 3 |a 9783030412500 
024 7 |a 10.1007/978-3-030-41251-7  |2 doi 
035 |a (DE-627)1727432193 
035 |a (DE-599)BVBBV046711805 
035 |a (OCoLC)1190873636 
035 |a (DE-604)BV046711805 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |q SEPA  |2 23 
084 |a 2,1  |2 ssgn 
084 |a ST 277  |q DE-Ofb1/21  |2 rvk  |0 (DE-625)rvk/143643: 
245 1 0 |a Open source intelligence and cyber crime  |b social media analytics  |c Mohammad A. Tayebi, Uwe Glässer, David B. Skillicorn, editors 
264 1 |a Cham  |b Springer  |c [2020] 
300 |a v, 251 Seiten  |b Illustrationen, Diagramme  |c 235 mm 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
490 0 |a Lecture notes in social networks 
500 |a This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics.Chapter Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com 
500 |a Chapter1. Studying the Weaponization of Social Media: Case Studies of Anti-NATO Disinformation Campaigns.- Chapter2. Cognitively-Inspired Inference for Malware Task Indentation.- Chapter3. Beyond the ‘Silk Road’: Assessing Illicit Drug Marketplaces on the Public Web.- Chapter4. Protecting the Web from Misinformation.- Chapter5. Social Media for Mental Health: Data, Methods, and Findings.- Chapter6. Twitter Bots and the Swedish Election.- Chapter7. Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study.- Chapter8. You are Known by Your Friends: Leveraging Network Metrics for Bot Detection in Twitter.- Chapter9. Inferring Systemic Nets with Applications to Islamist Forums 
520 |a This book shows how open source intelligence can be a powerful tool for combating crime by linking local and global patterns to help understand how criminal activities are connected. Readers will encounter the latest advances in cutting-edge data mining, machine learning and predictive analytics combined with natural language processing and social network analysis to detect, disrupt, and neutralize cyber and physical threats. Chapters contain state-of-the-art social media analytics and open source intelligence research trends. This multidisciplinary volume will appeal to students, researchers, and professionals working in the fields of open source intelligence, cyber crime and social network analytics.Chapter Automated Text Analysis for Intelligence Purposes: A Psychological Operations Case Study is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com 
583 1 |a Archivierung/Langzeitarchivierung gewährleistet  |f SSG  |x XA-DE-BW  |2 pdager  |5 DE-21 
655 7 |a Aufsatzsammlung  |0 (DE-588)4143413-4  |0 (DE-627)105605727  |0 (DE-576)209726091  |2 gnd-content 
689 0 0 |d s  |0 (DE-588)4548264-0  |0 (DE-627)270783016  |0 (DE-576)21357795X  |a Open Source  |2 gnd 
689 0 1 |d s  |0 (DE-588)4072803-1  |0 (DE-627)106094203  |0 (DE-576)209188227  |a Information Retrieval  |2 gnd 
689 0 2 |d s  |0 (DE-588)4428654-5  |0 (DE-627)216935180  |0 (DE-576)212347217  |a Data Mining  |2 gnd 
689 0 3 |d s  |0 (DE-588)4205975-6  |0 (DE-627)104789220  |0 (DE-576)210172304  |a Netzwerkanalyse  |g Soziologie  |2 gnd 
689 0 4 |d s  |0 (DE-588)7864395-8  |0 (DE-627)700634487  |0 (DE-576)363213635  |a Internetkriminalität  |2 gnd 
689 0 5 |d s  |0 (DE-588)4112701-8  |0 (DE-627)104321679  |0 (DE-576)209470127  |a Bekämpfung  |2 gnd 
689 0 |5 (DE-627) 
700 1 |a Tayebi, Mohammad A.  |e HerausgeberIn  |0 (DE-588)1122442017  |0 (DE-627)875668917  |0 (DE-576)478582080  |4 edt 
700 1 |a Glässer, Uwe  |e HerausgeberIn  |0 (DE-588)1122442068  |0 (DE-627)875668976  |0 (DE-576)170443531  |4 edt 
700 1 |a Skillicorn, David B.  |e HerausgeberIn  |0 (DE-588)1147709343  |0 (DE-627)1006696172  |0 (DE-576)173896456  |4 edt 
776 1 |z 9783030412517 
776 0 8 |i Erscheint auch als  |n Online-Ausgabe  |t Open Source Intelligence and Cyber Crime  |b 1st ed. 2020.  |d Cham : Springer International Publishing, 2020  |h 1 Online-Ressource(V, 251 p. 88 illus., 69 illus. in color.)  |w (DE-627)1726030512  |z 9783030412517 
856 4 2 |u https://swbplus.bsz-bw.de/bsz1727432193inh.htm  |m V:DE-576;B:DE-21  |q application/pdf  |v 20201001150128  |3 Inhaltsverzeichnis 
856 4 2 |u https://swbplus.bsz-bw.de/bsz1727432193kla.htm  |m V:DE-576;B:DE-21  |q application/pdf  |v 20201001150128  |3 Klappentext 
856 |u https://doi.org/10.1007/978-3-030-41251-7  |x doi  |3 Volltext 
936 r v |a ST 277  |b Sonstiges zur Sicherheit in der Datenverarbeitung  |k Informatik  |k Monografien  |k Software und -entwicklung  |k Sonstiges zur Sicherheit in der Datenverarbeitung  |0 (DE-627)1271118971  |0 (DE-625)rvk/143643:  |0 (DE-576)201118971 
951 |a BO 
ELC |a 1  |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 374114777X 
LOK |0 003 DE-627 
LOK |0 004 1727432193 
LOK |0 005 20200908122726 
LOK |0 008 200819||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21  |c DE-627  |d DE-21 
LOK |0 852   |a DE-21 
LOK |0 852 1  |c KB 21 A 901  |9 00 
LOK |0 935   |a krim 
LOK |0 938   |a 2009  |f 34 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw 
SIG |a UB: KB 21 A 901