This 2013 article examines the case of a Marine Corps reservist who perpetrated a series of attacks against military facilities in Virginia in October and November 2010.
This 2014 article uses a case study method to examine the implications of using the emerging technology of predictive analytics in a homeland security context, to provide increased intelligence for counterterrorism initiatives.
This 2013 book aims to inform government decision-makers, security analysts, and activists on how to use the social world to improve security locally, nationally, globally, and cost-effectively.
This paper presents a theoretical computerized system to detect social polarization and to estimate the related chances of violent radicalization. Existing technologies are analyzed to determine how they can be integrated into the proposed system to fulfil the authors’ objectives.
This 2013 article analyzes content generated on Twitter during the attacks at the Boston Marathon in April 2013. The authors perform an in-depth characterization of what factors influenced malicious content and profiles becoming viral.
The authors of this 2011 article hypothesize that the results of Google Trends, given its daily and weekly reports on queries related to various industries may be correlated to the current level of economic activity in these industries.
This survey reviews the literature and concepts of the data mining of social networks, with special emphasis on their representation as a graph structure. The article is divided into two principal parts:
This article focuses on Data Mining and Social Network Analysis (SNA) amongst bloggers, and in particular the mining of racist groups and cyber hate communities in online blogging websites.
This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism
+1-613-755-4007 • info@secdev.foundation
Copyright © 2014 - 2017 • The SecDev Foundation