2013 IEEE 2nd Network Science Workshop (NSW) 2013
DOI: 10.1109/nsw.2013.6609217
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative, dynamic Twitter parsing and visualization for dark network analysis

Abstract: Developing a network based on Twitter data for social network analysis (SNA) is a common task in most academic domains. The need for real-time analysis is not as prevalent due to the fact that researchers are interested in the analysis of Twitter information after a major event or for an overall statistical or sociological study of general Twitter users. Dark network analysis is a specific field that focuses on criminal, terroristic, or people of interest networks in which evaluating information quickly and ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 14 publications
0
7
0
Order By: Relevance
“…As such, to mitigate this threat, the intelligence community needs to continue to stay abreast of the technological revolution that is social media (Freeman & Schroeder, 2014). Dudas (2013) addresses three areas for future research. The first uses a sentiment lexicon to rate keywords on a positive/negative scale and then maps these keywords against the target keyword over time.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…As such, to mitigate this threat, the intelligence community needs to continue to stay abreast of the technological revolution that is social media (Freeman & Schroeder, 2014). Dudas (2013) addresses three areas for future research. The first uses a sentiment lexicon to rate keywords on a positive/negative scale and then maps these keywords against the target keyword over time.…”
Section: Discussionmentioning
confidence: 99%
“…These networks face constant attempts by governments, the intelligence community, and military groups to disrupt their activities (Milward & Raab, 2006), so their members naturally try to evade detection and intervention (McBride & Hewitt, 2013), sometimes with deceptive or misleading data (Roberts, 2011). The criminal (covert) nature of the organizations behind the networks necessitates quick, nearly immediate real-time analysis and reaction for authorities to successfully counter their activities (Everton, 2012a;Dudas, 2013). Covert networks can be resilient (Milward & Raab, 2006;Everton, 2012b;Senekal, 2014), often overlap with other covert networks (Senekal 2014), and act more like traditional organizations (Raab & Milward, 2003) in their attempts to organize and exhibit structure to their activities.…”
Section: Social Mediamentioning
confidence: 99%
See 1 more Smart Citation
“…The research objective of this thesis is to identify possible ways that can lead us to extract knowledge through the sentiment analysis of location based online social networks. When looking at patterns in large datasets, a popular choice is the utilization of Twitter [23]. Geo-tagged Twitter messages have been used as our primary data source but the data (that our application can analyze) is not limited to geo-tagged tweet only.…”
Section: Methodsmentioning
confidence: 99%
“…A lower number of tweets were selected for better understanding any trends in popularity. Election prediction has been plotted in the line graph fig 23…”
mentioning
confidence: 99%