Abstract
Content analysis is an established and effective method for research in the social science and, despite what many think, it has been around for quite some time. It has also tremendously benefited from ICT and the growth of computing power, as computers have proved to excel in the dull routine of scanning texts for keywords. But content analysis has become ubiquitous with the advent of the Internet, particularly emails and Web sites. Keyword search, a pivotal element of content analysis, is the most widespread feature of many Internet applications, from search engines to password-cracking programs. Consequently, it has become a central concern for cybersecurity. This chapter investigates some of the most important applications of content analysis on the Net and discusses its increasing essential position in many areas of cybersecurity.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
A texts can be seen as the “material manifestation” of speech. A “step further” from text analysis, the oldest procedure of content analysis, is discourse analysis, where the discourse is no longer considered just a simple reflection of reality but as its essential constituent part (Phillips and Hardy 2002).
- 2.
For an “early” discussion on this trend, see Weare and Lin (2000).
- 3.
For this section, the authors would like to gladly acknowledge the assistance of Fabrizio Coticchia.
- 4.
“Human” coders are also fundamental to gauge “each others’ (or intercoder) reliability”.
- 5.
See the Web site of Hamlet II for example, available at http://apb.newmdsx.com/hamlet2.html.
- 6.
We do not make a distinction here between “qualitative” and “quantitative” content analysis, because we argue that such distinction is fictitious as this method is successfully applied in both approaches.
- 7.
A remarkable example/explanation is given in the reference to “Text Mining” from StatSoft (2011).
References
Adevaa, J. J. G., & Atxa, J. M. P. (2007). Intrusion detection in web applications using text mining. Engineering Applications of Artificial Intelligence, 20(4), 555–566.
Amoroso, E. G. (2011). Cyber attacks: protecting national infrastructure. Burlington: Elsevier.
Berry, M. W. (Ed.) (2004). Survey of text mining: clustering, classification, and retrieval scanned by velocity. New York: Springer.
Benford, R. D., & Snow, D. A. (1992). Framing process and social movement: an overview and assessment. Annual Review of Sociology, 26, 611–639.
Berry, M. W., & Kogan, J. (2010). Text mining: applications and theory. Chichester: Wiley.
Brabazon, T. (2006). The Google effect: googling, blogging, wikis and the flattening of expertise. Libri, 56, 157–167.
Bueno, P., et al. (2011). McAfee Threats Report: First Quarter 2011, MacAfee.
Carmines, E. G., & Zeller, R. A. (1979). Reliability and validity assessment. London: Sage.
Casey, E. (2011). Digital evidence and computer crime: forensic science, computers and the Internet (3rd ed.). Waltham/London: Academic Press/Elsevier.
Cordesman, A. (2002). Cyber-threats, information warfare, and critical infrastructure protection: defending the U.S. homeland. Westport: Praeger.
Druckman, D. (2005). Doing research: methods of inquiry for conflict analysis. London: Sage.
Entman, M. (1993). Framing: toward clarification of a fractured paradigm. Journal of Communication, 43(4), 51–58.
Hearst, M. A. (1999). Untangling text data mining. In ACL ’99 Proceedings of the 37th annual meeting of the association for computational linguistics on computational linguistics. Stroudsburg: Association for Computational Linguistics.
Holsti, O. R. (1969). Content analysis for the social sciences and humanities. Reading: Addison–Wesley.
Janasik, N., Honkela, T., & Bruun, H. (2009). Text mining in qualitative research application of an unsupervised learning method. Organizational Research Methods, 12(3), 436–460.
Krippendorff, K. (1980). Content analysis: an introduction to its methodology. London: Sage.
Klotz, A., & Lynch, C. (2007). Strategies for research in constructivist international relations. Armonk: M.E. Sharp.
Kurtz, H. (2002). Robotic journalism: Google introduces Human-Less news. The Washington Post. 30 September 2002. Available at http://andrewcoile.com/CSUMB/2002/fall/CST373/scrapbook/robotjournalism.pdf. Last accessed 22 December 2011.
Lagerkvist, J. (2011). Inside the authoritarian state: new media entrepreneurs in China: allies of the party-state or civil society? Columbia Journal of International Affairs, 65(1).
Liu, B. (2011). Web data mining: exploring hyperlinks, contents, and usage data (2nd ed.). Heidelberg: Springer.
McGinty, S. (1999). Gatekeepers of knowledge: journal editors in the sciences and the social sciences. Westport: Bergin and Garvey.
Phillips, N., & Hardy, C. (2002). Discourse analysis. Thousand Oaks: Sage.
Srivastava, A. N. & Sahami, M. (Eds.) (2009). Text mining classification, clustering, and applications. London: CRC Press.
StatSoft, Inc. (2011). Electronic statistics textbook. Tulsa: StatSoft. Available at www.statsoft.com/textbook. Last accessed 22 December 2011.
Trochim, W. M. (1999). The research methods knowledge base (2nd ed.). Ithaca: Cornell University Custom Publishing.
Tsai, F. S., & Chan, K. L. (2007). Threats in weblogs using probabilistic models. Lecture notes in computer science (pp. 46–57). Detecting Cyber Security, 4430/2007.
Weare, C., & Lin, W. Y. (2000). Content analysis of the world wide web: opportunities and challenges. Social Science Computer Review, 18(3), 272–292.
Weber, R. P. (1990). Basic content analysis. London: Sage.
Weimann, G. (2010). Terrorism and counterterrorism on the Internet. The international studies encyclopedia. Denmark: Blackwell. Blackwell Reference Online 28 December. Available from http://www.isacompendium.com/subscriber/tocnode?id=g9781444336597_chunk_g978144433659719_ss1-18. Last accessed 22 December 2011.
Zheng, R., et al. (2003). Authorship analysis in cybercrime investigation. Intelligence and Security Informatics, 2665, 59–73.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Eriksson, J., Giacomello, G. (2013). Content Analysis in the Digital Age: Tools, Functions, and Implications for Security. In: Krüger, J., Nickolay, B., Gaycken, S. (eds) The Secure Information Society. Springer, London. https://doi.org/10.1007/978-1-4471-4763-3_6
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4763-3_6
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4762-6
Online ISBN: 978-1-4471-4763-3
eBook Packages: Computer ScienceComputer Science (R0)