Skip to main content

Content Analysis in the Digital Age: Tools, Functions, and Implications for Security

  • Chapter

Abstract

Content analysis is an established and effective method for research in the social science and, despite what many think, it has been around for quite some time. It has also tremendously benefited from ICT and the growth of computing power, as computers have proved to excel in the dull routine of scanning texts for keywords. But content analysis has become ubiquitous with the advent of the Internet, particularly emails and Web sites. Keyword search, a pivotal element of content analysis, is the most widespread feature of many Internet applications, from search engines to password-cracking programs. Consequently, it has become a central concern for cybersecurity. This chapter investigates some of the most important applications of content analysis on the Net and discusses its increasing essential position in many areas of cybersecurity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    A texts can be seen as the “material manifestation” of speech. A “step further” from text analysis, the oldest procedure of content analysis, is discourse analysis, where the discourse is no longer considered just a simple reflection of reality but as its essential constituent part (Phillips and Hardy 2002).

  2. 2.

    For an “early” discussion on this trend, see Weare and Lin (2000).

  3. 3.

    For this section, the authors would like to gladly acknowledge the assistance of Fabrizio Coticchia.

  4. 4.

    “Human” coders are also fundamental to gauge “each others’ (or intercoder) reliability”.

  5. 5.

    See the Web site of Hamlet II for example, available at http://apb.newmdsx.com/hamlet2.html.

  6. 6.

    We do not make a distinction here between “qualitative” and “quantitative” content analysis, because we argue that such distinction is fictitious as this method is successfully applied in both approaches.

  7. 7.

    A remarkable example/explanation is given in the reference to “Text Mining” from StatSoft (2011).

References

  • Adevaa, J. J. G., & Atxa, J. M. P. (2007). Intrusion detection in web applications using text mining. Engineering Applications of Artificial Intelligence, 20(4), 555–566.

    Article  Google Scholar 

  • Amoroso, E. G. (2011). Cyber attacks: protecting national infrastructure. Burlington: Elsevier.

    Google Scholar 

  • Berry, M. W. (Ed.) (2004). Survey of text mining: clustering, classification, and retrieval scanned by velocity. New York: Springer.

    Google Scholar 

  • Benford, R. D., & Snow, D. A. (1992). Framing process and social movement: an overview and assessment. Annual Review of Sociology, 26, 611–639.

    Article  Google Scholar 

  • Berry, M. W., & Kogan, J. (2010). Text mining: applications and theory. Chichester: Wiley.

    Google Scholar 

  • Brabazon, T. (2006). The Google effect: googling, blogging, wikis and the flattening of expertise. Libri, 56, 157–167.

    Article  Google Scholar 

  • Bueno, P., et al. (2011). McAfee Threats Report: First Quarter 2011, MacAfee.

    Google Scholar 

  • Carmines, E. G., & Zeller, R. A. (1979). Reliability and validity assessment. London: Sage.

    Google Scholar 

  • Casey, E. (2011). Digital evidence and computer crime: forensic science, computers and the Internet (3rd ed.). Waltham/London: Academic Press/Elsevier.

    Google Scholar 

  • Cordesman, A. (2002). Cyber-threats, information warfare, and critical infrastructure protection: defending the U.S. homeland. Westport: Praeger.

    Google Scholar 

  • Druckman, D. (2005). Doing research: methods of inquiry for conflict analysis. London: Sage.

    Google Scholar 

  • Entman, M. (1993). Framing: toward clarification of a fractured paradigm. Journal of Communication, 43(4), 51–58.

    Article  Google Scholar 

  • Hearst, M. A. (1999). Untangling text data mining. In ACL ’99 Proceedings of the 37th annual meeting of the association for computational linguistics on computational linguistics. Stroudsburg: Association for Computational Linguistics.

    Google Scholar 

  • Holsti, O. R. (1969). Content analysis for the social sciences and humanities. Reading: Addison–Wesley.

    Google Scholar 

  • Janasik, N., Honkela, T., & Bruun, H. (2009). Text mining in qualitative research application of an unsupervised learning method. Organizational Research Methods, 12(3), 436–460.

    Article  Google Scholar 

  • Krippendorff, K. (1980). Content analysis: an introduction to its methodology. London: Sage.

    Google Scholar 

  • Klotz, A., & Lynch, C. (2007). Strategies for research in constructivist international relations. Armonk: M.E. Sharp.

    Google Scholar 

  • Kurtz, H. (2002). Robotic journalism: Google introduces Human-Less news. The Washington Post. 30 September 2002. Available at http://andrewcoile.com/CSUMB/2002/fall/CST373/scrapbook/robotjournalism.pdf. Last accessed 22 December 2011.

  • Lagerkvist, J. (2011). Inside the authoritarian state: new media entrepreneurs in China: allies of the party-state or civil society? Columbia Journal of International Affairs, 65(1).

    Google Scholar 

  • Liu, B. (2011). Web data mining: exploring hyperlinks, contents, and usage data (2nd ed.). Heidelberg: Springer.

    MATH  Google Scholar 

  • McGinty, S. (1999). Gatekeepers of knowledge: journal editors in the sciences and the social sciences. Westport: Bergin and Garvey.

    Google Scholar 

  • Phillips, N., & Hardy, C. (2002). Discourse analysis. Thousand Oaks: Sage.

    Google Scholar 

  • Srivastava, A. N. & Sahami, M. (Eds.) (2009). Text mining classification, clustering, and applications. London: CRC Press.

    MATH  Google Scholar 

  • StatSoft, Inc. (2011). Electronic statistics textbook. Tulsa: StatSoft. Available at www.statsoft.com/textbook. Last accessed 22 December 2011.

    Google Scholar 

  • Trochim, W. M. (1999). The research methods knowledge base (2nd ed.). Ithaca: Cornell University Custom Publishing.

    Google Scholar 

  • Tsai, F. S., & Chan, K. L. (2007). Threats in weblogs using probabilistic models. Lecture notes in computer science (pp. 46–57). Detecting Cyber Security, 4430/2007.

    Google Scholar 

  • Weare, C., & Lin, W. Y. (2000). Content analysis of the world wide web: opportunities and challenges. Social Science Computer Review, 18(3), 272–292.

    Article  Google Scholar 

  • Weber, R. P. (1990). Basic content analysis. London: Sage.

    Google Scholar 

  • Weimann, G. (2010). Terrorism and counterterrorism on the Internet. The international studies encyclopedia. Denmark: Blackwell. Blackwell Reference Online 28 December. Available from http://www.isacompendium.com/subscriber/tocnode?id=g9781444336597_chunk_g978144433659719_ss1-18. Last accessed 22 December 2011.

    Google Scholar 

  • Zheng, R., et al. (2003). Authorship analysis in cybercrime investigation. Intelligence and Security Informatics, 2665, 59–73.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Giampiero Giacomello .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Eriksson, J., Giacomello, G. (2013). Content Analysis in the Digital Age: Tools, Functions, and Implications for Security. In: Krüger, J., Nickolay, B., Gaycken, S. (eds) The Secure Information Society. Springer, London. https://doi.org/10.1007/978-1-4471-4763-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4763-3_6

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4762-6

  • Online ISBN: 978-1-4471-4763-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics