Skip to main content

Tools and Methodologies for Data Collection, Analysis, and Visualization

  • Chapter
  • First Online:
Deviance in Social Media and Social Cyber Forensics

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

In this chapter, we briefly introduce a set of tools (mostly free and publicly available) and methodologies that can be used to collect, analyze, and visualize data from OSINF , Facebook , YouTube , Twitter , Blogs , and other sources. We will point out where you can get these tools, the capabilities of each tool, and how we used it in our research. This chapter is meant to give an overview of the tools currently used to conduct social network analysis (SNA) , social cyber forensics (SCF) , and text analytics . We will not cover the details of all the features/capabilities for each tool in this chapter—as some tools may require a whole book by themselves, but we will highlight each tool’s importance and point out the available resources to interested readers. This chapter should help readers finding answers to some research questions using various tools for data collection, analysis, and visualization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 49.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    SEO stands for search engine optimization: which is the process of making sure that a website gets traffic by appearing in the search results of any search engine, e.g., Google , Bing , and Yahoo . This can be achieved by having the right content in the website in which search engines algorithms can use to make a site appear in the returned results when a search query is submitted.

  2. 2.

    Martin Hawksey is Chief Innovation, Technology and Community Officer at Association for Learning Technology, UK.

  3. 3.

    https://dev.twitter.com/rest/reference/get/search/tweets.

  4. 4.

    https://dev.twitter.com/rest/reference/get/favorites/list.

  5. 5.

    https://dev.twitter.com/rest/reference/get/statuses/user_timeline.

  6. 6.

    Apple Right in Defying the F.B.I? The NY Times, 2016. Available at: http://nyti.ms/1qGtynH.

  7. 7.

    SMR Foundation http://www.smrfoundation.org/research/our-network/.

  8. 8.

    Trump, in Texas, Calls Hurricane Harvey Recovery Response Effort a Real Team. The NY Times, 2017. Available at: https://www.nytimes.com/2017/08/29/us/trump-texas-harvey.html.

  9. 9.

    The bot accounts are: @DoneHealthE, @HealthNutre, @HealthDones, @Healthedone, @HealthDone1, @HealthDone3, @HealthFruit1, www.@Health_Years, @Fashion_DoneA, @Fashion_DoneB, @Fashion_DoneC, @SecretCode_1, @SecretCodeM, @SecretCodeM1, @SecretCodeM2, @SecretCodeM4, @SecretCodeM5, @SecretCodeM6. Most of these accounts are suspended by Twitter.

  10. 10.

    The tweet disseminated by the bot accounts is: “: Breaking: Isis behaded 30 Ethiopian Christians in LibyaIsis behaded 30 Ethiopian Christians in Libya [link to…”.

  11. 11.

    Migrant refugee crisis. BBC News December 17, 2015. Available at: http://bbc.in/2f7h3hr.

  12. 12.

    Multiplex is a network in which the nodes are connected via multiple types of relations/edges.

  13. 13.

    Multimode is a network that has different types of nodes, e.g., 2-mode network, aka bipartite networks.

  14. 14.

    WCE can be downloaded from http://www.newprosoft.com/web-content-extractor.htm.

  15. 15.

    ODBC is a protocol that is required to connect MS Access DB to MS SQL Server, https://goo.gl/9Wu2xy.

  16. 16.

    To create your YouTube API key, check out this YouTube video tutorial https://www.youtube.com/watch?v=pP4zvduVAqo.

  17. 17.

    Social media footprint includes the various social media platforms that the YouTuber use to disseminate his/her videos.

References

  1. S. Al-khateeb, N. Agarwal, Analyzing deviant cyber flash mobs of ISIL on twitter, in Social Computing, Behavioral-Cultural Modeling, and Prediction (Springer, Cham, 2015), pp. 251–257

    Google Scholar 

  2. S. Al-khateeb, N. Agarwal, The rise & fall of# NoBackDoor on Twitter: the Apple vs. FBI case, in Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on (IEEE, Piscataway, 2016), pp. 833–836

    Google Scholar 

  3. S. M. Research Foundation. Nodexl: Network overview, discovery and exploration for excel. [Online]. Available: http://nodexl.codeplex.com/wikipage?tit

  4. M.A. Smith, B. Shneiderman, N. MilicFrayling, E. Mendes Rodrigues, V. Barash, C. Dunne, T. Capone, A. Perer, E. Gleave, Analyzing (social media) networks with NodeXL, in Proceedings of the Fourth International Conference on Communities and Technologies (ACM, New York, 2009), pp. 255–264. [Online]. Available: http://dl.acm.org/citation.cfm?id=1556497

  5. J.A. Carter, S. Maher, P.R. Neumann, #Greenbirds: measuring importance and influence in Syrian foreign fighter networks. [Online]. Available: http://bit.ly/1mdXAdW

  6. T. Khaund, K.K. Bandeli, M.N. Hussain, A. Obadimu, S. Al-Khateeb, N. Agarwal, Analyzing social and communication network structures of social bots and humans, in 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (IEEE, Piscataway, 2018), pp. 794–797

    Google Scholar 

  7. T. Khaund, S. Al-Khateeb, S. Tokdemir, N. Agarwal, Analyzing social bots and their coordination during natural disasters, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Cham, 2018), pp. 207–212

    Google Scholar 

  8. S. Al-khateeb, N. Agarwal, Examining botnet behaviors for propaganda dissemination: a case study of ISIL’s beheading videos-based propaganda, in 2015 IEEE International Conference on Data Mining Workshop (ICDMW) (IEEE, Piscataway, 2015), pp. 51–57

    Google Scholar 

  9. M. Hussain, K.K. Bandeli, M. Nooman, S. Al-khateeb, N. Agarwal, Analyzing the voices during European migrant crisis in blogosphere, in The 2nd International Workshop on Event Analytics using Social Media Data (2017)

    Google Scholar 

  10. E.L. Mead, M.N. Hussain, M. Nooman, S. Al-khateeb, N. Agarwal, Assessing situation awareness through blogosphere: a case study on Venezuelan socio-political crisis and the migrant influx, in SOTICS 2017 : The Seventh International Conference on Social Media Technologies, Communication, and Informatics (2017), pp. 22–29

    Google Scholar 

  11. Q. Yin, Q. Chen, A social network analysis platform for organizational risk analysis–ora, in 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA) (IEEE, Piscataway, 2012), pp. 760–763

    Google Scholar 

  12. S. Al-khateeb, K.J. Conlan, N. Agarwal, I. Baggili, F. Breitinger, Exploring deviant hacker networks (DHN) on social media platforms. J. Digit. Forensic Secur. Law 11(2), pp. 7–20. [Online]. Available: http://bit.ly/2nKwNJE

  13. IBM Watson Analytics - Overview - United States (2017). [Online]. Available: https://www.ibm.com/us-en/marketplace/watson-analytics

  14. M.N. Hussain, A. Obadimu, K.K. Bandeli, M. Nooman, S. Al-khateeb, N. Agarwal, A Framework for Blog Data Collection: Challenges and Opportunities (IARIA XPS Press, Venice, 2017)

    Google Scholar 

  15. S. Al-khateeb, M.N. Hussain, N. Agarwal, Analyzing Deviant Socio-technical behaviors using social network analysis and cyber forensics-based methodologies, in Big Data Analytics in Cybersecurity, ser. Data Analytics Applications (CRC Press, New York, 2017), pp. 263–280

    Google Scholar 

  16. M.N. Hussain, S. Tokdemir, N. Agarwal, S. Al-Khateeb, Analyzing disinformation and crowd manipulation tactics on YouTube, in 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (IEEE, Piscataway, 2018), pp. 1092–1095

    Google Scholar 

  17. M.N. Hussain, S. Tokdemir, S. Al-khateeb, K.K. Bandeli, N. Agarwal, Understanding digital ethnography: socio-computational analysis of trending YouTube videos, in International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS 2018) (2018)

    Google Scholar 

  18. S. Tokdemir, N. Agarwal, YouTube data analytics using YouTubeTracker

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-khateeb, S., Agarwal, N. (2019). Tools and Methodologies for Data Collection, Analysis, and Visualization. In: Deviance in Social Media and Social Cyber Forensics. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-030-13690-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-13690-1_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-13689-5

  • Online ISBN: 978-3-030-13690-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics