Advertisement

A Conceptual Framework for Social Movements Analytics for National Security

  • Pedro Cárdenas
  • Georgios Theodoropoulos
  • Boguslaw Obara
  • Ibad Kureshi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10860)

Abstract

Social media tools have changed our world due to the way they convey information between individuals; this has led to many social movements either starting on social media or being organised and managed through this medium. At times however, certain human-induced events can trigger Human Security Threats such as Personal Security, Health Security, Economic Security or Political Security. The aim of this paper is to propose a holistic Data Analysis Framework for examining Social Movements and detecting pernicious threats to National Security interests. As a result of this, the proposed framework focuses on three main stages of an event (Detonating Event, Warning Period and Crisis Interpretation) to provide timely additional insights, enabling policy makers, first responders, and authorities to determine the best course of action. The paper also outlines the possible computational techniques utilised to achieve in depth analysis at each stage. The robustness and effectiveness of the framework are demonstrated by dissecting Warning Period scenarios, from real-world events, where the increase of Human Security aspects were key to identifying likely threats to National Security.

Keywords

National Security Natural language processing Social movements Cyberactivism 

References

  1. 1.
    Ashcroft, M., Fisher, A., Kaati, L., Omer, E., Prucha, N.: Detecting jihadist messages on Twitter. In: European Intelligence and Security Informatics Conference, pp. 161–164 (2015)Google Scholar
  2. 2.
    Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993–1022 (2003)zbMATHGoogle Scholar
  3. 3.
    Boyd, D., Golder, S., Lotan, G.: Tweet, tweet, retweet: conversational aspects of retweeting on Twitter. In: Hawaii International Conference on System Sciences, pp. 1–10 (2010)Google Scholar
  4. 4.
    Castellanos, M., Hsu, M., Dayal, U., Ghosh, R., Dekhil, M., Ceja, C., Puchi, M., Ruiz, P.: Intention insider: discovering people’s intentions in the social channel. In: International Conference on Extending Database Technology, pp. 614–617. ACM (2012)Google Scholar
  5. 5.
    Castillo, C.: Big Crisis Data: Social Media in Disasters and Time-Critical Situations. Cambridge University Press, Cambridge (2016)CrossRefGoogle Scholar
  6. 6.
    Cohen, K., Johansson, F., Kaati, L., Mork, J.C.: Detecting linguistic markers for radical violence in social media. Terror. Polit. Violence 26, 246–256 (2014)CrossRefGoogle Scholar
  7. 7.
    Ferreira, D.E., Barbosa, C.E., Oliveira, J., de Souza, J.M.: Analyzing the collaborative aspects of the future-oriented technology analysis. In: IEEE International Conference on Computer Supported Cooperative Work in Design, pp. 139–144 (2016)Google Scholar
  8. 8.
    Grun, B., Hornik, K.: Topic models-an R package for fitting topic models. J. Stat. Softw. 40, 1–30 (2011)CrossRefGoogle Scholar
  9. 9.
    Hashimoto, T., Kuboyama, T., Chakraborty, B.: Topic extraction from millions of tweets using singular value decomposition and feature selection. In: Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, pp. 1145–1150 (2015)Google Scholar
  10. 10.
    Havre, S., Hetzler, B., Nowell, L.: ThemeRiver: visualizing theme changes over time. In: 2000 IEEE Symposium on Information Visualization, pp. 115–123 (2000)Google Scholar
  11. 11.
    Local Government Association: Integrated Public Sector Vocabulary (2006). http://standards.esd.org.uk. Accessed 7 Dec 2017
  12. 12.
    Levin, B.: English Verb Classes and Alternations: A Preliminary Investigation. Conversation Analysis. The University of Chicago Press, Chicago (1993)Google Scholar
  13. 13.
    Olson, M.: The Logic of Collective Action, Public Goods and the Theory of Groups, p. 7. Harvard University Press, Harvard (2002)Google Scholar
  14. 14.
    Perry, R.: What is a Disaster? New Answers to Old Questions, p. 161. Xlibris Corporation, Bloomington (2005)Google Scholar
  15. 15.
    Purohit, H., Hampton, A., Bhatt, S., et al.: Identifying seekers and suppliers in social media communities to support crisis coordination. Comput. Support. Coop. Work (CSCW) 23, 513–545 (2014)CrossRefGoogle Scholar
  16. 16.
    Sandoval-Almazan, R., Gil-Garcia, J.R.: Cyberactivism through social media: Twitter, YouTube, and the Mexican political movement “I’m Number 132”. In: Hawaii International Conference on System Sciences, pp. 1704–1713 (2013)Google Scholar
  17. 17.
    Sha, Y., Jinsong, Y., Guoray, C.: Detecting public sentiment over PM2.5 pollution hazards through analysis of Chinese microblog. In: International Conference on Information Systems for Crisis Response and Management, University Park, Pennsylvania, USA, pp. 722–726 (2014)Google Scholar
  18. 18.
    Socher, R., Perelygin, A., Wu, J.Y., Chuang, J., Manning, C.D., Ng, A.Y., Potts, C.: Recursive deep models for semantic compositionality over a sentiment treebank. In: Conference on Empirical Methods in Natural Language Processing (2013)Google Scholar
  19. 19.
    Soltani, R., Abhari, A.: Identity matching in social media platforms. In: International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp. 64–70 (2013)Google Scholar
  20. 20.
    Stallings, R.A.: Methods of Disaster Research, pp. 49–55. Xlibris Publishing, Bloomington (2003)Google Scholar
  21. 21.
    Cosby, S.L.: Human security concept: the root of U.S. national security and foreign policy. United States Marine Corps, Command and Staff College, Marine Corps Combat Dev, Marine Corps University, South Street, Quantico, VA, p. 9 (2009)Google Scholar
  22. 22.
    Storck, M.: The role of social media in political mobilisation: a case study of the January 2011 Egyptian uprising. University of St Andrews, Scotland, p. 3, December 2011Google Scholar
  23. 23.
    Sutton, J.N., Spiro, E., Johnson, B., Fitzhugh, S., Greczek, M., Butts, C.: Connected communications: network structures of official communications in a technological disaster. In: International Conference on Information Systems for Crisis Response and Management, pp. 1–10 (2012)Google Scholar
  24. 24.
    Twitter: Number of monthly active international Twitter users from 2nd quarter 2010 to 3rd quarter 2017 (in millions). https://www.statista.com/statistics/274565/monthly-active-international-twitter-users/. Accessed 14 Jan 2018
  25. 25.
    United Nations Development Program: Human Development Report, pp. 22–33. Oxford University Press, New York/Oxford (1994)Google Scholar
  26. 26.
    Whiting, A., Williams, D.: Why people use social media: a uses and gratifications approach. Qual. Market Res. Int. J. 16(4), 362–369 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Pedro Cárdenas
    • 1
  • Georgios Theodoropoulos
    • 2
  • Boguslaw Obara
    • 1
  • Ibad Kureshi
    • 3
  1. 1.Durham UniversityDurhamUK
  2. 2.Southern University of Science and TechnologyShenzhenChina
  3. 3.Inlecom SystemsBrusselsBelgium

Personalised recommendations