|
Foreword |
7 |
|
|
Preface |
8 |
|
|
Acknowledgments |
9 |
|
|
Contents |
10 |
|
|
About the Authors |
12 |
|
|
Acronyms |
14 |
|
|
List of Figures |
16 |
|
|
1 Deviance in Social Media |
19 |
|
|
1.1 Introduction |
19 |
|
|
1.2 Literature on Online Deviant Behaviors |
21 |
|
|
1.2.1 Online Deviant Groups |
22 |
|
|
1.2.1.1 Islamic State of Iraq and the Levant/Syria (ISIL) (ISIS) (Daesh) |
22 |
|
|
1.2.1.2 Anti-NATO Propagandist |
24 |
|
|
1.2.1.3 Deviant Hackers Networks (DHNs) |
24 |
|
|
1.2.1.4 Internet Trolls |
26 |
|
|
1.2.2 Online Deviant Events |
26 |
|
|
1.2.3 Online Deviant Tactics |
29 |
|
|
1.3 Leveraging the Theory of Collective Action to Study DCFMs |
31 |
|
|
1.3.1 The Case of DCFM-Success |
34 |
|
|
1.3.2 The Case of DCFM-Failure |
35 |
|
|
1.3.3 Conceptual Framework |
35 |
|
|
1.3.4 A CFM Scenario |
37 |
|
|
References |
40 |
|
|
2 Social Network Measures and Analysis |
45 |
|
|
2.1 Basics of Graph Theory |
45 |
|
|
2.1.1 Graph Data Structures |
49 |
|
|
2.1.1.1 List Structure |
49 |
|
|
2.1.1.2 Matrix Structure |
49 |
|
|
2.2 Fundamentals of Social Network Analysis (SNA) |
50 |
|
|
2.2.1 Centrality Measures |
52 |
|
|
2.2.2 Triadic Closure and Clustering Coefficient |
54 |
|
|
2.2.3 Modularity |
56 |
|
|
2.2.4 Influential Blogs and Influential Bloggers |
57 |
|
|
2.2.5 Focal Structures Analysis (FSA) |
59 |
|
|
References |
61 |
|
|
3 Tools and Methodologies for Data Collection, Analysis, and Visualization |
63 |
|
|
3.1 TouchGraph SEO Browser |
63 |
|
|
3.2 Twitter Archiving Google Sheet (TAGS) and TAGSExplorer |
65 |
|
|
3.3 Network Overview, Discovery, and Exploration for Excel(NodeXL) |
66 |
|
|
3.4 Gephi |
66 |
|
|
3.5 CytoScape |
69 |
|
|
3.6 Linguistic Inquiry and Word Count (LIWC) |
69 |
|
|
3.7 Organizational Risk Analyzer (ORA) NetScenes |
71 |
|
|
3.8 IBM Watson Analytics |
73 |
|
|
3.9 Web Content Extractor (WCE) |
75 |
|
|
3.10 Blogtrackers |
76 |
|
|
3.11 YouTubeTracker |
78 |
|
|
3.12 Botometer |
79 |
|
|
3.13 Reaper: Social Media Scraping Tool |
80 |
|
|
References |
82 |
|
|
4 Social Cyber Forensics (SCF): Uncovering Hidden Relationships |
84 |
|
|
4.1 Social Cyber Forensics Analysis (SCF) Using Maltego |
84 |
|
|
4.2 Methodologies to Extract Open Source Information |
88 |
|
|
4.2.1 Finding Related Websites From Web TrackerCode (WTC) |
88 |
|
|
4.2.2 Finding Blog Sites From Twitter Handles |
89 |
|
|
4.2.3 Inferring the Ownership or Hidden Connections Among Different Websites |
90 |
|
|
4.3 Hands-On Exercises |
90 |
|
|
4.3.1 Exercise A |
90 |
|
|
4.3.2 Exercise B |
92 |
|
|
4.3.3 Exercise C |
92 |
|
|
References |
93 |
|
|
5 Case Studies of Deviance in Social Media |
95 |
|
|
5.1 Introduction |
95 |
|
|
5.2 Case Study 1: Propaganda During the 2014 Crimean WaterCrisis |
98 |
|
|
5.3 Case Study 2: Anti-NATO Propaganda During the 2015 Trident Juncture Exercise |
100 |
|
|
5.4 Case Study 3: Anti-NATO Propaganda During the 2015 Dragoon Ride Exercise |
103 |
|
|
5.5 Case Study 4: ISIS Beheading Propaganda in 2015 |
105 |
|
|
References |
108 |
|
|
Glossary |
111 |
|
|
Index |
112 |
|