FIGURE 15.1
From social media to LEA intelligence.
216
CHAPTER 15
Social media and its role for LEAs: Review and applications
CONCLUDING REMARKS
As criminal threats and practices evolve with the environment around them, the in-
telligence resources offered by social media become an important asset in LEAs
investigative armory. Social media offers an unrivalled repository for intelligence-
led policing operations; the analysis of which plays a significant role in assessing
the validity, credibility and accuracy of the information acquired from open-source
intelligence repositories such as social media. Techniques such as text mining, NLP
(natural language processing) and sentiment analysis provide a varied toolset that
can be applied to better inform LEA decision-makers and lead to the identification
of where a crime is likely to happen, who is likely to commit it and the nature of the
threat itself.
Yet, in this context not only the technical details of how to mine and analyze
social media information are needed, but also in-depth knowledge about the people
using the services, their motivations and behaviors. In this chapter, we offered a short
overview of the current knowledge around social media usage including user char-
acteristics and the factors that influence user behaviors online. We further offered an
overview of usage scenarios to demonstrate how social media can support LEAs in
their operations. These scenarios establish use-cases for the application of social me-
dia in the prevention, prediction and resolution of a wide variety of criminal threats,
thus demonstrating the potential capacity of social media for LEAs.
REFERENCES
Alexander, D.A., Klein, S., 2009. Kidnapping and hostage-taking: a review of effects, coping
and resilience. J. R. Soc. Med. 102 (1), 16–21.
Amichai-Hamburger, Y., Wainapel, G., Fox, S., 2002. On the internet no one knows I'm an
introvert: extraversion, neuroticism, and internet interaction. Cyberpsychol. Behav. 5 (2),
125–128.
Armstrong, C.L., McAdams, M.J., 2009. Blogs of information: how gender cues and indi-
vidual motivations influence perceptions of credibility. J. Comput.-Mediated Commun.
14 (3), 435–456.
Armstrong, C.L., Nelson, M.R., 2005. How newspaper sources trigger gender stereotypes. J.
Mass Commun. Q. 82 (4), 820–837.
Barnes, S., 2006. A privacy paradox: social networking in the United States. First Monday 11
(9).
http://firstmonday.org/issues/issue11_9/barnes/index.html
(accessed 06.06.11).
Bayerl, P.S., Horton, K., Jacobs, G., Akhgar, B., 2014. Who want's police on social media.
Paper Presented at the 1st European Conference for Social Media, July 10-11, 2014,
Brighton, U.K.
Best, C., 2008. Open source intelligence. In: Mining Massive Data Sets for Security: Advances
in Data Mining, Search, Social Networks and Text Mining, and Their Applications to
Security, IOS Press, Amsterdam, Netherlands, 19. p. 331.
Biocca, F., Harms, C., Burgoon, J.K., 2003. Toward a more robust theory and measure of
social presence: review and suggested criteria. Presence: Teleoper. Virtual Environ. 12,
456–480.
Do'stlaringiz bilan baham: |