Published September 11, 2017
| Version v1
Conference paper
Open
A monitoring tool for terrorism-related key-players and key-communities in social media networks
Creators
- 1. CERTH-ITI, Thessaloniki, Greece
Description
Terrorists communicate and disseminate their activities using social media, such as Twitter, where complex networks of user accounts are formed and need to be effectively analysed by Law Enforcement Agencies (LEAs). To this end, we propose a novel visualisation tool that assists intelligence analysts and investigators through the presentation of the network formation, components, key-players, key-communities and through support of keyword search in the terrorism domain, highlighting also suspended users and offering navigation in the user network.
Files
EISIC2017_socialmediamonitoring.pdf
Files
(169.2 kB)
Name | Size | Download all |
---|---|---|
md5:ace0d22ea6295dd4191e4605ca988efe
|
169.2 kB | Preview Download |