Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Deviance in social media and social cyber forensics : uncovering hidden relations using open source information (OSINF)
Al-khateeb S., Agarwal N., Springer International Publishing, New York, NY, 2019. 124 pp. Type: Book (978-3-030136-89-5)
Date Reviewed: Aug 26 2020

This short treatise is part of the “SpringerBriefs in Cybersecurity” series. The briefs in this series are either topic focused, like this book, or country focused. As the title suggests, the book focuses on deviant behavior across numerous social media platforms, offers methods to potentially identify media ownership, and provides several examples of forensic work to identify ownership. It is organized in five chapters.

Chapter 1, “Deviance in Social Media,” defines deviant behaviors and presents a literature review of online deviant groups such as ISIS, anti-NATO propagandists, deviant hackers, and Internet trolls. Online deviant events are defined and illustrated, and the use of bots as tactical tools of influence is discussed. Particular attention is paid to deviant cyber flash mobs. A behavioral framework, taken from Coleman [1], is discussed and applied to the cyber flash mob.

Chapter 2, “Social Network Measures and Analysis,” introduces Euler’s graph theory and applies it to social network analysis (SNA). Centrality, cluster, and modularity measures for social networks are presented. Influential blogs and bloggers are discussed in the framework of SNA. Focal structure analysis (FSA) algorithms used to discover influential nodes in a network or graph are described.

Chapter 3, “Tools and Methodology for Data Collection, Analysis, and Visualization,” describes 13 data tools that can be used to address data from open-source information (OSINF), Facebook, YouTube, Twitter, blogs, and other sources. These tools include TouchGraph SEO Browser, Twitter Archiving Google Sheet (TAGS) and TAGSExplorer, NodeXL, Gephi, Cytoscape, Linguistic Inquiry and Word Count (LIWC), Organizational Risk Analyzer (ORA) NetScenes, IBM Watson Analytics, Web Content Extractor (WCE), Blogtrackers, YouTube Tracker, Botometer, and Reaper, a social media scraping tool.

Chapter 4, “Social Cyber Forensics (SCF): Uncovering Hidden Relationships,” presents Maltego, a tool that can be used to examine cross-media affiliations and uncover relations between organized deviant groups. It introduces a three-step methodology that can uncover Twitter account relationships with other web and blog sites and link likely ownership of these sites. The reader is introduced to methodologies to extract open-source information, find related sites via web tracker codes, find blog sites from Twitter handles, and assess ownership and links among different sites. Several exercises are presented.

Chapter 5, “Case Studies of Deviance in Social Media,” provides four case studies. First, the 2014 Crimean water crisis is presented. This is followed by two exercises related to anti-NATO propaganda and an exercise on ISIS propaganda.

This well-written book is presented in a sequential fashion. Readers with a little knowledge of cybersecurity and cyber forensics will find it very readable. As with other Springer publications, the chapter references are excellent and can help readers further their understanding. The book should interest managers of social media sites and blog writers, as well as readers with an interest in the social influence of the current slate of popular media sites.

More reviews about this item: Amazon

Reviewer:  Robert M. Lynch Review #: CR147046 (2102-0024)
1) Coleman, J. S. The mathematics of collective action. Routledge, New York, NY, 2006.
Bookmark and Share
  Featured Reviewer  
 
Human Factors (H.1.2 ... )
 
 
Social Networking (H.3.4 ... )
 
 
General (A.0 )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Human Factors": Date
A theory of computer semiotics
Andersen P., Cambridge University Press, New York, NY, 1990. Type: Book (9780521393362)
Aug 1 1992
An experimental comparison of tabular and graphic data presentation
Powers M., Lashley C., Sanchez P., Shneiderman B. International Journal of Man-Machine Studies 20(6): 545-566, 1984. Type: Article
May 1 1985
Organizing for human factors
Thomas J. (ed)  Human factors and interactive computer systems (, New York,461984. Type: Proceedings
May 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy