Data shared through Social Media may influence more than one client's protection "” e.g., Information that portray diverse clients, remarks that specify distinctive clients, occasions in which diverse clients are welcomed, and so forth. In this paper, numerous kinds of protection administration bolster in show standard Social Media establishment makes clients unfit to fittingly control the sender and collector. Computational systems that can combine the security inclinations of diverse...
Topics: Social Media, Privacy, Conflicts, Multi-party Privacy, Social Networking Services, Online Social...
Social circles arised out of a need to organize the contacts in personal networks, within the current social networking services. The automatic detection of these social circles still remains an understudied problem, and is currently attracting a growing interest in the research community. This task is related to the classical problem of community detection in networks, albeit it presents some peculiarities, like overlap and hierarchical inclusion of circles. The usual community detection...
Topics: DTIC Archive, Nanclares,Jesus A, Universitat Politecnica De Valencia VALENCIA Spain, social...
Virality of online content on social networking websites is an important but esoteric phenomenon often studied infields like marketing, psychology and data mining. In this paper we study viral images from a computer vision perspective. We introduce three new image datasets from Reddit and define a virality score using Reddit metadata.We train classifiers with state-of-the-art image features to predict virality of individual images, relative virality in pairs of images, and the dominant topic of...
Topics: DTIC Archive, Deza,Arturo, Virginia Polytechnic Institute and State University Blacksburg United...
Studies have shown that each person is more inclined to enjoy a group activity when 1) she is interested in the activity, and 2) many friends with the same interest join it as well. Nevertheless, even with the interest and social tightness information available in online social networks, nowadays many social group activities still need to be coordinated manually. In this paper, therefore, we first formulate a new problem, named Participant Selection for Group Activity (PSGA), to decide the...
Topics: DTIC Archive, Shuai,Hong-Han, National Taiwan University Taipei City Taiwan, GROUP DYNAMICS,...
We present a micro-architectural side-channel attack that runs entirely in the browser. In contrast to previous work in this genre, our attack does not require the attacker to install software on the victim's machine; to facilitate the attack, the victim needs only to browse to an untrusted webpage that contains attacker-controlled content. This makes our attack model highly scalable, and extremely relevant and practical to today's Web, as most desktop browsers currently used to access the...
Topics: DTIC Archive, Oren,Yossef, Columbia University New York City United States, web browsers,...
In this project, to continue our development of a system that can dynamically collect and warehouse unfiltered textual communication data and make this data available to support HSCB modeling, decision making, and course of action development, we have (i) developed algorithms and an end-to-end computational framework to support graph analysis and visualization, (ii) developed graph querying capabilities such as top K and n-hop neighborhood, (iii) developed automated YouTube video metadata...
Topics: DTIC Archive, Savas,Onur, Intelligent Automation, Inc. Rockville United States, social networking...
Nothing throws leadership into starker relief than a crisis, as Hurricane Katrina and the Great East Japan earthquake both demonstrated. Now more than ever, the ripple effects from a crisis spread far beyond its epicenter, often in unexpected ways. At the same time, faith in authority has eroded: trust in the U.S. Federal Governments ability to handle domestic problems, for example, has been declining for the past decade.1 Add the challenge of managing digital media and its rapid information...
Topics: DTIC Archive, Hayashi, Chiemi, World Economic Forum Cologny Switzerland, disasters, lessons...
In 2004, General James Hoss Cartwright blazed a new trail for the use of social media in the military when he introduced the concept of a blog system to tie together all of the United States Strategic Command (USSTRATCOM) headquarters. After the military's first use of chat in command and control using basic mIRC chat back in the 1990s, the inclusion of social media in military networks had not gained significant traction. Although some type of social media was eventually included in the...
Topics: DTIC Archive, Voigt,Kyle D, AIR WAR COLL MAXWELL AFB AL MAXWELL AFB United States, social...
The proposed research was motivated by the observation that urban environments are increasingly characterized by a variety of nontraditional sensors, whose data streams can be harnessed to infer a variety of latent events and urban context.
Topics: DTIC Archive, Misra, Archan, SINGAPORE MANAGEMENT UNIVERSITY SINGAPORE Singapore, social networking...
Sociologists, economists, and network scientists concur that the entrepreneurs network is critical to success but have consistently struggled with developing models that are measurable or quantifiable. Well-known research on this subject tends to focus on the entrepreneurs social network (Greve and Salaff, 2003, Witt, 1978) and utilizes the Name Generator approach (McAllister and Fischer, 1978) to develop the social network model. This method maps an ego-centered network and assembles an...
Topics: DTIC Archive, Evans,Daniel, MILITARY ACADEMY WEST POINT NY WEST POINT United States, SOCIAL...
Today's analysts manually examine social media networks to find discussions concerning planned cyber attacks, attacker techniques and tools, and potential victims. Applying modern machine learning approaches, Lincoln Laboratory has demonstrated the ability to automatically discover such discussions from Stack Exchange, Reddit, and Twitter posts written in English. Criminal hackers often use social media networks to discuss cyber attacks, share strategies and tools, and identify potential...
Topics: DTIC Archive, Campbell,Joseph Jr P, MIT Lincoln Laboratory Lexington United States, social...
In this project, we investigated how network structure interplays with higher level processes in online social networks. We investigated the appropriateness of existing mathematical models for explaining the structure of retweet cascades on Twitter; we investigated how to detect spam accounts on Facebook and other social networks by graph analytics; and finally we investigated how to design pricing schemes for users on a social network when their valuations are influenced by their neighbors in...
Topics: DTIC Archive, Munagala,Kamesh, Duke University Durham United States, social networks, social...
Many real networks that are collected or inferred from data are incomplete due to missing edges. Missing edges can be inherent to the dataset (Facebook friend links will never be complete) or the result of sampling (one may only have access to a portion of the data). The consequence is that downstream analyses that consume the network will often yield less accurate results than if the edges were complete. Community detection algorithms, in particular, often suffer when critical intra-community...
Topics: DTIC Archive, Burgess,Matthew, University of Michigan Ann Arbor United States, social networking...
Social media platforms have become an effective and efficient method used by U.S. Army organizations to deliver and communicate messages to various audiences. U.S. Army Public Affairs Officers (PAOs) receive training based on currently established Training Programs of Instruction by the Defense Information School. The use of social media platforms by PAOs is well established, but further research on how adequately PAOs are trained and educated to effectively use social media networks needs to...
Topics: DTIC Archive, Santiago,Cesar H, ARMY COMMAND AND GENERAL STAFF COLLEGE FORT LEAVENWORTH KS FORT...
In this project, to achieve our goals of (i) further enhancing capability to analyze unstructured social media data at scale and rapidly, and (ii) improving IAI social media software Scraawl's features, we have (i) designed and implemented temporal community detection and influence discovery algorithms, (ii) enhanced Scraawl Ul for improved usability and navigation, (iii) improved the computational framework of Scraawl, (iv) enhanced Named Entity Recognition (NER), and (v) designed and...
Topics: DTIC Archive, Savas,Onur, INTELLIGENT AUTOMATION INC ROCKVILLE MD ROCKVILLE United States, social...
Social media is a new model of interaction that is having an unanticipated and rapidly evolving effect on the political and social landscape of the world. Emphasis on and discussion about the use and role of social media accompanies many of todays ongoing debates, introducing a new variable into the policy-making process. The widespread impression is that the growth of social media can play an influential role in the policy-making process. But while extensive research continuously monitors the...
Topics: DTIC Archive, Lant,Marco, AIR WAR COLL MAXWELL AFB AL MAXWELL AFB United States, social media,...
Social networking services (SNSs) empower users to communicate, connect, and engage with others across the Internet. These tools have exploded in use worldwide. This paper explores the regional use of these tools to determine if participation with a subset of SNSs can be applied to identify a users country of origin. A better understanding of regional SNS behavior provides a more comprehensive profile of country-specific users, supporting computer network defense (CND) efforts and computer...
Topics: DTIC Archive, Meeuf,Kate, Carnegie Mellon University Software Engineering Institute Pittsburgh...
This research project has focused on detecting, analyzing, and modeling campaigns engaged in strategic manipulation in social media. Research questions investigated include: Can we detect campaigns engaging in strategic manipulation efficiently and effectively, considering the massive and growing scale of social systems? What approaches are in use? How do they evolve? What impacts do spatial and temporal constraints of social media have on strategic manipulation? What are the dynamics of...
Topics: DTIC Archive, Caverlee,James, TEXAS ENGINEERING EXPERIMENT STATION COLLEGE STATION COLLEGE STATION,...
We have enhanced subgraph matching queries to retrieve top Kusers/hashtags and their neighborhoods, and further improved Scraawl graph visualization to visualize the results. We have implemented a service to retrieve friends and followers of an arbitrary set of users, and further improved Scraawl graph visualization to visualize the results.
Topics: DTIC Archive, Savas,Onur, Intelligent Automation Incorporated Rockville United States, data mining,...
The impact of the internet and social media tools on authoritarian regimes and would be revolutionaries remains a hotly debated topic even after a decade of widespread internet access. This paper argues that dissidents' use of the Internet and social media tools undermines authoritarian power, however the state will likely retain the advantage. First, to frame the argument, it is useful to examine past information communication technologies (ICT) by exploring their nature, uses, and impacts on...
Topics: DTIC Archive, Alonso,Dawn, AIR WAR COLL MAXWELL AFB AL MAXWELL AFB United States, censorship, human...
The purpose of this thesis is to determine the threats that social media and social navigation (SMSN) pose to the surface transportation system. The research catalogs the types of threats and SMSNs vulnerabilities, and uncovers terrorists malign use of social media for intelligence gathering. Academic researchers have already discovered threats in social navigation platforms such as Waze and Google Maps; Sybil and man-in-the-middle attacks allow malicious actors to create traffic congestion and...
Topics: DTIC Archive, Naval Postgraduate School Monterey United States, social media, surface...
How many of us have been faced with this situation? A budding DOD executive pops into your cube and says Hey, I heard about this thing called Pinterest. I went on it last night and I thought it was really cool. I think we need Pinterest for the office. Will you help me? If you're not stunned by the suggestion, you'd probably respond by saying, What Pinterest? And you wouldn't be alone. Across the federal government, departments are diving into social software solutions for all sorts of mission...
Topics: DTIC Archive, Drake,Brian, Defense Intelligence Agency Arlington United States, social networking...
In this reporting period, we performed the following tasks. Developed VK Data Collection and Basic Statistics Computation Capabilities. We have developed a capability to retrieve VK posts based on keywords and geospatial locations. We have also developed a capability to compute basic statistics of the VK posts that include computation of top users, top words, top URLs, and top attachments along with top popular media. These capabilities are integrated into Scraawl Released Scraawl 1.18.0.
Topics: DTIC Archive, Savas,Onur, Intelligent Automation Incorporated Rockville United States, data mining,...
This research explores the use of Twitter to determine if the personality characteristics of well-performing Navy personnel can be identified based on their Twitter use. Well-performing Navy personnel are identified by using the publicly-available Navy promotion lists and then those names were used to query Twitter in order to identify possible accounts belonging to these Sailors. Data from those Twitter accounts that could be positively identified as belonging to Navy personnel were then fed...
Topics: DTIC Archive, Ward,Leslie, Naval Postgraduate School Monterey United States, relational database...
AFMC Public Affairs is charged with the task of telling the story of equipping the Air Force for world-dominant airpower. AFMC is unique amongst the rest of the Air Force, given its support role, emphasis on science and technology, greater proportion of civilian employees, and other factors, making this a distinct story worth telling.
Topics: DTIC Archive, Mick,Tyler W, HQ AFMC/A9A Wright-Patterson AFB United States, SOCIAL COMMUNICATION,...
Strategic communications coupled with existing and emerging technologies results in a globally powerful tool. In the current environment, the Department of Defenses (DoD) methods are woefully inadequate for the agile, dynamic, and far-reaching nature of this domain. Instead of continuing along its current path, the DoD must radically transform the way it thinks about strategic communications. Rather than allowing itself to be victimized or permitting current procedures to render a potentially...
Topics: DTIC Archive, Wilkins,Lance A, Air War College Montgomery United States, social networking...
Intelligence analysts depend on the ability to understand the social networks of suspects and adversaries. We develop a novel method for automatically discovering this information from digital storage media by analyzing byte-offset proximity between digital artifacts on the raw media. We show that this method can be used to group email addresses that indicate real communication between users and those that do not. Furthermore, in the case where addresses do represent communication between...
Topics: DTIC Archive, Green,Janina L, NAVAL POSTGRADUATE SCHOOL MONTEREY CA MONTEREY United States, social...
This report presents a study making our first approach to the analysis of Social Communities. The experiments conducted provide us with necessary knowledge to produce research within the problem of Social Copying Community Detection, where we will not only consider structural network information but also the contents of social interactions, with the aim to detect copying communities
Topics: DTIC Archive, Rosso,Paolo, Universitat Politcnica De Valncia Valncia Spain, artificial neural...
Police agencies are increasingly turning to social media to communicate with the public; some departments only push information out one way, while others engage in a two-way, back-and-forth conversation. Research is robust on topics such as two-way engagement, the benefits of a large following, and the positive impact government can have by using social media during and after crises, but there is a marked lack of police-specific quantifiable data. The purpose of this thesis is to determine if...
Topics: DTIC Archive, Perron,Zachary P, Naval Postgraduate School Monterey United States, Police, Law...
Since the declaration of the Islamic State (IS) in 2014, men and women have been recruited to join the Caliphate in numbers surpassing those recruited by al Qaida. This variance in recruitment volume is likely attributable to the online propaganda campaign, Brand Caliphate. This thesis looks at the recruitment of women and asks if Brand Caliphate specifically targets females with its messaging, and if so, is the messaging effective? Based on a textual analysis of Brand Caliphates propaganda, it...
Topics: DTIC Archive, Monroe,Brandi L, Naval Postgraduate School Monterey United States, terrorists, social...
Social Networking Technologies are Internet-based platforms that enable individuals and organizations to connect with other users of the platform and share information about themselves. The participants information is displayed as a profile describing the user as well as varying degrees of additional, identifying information. Participants can then view, and at times engage with, the information of the other users with whom they have made a formal connection. Participants can also view the...
Topics: DTIC Archive, McKechnie,Douglas B, United States Air Force Academy Air Force Academy United States,...
In this project, we developed many new efficient algorithms for analysis of networks. We have published over 100 papers during the course of this project, and we launched a new website BigDND [http://projects.csail.mit.edu/dnd/] for distributing large network data and tools for analyzing them. Within network science, our research develops algorithms to enable efficient and guaranteed-quality analysis of abroad range of types of networks, from social networks to computer networks and...
Topics: DTIC Archive, Demaine,Erik D, Massachusetts Institute of Technology Cambridge United States,...
The goal of this proposal is to (a) determine the extent to which lesbian, gay, bisexual and transgender (LGBT) service members report feelings of acceptance and integration into the military and their units post-Dont Ask, Dont Tell (DADT); (b) describe the composition and structure of LGBT service members supportive social networks; (c) determine if there are differences in behavioral health patterns among LGBT service members compared to their heterosexual counterparts and across military...
Topics: DTIC Archive, Holloway,Ian, CALIFORNIA UNIV LOS ANGELES LOS ANGELES, homosexuality, social...
Although there is voluminous data flow in social media, it is still possible to create an effective system that can detect malicious activities within a shorter time and provide situational awareness.This thesis developed patterns for a probabilistic approach to identify malicious behavior by monitoring big data. We collected twenty-two thousand tweets from publicly available Twitter data and used them in our testing and validation processes. We combined deterministic and nondeterministic...
Topics: DTIC Archive, Yilmaz,Abdullah, Naval Postgraduate School Monterey United States, social networking...
The present descriptive study examines the Islamic State's (IS) use of social media to launch its message and expand its propaganda to the world. IS focus on the Syrian Arab Spring revolution that started on March 15, 2011, as a foundation of tacit and explicit support of some Syrian people to evolve into a reorganized terrorist group. Examination and analysis of articles, reports, magazines, IS's publications and social media posts (such as those found on Twitter, YouTube, and Facebook)...
Topics: DTIC Archive, Harkous,Hasan S, US Army Command and General Staff College Fort Leavenworth United...
Technological advances and social media are both amoral; in and of itself, there is no good social media or bad social media. Like the rest of the world, extremist organizations have discovered social media and are not going to stop using it anytime soon. Terror organizations often utilize new technology in the same manner as an everyday user. Open access in cyberspace forces countries into a paradoxical position of how to grant access to the internet yet maintain control of the social media...
Topics: DTIC Archive, Close,Joshua, Air Command and Staff College Maxwell Air Force Base United States,...
Topics: DTIC Archive, Warnke,Scott D, Naval Postgraduate School Monterey United States, algorithms,...
The military's budget is decreasing but the number of new accessions is increasing to maintain the force structure. The services recruiting commands should leverage social media to increase exposure, tell their story, and increase brand recognition. This is equally important for the National Guard to continue to be relevant to the nation and states. This paper will research how each branch of service is using social media platforms to reach the desired audience and have a recommendation for the...
Topics: DTIC Archive, TAHARA,TYSON Y, AIR WAR COLLEGE, AIR UNIVERSITY MAXWELL AFB United States, social...
Email addresses extracted from secondary storage devices are important to a forensic analyst when conducting an investigation. They can provide insight into the users social network and help identify other potential persons of interest. However, a large portion of the email addresses from any given device are artifacts of installed software and are of no interest to the analyst. We propose a method for discovering relevant email addresses by creating graphs consisting of extracted email...
Topics: DTIC Archive, Allen,Gregory, Naval Postgraduate School Monterey United States, social networking...
Access to information has never been easier and peoples eagerness and ability to publish information on social media platforms has never been higher. The growing mountain of information has presented an opportunity and a significant challenge for data scientists. The military in particular can benefit from the ability to use public information to gain an awareness of its current vulnerabilities as well as learning about its adversaries. This thesis explores methods for collecting public...
Topics: DTIC Archive, Gillen,Patrick M, Naval Postgraduate School Monterey United States, DATA MINING,...
The generation entering the military grew up in an era where social media has always existed as an extension of their lives. Military leaders recognize this revolution in how people communicate, but usually limit their scope of online participation to simply obtaining a social media presence. Although having a presence online is largely recognized as an imperative in today's interconnected society, the implementation by most military units fails to capitalize on the potential benefits that...
Topics: DTIC Archive, Duesterhaus,Gregory M, US Army Command and General Staff College Fort Leavenworth...
Imagine in a social network that an agent wants to form a connection with a target user(s) by interacting with the friends of the target(s). Because forming a connection is known as following in social networks such as Twitter, we refer to this as the follow back problem. The friends of the target user(s) form a directed graph which we refer to as the friend's graph. The agents goal is to get the target to follow him, and he is allowed to interact with the target and the targets friends. To...
Topics: DTIC Archive, Rajagopalan,Krishnan, MASSACHUSETTS INST OF TECH LEXINGTON LEXINGTON United States,...
Reports of Russia's utilization of social media to influence the 2016 U.S. presidential elections demonstrated the power of social media. They also revealed that the U.S. is behind its adversaries in effective use of social media to influence targeted audiences and help set conditions for future operations. This thesis will examine factors of influence on social media networks and provide strategies for incorporating social media in operational plans. Before assessing potential strategies, the...
Topics: DTIC Archive, ALLISON, BRETT A, NDU/Joint Forces Staff College NORFOLK United States, social...
Discovering true and meaningful communities in dark networks is a non-trivial yet useful task. Because terrorists work hard to hide their relationships/network, analysts have an incomplete picture of their strategy; even worse, the degree of incompleteness is unknown. To better protect our nation, analysts would benefit from a tool that helps them identify meaningful terrorist communities. This thesis introduces a general-purpose algorithm for community detection in multiplex dark networks...
Topics: DTIC Archive, Miller,Ryan E, Naval Postgraduate School Monterey United States, linear programming,...
This thesis focuses on how the Taiwan military can improve public perception by changing its posting strategies on the Taiwanese Ministry of Defense Facebook page. By enhancing public trust through social media, the military would be better positioned to increase recruitment, funding, and morale. First, the research analyzes the application of Facebook and use of the Like button as an indicator of public trust levels. Then it employs content analysis methods, to evaluate which posting formats...
Topics: DTIC Archive, Chen,Tzu-Lun, Naval Postgraduate School Monterey United States, military forces...
Inter-Component Communication (ICC) enables useful interactions between mobile apps. It has been long believed that inter-app ICCs can be abused by malware writers to launch collusion attacks. In this project, we designed and developed two techniques for analyzing the security threats associated with inter-app ICC communications and conducted two large-scale experiments (MapReduce one with 11,996 apps and MySQL database one with over 110K apps). Our contributions are two-fold, methodology...
Topics: DTIC Archive, Yao,Danfeng, Virginia Polytechnic Institute and State University Blacksburg United...
This thesis examines the history of anti-Americanism as both a passing sentiment and an enduring ideology and how both can be detrimental to American security and future prosperity. It further explores the analytical methods for studying anti-Americanism, to include classic polling and social media analysis in an attempt to determine the reliability of each. This work attempts to bring to light the underlying motives for anti-American beliefs by examining relationships between explicit American...
Topics: DTIC Archive, Morales,David J, Naval Postgraduate School Monterey United States, military...
Security analysts gather essential information on cyber attacks, exploits, vulnerabilities, and victims by manually searching social media sites. This effort can be dramatically reduced using natural language machine learning techniques. Using a new English text corpus containing more than 250k discussions from Stack Exchange, Reddit, and Twitter on cyber and non-cyber topics, we demonstrate the ability to detect more than 90% of the cyber discussions with fewer than 1% false alarms. If an...
Topics: DTIC Archive, Lippmann,Richard P, MASSACHUSETTS INST OF TECH LEXINGTON LEXINGTON United States,...
The rise of the Islamic State of Iraq and Syria (ISIS), or al-Dawla al-Islamiya fi al-Iraq wa al-Sham (DAIISH), has been attributed to the groups ability to exploit social media to spread propaganda, control beliefs, recruit, preach, and broadcast ambitions. As a means to influence and motivate others to act on their behalf, DAIISHs use of social media is similar to the principles enshrined in U.S. military unconventional warfare (UW) doctrine. Although DAIISH is not the focus of this thesis,...
Topics: DTIC Archive, Petry,Joshua W, Air University Maxwell Air Force Base United States,...
Current efforts within Information Operations (IO) to effectively measure the influence and performance of products used to message primarily human target audiences lack the benefits that web based analytic technologies can provide. This thesis adapts previous research dedicated to optical communications through Quick Response (QR) codes as a messaging platform to provide a feedback channel for IO messaging efforts through optical communications technology. First, these concepts are applied to...
Topics: DTIC Archive, Phillips,Stephen K, Naval Postgraduate School Monterey United States, communication...