Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2016 | 8 | 14 | 92-101

Article title

Znaczenie analiz sieci społecznych online dla bezpieczeństwa narodowego.

Authors

Content

Title variants

EN
Analysis of online social networks in the context of national security.

Languages of publication

PL

Abstracts

PL
Sieci społeczne online mają istotne znaczenie w funkcjonowaniu współczesnego społeczeństwa. Zastosowanie zaawansowanych metod analitycznych w ich badaniu może być wykorzystane do wsparcia zarządzania bezpieczeństwem narodowym w co najmniej dwóch aspektach. Po pierwsze umożliwia identyfikację wojny informacyjnej prowadzonej z wykorzystaniem mediów społecznościowych. Po drugie zaś udostępnia metody rozpoznania struktury i sposobów działania zorganizowanych grup przestępczych, takich jak na przykład organizacje terrorystyczne. Te dwa obszary zastosowań zostały omówione w odniesieniu do aktualnego stanu badań naukowych, ograniczeń w ich prowadzeniu oraz potencjalnego zastosowania tych badań w zakresie bezpieczeństwa narodowego.
EN
Online social networks are essential dimension of modern society. Applying advanced analytical methods in social networks can be used to support of national security in at least two aspects. Firstly it allows identification information war, which is conducted with the use of social media. Secondly it provides methods for the recognition of the structure and methods of operation in organized criminal groups, such as terrorist organizations. These two areas of application are discussed in relation to the current state of art in scientific research, limitations, and potential applications in the national security.

Year

Volume

8

Issue

14

Pages

92-101

Physical description

Dates

published
2016-11-15

Contributors

author
  • dr hab., inż., profesor nadzwyczajny Instytutu Informatyki i Gospodarki Cyfrowej Szkoły Głównej Handlowej w Warszawie

References

  • Abbasi A., Chen H., Applying Authorship Analysis to Extremist-Group Web Forum Messages, „Intelligent Systems, IEEE” 2005, nr 20, s. 67–75.
  • Aral S., Identifying Social Influence: A Comment on Opinion Leadership and Social Contagion in New Product Diffusion, „Marketing Science” 2011, nr 30, s. 1–7.
  • Aral S., Walker D., Identifying Influential and Susceptible Members of Social Networks, „Science” 2012, nr 337, s. 337–341.
  • Arquilla J., Ronfeldt D., Networks and Netwars, Santa Monica 2001, RAND.
  • Baksy E. i in., The role of social networks in information diffusion, Proceedings of the 21 International Conference on World Wide Web, New York 2012, s. 519–528.
  • Boyd D.M., Ellison N.B., Social network sites: Definition, history, and scholarship, „Journal of Computer-Mediated Communication” 2007, nr 13, s. 210–230.
  • Brzeski R., Wojna informacyjna – wojna nowej generacji, Komorów 2014, Antyk.
  • Carley K.M., Dynamic network analysis, w: Dynamic social network modeling and analysis: Workshop summary and papers, R. Brieger, K.M. Carley, P. Pattison (red.), Washington 2003, b.w., s. 133–145.
  • Chaurasia N. i in., A survey on terrorist network mining: Current trends and opportunities, „International Journal of Computer Science & Engineering Survey” 2012, nr 3, s. 59–66.
  • Chen H., Dark Web. Exploring and Data Mining the Dark Side of the Web, New York 2012, Springer.
  • Cheng J., Danescu-Niculescu-Mizil C., Leskovec J., Antisocial Behavior in Online Discussion Communities, arXiv:1504.00680, 2015.
  • Counterterrorism and Open Source Intelligence, U. Wiil (red.), seria: Lecture Notes in Social Networks, b.m.w. 2011.
  • Darczewska J., Anatomia rosyjskiej wojny informacyjnej. Operacja krymska – studium przypadku, seria: Punkt Widzenia, Warszawa 2014, Ośrodek Studiów Wschodnich.
  • Desmarais B.A., Cranmer S.J., Forecasting the locational dynamics of transnational terrorism: A network analytic approach, „Security Informatics” 2013, nr 2, s. 1–13.
  • Duggan P.M., Strategic Development of Special Warfare in Cyberspace, „Joint Force Quarterly” 2015, nr 4, s. 46–53.
  • Everton S.F., Disrupting dark networks, Cambridge 2012, Cambridge University.
  • Ghonim W., Revolution 2.0: The Power of the People Is Greater Than the People in Power: A Memoir, Boston–New York 2013, Mariner Books.
  • Gupta R., Brooks H., Using Social Media for Global Security, Indianapolis 2013, John WIley & Sons.
  • Guille A., Hacid H., Favre C., Zighed D.A., Information Diffusion in Online Social Networks: A Survey, „SIGMOD Record” 2013, nr 42, s. 17–28.
  • Franke U., War by non-military means. Understanding Russian information warfare, Stockholm 2015 (Report No FOI-R–4065–SE), Swedish Defence Research Agency.
  • Handbook of computational approaches to counterterrorism, V.S. Subrahmanian (red.), New York 2013, Springer.
  • Hughes A., Palen L., Twitter adoption and use in mass convergence and emergency events, „International Journal of Emergency Management” 2009, nr 6, s. 248–260.
  • Iyengar R., Bulte C. van den, Valente T.W., Opinion leadership and social contagion in new product diffusion, „Marketing Science” 2011, nr 2, s. 195–212.
  • Jackson B.A., Groups, networks, or movements: A command-and-control driven approach to classifying terrorist organizations and its application to Al Qaeda, „Studies in Conflict &Terrorism” 2006, nr 29, s. 241–262.
  • Jaitner M., Mattsson P.A., Russian Information Warfare of 2014, 7th International Conference on Cyber Conflict, NATO CCD COE Publications 2015, s. 29–52.
  • Kaplan A.M., Haenlein M., Users of the world, unite! The challenges and opportunities of social media, „Business Horizons” 2010, nr 53, s. 59–68.
  • Knoke D., Emerging Trends in Social Network Analysis of Terrorism and Counterterrorism, w: Emerging Trends in the Social and Behavioral Sciences, R. Scott, S. Kosslyn (red.), Hoboken 2015, John Wiley & Sons.
  • Koschade S., A social network analysis of Jemaah Islamiyah: The applications to counterterrorism and intelligence, „Studies in Conflict & Terrorism” 2006, nr 29, s. 559–575.
  • Krebs V., Mapping Networks of Terrorist Cells, „Connections” 2001, nr 24, s. 43–52.
  • Lindelauf R., Borm P., Hamers H., The influence of secrecy on the communication structure of covert networks, „Social Networks” 2009, nr 31, s. 126–137.
  • Lucas E., The Snowden Operation: Inside the West’s Greatest Intelligence Disaster, b.m.w. 2014, b.w.
  • Mahesh S., Mahesh T.R., Vinayababu M., Using data mining techniques for detecting terror-related activities on the Web, „Journal of Theoretical & Applied Information Technology” 2010, nr 16, 99–104.
  • Mapping terrorism research: State of the art, gaps and future direction, M. Ranstorp (red.), London 2007, Routledge.
  • Mathematical methods in counterterrorism, N. Memon i in. (red.), Wien–New York 2009, Springer.
  • Medina R.M., Social network analysis: A case study of the Islamist terrorist network, „Security Journal” 2014, nr 27, s. 97–121.
  • Morzy M., Analysis and Mining of Online Communities of Internet Forum Users, w: Data Mining: Foundations and Intelligent Paradigms, D.E. Holmes, L.C. Jain (red.), seria: Intelligent Systems Reference Library, t. 24, Berlin–Heidelberg 2012, Springer.
  • Mullins S., Special issue: Applying social network analysis to terrorism, „Behavioral Sciences of Terrorism & Political Aggression” 2013, nr 5, s. 67–175.
  • Pang B., Lee L., Opinion mining and sentiment analysis, „Journal Foundations and Trends in Information Retrieval” 2008, nr 2, s. 1–135.
  • Ressler S., Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research, „Homeland Security Affairs” 2006, t. 2.
  • Samadashvili S., Muzzling the bear: Strategic Defense for Russia’s Undeclared Information
  • War on Europe, Brussels 2015, Wilfried Martens Centre for European Studies.
  • Surma J., The Role of Individual Behavior and Social Influence in Customer Relation Management, w: Handbook of Research on Managing and Influencing Consumer Behavior, New York 2015, Springer, s. 385–396.
  • Wang F.Y. i in., Social computing: From social informatics to social intelligence, „Intelligent Systems, IEEE” 2007, nr 22, s. 79–83.
  • Wasserman S., Faust K., Social Network Analysis. Methods and Applications, Cambridge 1994, Cambridge University Press.
  • Zafarani R., Abbasi M.A., Liu H., Social Media Mining. An Introduction, Cambridge 2014, Cambridge University Press.

Document Type

Publication order reference

Identifiers

ISSN
2080-1335

YADDA identifier

bwmeta1.element.desklight-cfc304ec-540d-4edc-9db6-6513410874b9
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.