Table of Contents
Part I: Understanding the Influence of Social Media Globally
Chapter 1: Understanding Social Media's Impact on Global Security
Organizing Revolutions and Riots
Recruiting Terrorists and Encouraging Attacks
Glorifying and Promoting Gang Culture and Violence
Acknowledging Social Media's Impact
Chapter 2: Understanding Global Social Media Use
Grasping Social Media's Popularity and Appeal
Part II: Analyzing Social Media Data to Solve Security Problems
Chapter 3: Introduction to Social Media Analytics
Chapter 4: Collecting and Managing Social Media Data
Understanding Social Media Data
Chapter 5: Mapping and Analyzing Social Networks
First Example–Identify Influencers
Third Example–Determine Top Memes
Chapter 6: Understanding and Forecasting Events
Introduction to Analyzing Events
Conducting Language and Sentiment Analysis
Correlation and Regression Analysis
Part III: Crowdsourcing Intelligence, Solutions, and Influence
Chapter 7: Introduction to Crowdsourcing
Relevant Examples of Crowdsourcing
Chapter 8: Building and Running Crowdsourcing Platforms
Analyze the Target Audience and Media Environment
Measure the Platform's Performance
Chapter 9: Crowdsourcing Intelligence
Understanding the Scope of Crowdsourced Intelligence
Appreciating the Limits of Crowdsourcing Intelligence
Tweaking the Process for Intelligence Collection Platforms
Collect Intelligence from Hard-to-Reach Areas through SMS
Collect Intelligence from the Community for Law Enforcement
Collect Intelligence to Bolster Disaster Relief
Chapter 10: Crowdsourcing Solutions
Understanding the Scope of Crowdsourced Solutions
Appreciating the Limits of Crowdsourcing Solutions
Tweaking the Process for Solution Platforms
Crowdsourcing Translations during Disaster Relief
Crowdsource Tools to Identify Antagonistic Actors in Video Feeds
Chapter 11: Influencing Crowds
Understanding the Scope of Influencing through Crowdsourcing
Appreciating the Limits of Influencing Crowds
Tweaking the Process for Influence Platforms
Influencing to Collect Intelligence on Corrupt Officials
Part IV: Broadening Your Horizon
Chapter 12: Advanced and Emerging Analytical Methodologies
Expanding the Scope of Analysis
Chapter 13: Delivering Services through Crowdsourcing
Chapter 14: Protecting Privacy and Yourself
Considering Privacy and Free Speech
Protecting Your Identity and Speech