A technological perspective on detecting and countering online radicalization

Size: px
Start display at page:

Download "A technological perspective on detecting and countering online radicalization"

Transcription

1 A technological perspective on detecting and countering online radicalization Fredrik Johansson, Ph.D.

2 Online radicalization A process whereby individuals through their online interactions and exposures to various types of internet context, come to view violence as a legitimate method of solving social and political conflicts (Bermingham, 2009) Terrorist groups have recognized the power of Internet and social media for recruiting and radicalizing people. Successful at producing and spreading large amounts of terrorismrelated content online. Many opportunities for people to become radicalized and to confirm existing beliefs in social media-created echo chambers. Many anecdotal stories about people who become self-radicalized online, however, not as much empirical scientific evidence (yet).

3 Online violent extremism content This presentation will be focused on detection, analysis and potential removal of violent extremism-related online content. If violent extremism-related online content can be decreased, online radicalization is likely to decrease as well. If we do not know what kind of content and which narratives which are out there, counter-narratives are unlikely to succeed!

4 Evolution of online terrorism propaganda Earlier, terrorism propaganda was spread using recordings distributed slowly via copied video cassettes or dedicated terrorist forums (one-tomany). Today, high-quality productions are produced on a day-to-day basis and distributed and shared instantly via social media including YouTube, Twitter and Telegram (many-to-many).

5 Analysis of online terrorism propaganda A few recent studies in which researchers have tried to analyze various aspects of online terrorism propaganda, e.g. C. Winter (2015) Documenting the Virtual Caliphate C. Winter (2015) The Virtual Caliphate: Understanding Islamic State s Propaganda Strategy L. Gustafsson (2015) Våldsbejakande islamistisk extremism och sociala medier Manual classification of rather small data samples into various themes or narratives, such as (Winter, 2015): Utopia (~53%), military (~37%), mercy (<1%), victimhood (~7%), brutality (~2%), belonging (<1%) Interesting in their own right, but impossible to go through very large sets of data manually.

6 Large-scale analysis of online terrorism propaganda in Sweden The government commissions the Swedish Defence Research Agency (FOI) to make a quantitative survey and analysis of the violent extremist propaganda spread via the Internet and social media in Sweden. The survey will cover the violent extremist environments in Sweden: right-wing extremism, left-wing and Islamist extremism, and their international links. The Authority shall also carry out a qualitative analysis of this material as well as the content of texts and messages. (received , final report to be given in March 2019 ) Interdisciplinary research between computer scientists and domain experts (terrorism researchers, linguists, psychologists, etc.). Suggested research methodology recently approved by ethics board (EPN). Focus on content, not individuals! Collaboration with relevant Swedish organizations and authorities.

7 Large-scale analysis of online terrorism propaganda in Sweden Identification of relevant search terms, hashtags, seed accounts, etc. Automated collection of data via available APIs and custom-built crawlers Anonymizing data (e.g., aggregation and removal of PII) Semi-automatic filtering of non-supporter accounts in collected data Identification and separate treatment of bots and hijacked accounts Applying standard social media analysis metrics, such as: Top hashtags, top links, most central accounts, tweets/day, nr of followers, (location) Application of more sophisticated NLP and machine learning techniques for classifying the actual content

8 Identification of relevant search terms Important to carry out this task in cooperation with domain experts! Previously official accounts could be utilized as seed accounts. Now harder due to active suspensions of such accounts. Unofficial lists often utilized as seed accounts, e.g., "The Twitter Guide: The Most Important Jihadi Sites and Support for Jihad and the Mujahideen on Twitter (Fisher & Prucha, 2014) and (Ashcroft et al., 2015) Nowadays, keywords in combination with hashtags work better for Twitter. E.g.: #KhalifaRestored, #ISLAMICSTATE, #ILoveISIS #WhiteGenocide, #StopIslam

9 Identification of non-supporters When collecting followers of known extremism accounts, a problem is that many of the followers often are non-supporters, e.g., Journalists Researchers Intelligence analysts Removing accounts which have not explicitly used known extremismrelated hashtags can filter out most non-supporters, but manual inspection required. Data WILL be biased, erroneous and/or missing!

10 Identification of bots and hijacked accounts When spreading propaganda, it is common to use bot accounts and hijacked hashtags to reach out to a larger audience, and sometimes also hijacked accounts to seem more trustworthy. FOI have developed sophisticated methods for being able to detect bots and hijacked accounts. Dawn of Glad Tidings

11 Examples of (automated) analysis of the data Social network analysis (SNA) Which accounts are most highly connected, most influential, etc.? Topic detection and classification Which words and narratives are used in the propaganda? How much of the content is aimed at brutality, victimhood, utopia, etc.? Behaviour profiling According to Rowe & Saif (2016), people who become radicalized change their language extensively by adapting to a more extreme vocabulary. Can potentially be combined with other indicators to detect early stages of online radicalization? (sharing of violent movies, links, etc.) Geolocalization From which places or regions is the content distributed?

12 Effectiveness of removing online extremism content? Some companies are good at shutting down (some sorts of) violent extremism-related accounts and removing related content. Over 300,000 Twitter accounts shut down for promoting terrorism in According to a study by Berger (2016), other extremist groups such as white nationalists suffer only a low suspension pressure from Twitter. Europol s IRU and UK CTIRU attempting to remove terrorism content. Observed counter-strategy: utilize several social media platforms and multiple accounts Alternative narratives as a more viable approach for reducing the likelihood of online radicalization? Badly produced counter-narratives from authorities likely to fail Dialouge with other people with the same background more likely to work? Jigsaw s / Google s Redirect Method

13 Questions? Thank you for your attention!

Delegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol.

Delegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol. Council of the European Union Brussels, 16 March 2015 (OR. en) 7266/15 LIMITE JAI 178 COSI 32 ENFOPOL 66 CYBER 17 COTER 49 NOTE From: To: Subject: EUROPOL Standing Committee on operational cooperation

More information

Assessment of the terror threat to Denmark

Assessment of the terror threat to Denmark 28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks

More information

Assessment of the Terror Threat to Denmark

Assessment of the Terror Threat to Denmark 19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals

More information

First crawling of the Slovenian National web domain *.si: pitfalls, obstacles and challenges

First crawling of the Slovenian National web domain *.si: pitfalls, obstacles and challenges Submitted on: 1.7.2015 First crawling of the Slovenian National web domain *.si: pitfalls, obstacles and challenges Matjaž Kragelj Head, Digital Library Development Department and Head, Information Technology

More information

Web and Social Media Analytics

Web and Social Media Analytics Web and Social Media Analytics Course Description This workshop aims at giving the participants a practical background about Web and Social Media analytics. The workshop introduces Key Performance Indicators

More information

Higher Education in Further Education Webinar

Higher Education in Further Education Webinar Higher Education in Further Education Webinar Contents 1. Introduction 2. Make an HE Recruitment Calendar 3. Advertise across multiple platforms 4. Understand your digital audience 5. Engage students with

More information

Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups

Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups Forum: Issue: Student Officer: Position: Special Conference The Exploitation Of Media By Terrorist Groups Deniz Gokce Co-Chair Introduction Terrorist groups have been using social media to reach a wider

More information

Prevent Preempt Protect

Prevent Preempt Protect Prevent Preempt Protect The Swedish counter-terrorism strategy Government Communication 2014/15:146 Government Communication 2014/15:146 Prevent, preempt and protect the Swedish counter-terrorism strategy

More information

Minor Interpellation tabled by Bundestag Member Andrej Hunko and others and The Left parliamentary group.

Minor Interpellation tabled by Bundestag Member Andrej Hunko and others and The Left parliamentary group. Development of the German Federal Criminal Police Office Check the Web project, which was originally launched to monitor the Internet, into a referral unit for unpleasant content Minor Interpellation tabled

More information

Outsmarting digital opponents. Using public safety technology to confront online threats to national security

Outsmarting digital opponents. Using public safety technology to confront online threats to national security Outsmarting digital opponents Using public safety technology to confront online threats to national security Outsmarting digital opponents 3 Digital technologies have changed everything. Governments,

More information

How do we know what we know?

How do we know what we know? Research Methods Family in the News Can you identify some main debates (controversies) for your topic? Do you think the authors positions in these debates (i.e., their values) affect their presentation

More information

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in

CTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in 1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies

More information

Text Mining - Scope and Applications

Text Mining - Scope and Applications Journal of Computer Science and Applications. ISSN 2231-1270 Volume 5, Number 2 (2013), pp. 51-55 International Research Publication House http://www.irphouse.com Text Mining - Scope and Applications Miss

More information

Big Data and Society: The Use of Big Data in the ATHENA project

Big Data and Society: The Use of Big Data in the ATHENA project Big Data and Society: The Use of Big Data in the ATHENA project Professor David Waddington CENTRIC Lead on Ethics, Media and Public Disorder d.p.waddington@shu.ac.uk Helen Gibson CENTRIC Researcher h.gibson@shu.ac.uk

More information

THE POWER OF INFLUENCE TAKING THE LUCK OUT OF WORD OF MOUTH

THE POWER OF INFLUENCE TAKING THE LUCK OUT OF WORD OF MOUTH THE POWER OF INFLUENCE INTRODUCTION Word-of-mouth marketing has always been a powerful driver of consumer behavior. Every experienced marketer knows that customers are more likely to base purchasing decisions

More information

TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5

TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5 January 2015 TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5 Introduction On January 7, 2015 France endured a three day terror attack. In the aftermath, two separate parties

More information

Take Advantage of Social Media. Monitoring. www.intelligencepathways.com

Take Advantage of Social Media. Monitoring. www.intelligencepathways.com Take Advantage of Social Media Monitoring WHY PERFORM COMPETITIVE ANALYSIS ON SOCIAL MEDIA? Analysis of social media is an important part of a competitor overview analysis, no matter if you have just started

More information

Certified Digital Marketing Professional VS-1217

Certified Digital Marketing Professional VS-1217 Certified Digital Marketing Professional VS-1217 Certified Digital Marketing Professional Certified Digital Marketing Professional Certification Code VS-1217 Vskills certification for Digital Marketing

More information

The Six Critical Considerations of Social Media Threat Intelligence

The Six Critical Considerations of Social Media Threat Intelligence The Six Critical Considerations of Social Media Threat Intelligence Every day, angry rhetoric and hints of potential danger flow though streams of social media data. Some of these threats may affect your

More information

Meeting Summary. Key themes that emerged during the seminar include:

Meeting Summary. Key themes that emerged during the seminar include: Countering Violent Extremism (CVE) Working Group CVE through Communications Work Stream Practical Seminar on Monitoring and Evaluation Techniques for CVE Communication Programs 10-11 February 2013 Abu

More information

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015 Law Enforcement Assessment of the Violent Extremism Threat Charles Kurzman and David Schanzer June 25, 2015 About the Authors Charles Kurzman is a professor of sociology at the University of North Carolina

More information

Lead Generation Domain Auction Inventory hosted by Above.com

Lead Generation Domain Auction Inventory hosted by Above.com Improving Lead Generation with Keyword Loaded Domain Names Domain names impact website ranking Domain names impact perceptions and trustworthiness Domain names are memorable and brandable QUALITY DOMAIN

More information

ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE. Page 1 of 34 www.experttraining.in Youtube.com/ViralJadhav viral@experttraining.

ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE. Page 1 of 34 www.experttraining.in Youtube.com/ViralJadhav viral@experttraining. ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE Page 1 of 34 www.experttraining.in Youtube.com/ViralJadhav viral@experttraining.in +91 9558821174 Who Can Join? Business Owners who want to attract more

More information

Tuition, Medical and Behaviour Support Service. Preventing Extremism and Radicalisation Policy. October 2015

Tuition, Medical and Behaviour Support Service. Preventing Extremism and Radicalisation Policy. October 2015 Tuition, Medical and Behaviour Support Service Preventing Extremism and Radicalisation Policy October 2015 Introduction This Preventing Extremism and Radicalisation Policy is part of our commitment to

More information

Bridging CAQDAS with text mining: Text analyst s toolbox for Big Data: Science in the Media Project

Bridging CAQDAS with text mining: Text analyst s toolbox for Big Data: Science in the Media Project Bridging CAQDAS with text mining: Text analyst s toolbox for Big Data: Science in the Media Project Ahmet Suerdem Istanbul Bilgi University; LSE Methodology Dept. Science in the media project is funded

More information

Your Social Media Starter Kit For Content Marketing

Your Social Media Starter Kit For Content Marketing Your Social Media Starter Kit For Content Marketing L et s assume you ve created a white paper or some other form of content. Doing so involves research, writing, editing, rewriting and design. The cost

More information

For More Information

For More Information CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION The RAND Corporation is a nonprofit institution that helps improve policy and

More information

AT A HEARING ENTITLED THREATS TO THE HOMELAND

AT A HEARING ENTITLED THREATS TO THE HOMELAND STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND

More information

Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance

Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance This article was written by Thiagarajan Natarajan, Senior Underwriter Specialty Lines

More information

Constructing Your Social Marketing Architecture

Constructing Your Social Marketing Architecture Constructing Your Social Marketing Architecture How to Build A Bridge Between Social Marketing Strategies and Social Media Platforms Follow Conversation on Twitter #SherpaROAD Constructing Your Social

More information

Top 4 Ways Social Media is Helping to Reshape Marketing

Top 4 Ways Social Media is Helping to Reshape Marketing Top 4 Ways Social Media is Helping to Reshape Marketing How implementing social media into your business strategy can position your brand for the better Inside, you ll find information on: The ever-changing

More information

Social Media Implementations

Social Media Implementations SEM Experience Analytics Social Media Implementations SEM Experience Analytics delivers real sentiment, meaning and trends within social media for many of the world s leading consumer brand companies.

More information

Discovering Hidden Networks in On-line Social Networks

Discovering Hidden Networks in On-line Social Networks I.J. Intelligent Systems and Applications, 2014, 05, 44-54 Published Online April 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2014.05.04 Discovering Hidden Networks in On-line Social Networks

More information

American Foreign Fighters: Implications for Homeland Security. Final Report. 31 August 2015. Prepared for the Department of Homeland Security

American Foreign Fighters: Implications for Homeland Security. Final Report. 31 August 2015. Prepared for the Department of Homeland Security American Foreign Fighters: Implications for Homeland Security Final Report 31 August 2015 Prepared for the Department of Homeland Security HOMELAND SECURITY STUDIES AND ANALYSIS INSTITUTE The Homeland

More information

OPEN SOURCE INTELLIGENCE SEMINAR SERIES. Transforming Your Research and Analytic Skills

OPEN SOURCE INTELLIGENCE SEMINAR SERIES. Transforming Your Research and Analytic Skills OPEN SOURCE INTELLIGENCE SEMINAR SERIES Transforming Your Research and Analytic Skills Winter 2015 Contents A 21st Century Skillset 3 Course Dates 5 Course Fees 5 Open Source Intelligence 6 Advanced OSINT

More information

LIMITE EN. Background

LIMITE EN. Background Background Following the Paris shooting on 7 January 2015, there have been a number of developments that have recently led to the creation of the European Counter-Terrorism Centre (ECTC) and the Internet

More information

RESEARCH OPPORTUNITY PROGRAM 299Y PROJECT DESCRIPTIONS 2015 2016 SUMMER

RESEARCH OPPORTUNITY PROGRAM 299Y PROJECT DESCRIPTIONS 2015 2016 SUMMER Project Code: CSC 1S Professor Ronald M. Baecker & Assistant Lab Director Carrie Demmans Epp Computer Science TITLE OF RESEARCH PROJECT: Exploring Language Use in Computer Science Discussion Forums NUMBER

More information

Business Process Services. White Paper. Social Media Influence: Looking Beyond Activities and Followers

Business Process Services. White Paper. Social Media Influence: Looking Beyond Activities and Followers Business Process Services White Paper Social Media Influence: Looking Beyond Activities and Followers About the Author Vandita Bansal Vandita Bansal is a subject matter expert in Analytics and Insights

More information

What to do Post Google Panda

What to do Post Google Panda What to do Post Google Panda 1 Google Panda Update Panda, also known as Farmer, was an algorithm update from Google that first appeared in February 2011. This update restructured many search results and

More information

Social media Content Coordinator (online marketing manager)

Social media Content Coordinator (online marketing manager) Social media Content Coordinator (online marketing manager) We serve private, non profits and governmental agencies. We are seeking to grow our digital media department as well as the company s digital

More information

Doctoral Research Scientific Report

Doctoral Research Scientific Report Invest in people! EUROPEAN SOCIAL FUND Sectorial Operational Programme for Human Resource Development 2007-2013 Priority Axis nr. 1 Education and professional development in pursuit of economic growth

More information

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations

More information

EXPO MILANO 2015 CALL Best Sustainable Development Practices for Food Security

EXPO MILANO 2015 CALL Best Sustainable Development Practices for Food Security EXPO MILANO 2015 CALL Best Sustainable Development Practices for Food Security Offline Application form Storytelling is a simple, immediate and effective way to share experiences, concepts and ethical

More information

Revised Prevent Duty Guidance:

Revised Prevent Duty Guidance: Prevent Duty Guidance: for Scotland 1 HM Government Revised Prevent Duty Guidance: for Scotland Guidance for specified Scottish authorities on the duty in the Counter-Terrorism and Security Act 2015 to

More information

Considerations on Audience Measurement Procedures for Digital Signage Service

Considerations on Audience Measurement Procedures for Digital Signage Service Considerations on Audience Measurement Procedures for Digital Signage Service Wook Hyun, MiYoung Huh, SeungHei Kim and ShinGak Kang Electronics and Telecommunications Research Institute Daejeon, Republic

More information

The Financial Services Industry

The Financial Services Industry The Financial Services Industry AN INTRODUCTION TO SOCIAL MEDIA The Challenge The Financial Services industry is one of the most established and complex around. Many of its key processes and systems have

More information

PERSONAL BRANDING. Natalia Untung 0142626. BARBRA Sundquist IMG 220

PERSONAL BRANDING. Natalia Untung 0142626. BARBRA Sundquist IMG 220 PERSONAL BRANDING Natalia Untung 0142626 BARBRA Sundquist IMG 220 This report documents the steps I have taken to develop my professional online reputation, as well as my plan for further strengthening

More information

Running head: AL-QAEDA S MEDIA STRATEGY 1. Al-Qaeda s media strategy: Internet self-radicalization and counter-radicalization policies

Running head: AL-QAEDA S MEDIA STRATEGY 1. Al-Qaeda s media strategy: Internet self-radicalization and counter-radicalization policies Running head: AL-QAEDA S MEDIA STRATEGY 1 Al-Qaeda s media strategy: Internet self-radicalization and counter-radicalization policies Rebecca L. Earnhardt Virginia Commonwealth University AL-QAEDA S MEDIA

More information

Search Engine Optimization (SEO)

Search Engine Optimization (SEO) Search Engine Optimization (SEO) Saurabh Chavan, Apoorva Chitre, Husain Bhala Abstract Search engine optimization is often about making small modifications to parts of your website. When viewed individually,

More information

Interpreting Web Analytics Data

Interpreting Web Analytics Data Interpreting Web Analytics Data Whitepaper 8650 Commerce Park Place, Suite G Indianapolis, Indiana 46268 (317) 875-0910 info@pentera.com www.pentera.com Interpreting Web Analytics Data At some point in

More information

influence influential interest issue key

influence influential interest issue key Finding influence: uncovering the brand conversations that matter in the new media world analytics blogs brand business comments community company conversations corporate discussed example firms forums

More information

SB-Plan: Simulation-based support for resource allocation and mission planning

SB-Plan: Simulation-based support for resource allocation and mission planning SB-Plan: Simulation-based support for resource allocation and mission planning Pontus Svenson, FOI Ledningssystem ponsve@foi.se Christian Mårtenson, FOI Ledningssystem cmart@foi.se 0. Abstract In future

More information

Running surveys and consultations

Running surveys and consultations Running surveys and consultations Susannah Wintersgill, Public Affairs Annette Cunningham & Rob Markham, Estates Tuesday 9 June 2015 Contents Five key stages of planning a survey Questionnaire design:

More information

USING SOCIAL MEDIA TO COMMUNICATE AGAINST VIOLENT EXTREMISM

USING SOCIAL MEDIA TO COMMUNICATE AGAINST VIOLENT EXTREMISM USING SOCIAL MEDIA TO COMMUNICATE AGAINST VIOLENT EXTREMISM 2 Introduction The online environment plays a crucial role in enabling people to express their views freely on globally-connected platforms.

More information

Digital Marketing Workshop

Digital Marketing Workshop Digital Marketing Workshop 2 Global Digital Advt. spend to be $278Bn in 2019 Business Wire Online Marketing to create 1.5 lakh jobs in India Economic Times Online Marketing Managers are paid 82% more Indeed

More information

Competitive intelligence: History, importance, objectives, process and issues

Competitive intelligence: History, importance, objectives, process and issues Competitive intelligence: History, importance, objectives, process and issues Dhekra BEN SASSI Anissa FRINI Wahiba BEN ABDESLAM May 13-15 2015, Athens, Greece Introduction State of the art Critical Issues

More information

April 9 10, 2015 Twentieth Century Club

April 9 10, 2015 Twentieth Century Club Countering Violent Extremism in the United States and the European Union April 9 10, 2015 Twentieth Century Club Registration is required. To register please visit: tinyurl.com/kxteapk All sessions will

More information

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired

More information

NON-PROBABILITY SAMPLING TECHNIQUES

NON-PROBABILITY SAMPLING TECHNIQUES NON-PROBABILITY SAMPLING TECHNIQUES PRESENTED BY Name: WINNIE MUGERA Reg No: L50/62004/2013 RESEARCH METHODS LDP 603 UNIVERSITY OF NAIROBI Date: APRIL 2013 SAMPLING Sampling is the use of a subset of the

More information

Re. Request for feedback on Assurance on <IR> Introduction & Exploration of Issues

Re. Request for feedback on Assurance on <IR> Introduction & Exploration of Issues Chartered Professional Accountants of Canada 277 Wellington Street West Toronto ON CANADA M5V 3H2 T. 416 977.3222 F. 416 977.8585 www.cpacanada.ca Comptables professionnels agréés du Canada 277, rue Wellington

More information

Sentiment Analysis and Time Series with Twitter Introduction

Sentiment Analysis and Time Series with Twitter Introduction Sentiment Analysis and Time Series with Twitter Mike Thelwall, School of Technology, University of Wolverhampton, Wulfruna Street, Wolverhampton WV1 1LY, UK. E-mail: m.thelwall@wlv.ac.uk. Tel: +44 1902

More information

Chapter 6. Attracting Buyers with Search, Semantic, and Recommendation Technology

Chapter 6. Attracting Buyers with Search, Semantic, and Recommendation Technology Attracting Buyers with Search, Semantic, and Recommendation Technology Learning Objectives Using Search Technology for Business Success Organic Search and Search Engine Optimization Recommendation Engines

More information

CREDIT TRANSFER: GUIDELINES FOR STUDENT TRANSFER AND ARTICULATION AMONG MISSOURI COLLEGES AND UNIVERSITIES

CREDIT TRANSFER: GUIDELINES FOR STUDENT TRANSFER AND ARTICULATION AMONG MISSOURI COLLEGES AND UNIVERSITIES CREDIT TRANSFER: GUIDELINES FOR STUDENT TRANSFER AND ARTICULATION AMONG MISSOURI COLLEGES AND UNIVERSITIES With Revisions as Proposed by the General Education Steering Committee [Extracts] A. RATIONALE

More information

CHOOSE THE RIGHT ONE!

CHOOSE THE RIGHT ONE! The social intelligence company CHOOSE THE RIGHT ONE! GROUPING SOCIAL MEDIA MONITORING TOOLS Whitepaper The social intelligence company BRIEF Monitoring social media! Do I need this? How do I get started?

More information

Our Data & Methodology. Understanding the Digital World by Turning Data into Insights

Our Data & Methodology. Understanding the Digital World by Turning Data into Insights Our Data & Methodology Understanding the Digital World by Turning Data into Insights Understanding Today s Digital World SimilarWeb provides data and insights to help businesses make better decisions,

More information

PSYCHOLOGY COURSES THAT COUNT

PSYCHOLOGY COURSES THAT COUNT PSYCHOLOGY COURSES THAT COUNT Department of Psychology Why study Psychology at Sunderland? Psychology courses at Sunderland will equip you with all the knowledge and skills you need to pursue a career

More information

DIGITAL MARKETING. The Page Title Meta Descriptions & Meta Keywords

DIGITAL MARKETING. The Page Title Meta Descriptions & Meta Keywords DIGITAL MARKETING Digital Marketing Basics Basics of advertising What is Digital Media? Digital Media Vs. Traditional Media Benefits of Digital marketing Latest Digital marketing trends Digital media marketing

More information

Programme title Master s Programme in Politics and War. Programme title in Swedish Magisterprogrammet i politik och krig

Programme title Master s Programme in Politics and War. Programme title in Swedish Magisterprogrammet i politik och krig Programme syllabus 1 (6) Programme title Master s Programme in Politics and War Programme title in Swedish Magisterprogrammet i politik och krig Higher education credits: 60 Credits Programme code: 2PK15

More information

COUNCIL OF THE EUROPEAN UNION. Brussels, 13 February 2002 (19.02) (OR. es) 5712/1/02 REV 1 ENFOPOL 18

COUNCIL OF THE EUROPEAN UNION. Brussels, 13 February 2002 (19.02) (OR. es) 5712/1/02 REV 1 ENFOPOL 18 COUNCIL OF THE EUROPEAN UNION Brussels, 13 February 2002 (19.02) (OR. es) 5712/1/02 REV 1 FOPOL 18 NOTE from: Chair of the Working Party on Terrorism to: Working Party on Terrorism No. prev. doc.: 5712/02

More information

Certification In SAS Programming. Introduction to SAS Program

Certification In SAS Programming. Introduction to SAS Program Certification In SAS Programming Introduction to SAS Program What Lies Ahead In this session, you will gain answers to: Overview of Analytics Careers in Analytics Why Use SAS? Introduction to SAS System

More information

FOCUS Workshop on Security Research - Drivers, research and outcome. hans.frennberg@foi.se

FOCUS Workshop on Security Research - Drivers, research and outcome. hans.frennberg@foi.se FOCUS Workshop on Security Research - Drivers, research and outcome hans.frennberg@foi.se Workshop - objectives Provide forum for representatives from Swedish security research initiatives to meet and

More information

Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en)

Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en) Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en) DS 1035/15 LIMITE MEETING DOCUMENT From: EU Counter-Terrorism Coordinator To: Delegations Subject: EU CTC input for

More information

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. 23 Grafton Street London W1S 4EY UK Main Tel: +44 (0) 207 887 2699 ABOUT PGI PGI is a privately owned UK business offering integrated, intelligence-led

More information

Group for Programming & Software Engineering (PSE ), master thesis

Group for Programming & Software Engineering (PSE ), master thesis Group for Programming & Software Engineering (PSE ), master thesis 22 th September 2015 23.09.2015 1 PSE, at the core of computer science OO Programming and programming languages Making new programming

More information

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism

Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Introduction Countering violent extremism (CVE) initiatives tackle conditions conducive to radicalization

More information

TDPA: Trend Detection and Predictive Analytics

TDPA: Trend Detection and Predictive Analytics TDPA: Trend Detection and Predictive Analytics M. Sakthi ganesh 1, CH.Pradeep Reddy 2, N.Manikandan 3, DR.P.Venkata krishna 4 1. Assistant Professor, School of Information Technology & Engineering (SITE),

More information

CPA Perfomance Trends on the Google Display Network

CPA Perfomance Trends on the Google Display Network CPA Perfomance Trends on the Google Display Network Google Display Network White Paper CPA Performance Trends on the Google Display Network About the Google Display Network The Google Display Network offers

More information

Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White

Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White Principles of Good Research & Research Proposal Guidee Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White March 2006 Principles of Good Research All research is different

More information

Title: Social TV: online discursive practices and political engagement

Title: Social TV: online discursive practices and political engagement Title: Social TV: online discursive practices and political engagement Bio: Donatella Selva, PhD in Media Studies at University of Urbino, Italy. She is working since 2009 at the Centre for Media and Communication

More information

The website will be developed in English and Arabic

The website will be developed in English and Arabic A. SCOPE 1. Main a) Design Your Website needs a unique and interactive design to fit with the theme of your company. The latest techniques in Website development will be used in order to measure up with

More information

Criminal Justice Evaluation Framework (CJEF): Conducting effective outcome evaluations

Criminal Justice Evaluation Framework (CJEF): Conducting effective outcome evaluations Criminal Justice Research Department of Premier and Cabinet Criminal Justice Evaluation Framework (CJEF): Conducting effective outcome evaluations THE CRIMINAL JUSTICE EVALUATION FRAMEWORK (CJEF) The Criminal

More information

Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS

Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS This resource provides a sampling of tools available to produce social media metrics. The list

More information

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>

IC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com> IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration

More information

Drive Interactivity and Engagement in Your Webinars

Drive Interactivity and Engagement in Your Webinars FROM PRESENTATION TO CONVERSATION Drive Interactivity and Engagement in Your Webinars 1 AUDIENCE ENGAGEMENT IS ESSENTIAL Webinars have become a top-tier marketing tool, with an ever-growing number of companies

More information

First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing

First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing Overview First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing 14-15 May 2014 Marrakech, Morocco Summary Hosted by

More information

Tasks in the annual HSI Research Plan. This report presents the results of research and analysis conducted under. Tool to Reach Out to Youth

Tasks in the annual HSI Research Plan. This report presents the results of research and analysis conducted under. Tool to Reach Out to Youth Homeland Security Institute The Homeland Security Institute (HSI) is a federally funded research and development center (FFRDC) established by the Secretary of Homeland Security under Section 312 of the

More information

Text Analytics for Competitive Analysis and Market Intelligence Aiaioo Labs - 2011

Text Analytics for Competitive Analysis and Market Intelligence Aiaioo Labs - 2011 Text Analytics for Competitive Analysis and Market Intelligence Aiaioo Labs - 2011 Bangalore, India Title Text Analytics Introduction Entity Person Comparative Analysis Entity or Event Text Analytics Text

More information

The Purpose of PR 2016

The Purpose of PR 2016 The Purpose of PR 2016 Research Report Contents Introduction Key findings Purpose of PR Tactics Budget Social media, SEO Media Relevance and importance of PR INTRODUCTION FROM XANTHE VAUGHAN WILLIAMS PR

More information

Title/Description/Keywords & Various Other Meta Tags Development

Title/Description/Keywords & Various Other Meta Tags Development Module 1 - Introduction Introduction to Internet Brief about World Wide Web and Digital Marketing Basic Description SEM, SEO, SEA, SMM, SMO, SMA, PPC, Affiliate Marketing, Email Marketing, referral marketing,

More information

Evaluation: Designs and Approaches

Evaluation: Designs and Approaches Evaluation: Designs and Approaches Publication Year: 2004 The choice of a design for an outcome evaluation is often influenced by the need to compromise between cost and certainty. Generally, the more

More information

Mobile SEO in 2015 Get ready for the April algorithm update

Mobile SEO in 2015 Get ready for the April algorithm update Mobile SEO in 2015 Get ready for the April algorithm update Mobile SEO in 2015 April Algorithm Update Mobile has provided Google a number of challenges This includes the quality of search results on mobile

More information

ehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke

ehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke ehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke Health systems around the world clearly recognise the potential of digital health;

More information

Europol Public Information VACANCY NOTICE

Europol Public Information VACANCY NOTICE The Hague, 3 February 2016 File nº: Europol/2016/TA/AD9/237 VACANCY NOTICE Name of the post: Reporting to: Business Manager IRU - EU Internet Referral Unit - within the Operations Department (OD) AD9 Head

More information

Mandeep K. Dhami, PhD

Mandeep K. Dhami, PhD Mandeep K. Dhami, PhD Reader in Forensic Psychology Director, Postgraduate Programme in Forensic Psychology School of Psychology University of Surrey School of Psychology Over 50 academics and postdoctoral

More information

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages

LASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,

More information

CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION

CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION Bulgarian Journal of Science and Education Policy (BJSEP), Volume 7, Number 1, 2013 CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION Khayrazad Kari JABBOUR Lebanese University, LEBANON Abstract. The

More information

Professional Diploma in Digital Marketing

Professional Diploma in Digital Marketing Professional Diploma in Digital Marketing Agenda Day 1: Day 2: Day 3: Day 4: Day 5: to Digital Marketing Search Engine Optimisation Search Engine Marketing Email Marketing Digital Display Advertising Mobile

More information

HIGH SCHOOL MASS MEDIA AND MEDIA LITERACY STANDARDS

HIGH SCHOOL MASS MEDIA AND MEDIA LITERACY STANDARDS Guidelines for Syllabus Development of Mass Media Course (1084) DRAFT 1 of 7 HIGH SCHOOL MASS MEDIA AND MEDIA LITERACY STANDARDS Students study the importance of mass media as pervasive in modern life

More information

SMaPP Lab Data Report: The Islamic State s Battle for the Global Twittersphere

SMaPP Lab Data Report: The Islamic State s Battle for the Global Twittersphere SMaPP Lab Data Report: The Islamic State s Battle for the Global Twittersphere Social Media and Political Participation Lab, New York University 1 Preliminary Results, July 27, 2015 While many jihadist

More information