A technological perspective on detecting and countering online radicalization
|
|
- Gwenda Blair
- 7 years ago
- Views:
Transcription
1 A technological perspective on detecting and countering online radicalization Fredrik Johansson, Ph.D.
2 Online radicalization A process whereby individuals through their online interactions and exposures to various types of internet context, come to view violence as a legitimate method of solving social and political conflicts (Bermingham, 2009) Terrorist groups have recognized the power of Internet and social media for recruiting and radicalizing people. Successful at producing and spreading large amounts of terrorismrelated content online. Many opportunities for people to become radicalized and to confirm existing beliefs in social media-created echo chambers. Many anecdotal stories about people who become self-radicalized online, however, not as much empirical scientific evidence (yet).
3 Online violent extremism content This presentation will be focused on detection, analysis and potential removal of violent extremism-related online content. If violent extremism-related online content can be decreased, online radicalization is likely to decrease as well. If we do not know what kind of content and which narratives which are out there, counter-narratives are unlikely to succeed!
4 Evolution of online terrorism propaganda Earlier, terrorism propaganda was spread using recordings distributed slowly via copied video cassettes or dedicated terrorist forums (one-tomany). Today, high-quality productions are produced on a day-to-day basis and distributed and shared instantly via social media including YouTube, Twitter and Telegram (many-to-many).
5 Analysis of online terrorism propaganda A few recent studies in which researchers have tried to analyze various aspects of online terrorism propaganda, e.g. C. Winter (2015) Documenting the Virtual Caliphate C. Winter (2015) The Virtual Caliphate: Understanding Islamic State s Propaganda Strategy L. Gustafsson (2015) Våldsbejakande islamistisk extremism och sociala medier Manual classification of rather small data samples into various themes or narratives, such as (Winter, 2015): Utopia (~53%), military (~37%), mercy (<1%), victimhood (~7%), brutality (~2%), belonging (<1%) Interesting in their own right, but impossible to go through very large sets of data manually.
6 Large-scale analysis of online terrorism propaganda in Sweden The government commissions the Swedish Defence Research Agency (FOI) to make a quantitative survey and analysis of the violent extremist propaganda spread via the Internet and social media in Sweden. The survey will cover the violent extremist environments in Sweden: right-wing extremism, left-wing and Islamist extremism, and their international links. The Authority shall also carry out a qualitative analysis of this material as well as the content of texts and messages. (received , final report to be given in March 2019 ) Interdisciplinary research between computer scientists and domain experts (terrorism researchers, linguists, psychologists, etc.). Suggested research methodology recently approved by ethics board (EPN). Focus on content, not individuals! Collaboration with relevant Swedish organizations and authorities.
7 Large-scale analysis of online terrorism propaganda in Sweden Identification of relevant search terms, hashtags, seed accounts, etc. Automated collection of data via available APIs and custom-built crawlers Anonymizing data (e.g., aggregation and removal of PII) Semi-automatic filtering of non-supporter accounts in collected data Identification and separate treatment of bots and hijacked accounts Applying standard social media analysis metrics, such as: Top hashtags, top links, most central accounts, tweets/day, nr of followers, (location) Application of more sophisticated NLP and machine learning techniques for classifying the actual content
8 Identification of relevant search terms Important to carry out this task in cooperation with domain experts! Previously official accounts could be utilized as seed accounts. Now harder due to active suspensions of such accounts. Unofficial lists often utilized as seed accounts, e.g., "The Twitter Guide: The Most Important Jihadi Sites and Support for Jihad and the Mujahideen on Twitter (Fisher & Prucha, 2014) and (Ashcroft et al., 2015) Nowadays, keywords in combination with hashtags work better for Twitter. E.g.: #KhalifaRestored, #ISLAMICSTATE, #ILoveISIS #WhiteGenocide, #StopIslam
9 Identification of non-supporters When collecting followers of known extremism accounts, a problem is that many of the followers often are non-supporters, e.g., Journalists Researchers Intelligence analysts Removing accounts which have not explicitly used known extremismrelated hashtags can filter out most non-supporters, but manual inspection required. Data WILL be biased, erroneous and/or missing!
10 Identification of bots and hijacked accounts When spreading propaganda, it is common to use bot accounts and hijacked hashtags to reach out to a larger audience, and sometimes also hijacked accounts to seem more trustworthy. FOI have developed sophisticated methods for being able to detect bots and hijacked accounts. Dawn of Glad Tidings
11 Examples of (automated) analysis of the data Social network analysis (SNA) Which accounts are most highly connected, most influential, etc.? Topic detection and classification Which words and narratives are used in the propaganda? How much of the content is aimed at brutality, victimhood, utopia, etc.? Behaviour profiling According to Rowe & Saif (2016), people who become radicalized change their language extensively by adapting to a more extreme vocabulary. Can potentially be combined with other indicators to detect early stages of online radicalization? (sharing of violent movies, links, etc.) Geolocalization From which places or regions is the content distributed?
12 Effectiveness of removing online extremism content? Some companies are good at shutting down (some sorts of) violent extremism-related accounts and removing related content. Over 300,000 Twitter accounts shut down for promoting terrorism in According to a study by Berger (2016), other extremist groups such as white nationalists suffer only a low suspension pressure from Twitter. Europol s IRU and UK CTIRU attempting to remove terrorism content. Observed counter-strategy: utilize several social media platforms and multiple accounts Alternative narratives as a more viable approach for reducing the likelihood of online radicalization? Badly produced counter-narratives from authorities likely to fail Dialouge with other people with the same background more likely to work? Jigsaw s / Google s Redirect Method
13 Questions? Thank you for your attention!
Delegations will find in Annex a concept note on the creation of a EU Internet Referral Unit at Europol.
Council of the European Union Brussels, 16 March 2015 (OR. en) 7266/15 LIMITE JAI 178 COSI 32 ENFOPOL 66 CYBER 17 COTER 49 NOTE From: To: Subject: EUROPOL Standing Committee on operational cooperation
More informationAssessment of the terror threat to Denmark
28 April 2016 Assessment of the terror threat to Denmark Summary The terror threat to Denmark remains significant. This means that there are individuals with intent and capacity to commit terrorist attacks
More informationAssessment of the Terror Threat to Denmark
19 March 2015 Assessment of the Terror Threat to Denmark Summary The terrorist attacks in Copenhagen on 14 and 15 February 2015 confirm that the terror threat to Denmark is significant. There are individuals
More informationFirst crawling of the Slovenian National web domain *.si: pitfalls, obstacles and challenges
Submitted on: 1.7.2015 First crawling of the Slovenian National web domain *.si: pitfalls, obstacles and challenges Matjaž Kragelj Head, Digital Library Development Department and Head, Information Technology
More informationWeb and Social Media Analytics
Web and Social Media Analytics Course Description This workshop aims at giving the participants a practical background about Web and Social Media analytics. The workshop introduces Key Performance Indicators
More informationHigher Education in Further Education Webinar
Higher Education in Further Education Webinar Contents 1. Introduction 2. Make an HE Recruitment Calendar 3. Advertise across multiple platforms 4. Understand your digital audience 5. Engage students with
More informationIntroduction. Special Conference. The Exploitation Of Media By Terrorist Groups
Forum: Issue: Student Officer: Position: Special Conference The Exploitation Of Media By Terrorist Groups Deniz Gokce Co-Chair Introduction Terrorist groups have been using social media to reach a wider
More informationPrevent Preempt Protect
Prevent Preempt Protect The Swedish counter-terrorism strategy Government Communication 2014/15:146 Government Communication 2014/15:146 Prevent, preempt and protect the Swedish counter-terrorism strategy
More informationMinor Interpellation tabled by Bundestag Member Andrej Hunko and others and The Left parliamentary group.
Development of the German Federal Criminal Police Office Check the Web project, which was originally launched to monitor the Internet, into a referral unit for unpleasant content Minor Interpellation tabled
More informationOutsmarting digital opponents. Using public safety technology to confront online threats to national security
Outsmarting digital opponents Using public safety technology to confront online threats to national security Outsmarting digital opponents 3 Digital technologies have changed everything. Governments,
More informationHow do we know what we know?
Research Methods Family in the News Can you identify some main debates (controversies) for your topic? Do you think the authors positions in these debates (i.e., their values) affect their presentation
More informationCTC Special Meeting on Communications and IT New York May 2013. Thank you very much. I am very pleased to be here to participate in
1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies
More informationText Mining - Scope and Applications
Journal of Computer Science and Applications. ISSN 2231-1270 Volume 5, Number 2 (2013), pp. 51-55 International Research Publication House http://www.irphouse.com Text Mining - Scope and Applications Miss
More informationBig Data and Society: The Use of Big Data in the ATHENA project
Big Data and Society: The Use of Big Data in the ATHENA project Professor David Waddington CENTRIC Lead on Ethics, Media and Public Disorder d.p.waddington@shu.ac.uk Helen Gibson CENTRIC Researcher h.gibson@shu.ac.uk
More informationTHE POWER OF INFLUENCE TAKING THE LUCK OUT OF WORD OF MOUTH
THE POWER OF INFLUENCE INTRODUCTION Word-of-mouth marketing has always been a powerful driver of consumer behavior. Every experienced marketer knows that customers are more likely to base purchasing decisions
More informationTABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5
January 2015 TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5 Introduction On January 7, 2015 France endured a three day terror attack. In the aftermath, two separate parties
More informationTake Advantage of Social Media. Monitoring. www.intelligencepathways.com
Take Advantage of Social Media Monitoring WHY PERFORM COMPETITIVE ANALYSIS ON SOCIAL MEDIA? Analysis of social media is an important part of a competitor overview analysis, no matter if you have just started
More informationCertified Digital Marketing Professional VS-1217
Certified Digital Marketing Professional VS-1217 Certified Digital Marketing Professional Certified Digital Marketing Professional Certification Code VS-1217 Vskills certification for Digital Marketing
More informationThe Six Critical Considerations of Social Media Threat Intelligence
The Six Critical Considerations of Social Media Threat Intelligence Every day, angry rhetoric and hints of potential danger flow though streams of social media data. Some of these threats may affect your
More informationMeeting Summary. Key themes that emerged during the seminar include:
Countering Violent Extremism (CVE) Working Group CVE through Communications Work Stream Practical Seminar on Monitoring and Evaluation Techniques for CVE Communication Programs 10-11 February 2013 Abu
More informationLaw Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015
Law Enforcement Assessment of the Violent Extremism Threat Charles Kurzman and David Schanzer June 25, 2015 About the Authors Charles Kurzman is a professor of sociology at the University of North Carolina
More informationLead Generation Domain Auction Inventory hosted by Above.com
Improving Lead Generation with Keyword Loaded Domain Names Domain names impact website ranking Domain names impact perceptions and trustworthiness Domain names are memorable and brandable QUALITY DOMAIN
More informationADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE. Page 1 of 34 www.experttraining.in Youtube.com/ViralJadhav viral@experttraining.
ADVANCE DIGITAL MARKETING VIDEO TRAINING COURSE Page 1 of 34 www.experttraining.in Youtube.com/ViralJadhav viral@experttraining.in +91 9558821174 Who Can Join? Business Owners who want to attract more
More informationTuition, Medical and Behaviour Support Service. Preventing Extremism and Radicalisation Policy. October 2015
Tuition, Medical and Behaviour Support Service Preventing Extremism and Radicalisation Policy October 2015 Introduction This Preventing Extremism and Radicalisation Policy is part of our commitment to
More informationBridging CAQDAS with text mining: Text analyst s toolbox for Big Data: Science in the Media Project
Bridging CAQDAS with text mining: Text analyst s toolbox for Big Data: Science in the Media Project Ahmet Suerdem Istanbul Bilgi University; LSE Methodology Dept. Science in the media project is funded
More informationYour Social Media Starter Kit For Content Marketing
Your Social Media Starter Kit For Content Marketing L et s assume you ve created a white paper or some other form of content. Doing so involves research, writing, editing, rewriting and design. The cost
More informationFor More Information
CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND TRANSPORTATION The RAND Corporation is a nonprofit institution that helps improve policy and
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationAchieving business resilience in a volatile political environment through Terrorism and Political Violence insurance
Achieving business resilience in a volatile political environment through Terrorism and Political Violence insurance This article was written by Thiagarajan Natarajan, Senior Underwriter Specialty Lines
More informationConstructing Your Social Marketing Architecture
Constructing Your Social Marketing Architecture How to Build A Bridge Between Social Marketing Strategies and Social Media Platforms Follow Conversation on Twitter #SherpaROAD Constructing Your Social
More informationTop 4 Ways Social Media is Helping to Reshape Marketing
Top 4 Ways Social Media is Helping to Reshape Marketing How implementing social media into your business strategy can position your brand for the better Inside, you ll find information on: The ever-changing
More informationSocial Media Implementations
SEM Experience Analytics Social Media Implementations SEM Experience Analytics delivers real sentiment, meaning and trends within social media for many of the world s leading consumer brand companies.
More informationDiscovering Hidden Networks in On-line Social Networks
I.J. Intelligent Systems and Applications, 2014, 05, 44-54 Published Online April 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijisa.2014.05.04 Discovering Hidden Networks in On-line Social Networks
More informationAmerican Foreign Fighters: Implications for Homeland Security. Final Report. 31 August 2015. Prepared for the Department of Homeland Security
American Foreign Fighters: Implications for Homeland Security Final Report 31 August 2015 Prepared for the Department of Homeland Security HOMELAND SECURITY STUDIES AND ANALYSIS INSTITUTE The Homeland
More informationOPEN SOURCE INTELLIGENCE SEMINAR SERIES. Transforming Your Research and Analytic Skills
OPEN SOURCE INTELLIGENCE SEMINAR SERIES Transforming Your Research and Analytic Skills Winter 2015 Contents A 21st Century Skillset 3 Course Dates 5 Course Fees 5 Open Source Intelligence 6 Advanced OSINT
More informationLIMITE EN. Background
Background Following the Paris shooting on 7 January 2015, there have been a number of developments that have recently led to the creation of the European Counter-Terrorism Centre (ECTC) and the Internet
More informationRESEARCH OPPORTUNITY PROGRAM 299Y PROJECT DESCRIPTIONS 2015 2016 SUMMER
Project Code: CSC 1S Professor Ronald M. Baecker & Assistant Lab Director Carrie Demmans Epp Computer Science TITLE OF RESEARCH PROJECT: Exploring Language Use in Computer Science Discussion Forums NUMBER
More informationBusiness Process Services. White Paper. Social Media Influence: Looking Beyond Activities and Followers
Business Process Services White Paper Social Media Influence: Looking Beyond Activities and Followers About the Author Vandita Bansal Vandita Bansal is a subject matter expert in Analytics and Insights
More informationWhat to do Post Google Panda
What to do Post Google Panda 1 Google Panda Update Panda, also known as Farmer, was an algorithm update from Google that first appeared in February 2011. This update restructured many search results and
More informationSocial media Content Coordinator (online marketing manager)
Social media Content Coordinator (online marketing manager) We serve private, non profits and governmental agencies. We are seeking to grow our digital media department as well as the company s digital
More informationDoctoral Research Scientific Report
Invest in people! EUROPEAN SOCIAL FUND Sectorial Operational Programme for Human Resource Development 2007-2013 Priority Axis nr. 1 Education and professional development in pursuit of economic growth
More informationImage credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.
Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt. Mike Pryor, 2nd BCT, 82nd Abn. Div. Public Affairs Operations
More informationEXPO MILANO 2015 CALL Best Sustainable Development Practices for Food Security
EXPO MILANO 2015 CALL Best Sustainable Development Practices for Food Security Offline Application form Storytelling is a simple, immediate and effective way to share experiences, concepts and ethical
More informationRevised Prevent Duty Guidance:
Prevent Duty Guidance: for Scotland 1 HM Government Revised Prevent Duty Guidance: for Scotland Guidance for specified Scottish authorities on the duty in the Counter-Terrorism and Security Act 2015 to
More informationConsiderations on Audience Measurement Procedures for Digital Signage Service
Considerations on Audience Measurement Procedures for Digital Signage Service Wook Hyun, MiYoung Huh, SeungHei Kim and ShinGak Kang Electronics and Telecommunications Research Institute Daejeon, Republic
More informationThe Financial Services Industry
The Financial Services Industry AN INTRODUCTION TO SOCIAL MEDIA The Challenge The Financial Services industry is one of the most established and complex around. Many of its key processes and systems have
More informationPERSONAL BRANDING. Natalia Untung 0142626. BARBRA Sundquist IMG 220
PERSONAL BRANDING Natalia Untung 0142626 BARBRA Sundquist IMG 220 This report documents the steps I have taken to develop my professional online reputation, as well as my plan for further strengthening
More informationRunning head: AL-QAEDA S MEDIA STRATEGY 1. Al-Qaeda s media strategy: Internet self-radicalization and counter-radicalization policies
Running head: AL-QAEDA S MEDIA STRATEGY 1 Al-Qaeda s media strategy: Internet self-radicalization and counter-radicalization policies Rebecca L. Earnhardt Virginia Commonwealth University AL-QAEDA S MEDIA
More informationSearch Engine Optimization (SEO)
Search Engine Optimization (SEO) Saurabh Chavan, Apoorva Chitre, Husain Bhala Abstract Search engine optimization is often about making small modifications to parts of your website. When viewed individually,
More informationInterpreting Web Analytics Data
Interpreting Web Analytics Data Whitepaper 8650 Commerce Park Place, Suite G Indianapolis, Indiana 46268 (317) 875-0910 info@pentera.com www.pentera.com Interpreting Web Analytics Data At some point in
More informationinfluence influential interest issue key
Finding influence: uncovering the brand conversations that matter in the new media world analytics blogs brand business comments community company conversations corporate discussed example firms forums
More informationSB-Plan: Simulation-based support for resource allocation and mission planning
SB-Plan: Simulation-based support for resource allocation and mission planning Pontus Svenson, FOI Ledningssystem ponsve@foi.se Christian Mårtenson, FOI Ledningssystem cmart@foi.se 0. Abstract In future
More informationRunning surveys and consultations
Running surveys and consultations Susannah Wintersgill, Public Affairs Annette Cunningham & Rob Markham, Estates Tuesday 9 June 2015 Contents Five key stages of planning a survey Questionnaire design:
More informationUSING SOCIAL MEDIA TO COMMUNICATE AGAINST VIOLENT EXTREMISM
USING SOCIAL MEDIA TO COMMUNICATE AGAINST VIOLENT EXTREMISM 2 Introduction The online environment plays a crucial role in enabling people to express their views freely on globally-connected platforms.
More informationDigital Marketing Workshop
Digital Marketing Workshop 2 Global Digital Advt. spend to be $278Bn in 2019 Business Wire Online Marketing to create 1.5 lakh jobs in India Economic Times Online Marketing Managers are paid 82% more Indeed
More informationCompetitive intelligence: History, importance, objectives, process and issues
Competitive intelligence: History, importance, objectives, process and issues Dhekra BEN SASSI Anissa FRINI Wahiba BEN ABDESLAM May 13-15 2015, Athens, Greece Introduction State of the art Critical Issues
More informationApril 9 10, 2015 Twentieth Century Club
Countering Violent Extremism in the United States and the European Union April 9 10, 2015 Twentieth Century Club Registration is required. To register please visit: tinyurl.com/kxteapk All sessions will
More informationA Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks
A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired
More informationNON-PROBABILITY SAMPLING TECHNIQUES
NON-PROBABILITY SAMPLING TECHNIQUES PRESENTED BY Name: WINNIE MUGERA Reg No: L50/62004/2013 RESEARCH METHODS LDP 603 UNIVERSITY OF NAIROBI Date: APRIL 2013 SAMPLING Sampling is the use of a subset of the
More informationRe. Request for feedback on Assurance on <IR> Introduction & Exploration of Issues
Chartered Professional Accountants of Canada 277 Wellington Street West Toronto ON CANADA M5V 3H2 T. 416 977.3222 F. 416 977.8585 www.cpacanada.ca Comptables professionnels agréés du Canada 277, rue Wellington
More informationSentiment Analysis and Time Series with Twitter Introduction
Sentiment Analysis and Time Series with Twitter Mike Thelwall, School of Technology, University of Wolverhampton, Wulfruna Street, Wolverhampton WV1 1LY, UK. E-mail: m.thelwall@wlv.ac.uk. Tel: +44 1902
More informationChapter 6. Attracting Buyers with Search, Semantic, and Recommendation Technology
Attracting Buyers with Search, Semantic, and Recommendation Technology Learning Objectives Using Search Technology for Business Success Organic Search and Search Engine Optimization Recommendation Engines
More informationCREDIT TRANSFER: GUIDELINES FOR STUDENT TRANSFER AND ARTICULATION AMONG MISSOURI COLLEGES AND UNIVERSITIES
CREDIT TRANSFER: GUIDELINES FOR STUDENT TRANSFER AND ARTICULATION AMONG MISSOURI COLLEGES AND UNIVERSITIES With Revisions as Proposed by the General Education Steering Committee [Extracts] A. RATIONALE
More informationCHOOSE THE RIGHT ONE!
The social intelligence company CHOOSE THE RIGHT ONE! GROUPING SOCIAL MEDIA MONITORING TOOLS Whitepaper The social intelligence company BRIEF Monitoring social media! Do I need this? How do I get started?
More informationOur Data & Methodology. Understanding the Digital World by Turning Data into Insights
Our Data & Methodology Understanding the Digital World by Turning Data into Insights Understanding Today s Digital World SimilarWeb provides data and insights to help businesses make better decisions,
More informationPSYCHOLOGY COURSES THAT COUNT
PSYCHOLOGY COURSES THAT COUNT Department of Psychology Why study Psychology at Sunderland? Psychology courses at Sunderland will equip you with all the knowledge and skills you need to pursue a career
More informationDIGITAL MARKETING. The Page Title Meta Descriptions & Meta Keywords
DIGITAL MARKETING Digital Marketing Basics Basics of advertising What is Digital Media? Digital Media Vs. Traditional Media Benefits of Digital marketing Latest Digital marketing trends Digital media marketing
More informationProgramme title Master s Programme in Politics and War. Programme title in Swedish Magisterprogrammet i politik och krig
Programme syllabus 1 (6) Programme title Master s Programme in Politics and War Programme title in Swedish Magisterprogrammet i politik och krig Higher education credits: 60 Credits Programme code: 2PK15
More informationCOUNCIL OF THE EUROPEAN UNION. Brussels, 13 February 2002 (19.02) (OR. es) 5712/1/02 REV 1 ENFOPOL 18
COUNCIL OF THE EUROPEAN UNION Brussels, 13 February 2002 (19.02) (OR. es) 5712/1/02 REV 1 FOPOL 18 NOTE from: Chair of the Working Party on Terrorism to: Working Party on Terrorism No. prev. doc.: 5712/02
More informationCertification In SAS Programming. Introduction to SAS Program
Certification In SAS Programming Introduction to SAS Program What Lies Ahead In this session, you will gain answers to: Overview of Analytics Careers in Analytics Why Use SAS? Introduction to SAS System
More informationFOCUS Workshop on Security Research - Drivers, research and outcome. hans.frennberg@foi.se
FOCUS Workshop on Security Research - Drivers, research and outcome hans.frennberg@foi.se Workshop - objectives Provide forum for representatives from Swedish security research initiatives to meet and
More informationCouncil of the European Union General Secretariat Brussels, 17 January 2015 (OR. en)
Council of the European Union General Secretariat Brussels, 17 January 2015 (OR. en) DS 1035/15 LIMITE MEETING DOCUMENT From: EU Counter-Terrorism Coordinator To: Delegations Subject: EU CTC input for
More informationINTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.
INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. 23 Grafton Street London W1S 4EY UK Main Tel: +44 (0) 207 887 2699 ABOUT PGI PGI is a privately owned UK business offering integrated, intelligence-led
More informationGroup for Programming & Software Engineering (PSE ), master thesis
Group for Programming & Software Engineering (PSE ), master thesis 22 th September 2015 23.09.2015 1 PSE, at the core of computer science OO Programming and programming languages Making new programming
More informationGood Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism
Good Practices on Community Engagement and Community-Oriented Policing as Tools to Counter Violent Extremism Introduction Countering violent extremism (CVE) initiatives tackle conditions conducive to radicalization
More informationTDPA: Trend Detection and Predictive Analytics
TDPA: Trend Detection and Predictive Analytics M. Sakthi ganesh 1, CH.Pradeep Reddy 2, N.Manikandan 3, DR.P.Venkata krishna 4 1. Assistant Professor, School of Information Technology & Engineering (SITE),
More informationCPA Perfomance Trends on the Google Display Network
CPA Perfomance Trends on the Google Display Network Google Display Network White Paper CPA Performance Trends on the Google Display Network About the Google Display Network The Google Display Network offers
More informationPrepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White
Principles of Good Research & Research Proposal Guidee Prepared by the Policy, Performance and Quality Assurance Unit (Adults) Tamsin White March 2006 Principles of Good Research All research is different
More informationTitle: Social TV: online discursive practices and political engagement
Title: Social TV: online discursive practices and political engagement Bio: Donatella Selva, PhD in Media Studies at University of Urbino, Italy. She is working since 2009 at the Centre for Media and Communication
More informationThe website will be developed in English and Arabic
A. SCOPE 1. Main a) Design Your Website needs a unique and interactive design to fit with the theme of your company. The latest techniques in Website development will be used in order to measure up with
More informationCriminal Justice Evaluation Framework (CJEF): Conducting effective outcome evaluations
Criminal Justice Research Department of Premier and Cabinet Criminal Justice Evaluation Framework (CJEF): Conducting effective outcome evaluations THE CRIMINAL JUSTICE EVALUATION FRAMEWORK (CJEF) The Criminal
More informationSocial Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS
Social Media Measurement Meeting Robert Wood Johnson Foundation April 25, 2013 SOCIAL MEDIA MONITORING TOOLS This resource provides a sampling of tools available to produce social media metrics. The list
More informationIC05 Introduction on Networks &Visualization Nov. 2009. <mathieu.bastian@gmail.com>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
More informationDrive Interactivity and Engagement in Your Webinars
FROM PRESENTATION TO CONVERSATION Drive Interactivity and Engagement in Your Webinars 1 AUDIENCE ENGAGEMENT IS ESSENTIAL Webinars have become a top-tier marketing tool, with an ever-growing number of companies
More informationFirst Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing
Overview First Expert Meeting of the GCTF Foreign Terrorist Fighters Initiative: Police and Border Law Enforcement, Judiciary, and Information Sharing 14-15 May 2014 Marrakech, Morocco Summary Hosted by
More informationTasks in the annual HSI Research Plan. This report presents the results of research and analysis conducted under. Tool to Reach Out to Youth
Homeland Security Institute The Homeland Security Institute (HSI) is a federally funded research and development center (FFRDC) established by the Secretary of Homeland Security under Section 312 of the
More informationText Analytics for Competitive Analysis and Market Intelligence Aiaioo Labs - 2011
Text Analytics for Competitive Analysis and Market Intelligence Aiaioo Labs - 2011 Bangalore, India Title Text Analytics Introduction Entity Person Comparative Analysis Entity or Event Text Analytics Text
More informationThe Purpose of PR 2016
The Purpose of PR 2016 Research Report Contents Introduction Key findings Purpose of PR Tactics Budget Social media, SEO Media Relevance and importance of PR INTRODUCTION FROM XANTHE VAUGHAN WILLIAMS PR
More informationTitle/Description/Keywords & Various Other Meta Tags Development
Module 1 - Introduction Introduction to Internet Brief about World Wide Web and Digital Marketing Basic Description SEM, SEO, SEA, SMM, SMO, SMA, PPC, Affiliate Marketing, Email Marketing, referral marketing,
More informationEvaluation: Designs and Approaches
Evaluation: Designs and Approaches Publication Year: 2004 The choice of a design for an outcome evaluation is often influenced by the need to compromise between cost and certainty. Generally, the more
More informationMobile SEO in 2015 Get ready for the April algorithm update
Mobile SEO in 2015 Get ready for the April algorithm update Mobile SEO in 2015 April Algorithm Update Mobile has provided Google a number of challenges This includes the quality of search results on mobile
More informationehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke
ehealth 2.0: How health systems can gain a leadership role in digital health Gerardo Aue, Stefan Biesdorf, Nicolaus Henke Health systems around the world clearly recognise the potential of digital health;
More informationEuropol Public Information VACANCY NOTICE
The Hague, 3 February 2016 File nº: Europol/2016/TA/AD9/237 VACANCY NOTICE Name of the post: Reporting to: Business Manager IRU - EU Internet Referral Unit - within the Operations Department (OD) AD9 Head
More informationMandeep K. Dhami, PhD
Mandeep K. Dhami, PhD Reader in Forensic Psychology Director, Postgraduate Programme in Forensic Psychology School of Psychology University of Surrey School of Psychology Over 50 academics and postdoctoral
More informationLASTLINE WHITEPAPER. Large-Scale Detection of Malicious Web Pages
LASTLINE WHITEPAPER Large-Scale Detection of Malicious Web Pages Abstract Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and,
More informationCLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION
Bulgarian Journal of Science and Education Policy (BJSEP), Volume 7, Number 1, 2013 CLOUD COMPUTING CONCEPTS FOR ACADEMIC COLLABORATION Khayrazad Kari JABBOUR Lebanese University, LEBANON Abstract. The
More informationProfessional Diploma in Digital Marketing
Professional Diploma in Digital Marketing Agenda Day 1: Day 2: Day 3: Day 4: Day 5: to Digital Marketing Search Engine Optimisation Search Engine Marketing Email Marketing Digital Display Advertising Mobile
More informationHIGH SCHOOL MASS MEDIA AND MEDIA LITERACY STANDARDS
Guidelines for Syllabus Development of Mass Media Course (1084) DRAFT 1 of 7 HIGH SCHOOL MASS MEDIA AND MEDIA LITERACY STANDARDS Students study the importance of mass media as pervasive in modern life
More informationSMaPP Lab Data Report: The Islamic State s Battle for the Global Twittersphere
SMaPP Lab Data Report: The Islamic State s Battle for the Global Twittersphere Social Media and Political Participation Lab, New York University 1 Preliminary Results, July 27, 2015 While many jihadist
More information