. . . . . . . . . . . . . . . . . . . . . "Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement! During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behavior/security professionals, Using Social Media for Global Security offers pages of instruction and detail o."@en . . . "Using Social Media for Global Security"@en . . . "BEssential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement!/b/ During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behavior/security professionals, iUsing Social Media for Global Security /ioffers pages of instruction and detail on cutting-edge social media technologies, analyzing social media data, and building crowdsourcing platforms./ The book teaches how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read./ ulliIllustrates linguistic, correlative, and network analysis of OSINT/liliExamines using crowdsourcing technologies to work and engage with populations globally to solve security problems/liliExplores how to ethically deal with social media data without compromising people's rights to privacy and freedom of expression/liliShows activists fighting against oppressive regimes how they can protect their identities online/li/ul If you're responsible for maintaining local, national or global security, you'll want to read iUsing Social Media for Global Security/i."@en . . . . . . . . . . . . . "Livres électroniques" . . . . . . "Essential reading for cyber-security professionals, security analysts, policy experts, decision-makers, activists, and law enforcement! During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behaviour/security professionals, Using Social Media for Global Security offers pages of instruction and detail on cutting-edge social media technologies, analysing social media data, and building crowd sourcing platforms. The book teaches how to collect social media data and analyse it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read." . . . . . . . "Electronic books" . . "Electronic books"@en . . . . "Using social media for global security" . "Using social media for global security"@en . . . . . . "Médias sociaux Aspect politique." . . "Sicherheitspolitik." . . "Online social networks." . . "Online social networks" . "HISTORY / Military / Other" . . "Externalisation ouverte." . . "Sécurité internationale." . . "TECHNOLOGY & ENGINEERING / Military Science" . . "Soziale Software." . . "COMPUTERS Security General." . . "Computer security." . . "Computer security" . "Human computation." . . "Exploration de données (Informatique)" . . "Data mining." . . "Social networks." . . "Social media / Political aspects." . . "Social media Political aspects." . "Global security." . . "Social media." . . "Social media" . "Security, International." . .