Knowledge

Social media intelligence

Source 📝

1422: 181:(largest video sharing and hosting website), Blogs and discussion forums are being misused by extremist groups for spreading their beliefs and ideologies, promoting radicalization, recruiting members and creating online virtual communities sharing a common agenda. Popular microblogging websites such as Twitter are being used as a real-time platform for information sharing and communication during the planning and mobilization of civil unrest-related events. 162:. Surprisingly, most of its revenue comes from advertising, not direct sales of its services or products. Google makes money by selling advertising services to advertisers. They provide ad space to websites on Google, and target ads to consumers of Google services and products. Google can market ads using SOCMINT to collect data from its users and generate revenue. 148:
and experiences within social networks. ASNI is expected to evolve rapidly, influencing how we interact online and shaping their digital experiences. Transparency, ethical considerations, media influence bias, and user control over data will be crucial to ensure responsible development and positive impact.
121:
An example of how SOCMINT is used to affect political opinions is the Cambridge Analytica Scandal. Cambridge Analytica was a company that purchased data from Facebook about its users without the consent or knowledge of Americans. They used this data to build a "psychological warfare tool" to persuade
104:
In the UK, the Association of Chief Police Officers of England, Wales, and Northern Ireland emphasized the significance of social media in intelligence gathering during anti-fracking protests in 2011. Social media analysis closely monitored protests against the badger cull in 2013, with a 2013 report
134:
In September of 2023, the Philadelphia Police Department began using social media to track and stay one step ahead of criminal activity to stop meetups and potential robberies. This new approach has made officers utilize another tool in their field by being able to find new information as quickly as
100:
In the United States, ZeroFOX faced criticism for sharing a report with Baltimore officials showcasing how their social media monitoring tool could track riots following Freddie Gray's funeral. The report labeled 19 individuals, including two prominent figures from the #BlackLivesMatter movement, as
147:
Artificial Social Networking Intelligence (ASNI) refers to the application of artificial intelligence within social networking services and social media platforms. It encompasses various technologies and techniques used to automate, personalize, enhance, improve, and synchronize user's interactions
89:
In Thailand, the Technology Crime Suppression Division not only employs a 30-person team to scrutinize social media for content deemed disrespectful to the monarchy, known as lèse-majesté but also encourages citizens to report such content. Particularly targeting the youth, they run a "Cyber Scout"
80:
Given the dynamic evolution of social media and social media monitoring, our current understanding of how social media monitoring can help organizations create business value is inadequate. As a result, there is a need to study how organizations can (a) extract and analyze social media data related
117:
In a broad sense, social media refers to a conversational, distributed mode of content generation, dissemination, and communication among communities. Different from broadcast-based traditional and industrial media, social media has torn down the boundaries between authorship and readership, while
143:
SOCMINT collects data from both organizations and people on an individual level. It has a variety of different purposes, and though its main goal is to improve national security advancements, there are several other benefits as well. This intelligence can identify patterns, predict trends, gather
113:
During the 2016 United States presidential election, the Senate Intelligence Committee released reports containing information about Russia’s use of troll farms to mislead black voters about voting. Also, German researchers in 2010 analyzed Twitter messages regarding the German federal election
93:
Instances in Israel involve the arrest of Palestinians by the police for their social media posts. An example includes a 15-year-old girl who posted a Facebook status with the words "forgive me," raising suspicions among Israeli authorities that she might be planning an attack.
73:. The authors argued that social media is now an important part of intelligence and security work, but that technological, analytical, and regulatory changes are needed before it can be considered a powerful new form of intelligence, including amendments to the United Kingdom 126:, the whistleblower, reported that personal information was taken in early 2014, and used to build a system that could target US voters with personalized pollical advertisements. More than 50 million individuals' data was exploited and manipulated. 322: 97:
In Egypt, a leaked 2014 call for tender from the Ministry of Interior reveals efforts to procure a social media monitoring system to identify leading figures and prevent protests before they occur.
924: 200: 790:
Agarwal, Swati; Sureka, Ashish (November 21, 2015). "Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats".
105:
revealing a team of 17 officers in the National Domestic Extremism Unit scanning public tweets, YouTube videos, Facebook profiles, and other online content from UK citizens.
154:
provides many free services and has built an entire media brand with its vast variety of products. Along with data collection, Google also owns two advertising services,
970: 30:) comprises the collective tools and solutions that allow organizations to analyze conversations, respond to synchronize social signals, and synthesize social 324:
Socmint: die monitering van sosiale media vir gemeenskapsveiligheidsdoeleindes binne 'n grootdataraamwerk in Suid-Afrika met spesifieke verwysing na Orania
118:
the information consumption and dissemination process is becoming intrinsically intertwined with the process of generating and sharing information.
81:
to their business (Sensing), and (b) utilize external intelligence gained from social media monitoring for specific business initiatives (Seizing).
368: 144:
information in current time, etc. In addition, these aspects have allowed for both improvement within businesses and help for law enforcement.
382: 1507: 845: 74: 1463: 590: 66: 1492: 352: 90:
program where participants are rewarded for reporting individuals posting material perceived as detrimental to the monarchy.
675: 487: 1369: 965: 1517: 414:
ACIS 2012: Location, Location, Location: Proceedings of the 23rd Australasian Conference on Information Systems 2012
291: 1497: 1487: 1156: 1078: 755:
TripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society
270: 816: 648: 1106: 1008: 838: 34:
into meaningful trends and analysis, based on the user's needs. Social media intelligence allows one to utilize
1512: 556: 947: 1456: 1018: 932: 877: 436: 1161: 1043: 58: 1248: 1101: 937: 920: 831: 1384: 1308: 1121: 1058: 957: 623: 255: 1522: 1437: 1333: 1318: 220: 47: 1449: 1278: 1268: 1063: 1313: 1151: 1038: 1033: 1028: 1013: 1003: 915: 591:"Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach" 514: 245: 240: 235: 35: 727: 461: 1502: 1482: 1253: 1197: 1131: 942: 750: 205: 70: 1359: 1298: 1207: 1096: 998: 190: 62: 8: 1328: 1323: 1171: 1116: 1073: 1053: 250: 697: 114:
concluding that Twitter played a role in leading users to a specific political opinion.
1293: 1288: 1283: 1273: 1263: 1126: 993: 791: 410:"Understanding the role of social media monitoring in generating external intelligence" 362: 225: 210: 1401: 1258: 1192: 1166: 1136: 988: 897: 772: 709: 598: 564: 537: 348: 195: 123: 649:"Looting in Philadelphia: How social media is playing a key role - CBS Philadelphia" 1421: 1389: 1343: 1338: 872: 823: 762: 529: 342: 260: 215: 1379: 1232: 1222: 1217: 1202: 265: 1433: 1396: 1227: 1187: 1023: 882: 854: 751:"Selling You and Your Clicks: Examining the Audience Commodification of Google" 159: 43: 767: 1476: 1364: 1212: 1111: 887: 776: 713: 602: 568: 541: 409: 1374: 1146: 858: 624:"History of the Cambridge Analytica Controversy | Bipartisan Policy Center" 165:
Research shows that various social media platforms on the Internet such as
39: 533: 54: 42:
sites, using both intrusive or non-intrusive means, from open and closed
31: 1303: 1141: 1068: 230: 155: 1429: 16:
Tools for analyzing and synchronizing data from social media websites
122:
US voters to elect Donald Trump as president in the 2016 election.
796: 174: 340: 408:
Mayeh, Maral; Scheepers, Rens; Valos, Michael (January 1, 2012).
178: 166: 892: 170: 151: 557:"How Cambridge Analytica Sparked the Great Privacy Awakening" 462:"Report: Russia still using social media to roil US politics" 589:
Cadwalladr, Carole; Graham-Harrison, Emma (March 17, 2018).
971:
List of virtual communities with more than 1 million users
698:"Social Media Intelligence: Opportunities And Limitations" 588: 336: 334: 728:"What is Social Media Intelligence (SOCMINT)? | Brand24" 46:. This type of intelligence gathering is one element of 749:
Kang, Hyunjin; McAllister, Matthew P. (June 23, 2011).
513:
Zeng, D.; Chen, H.; Lusch, R.; Li, S. (November 2010).
331: 853: 341:
Omand, David; Bartlett, Jamie; Miller, Carl (2012).
292:"Former spy chief calls for laws on online snooping" 437:"Social Media Intelligence | Privacy International" 407: 53:The term was coined in a 2012 paper written by Sir 1474: 512: 108: 748: 316: 314: 312: 1457: 839: 789: 289: 367:: CS1 maint: multiple names: authors list ( 814: 309: 75:Regulation of Investigatory Powers Act 2000 1464: 1450: 846: 832: 488:"Social Media As An Intelligence Goldmine" 795: 766: 515:"Social Media Analytics and Intelligence" 290:Norton-Taylor, Richard (April 24, 2012). 320: 177:(a popular social networking website), 67:Centre for the Analysis of Social Media 1475: 817:"Meet PRISM's little brother: Socmint" 827: 1416: 554: 431: 429: 427: 425: 423: 383:"Warning over net surveillance move" 84: 13: 1508:Intelligence gathering disciplines 966:List of social networking services 129: 69:, at the London-based think tank, 14: 1534: 808: 673: 420: 1420: 1157:Social network analysis software 1079:Virtual collective consciousness 271:Virtual collective consciousness 1009:Organizational network analysis 783: 742: 720: 690: 676:"Social Media Marketing Agency" 667: 641: 616: 582: 548: 506: 480: 454: 401: 375: 283: 201:Collective influence algorithm 1: 1493:Social information processing 948:Personal knowledge networking 815:Paul Wright (June 26, 2013). 276: 50:(Open- Source Intelligence). 1436:. You can help Knowledge by 1019:Social aspects of television 933:Enterprise social networking 138: 109:Effects on Political Opinion 7: 1162:Social networking potential 1044:Social media and psychology 184: 173:(micro-blogging websites), 10: 1539: 1415: 1249:Algorithmic radicalization 938:Enterprise social software 921:Distributed social network 347:. London, England: Demos. 1352: 1309:Six degrees of separation 1241: 1180: 1122:Collaborative consumption 1087: 1059:Social media optimization 1049:Social media intelligence 979: 956: 908: 865: 768:10.31269/triplec.v9i2.255 327:, LitNet Akademies 15(3). 256:Social media optimization 20:Social media intelligence 1518:Open-source intelligence 1334:Suicide and the Internet 1319:Social media and suicide 522:IEEE Intelligent Systems 441:privacyinternational.org 221:Open-source intelligence 1498:Collective intelligence 1488:Social media management 1279:Friending and following 1269:Consequential strangers 1064:Social network analysis 1432:-related article is a 1314:Social media addiction 1152:Social media analytics 1039:Social identity theory 1034:Social exchange theory 1029:Social data revolution 1014:Small-world experiment 916:Corporate social media 246:Social media analytics 241:Social data revolution 236:Social cloud computing 36:intelligence gathering 1513:Mass media monitoring 1254:Community recognition 1198:Collaborative finance 1132:Lateral communication 943:Mobile social network 708:(2A): 505–510. 2015. 492:Cyber Security Review 206:Information retrieval 1360:Friendship recession 1299:Information overload 1208:Influencer marketing 1097:Account verification 1004:Interpersonal bridge 999:Attention inequality 655:. September 29, 2023 628:bipartisanpolicy.org 534:10.1109/MIS.2010.151 321:Senekal, BA (2018), 191:Algorithmic curation 1329:Social network game 1324:Social invisibility 1172:Structural cohesion 1117:Collaboration graph 1074:Structural endogamy 1054:Social media mining 468:. December 18, 2018 251:Social media mining 1294:Internet addiction 1289:Influence-for-hire 1284:Friendship paradox 1274:Friend of a friend 1264:Computer addiction 1127:Giant Global Graph 994:Assortative mixing 730:. October 27, 2023 702:CES Working Papers 226:Sentiment analysis 211:Media intelligence 101:"threat actors." 1445: 1444: 1410: 1409: 1402:Virtual community 1259:Complex contagion 1193:Attention economy 1167:Social television 1137:Reputation system 989:Ambient awareness 555:Lapowsky, Issie. 354:978-1-909037-08-3 196:Ambient awareness 124:Christopher Wylie 1530: 1466: 1459: 1452: 1424: 1417: 1390:Social profiling 1344:Viral phenomenon 1107:Change detection 848: 841: 834: 825: 824: 820: 802: 801: 799: 787: 781: 780: 770: 746: 740: 739: 737: 735: 724: 718: 717: 694: 688: 687: 685: 683: 671: 665: 664: 662: 660: 645: 639: 638: 636: 634: 620: 614: 613: 611: 609: 586: 580: 579: 577: 575: 552: 546: 545: 519: 510: 504: 503: 501: 499: 494:. March 15, 2016 484: 478: 477: 475: 473: 458: 452: 451: 449: 447: 433: 418: 417: 405: 399: 398: 396: 394: 389:. April 24, 2012 379: 373: 372: 366: 358: 338: 329: 328: 318: 307: 306: 304: 302: 287: 261:Social profiling 216:Online algorithm 85:Governmental Use 1538: 1537: 1533: 1532: 1531: 1529: 1528: 1527: 1523:Espionage stubs 1473: 1472: 1471: 1470: 1413: 1411: 1406: 1380:Online identity 1348: 1237: 1233:Viral marketing 1223:Social commerce 1218:Sharing economy 1203:Creator economy 1176: 1089: 1083: 981: 975: 952: 904: 861: 855:Social networks 852: 811: 806: 805: 788: 784: 747: 743: 733: 731: 726: 725: 721: 696: 695: 691: 681: 679: 672: 668: 658: 656: 653:www.cbsnews.com 647: 646: 642: 632: 630: 622: 621: 617: 607: 605: 587: 583: 573: 571: 553: 549: 517: 511: 507: 497: 495: 486: 485: 481: 471: 469: 460: 459: 455: 445: 443: 435: 434: 421: 406: 402: 392: 390: 381: 380: 376: 360: 359: 355: 339: 332: 319: 310: 300: 298: 288: 284: 279: 266:Social software 187: 141: 132: 130:Law Enforcement 111: 87: 44:social networks 17: 12: 11: 5: 1536: 1526: 1525: 1520: 1515: 1510: 1505: 1500: 1495: 1490: 1485: 1469: 1468: 1461: 1454: 1446: 1443: 1442: 1425: 1408: 1407: 1405: 1404: 1399: 1397:Viral messages 1394: 1393: 1392: 1387: 1382: 1372: 1367: 1362: 1356: 1354: 1353:Related topics 1350: 1349: 1347: 1346: 1341: 1336: 1331: 1326: 1321: 1316: 1311: 1306: 1301: 1296: 1291: 1286: 1281: 1276: 1271: 1266: 1261: 1256: 1251: 1245: 1243: 1239: 1238: 1236: 1235: 1230: 1228:Social sorting 1225: 1220: 1215: 1210: 1205: 1200: 1195: 1190: 1188:Affinity fraud 1184: 1182: 1178: 1177: 1175: 1174: 1169: 1164: 1159: 1154: 1149: 1144: 1139: 1134: 1129: 1124: 1119: 1114: 1109: 1104: 1099: 1093: 1091: 1085: 1084: 1082: 1081: 1076: 1071: 1066: 1061: 1056: 1051: 1046: 1041: 1036: 1031: 1026: 1024:Social capital 1021: 1016: 1011: 1006: 1001: 996: 991: 985: 983: 977: 976: 974: 973: 968: 962: 960: 954: 953: 951: 950: 945: 940: 935: 930: 918: 912: 910: 906: 905: 903: 902: 901: 900: 890: 885: 880: 875: 869: 867: 863: 862: 851: 850: 843: 836: 828: 822: 821: 810: 809:External links 807: 804: 803: 782: 761:(2): 141–153. 741: 719: 689: 674:Terry, Roger. 666: 640: 615: 581: 547: 505: 479: 453: 419: 400: 387:The Sunday Sun 374: 353: 330: 308: 281: 280: 278: 275: 274: 273: 268: 263: 258: 253: 248: 243: 238: 233: 228: 223: 218: 213: 208: 203: 198: 193: 186: 183: 160:Google AdSense 140: 137: 131: 128: 110: 107: 86: 83: 59:Jamie Bartlett 15: 9: 6: 4: 3: 2: 1535: 1524: 1521: 1519: 1516: 1514: 1511: 1509: 1506: 1504: 1501: 1499: 1496: 1494: 1491: 1489: 1486: 1484: 1481: 1480: 1478: 1467: 1462: 1460: 1455: 1453: 1448: 1447: 1441: 1439: 1435: 1431: 1426: 1423: 1419: 1418: 1414: 1403: 1400: 1398: 1395: 1391: 1388: 1386: 1383: 1381: 1378: 1377: 1376: 1373: 1371: 1368: 1366: 1365:Peer pressure 1363: 1361: 1358: 1357: 1355: 1351: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1280: 1277: 1275: 1272: 1270: 1267: 1265: 1262: 1260: 1257: 1255: 1252: 1250: 1247: 1246: 1244: 1240: 1234: 1231: 1229: 1226: 1224: 1221: 1219: 1216: 1214: 1213:Narrowcasting 1211: 1209: 1206: 1204: 1201: 1199: 1196: 1194: 1191: 1189: 1186: 1185: 1183: 1179: 1173: 1170: 1168: 1165: 1163: 1160: 1158: 1155: 1153: 1150: 1148: 1145: 1143: 1140: 1138: 1135: 1133: 1130: 1128: 1125: 1123: 1120: 1118: 1115: 1113: 1112:Blockmodeling 1110: 1108: 1105: 1103: 1100: 1098: 1095: 1094: 1092: 1086: 1080: 1077: 1075: 1072: 1070: 1067: 1065: 1062: 1060: 1057: 1055: 1052: 1050: 1047: 1045: 1042: 1040: 1037: 1035: 1032: 1030: 1027: 1025: 1022: 1020: 1017: 1015: 1012: 1010: 1007: 1005: 1002: 1000: 997: 995: 992: 990: 987: 986: 984: 978: 972: 969: 967: 964: 963: 961: 959: 955: 949: 946: 944: 941: 939: 936: 934: 931: 928: 927: 922: 919: 917: 914: 913: 911: 907: 899: 896: 895: 894: 891: 889: 886: 884: 881: 879: 876: 874: 871: 870: 868: 864: 860: 856: 849: 844: 842: 837: 835: 830: 829: 826: 818: 813: 812: 798: 793: 786: 778: 774: 769: 764: 760: 756: 752: 745: 729: 723: 715: 711: 707: 703: 699: 693: 677: 670: 654: 650: 644: 629: 625: 619: 604: 600: 596: 592: 585: 570: 566: 562: 558: 551: 543: 539: 535: 531: 527: 523: 516: 509: 493: 489: 483: 467: 463: 457: 442: 438: 432: 430: 428: 426: 424: 415: 411: 404: 388: 384: 378: 370: 364: 356: 350: 346: 345: 344:#Intelligence 337: 335: 326: 325: 317: 315: 313: 297: 293: 286: 282: 272: 269: 267: 264: 262: 259: 257: 254: 252: 249: 247: 244: 242: 239: 237: 234: 232: 229: 227: 224: 222: 219: 217: 214: 212: 209: 207: 204: 202: 199: 197: 194: 192: 189: 188: 182: 180: 176: 172: 168: 163: 161: 157: 153: 149: 145: 136: 127: 125: 119: 115: 106: 102: 98: 95: 91: 82: 78: 76: 72: 68: 64: 60: 56: 51: 49: 45: 41: 37: 33: 29: 25: 21: 1503:Surveillance 1483:Social media 1438:expanding it 1427: 1412: 1375:User profile 1147:Social graph 1048: 980:Concepts and 925: 878:Professional 859:social media 785: 758: 754: 744: 734:November 27, 732:. Retrieved 722: 705: 701: 692: 680:. Retrieved 678:. tmcnet.com 669: 659:November 27, 657:. Retrieved 652: 643: 631:. Retrieved 627: 618: 606:. Retrieved 595:The Guardian 594: 584: 572:. Retrieved 560: 550: 528:(6): 13–16. 525: 521: 508: 498:November 20, 496:. Retrieved 491: 482: 472:November 20, 470:. Retrieved 465: 456: 446:November 27, 444:. Retrieved 440: 413: 403: 393:February 22, 391:. Retrieved 386: 377: 343: 323: 301:February 22, 299:. Retrieved 296:The Guardian 295: 285: 164: 150: 146: 142: 133: 120: 116: 112: 103: 99: 96: 92: 88: 79: 52: 40:social media 27: 23: 19: 18: 1370:Researchers 1102:Aggregation 819:. WIRED UK. 633:December 4, 608:December 4, 574:December 4, 63:Carl Miller 55:David Omand 32:data points 1477:Categories 1304:Overchoice 1142:Social bot 1088:Models and 1069:Social web 898:Adolescent 797:1511.06858 277:References 231:Social bot 156:Google Ads 135:possible. 1430:espionage 1242:Phenomena 1181:Economics 1090:processes 777:1726-670X 714:2067-7693 682:March 21, 603:0261-3077 569:1059-1028 542:1941-1294 363:cite book 139:Marketing 982:theories 958:Services 909:Networks 873:Personal 185:See also 175:Facebook 65:for the 1385:Persona 466:AP News 416:: 1–10. 179:YouTube 167:Twitter 28:SOCMINT 893:Clique 883:Sexual 775:  712:  601:  567:  540:  351:  171:Tumblr 158:, and 152:Google 1428:This 1339:Tribe 888:Value 866:Types 792:arXiv 561:Wired 518:(PDF) 71:Demos 48:OSINT 38:from 1434:stub 926:list 857:and 773:ISSN 736:2023 710:ISSN 684:2023 661:2023 635:2023 610:2023 599:ISSN 576:2023 565:ISSN 538:ISSN 500:2023 474:2023 448:2023 395:2013 369:link 349:ISBN 303:2013 61:and 763:doi 530:doi 26:or 24:SMI 1479:: 771:. 757:. 753:. 704:. 700:. 651:. 626:. 597:. 593:. 563:. 559:. 536:. 526:25 524:. 520:. 490:. 464:. 439:. 422:^ 412:. 385:. 365:}} 361:{{ 333:^ 311:^ 294:. 169:, 77:. 57:, 1465:e 1458:t 1451:v 1440:. 929:) 923:( 847:e 840:t 833:v 800:. 794:: 779:. 765:: 759:9 738:. 716:. 706:7 686:. 663:. 637:. 612:. 578:. 544:. 532:: 502:. 476:. 450:. 397:. 371:) 357:. 305:. 22:(

Index

data points
intelligence gathering
social media
social networks
OSINT
David Omand
Jamie Bartlett
Carl Miller
Centre for the Analysis of Social Media
Demos
Regulation of Investigatory Powers Act 2000
Christopher Wylie
Google
Google Ads
Google AdSense
Twitter
Tumblr
Facebook
YouTube
Algorithmic curation
Ambient awareness
Collective influence algorithm
Information retrieval
Media intelligence
Online algorithm
Open-source intelligence
Sentiment analysis
Social bot
Social cloud computing
Social data revolution

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.