1422:
181:(largest video sharing and hosting website), Blogs and discussion forums are being misused by extremist groups for spreading their beliefs and ideologies, promoting radicalization, recruiting members and creating online virtual communities sharing a common agenda. Popular microblogging websites such as Twitter are being used as a real-time platform for information sharing and communication during the planning and mobilization of civil unrest-related events.
162:. Surprisingly, most of its revenue comes from advertising, not direct sales of its services or products. Google makes money by selling advertising services to advertisers. They provide ad space to websites on Google, and target ads to consumers of Google services and products. Google can market ads using SOCMINT to collect data from its users and generate revenue.
148:
and experiences within social networks. ASNI is expected to evolve rapidly, influencing how we interact online and shaping their digital experiences. Transparency, ethical considerations, media influence bias, and user control over data will be crucial to ensure responsible development and positive impact.
121:
An example of how SOCMINT is used to affect political opinions is the
Cambridge Analytica Scandal. Cambridge Analytica was a company that purchased data from Facebook about its users without the consent or knowledge of Americans. They used this data to build a "psychological warfare tool" to persuade
104:
In the UK, the
Association of Chief Police Officers of England, Wales, and Northern Ireland emphasized the significance of social media in intelligence gathering during anti-fracking protests in 2011. Social media analysis closely monitored protests against the badger cull in 2013, with a 2013 report
134:
In
September of 2023, the Philadelphia Police Department began using social media to track and stay one step ahead of criminal activity to stop meetups and potential robberies. This new approach has made officers utilize another tool in their field by being able to find new information as quickly as
100:
In the United States, ZeroFOX faced criticism for sharing a report with
Baltimore officials showcasing how their social media monitoring tool could track riots following Freddie Gray's funeral. The report labeled 19 individuals, including two prominent figures from the #BlackLivesMatter movement, as
147:
Artificial Social
Networking Intelligence (ASNI) refers to the application of artificial intelligence within social networking services and social media platforms. It encompasses various technologies and techniques used to automate, personalize, enhance, improve, and synchronize user's interactions
89:
In
Thailand, the Technology Crime Suppression Division not only employs a 30-person team to scrutinize social media for content deemed disrespectful to the monarchy, known as lèse-majesté but also encourages citizens to report such content. Particularly targeting the youth, they run a "Cyber Scout"
80:
Given the dynamic evolution of social media and social media monitoring, our current understanding of how social media monitoring can help organizations create business value is inadequate. As a result, there is a need to study how organizations can (a) extract and analyze social media data related
117:
In a broad sense, social media refers to a conversational, distributed mode of content generation, dissemination, and communication among communities. Different from broadcast-based traditional and industrial media, social media has torn down the boundaries between authorship and readership, while
143:
SOCMINT collects data from both organizations and people on an individual level. It has a variety of different purposes, and though its main goal is to improve national security advancements, there are several other benefits as well. This intelligence can identify patterns, predict trends, gather
113:
During the 2016 United States presidential election, the Senate
Intelligence Committee released reports containing information about Russia’s use of troll farms to mislead black voters about voting. Also, German researchers in 2010 analyzed Twitter messages regarding the German federal election
93:
Instances in Israel involve the arrest of
Palestinians by the police for their social media posts. An example includes a 15-year-old girl who posted a Facebook status with the words "forgive me," raising suspicions among Israeli authorities that she might be planning an attack.
73:. The authors argued that social media is now an important part of intelligence and security work, but that technological, analytical, and regulatory changes are needed before it can be considered a powerful new form of intelligence, including amendments to the United Kingdom
126:, the whistleblower, reported that personal information was taken in early 2014, and used to build a system that could target US voters with personalized pollical advertisements. More than 50 million individuals' data was exploited and manipulated.
322:
97:
In Egypt, a leaked 2014 call for tender from the
Ministry of Interior reveals efforts to procure a social media monitoring system to identify leading figures and prevent protests before they occur.
924:
200:
790:
Agarwal, Swati; Sureka, Ashish (November 21, 2015). "Applying Social Media
Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats".
105:
revealing a team of 17 officers in the National Domestic Extremism Unit scanning public tweets, YouTube videos, Facebook profiles, and other online content from UK citizens.
154:
provides many free services and has built an entire media brand with its vast variety of products. Along with data collection, Google also owns two advertising services,
970:
30:) comprises the collective tools and solutions that allow organizations to analyze conversations, respond to synchronize social signals, and synthesize social
324:
Socmint: die monitering van sosiale media vir gemeenskapsveiligheidsdoeleindes binne 'n grootdataraamwerk in Suid-Afrika met spesifieke verwysing na Orania
118:
the information consumption and dissemination process is becoming intrinsically intertwined with the process of generating and sharing information.
81:
to their business (Sensing), and (b) utilize external intelligence gained from social media monitoring for specific business initiatives (Seizing).
368:
144:
information in current time, etc. In addition, these aspects have allowed for both improvement within businesses and help for law enforcement.
382:
1507:
845:
74:
1463:
590:
66:
1492:
352:
90:
program where participants are rewarded for reporting individuals posting material perceived as detrimental to the monarchy.
675:
487:
1369:
965:
1517:
414:
ACIS 2012: Location, Location, Location: Proceedings of the 23rd Australasian Conference on Information Systems 2012
291:
1497:
1487:
1156:
1078:
755:
TripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society
270:
816:
648:
1106:
1008:
838:
34:
into meaningful trends and analysis, based on the user's needs. Social media intelligence allows one to utilize
1512:
556:
947:
1456:
1018:
932:
877:
436:
1161:
1043:
58:
1248:
1101:
937:
920:
831:
1384:
1308:
1121:
1058:
957:
623:
255:
1522:
1437:
1333:
1318:
220:
47:
1449:
1278:
1268:
1063:
1313:
1151:
1038:
1033:
1028:
1013:
1003:
915:
591:"Revealed: 50 million Facebook profiles harvested for Cambridge Analytica in major data breach"
514:
245:
240:
235:
35:
727:
461:
1502:
1482:
1253:
1197:
1131:
942:
750:
205:
70:
1359:
1298:
1207:
1096:
998:
190:
62:
8:
1328:
1323:
1171:
1116:
1073:
1053:
250:
697:
114:
concluding that Twitter played a role in leading users to a specific political opinion.
1293:
1288:
1283:
1273:
1263:
1126:
993:
791:
410:"Understanding the role of social media monitoring in generating external intelligence"
362:
225:
210:
1401:
1258:
1192:
1166:
1136:
988:
897:
772:
709:
598:
564:
537:
348:
195:
123:
649:"Looting in Philadelphia: How social media is playing a key role - CBS Philadelphia"
1421:
1389:
1343:
1338:
872:
823:
762:
529:
342:
260:
215:
1379:
1232:
1222:
1217:
1202:
265:
1433:
1396:
1227:
1187:
1023:
882:
854:
751:"Selling You and Your Clicks: Examining the Audience Commodification of Google"
159:
43:
767:
1476:
1364:
1212:
1111:
887:
776:
713:
602:
568:
541:
409:
1374:
1146:
858:
624:"History of the Cambridge Analytica Controversy | Bipartisan Policy Center"
165:
Research shows that various social media platforms on the Internet such as
39:
533:
54:
42:
sites, using both intrusive or non-intrusive means, from open and closed
31:
1303:
1141:
1068:
230:
155:
1429:
16:
Tools for analyzing and synchronizing data from social media websites
122:
US voters to elect Donald Trump as president in the 2016 election.
796:
174:
340:
408:
Mayeh, Maral; Scheepers, Rens; Valos, Michael (January 1, 2012).
178:
166:
892:
170:
151:
557:"How Cambridge Analytica Sparked the Great Privacy Awakening"
462:"Report: Russia still using social media to roil US politics"
589:
Cadwalladr, Carole; Graham-Harrison, Emma (March 17, 2018).
971:
List of virtual communities with more than 1 million users
698:"Social Media Intelligence: Opportunities And Limitations"
588:
336:
334:
728:"What is Social Media Intelligence (SOCMINT)? | Brand24"
46:. This type of intelligence gathering is one element of
749:
Kang, Hyunjin; McAllister, Matthew P. (June 23, 2011).
513:
Zeng, D.; Chen, H.; Lusch, R.; Li, S. (November 2010).
331:
853:
341:
Omand, David; Bartlett, Jamie; Miller, Carl (2012).
292:"Former spy chief calls for laws on online snooping"
437:"Social Media Intelligence | Privacy International"
407:
53:The term was coined in a 2012 paper written by Sir
1474:
512:
108:
748:
316:
314:
312:
1457:
839:
789:
289:
367:: CS1 maint: multiple names: authors list (
814:
309:
75:Regulation of Investigatory Powers Act 2000
1464:
1450:
846:
832:
488:"Social Media As An Intelligence Goldmine"
795:
766:
515:"Social Media Analytics and Intelligence"
290:Norton-Taylor, Richard (April 24, 2012).
320:
177:(a popular social networking website),
67:Centre for the Analysis of Social Media
1475:
817:"Meet PRISM's little brother: Socmint"
827:
1416:
554:
431:
429:
427:
425:
423:
383:"Warning over net surveillance move"
84:
13:
1508:Intelligence gathering disciplines
966:List of social networking services
129:
69:, at the London-based think tank,
14:
1534:
808:
673:
420:
1420:
1157:Social network analysis software
1079:Virtual collective consciousness
271:Virtual collective consciousness
1009:Organizational network analysis
783:
742:
720:
690:
676:"Social Media Marketing Agency"
667:
641:
616:
582:
548:
506:
480:
454:
401:
375:
283:
201:Collective influence algorithm
1:
1493:Social information processing
948:Personal knowledge networking
815:Paul Wright (June 26, 2013).
276:
50:(Open- Source Intelligence).
1436:. You can help Knowledge by
1019:Social aspects of television
933:Enterprise social networking
138:
109:Effects on Political Opinion
7:
1162:Social networking potential
1044:Social media and psychology
184:
173:(micro-blogging websites),
10:
1539:
1415:
1249:Algorithmic radicalization
938:Enterprise social software
921:Distributed social network
347:. London, England: Demos.
1352:
1309:Six degrees of separation
1241:
1180:
1122:Collaborative consumption
1087:
1059:Social media optimization
1049:Social media intelligence
979:
956:
908:
865:
768:10.31269/triplec.v9i2.255
327:, LitNet Akademies 15(3).
256:Social media optimization
20:Social media intelligence
1518:Open-source intelligence
1334:Suicide and the Internet
1319:Social media and suicide
522:IEEE Intelligent Systems
441:privacyinternational.org
221:Open-source intelligence
1498:Collective intelligence
1488:Social media management
1279:Friending and following
1269:Consequential strangers
1064:Social network analysis
1432:-related article is a
1314:Social media addiction
1152:Social media analytics
1039:Social identity theory
1034:Social exchange theory
1029:Social data revolution
1014:Small-world experiment
916:Corporate social media
246:Social media analytics
241:Social data revolution
236:Social cloud computing
36:intelligence gathering
1513:Mass media monitoring
1254:Community recognition
1198:Collaborative finance
1132:Lateral communication
943:Mobile social network
708:(2A): 505–510. 2015.
492:Cyber Security Review
206:Information retrieval
1360:Friendship recession
1299:Information overload
1208:Influencer marketing
1097:Account verification
1004:Interpersonal bridge
999:Attention inequality
655:. September 29, 2023
628:bipartisanpolicy.org
534:10.1109/MIS.2010.151
321:Senekal, BA (2018),
191:Algorithmic curation
1329:Social network game
1324:Social invisibility
1172:Structural cohesion
1117:Collaboration graph
1074:Structural endogamy
1054:Social media mining
468:. December 18, 2018
251:Social media mining
1294:Internet addiction
1289:Influence-for-hire
1284:Friendship paradox
1274:Friend of a friend
1264:Computer addiction
1127:Giant Global Graph
994:Assortative mixing
730:. October 27, 2023
702:CES Working Papers
226:Sentiment analysis
211:Media intelligence
101:"threat actors."
1445:
1444:
1410:
1409:
1402:Virtual community
1259:Complex contagion
1193:Attention economy
1167:Social television
1137:Reputation system
989:Ambient awareness
555:Lapowsky, Issie.
354:978-1-909037-08-3
196:Ambient awareness
124:Christopher Wylie
1530:
1466:
1459:
1452:
1424:
1417:
1390:Social profiling
1344:Viral phenomenon
1107:Change detection
848:
841:
834:
825:
824:
820:
802:
801:
799:
787:
781:
780:
770:
746:
740:
739:
737:
735:
724:
718:
717:
694:
688:
687:
685:
683:
671:
665:
664:
662:
660:
645:
639:
638:
636:
634:
620:
614:
613:
611:
609:
586:
580:
579:
577:
575:
552:
546:
545:
519:
510:
504:
503:
501:
499:
494:. March 15, 2016
484:
478:
477:
475:
473:
458:
452:
451:
449:
447:
433:
418:
417:
405:
399:
398:
396:
394:
389:. April 24, 2012
379:
373:
372:
366:
358:
338:
329:
328:
318:
307:
306:
304:
302:
287:
261:Social profiling
216:Online algorithm
85:Governmental Use
1538:
1537:
1533:
1532:
1531:
1529:
1528:
1527:
1523:Espionage stubs
1473:
1472:
1471:
1470:
1413:
1411:
1406:
1380:Online identity
1348:
1237:
1233:Viral marketing
1223:Social commerce
1218:Sharing economy
1203:Creator economy
1176:
1089:
1083:
981:
975:
952:
904:
861:
855:Social networks
852:
811:
806:
805:
788:
784:
747:
743:
733:
731:
726:
725:
721:
696:
695:
691:
681:
679:
672:
668:
658:
656:
653:www.cbsnews.com
647:
646:
642:
632:
630:
622:
621:
617:
607:
605:
587:
583:
573:
571:
553:
549:
517:
511:
507:
497:
495:
486:
485:
481:
471:
469:
460:
459:
455:
445:
443:
435:
434:
421:
406:
402:
392:
390:
381:
380:
376:
360:
359:
355:
339:
332:
319:
310:
300:
298:
288:
284:
279:
266:Social software
187:
141:
132:
130:Law Enforcement
111:
87:
44:social networks
17:
12:
11:
5:
1536:
1526:
1525:
1520:
1515:
1510:
1505:
1500:
1495:
1490:
1485:
1469:
1468:
1461:
1454:
1446:
1443:
1442:
1425:
1408:
1407:
1405:
1404:
1399:
1397:Viral messages
1394:
1393:
1392:
1387:
1382:
1372:
1367:
1362:
1356:
1354:
1353:Related topics
1350:
1349:
1347:
1346:
1341:
1336:
1331:
1326:
1321:
1316:
1311:
1306:
1301:
1296:
1291:
1286:
1281:
1276:
1271:
1266:
1261:
1256:
1251:
1245:
1243:
1239:
1238:
1236:
1235:
1230:
1228:Social sorting
1225:
1220:
1215:
1210:
1205:
1200:
1195:
1190:
1188:Affinity fraud
1184:
1182:
1178:
1177:
1175:
1174:
1169:
1164:
1159:
1154:
1149:
1144:
1139:
1134:
1129:
1124:
1119:
1114:
1109:
1104:
1099:
1093:
1091:
1085:
1084:
1082:
1081:
1076:
1071:
1066:
1061:
1056:
1051:
1046:
1041:
1036:
1031:
1026:
1024:Social capital
1021:
1016:
1011:
1006:
1001:
996:
991:
985:
983:
977:
976:
974:
973:
968:
962:
960:
954:
953:
951:
950:
945:
940:
935:
930:
918:
912:
910:
906:
905:
903:
902:
901:
900:
890:
885:
880:
875:
869:
867:
863:
862:
851:
850:
843:
836:
828:
822:
821:
810:
809:External links
807:
804:
803:
782:
761:(2): 141–153.
741:
719:
689:
674:Terry, Roger.
666:
640:
615:
581:
547:
505:
479:
453:
419:
400:
387:The Sunday Sun
374:
353:
330:
308:
281:
280:
278:
275:
274:
273:
268:
263:
258:
253:
248:
243:
238:
233:
228:
223:
218:
213:
208:
203:
198:
193:
186:
183:
160:Google AdSense
140:
137:
131:
128:
110:
107:
86:
83:
59:Jamie Bartlett
15:
9:
6:
4:
3:
2:
1535:
1524:
1521:
1519:
1516:
1514:
1511:
1509:
1506:
1504:
1501:
1499:
1496:
1494:
1491:
1489:
1486:
1484:
1481:
1480:
1478:
1467:
1462:
1460:
1455:
1453:
1448:
1447:
1441:
1439:
1435:
1431:
1426:
1423:
1419:
1418:
1414:
1403:
1400:
1398:
1395:
1391:
1388:
1386:
1383:
1381:
1378:
1377:
1376:
1373:
1371:
1368:
1366:
1365:Peer pressure
1363:
1361:
1358:
1357:
1355:
1351:
1345:
1342:
1340:
1337:
1335:
1332:
1330:
1327:
1325:
1322:
1320:
1317:
1315:
1312:
1310:
1307:
1305:
1302:
1300:
1297:
1295:
1292:
1290:
1287:
1285:
1282:
1280:
1277:
1275:
1272:
1270:
1267:
1265:
1262:
1260:
1257:
1255:
1252:
1250:
1247:
1246:
1244:
1240:
1234:
1231:
1229:
1226:
1224:
1221:
1219:
1216:
1214:
1213:Narrowcasting
1211:
1209:
1206:
1204:
1201:
1199:
1196:
1194:
1191:
1189:
1186:
1185:
1183:
1179:
1173:
1170:
1168:
1165:
1163:
1160:
1158:
1155:
1153:
1150:
1148:
1145:
1143:
1140:
1138:
1135:
1133:
1130:
1128:
1125:
1123:
1120:
1118:
1115:
1113:
1112:Blockmodeling
1110:
1108:
1105:
1103:
1100:
1098:
1095:
1094:
1092:
1086:
1080:
1077:
1075:
1072:
1070:
1067:
1065:
1062:
1060:
1057:
1055:
1052:
1050:
1047:
1045:
1042:
1040:
1037:
1035:
1032:
1030:
1027:
1025:
1022:
1020:
1017:
1015:
1012:
1010:
1007:
1005:
1002:
1000:
997:
995:
992:
990:
987:
986:
984:
978:
972:
969:
967:
964:
963:
961:
959:
955:
949:
946:
944:
941:
939:
936:
934:
931:
928:
927:
922:
919:
917:
914:
913:
911:
907:
899:
896:
895:
894:
891:
889:
886:
884:
881:
879:
876:
874:
871:
870:
868:
864:
860:
856:
849:
844:
842:
837:
835:
830:
829:
826:
818:
813:
812:
798:
793:
786:
778:
774:
769:
764:
760:
756:
752:
745:
729:
723:
715:
711:
707:
703:
699:
693:
677:
670:
654:
650:
644:
629:
625:
619:
604:
600:
596:
592:
585:
570:
566:
562:
558:
551:
543:
539:
535:
531:
527:
523:
516:
509:
493:
489:
483:
467:
463:
457:
442:
438:
432:
430:
428:
426:
424:
415:
411:
404:
388:
384:
378:
370:
364:
356:
350:
346:
345:
344:#Intelligence
337:
335:
326:
325:
317:
315:
313:
297:
293:
286:
282:
272:
269:
267:
264:
262:
259:
257:
254:
252:
249:
247:
244:
242:
239:
237:
234:
232:
229:
227:
224:
222:
219:
217:
214:
212:
209:
207:
204:
202:
199:
197:
194:
192:
189:
188:
182:
180:
176:
172:
168:
163:
161:
157:
153:
149:
145:
136:
127:
125:
119:
115:
106:
102:
98:
95:
91:
82:
78:
76:
72:
68:
64:
60:
56:
51:
49:
45:
41:
37:
33:
29:
25:
21:
1503:Surveillance
1483:Social media
1438:expanding it
1427:
1412:
1375:User profile
1147:Social graph
1048:
980:Concepts and
925:
878:Professional
859:social media
785:
758:
754:
744:
734:November 27,
732:. Retrieved
722:
705:
701:
692:
680:. Retrieved
678:. tmcnet.com
669:
659:November 27,
657:. Retrieved
652:
643:
631:. Retrieved
627:
618:
606:. Retrieved
595:The Guardian
594:
584:
572:. Retrieved
560:
550:
528:(6): 13–16.
525:
521:
508:
498:November 20,
496:. Retrieved
491:
482:
472:November 20,
470:. Retrieved
465:
456:
446:November 27,
444:. Retrieved
440:
413:
403:
393:February 22,
391:. Retrieved
386:
377:
343:
323:
301:February 22,
299:. Retrieved
296:The Guardian
295:
285:
164:
150:
146:
142:
133:
120:
116:
112:
103:
99:
96:
92:
88:
79:
52:
40:social media
27:
23:
19:
18:
1370:Researchers
1102:Aggregation
819:. WIRED UK.
633:December 4,
608:December 4,
574:December 4,
63:Carl Miller
55:David Omand
32:data points
1477:Categories
1304:Overchoice
1142:Social bot
1088:Models and
1069:Social web
898:Adolescent
797:1511.06858
277:References
231:Social bot
156:Google Ads
135:possible.
1430:espionage
1242:Phenomena
1181:Economics
1090:processes
777:1726-670X
714:2067-7693
682:March 21,
603:0261-3077
569:1059-1028
542:1941-1294
363:cite book
139:Marketing
982:theories
958:Services
909:Networks
873:Personal
185:See also
175:Facebook
65:for the
1385:Persona
466:AP News
416:: 1–10.
179:YouTube
167:Twitter
28:SOCMINT
893:Clique
883:Sexual
775:
712:
601:
567:
540:
351:
171:Tumblr
158:, and
152:Google
1428:This
1339:Tribe
888:Value
866:Types
792:arXiv
561:Wired
518:(PDF)
71:Demos
48:OSINT
38:from
1434:stub
926:list
857:and
773:ISSN
736:2023
710:ISSN
684:2023
661:2023
635:2023
610:2023
599:ISSN
576:2023
565:ISSN
538:ISSN
500:2023
474:2023
448:2023
395:2013
369:link
349:ISBN
303:2013
61:and
763:doi
530:doi
26:or
24:SMI
1479::
771:.
757:.
753:.
704:.
700:.
651:.
626:.
597:.
593:.
563:.
559:.
536:.
526:25
524:.
520:.
490:.
464:.
439:.
422:^
412:.
385:.
365:}}
361:{{
333:^
311:^
294:.
169:,
77:.
57:,
1465:e
1458:t
1451:v
1440:.
929:)
923:(
847:e
840:t
833:v
800:.
794::
779:.
765::
759:9
738:.
716:.
706:7
686:.
663:.
637:.
612:.
578:.
544:.
532::
502:.
476:.
450:.
397:.
371:)
357:.
305:.
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.