SlideShare a Scribd company logo
Ethical Implications of Social Media Data Mining by Police
University of Maryland University College (UMUC)
Group Epsilon
Group Epsilon
Executive Summary
Introduction
History
Current Trends
Alternatives
Conclusion
References
2
TABLE OF CONTENTS
Group Epsilon
EXECUTIVE SUMMARY
Social media is constantly inundated with posts that contain rich
and timely information about events relevant to public safety
Social media can be used track people as they move from one
location to the next
Software can be deployed to identify key words like “gun”,
“fight”, and “shoot” to track posts that are indicative of danger
and/or criminal activity
The goal of these programs and the partnership with law
enforcement is to bypass privacy options of the social media
sites
Social media data mining has great potential to make policing
more proactive – But is it legal? Ethical?
Authorities are already using social media, such as posts and
comments, to store information and to keep tabs on people
Facebook and Instagram oppose this effort
3
Group Epsilon
INTRODUCTION
Is social media data mining ethical?
Should the government and law enforcement agencies be legally
authorized to undermine resident privacy in an effort to
prevent/deter crime?
What is the public’s reasonable expectation of privacy?
Is social data mining considered a warrantless search?
Social media posts are public – does that make it legal and
ethical to monitor an individual’s posts over a period of time?
Law enforcement agencies should reveal what data they are
collecting, how it is being collected, and what it is being used
for
Public education/engagement about this effort should be
mandatory!
Clear guidelines and regulations must be imposed on this
process!
4
Group Epsilon
HISTORY
100 Representatives attended a Social Media networking
workshop.
Included federal, state, and local governments, private sector,
and news media (to share case studies for learning).
Two goals to help emergency management learn how to:
Better protect communities.
Improve communication during crisis situations.
Police have been increasingly using social media
76% to gain tips on crime
72% to monitor public
70% for intelligence gathering
5
Group Epsilon
HISTORY (cont.)
California fires in 2018 used real-time updates on evacuations
and effected areas via social media outlets
Used to be done by TV and Radio which not everyone got the
information.
Amber Alerts posted on Facebook and twitter to increase
exposure.
Jurys using social media during trials is astoundingly high.
Juror was “friending” female defendant and got out of jury duty.
Results in numerous new trials and overturned verdicts.
Arkansas Supreme Court reverses capital murder conviction
because of juror repeatedly tweeted comments during trial.
6
Group Epsilon
Social Media posts can be loaded with useful data for policing.
This data can assist law enforcement with:
Quicker Interventions – Crime Prevention, Incident Targeting,
and Protest Awareness
Intelligence gathering – Hashtags, Live Streaming, Pictures of
Emergency Situations, and Potential Criminal Networks
Software is presently being used to sift through this collection
of data in an effort to pinpoint potential danger – Also used to
“flag” and track people
Geofeedia:: Bypasses security settings; monitors key words to
provide location based social data –”fight”, “shoot”, “bomb”
Snaptrends: : Creates “dummy” accounts to bait/attract sexual
offenders
Media Son : Looks for insider threats through back-end social
media monitoring.
*Facebook, Instagram, and Twitter have blocked these
companies
7
CURRENT TRENDS
Group Epsilon
American Civil Liberties Union (ACLU) claims law
enforcement is targeting racially loaded phrases
#blacklivesmatter, #DontShoot, #muslimlivesmatter
Boston Police has been accused of prejudice – Their social
mining efforts have caused great public distrust
Current social media data mining practices are an invasion of
privacy and a violation of civil rights
Social media posts are public, but bypassing security settings to
monitor people over time and tracking citizen’s movement is
unethical and should be deemed illegal
This could be considered warrantless digital searching
Social media can be used for positive police to public
engagement - Safety messages, danger areas, etc.
Research shows that the existence of this engagement is low
Social media is more commonly used to make police look bad
8
CURRENT TRENDS (cont.)
Group Epsilon
Public safety is becoming more technologically sophisticated
Citizens should expect more community engagement by public
safety organizations via social media
Law enforcement agencies have evolved from utilizing posters
to social networks and police radio.
Social media is being used in jury trials
Jurors collect data via social media to research cases and
defendants – Historical understanding of case and those
involved
This can result in an unfair trial or biased verdicts
Social media data mining has influenced how law enforcement
agencies respond to protests
Tracking highly charged phrases and hashtags provides police
with the awareness to keep organized protests under control
Also allows police to intervene and sometimes kill protests
before they start – Protesting is a legal right that should not be
infringed upon – Freedom of speech is being controlled
9
CURRENT TRENDS (cont.)
Group Epsilon
ALTERNATIVES
Social media, if strategically added to the larger information
environment, can help to provide the real-time “what,” the
“who,” the “why,” and the “how,” and may even help in
predicting the cascading effects of decisions, actions, and
changing hazards
Integrating social data within all aspects of response, from
planning, to training and exercises, will help to legitimize its
role in public safety and emergency response
Police agencies should provide links to their social media
accounts on their websites to build followers
10
Group Epsilon
ALTERNATIVES (cont.)
Published material should also have the same links to increase
law enforcement’s ability to communicate with the public
Jurors conducting their own research on the Internet could be
made a punishable offense (a form of statutory contempt) to
stop the use of social media during a trial
The use of e-government applications to provide information
from the government to citizens in a mono-directional manner
11
Group Epsilon
Law enforcement and public safety organizations have the
potential to also utilize social media in productive capacities
Disseminate productive outreach messages
Disseminate information related to criminal activity
Alert the public of required information for ongoing cases
Utilizing a large social media presence can be advantageous to
law enforcement organizations as they can rely on public
entities to help solve crimes
Using AI and machine learning to access available public
information to recreate crime scenes and capture other evidence
from pictures and other digital media
12
ALTERNATIVES (cont.)
Group Epsilon
ALTERNATIVES (cont.)
Agencies can incorporate warning and alert systems through
their social media fowling to keep citizens in their jurisdictions
informed on latest trends
Public safety and other governmental services can collaborate
with private business and organizations to request assistance
with local and regional criminal trends
Rather than conduct questionable monitoring of private social
media accounts, public safety organizations can also utilize
aggregate sentiment to utilize group trending to change policies
Examples would be used with Twitter hashtags where large
groups of citizens can tag areas of increased criminal activity
These tags would then inspire police in the area to change
policies related to public safety
13
Group Epsilon
CONCLUSION
Using social media to essentially “flag”, track, or target people
should not be allowed – this is unethical
There must be rules and regulations imposed to ensure that this
effort is legal and does not violate resident privacy
Does social mining actually work? Where is the evidence?
There must be more testing and more research
The U.S. 4th Amendment protects our right to privacy and the
1st Amendment protects our freedom of speech
People should not be targeted for what they say online
We should not have to adjust the way we talk
Social data mining results in racial profiling and can lead to
biased policing and unfair trials
Be careful what you say and don’t overshare on social media
because law enforcement is watching you!
14
Group Epsilon
15
REFERENCES
Bousquet, C. (2018). Mining Social Media Data for Policing,
the Ethical Way. Retrieved from
https://www.govtech.com/public-safety/Mining-Social-Media-
Data-for-Policing-the-Ethical-Way.html
Brainard, L., & Edlins, M. (2015). Top 10 US municipal police
departments and their social media usage. The American Review
of Public Administration, 45(6), 728-745.
Cohen, S. (2014). Social Media as a Sensor – Legitimizing the
Role of Social Media in Public Safety. Retrieved from
https://www.ghinternational.com/blog/legitimizing-the-role-of-
social-media-in-public-safety
Gavigan, J. (2010). Article Archive Details Hendon Publishing.
Retrieved from
http://www.hendonpub.com/resources/article_archive/results/det
ails?id=1536
Karakiz, Maria. (2015). The Impact of Social Media in the
Public Sector. Procedia – Social and Behavioral Sciences.
175.10.1016/j.sbspro.2015.01.1214
Pfeifer, W. (2018, December 5). Will Social Media Affect the
Outcome of Your Trial? Retrieved from
https://www.thebalancesmb.com/social-media-in-the-courtroom-
2151359
Tsytsarau, M. (2013). Large scale aggregated sentiment
analytics. DISI - University of Trento International Doctorate
School in Information and Communication Technologies.
Accessed from:
https://pdfs.semanticscholar.org/2d02/03f997c7d51983c57e78ea
2714cc7ec1376c.pdf.
Schneider, C. J. (2016). Policing and social media: Social
control in an era of new media. Lexington Books.
Waters, G. (2012). Social Media and Law Enforcement Potential
Risks. FBI Articles. Accessed from
https://leb.fbi.gov/articles/featured-articles/social-media-and-
law-enforcement.
Williams, C. B., Fedorowicz, J., Kavanaugh, A., Mentzer, K.,
Thatcher, J. B., & Xu, J. (2018). Leveraging social media to
achieve a community policing agenda. Government Information
Quarterly, 35(2), 210–222
Group Epsilon
Write a 5-7-page paper. Must be APA 6th Edition format, 1in
margin, 12pt font, New Times Roman or Ariel font Double
spaced, NO EXTRA SPACES , Properly formatted Section
headings as appropriate no less 5-7 legitimate, verifiable
sources try not to use the same sources as in the power point,
Cover page, abstract, body of paper, intext citations, reference
page. This is due Friday October 4, 2019 at 10Am Friday EST
36 hours. Plagiarism Free!!
Instructions
The Individual Paper is worth 100 points and is 30% of your
final grade. In this paper, implement a solution to the ethical
situation identified by the group in the group project. The
implementation paper is to include, but is not limited to
suggested training, identification of stakeholders, the
implementation plan and process, and a draft code of ethics. If
you make use of an existing code of ethics, make sure to
properly cite and reference the work of others. Material from
the group project PowerPoint presentation may be incorporated
as needed, but remember the vast majority of this paper must be
new original material. The body of the paper shall be 5 to 7
pages, excluding other material such as the cover page,
abstract, table of contents, graphics and tables, and references.
The Individual Implementation Paper shall contain:
· Cover Page
· Abstract
· Body of Paper (10to-12 pages)
· References Page
The paper shall be formatted as follows:
· APA 6th edition
· 1 inch margins
· 12 point font, either New Times Roman or Arial font style
· Double spaced, making sure there are no "extra" spaces in
between paragraphs
· Properly formatted Section headings as appropriate
Individual Paper
In the Individual Paper, implement a solution to the ethical
situation identified by the group in the group project. The
implementation paper is to include, but is not limited to
suggested training, identification of stakeholders, the
implementation plan and process, and a draft code of ethics. If
you make use of an existing code of ethics, make sure to
properly cite and reference the work of others. Material from
the group project PowerPoint presentation may be incorporated
as needed, but remember the vast majority of this paper must be
new original material. The body of the paper shall be 10 to 12
pages, excluding other material such as the cover page, abstract,
table of contents, graphics and tables, and references.

More Related Content

Similar to Ethical Implications of Social Media Data Mining by Police.docx

Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...
Felicia Barker
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
teresehearn
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
aulasnilda
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
Twittercrisis
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
Sherry Bailey
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
archiejones4
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
AttaUrRahman78
 
Social Media: The New DNA - flyer
Social Media: The New DNA - flyerSocial Media: The New DNA - flyer
Social Media: The New DNA - flyer
TNO
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
Ayodele Odubela
 
Policy Development Rough Draft Grading RubricCriteriaLevels.docx
Policy Development Rough Draft Grading RubricCriteriaLevels.docxPolicy Development Rough Draft Grading RubricCriteriaLevels.docx
Policy Development Rough Draft Grading RubricCriteriaLevels.docx
harrisonhoward80223
 
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Twittercrisis
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
Christy Davis
 
Big data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracyBig data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracy
Samos2019Summit
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
Tracy Clark
 
Role of media in criminal justice system.pptx
Role of media in criminal justice system.pptxRole of media in criminal justice system.pptx
Role of media in criminal justice system.pptx
Applied Forensic Research Sciences
 
A Pattern Language of Social Media in Public Security
A Pattern Language of Social Media in Public SecurityA Pattern Language of Social Media in Public Security
A Pattern Language of Social Media in Public Security
Sebastian Denef
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
archiejones4
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms Race
Dotmappers1
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-race
Hop Trieu Sung
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
Araz Taeihagh
 

Similar to Ethical Implications of Social Media Data Mining by Police.docx (20)

Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...Should The Government Surveillance Systems Affect Personal...
Should The Government Surveillance Systems Affect Personal...
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
 
1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx1) With Modern Surveillance technologies the government has the .docx
1) With Modern Surveillance technologies the government has the .docx
 
IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010IACP Social Media Concepts and Issues Paper September 2010
IACP Social Media Concepts and Issues Paper September 2010
 
Example Of Predictive Policing
Example Of Predictive PolicingExample Of Predictive Policing
Example Of Predictive Policing
 
Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
 
Social Media: The New DNA - flyer
Social Media: The New DNA - flyerSocial Media: The New DNA - flyer
Social Media: The New DNA - flyer
 
Social Justice & Black Twitter
Social Justice & Black TwitterSocial Justice & Black Twitter
Social Justice & Black Twitter
 
Policy Development Rough Draft Grading RubricCriteriaLevels.docx
Policy Development Rough Draft Grading RubricCriteriaLevels.docxPolicy Development Rough Draft Grading RubricCriteriaLevels.docx
Policy Development Rough Draft Grading RubricCriteriaLevels.docx
 
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
Lexis Nexis Law Enforcement Personnel Use of Social Media in Investigations: ...
 
Surveillance In 1984
Surveillance In 1984Surveillance In 1984
Surveillance In 1984
 
Big data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracyBig data analytics: from threatening privacy to challenging democracy
Big data analytics: from threatening privacy to challenging democracy
 
Internet Crime And Moral Responsibility
Internet Crime And Moral ResponsibilityInternet Crime And Moral Responsibility
Internet Crime And Moral Responsibility
 
Role of media in criminal justice system.pptx
Role of media in criminal justice system.pptxRole of media in criminal justice system.pptx
Role of media in criminal justice system.pptx
 
A Pattern Language of Social Media in Public Security
A Pattern Language of Social Media in Public SecurityA Pattern Language of Social Media in Public Security
A Pattern Language of Social Media in Public Security
 
Targeted disinformation warfare how and why foreign efforts are
Targeted disinformation warfare  how and why foreign efforts areTargeted disinformation warfare  how and why foreign efforts are
Targeted disinformation warfare how and why foreign efforts are
 
Big Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms RaceBig Data: A Twenty-First Century Arms Race
Big Data: A Twenty-First Century Arms Race
 
The big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-raceThe big-data-a-twenty-first-century-arms-race
The big-data-a-twenty-first-century-arms-race
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 

More from theodorelove43763

Exam Questions1. (Mandatory) Assess the strengths and weaknesse.docx
Exam Questions1. (Mandatory) Assess the strengths and weaknesse.docxExam Questions1. (Mandatory) Assess the strengths and weaknesse.docx
Exam Questions1. (Mandatory) Assess the strengths and weaknesse.docx
theodorelove43763
 
Evolving Leadership roles in HIM1. Increased adoption of hea.docx
Evolving Leadership roles in HIM1. Increased adoption of hea.docxEvolving Leadership roles in HIM1. Increased adoption of hea.docx
Evolving Leadership roles in HIM1. Increased adoption of hea.docx
theodorelove43763
 
exam 2 logiWhatsApp Image 2020-01-18 at 1.01.20 AM (1).jpeg.docx
exam 2 logiWhatsApp Image 2020-01-18 at 1.01.20 AM (1).jpeg.docxexam 2 logiWhatsApp Image 2020-01-18 at 1.01.20 AM (1).jpeg.docx
exam 2 logiWhatsApp Image 2020-01-18 at 1.01.20 AM (1).jpeg.docx
theodorelove43763
 
Evolution of Terrorism300wrdDo you think terrorism has bee.docx
Evolution of Terrorism300wrdDo you think terrorism has bee.docxEvolution of Terrorism300wrdDo you think terrorism has bee.docx
Evolution of Terrorism300wrdDo you think terrorism has bee.docx
theodorelove43763
 
Evidence-based practice is an approach to health care where health c.docx
Evidence-based practice is an approach to health care where health c.docxEvidence-based practice is an approach to health care where health c.docx
Evidence-based practice is an approach to health care where health c.docx
theodorelove43763
 
Evidence-Based EvaluationEvidence-based practice is importan.docx
Evidence-Based EvaluationEvidence-based practice is importan.docxEvidence-Based EvaluationEvidence-based practice is importan.docx
Evidence-Based EvaluationEvidence-based practice is importan.docx
theodorelove43763
 
Evidence TableStudy CitationDesignMethodSampleData C.docx
Evidence TableStudy CitationDesignMethodSampleData C.docxEvidence TableStudy CitationDesignMethodSampleData C.docx
Evidence TableStudy CitationDesignMethodSampleData C.docx
theodorelove43763
 
Evidence SynthesisCritique the below evidence synthesis ex.docx
Evidence SynthesisCritique the below evidence synthesis ex.docxEvidence SynthesisCritique the below evidence synthesis ex.docx
Evidence SynthesisCritique the below evidence synthesis ex.docx
theodorelove43763
 
Evidence Collection PolicyScenarioAfter the recent secur.docx
Evidence Collection PolicyScenarioAfter the recent secur.docxEvidence Collection PolicyScenarioAfter the recent secur.docx
Evidence Collection PolicyScenarioAfter the recent secur.docx
theodorelove43763
 
Everyone Why would companies have quality programs even though they.docx
Everyone Why would companies have quality programs even though they.docxEveryone Why would companies have quality programs even though they.docx
Everyone Why would companies have quality programs even though they.docx
theodorelove43763
 
Even though technology has shifted HRM to strategic partner, has thi.docx
Even though technology has shifted HRM to strategic partner, has thi.docxEven though technology has shifted HRM to strategic partner, has thi.docx
Even though technology has shifted HRM to strategic partner, has thi.docx
theodorelove43763
 
Even though people are aware that earthquakes and volcanoes typi.docx
Even though people are aware that earthquakes and volcanoes typi.docxEven though people are aware that earthquakes and volcanoes typi.docx
Even though people are aware that earthquakes and volcanoes typi.docx
theodorelove43763
 
Evaluative Essay 2 Grading RubricCriteriaLevels of Achievement.docx
Evaluative Essay 2 Grading RubricCriteriaLevels of Achievement.docxEvaluative Essay 2 Grading RubricCriteriaLevels of Achievement.docx
Evaluative Essay 2 Grading RubricCriteriaLevels of Achievement.docx
theodorelove43763
 
Evaluation Title Research DesignFor this first assignment, .docx
Evaluation Title Research DesignFor this first assignment, .docxEvaluation Title Research DesignFor this first assignment, .docx
Evaluation Title Research DesignFor this first assignment, .docx
theodorelove43763
 
Evaluation is the set of processes and methods that managers and sta.docx
Evaluation is the set of processes and methods that managers and sta.docxEvaluation is the set of processes and methods that managers and sta.docx
Evaluation is the set of processes and methods that managers and sta.docx
theodorelove43763
 
Evaluation Plan with Policy RecommendationAfter a program ha.docx
Evaluation Plan with Policy RecommendationAfter a program ha.docxEvaluation Plan with Policy RecommendationAfter a program ha.docx
Evaluation Plan with Policy RecommendationAfter a program ha.docx
theodorelove43763
 
Evaluating 19-Channel Z-score Neurofeedback Addressi.docx
Evaluating 19-Channel Z-score Neurofeedback  Addressi.docxEvaluating 19-Channel Z-score Neurofeedback  Addressi.docx
Evaluating 19-Channel Z-score Neurofeedback Addressi.docx
theodorelove43763
 
Evaluate the history of the Data Encryption Standard (DES) and then .docx
Evaluate the history of the Data Encryption Standard (DES) and then .docxEvaluate the history of the Data Encryption Standard (DES) and then .docx
Evaluate the history of the Data Encryption Standard (DES) and then .docx
theodorelove43763
 
Evaluate the Health History and Medical Information for Mrs. J.,.docx
Evaluate the Health History and Medical Information for Mrs. J.,.docxEvaluate the Health History and Medical Information for Mrs. J.,.docx
Evaluate the Health History and Medical Information for Mrs. J.,.docx
theodorelove43763
 
Evaluate the environmental factors that contribute to corporate mana.docx
Evaluate the environmental factors that contribute to corporate mana.docxEvaluate the environmental factors that contribute to corporate mana.docx
Evaluate the environmental factors that contribute to corporate mana.docx
theodorelove43763
 

More from theodorelove43763 (20)

Exam Questions1. (Mandatory) Assess the strengths and weaknesse.docx
Exam Questions1. (Mandatory) Assess the strengths and weaknesse.docxExam Questions1. (Mandatory) Assess the strengths and weaknesse.docx
Exam Questions1. (Mandatory) Assess the strengths and weaknesse.docx
 
Evolving Leadership roles in HIM1. Increased adoption of hea.docx
Evolving Leadership roles in HIM1. Increased adoption of hea.docxEvolving Leadership roles in HIM1. Increased adoption of hea.docx
Evolving Leadership roles in HIM1. Increased adoption of hea.docx
 
exam 2 logiWhatsApp Image 2020-01-18 at 1.01.20 AM (1).jpeg.docx
exam 2 logiWhatsApp Image 2020-01-18 at 1.01.20 AM (1).jpeg.docxexam 2 logiWhatsApp Image 2020-01-18 at 1.01.20 AM (1).jpeg.docx
exam 2 logiWhatsApp Image 2020-01-18 at 1.01.20 AM (1).jpeg.docx
 
Evolution of Terrorism300wrdDo you think terrorism has bee.docx
Evolution of Terrorism300wrdDo you think terrorism has bee.docxEvolution of Terrorism300wrdDo you think terrorism has bee.docx
Evolution of Terrorism300wrdDo you think terrorism has bee.docx
 
Evidence-based practice is an approach to health care where health c.docx
Evidence-based practice is an approach to health care where health c.docxEvidence-based practice is an approach to health care where health c.docx
Evidence-based practice is an approach to health care where health c.docx
 
Evidence-Based EvaluationEvidence-based practice is importan.docx
Evidence-Based EvaluationEvidence-based practice is importan.docxEvidence-Based EvaluationEvidence-based practice is importan.docx
Evidence-Based EvaluationEvidence-based practice is importan.docx
 
Evidence TableStudy CitationDesignMethodSampleData C.docx
Evidence TableStudy CitationDesignMethodSampleData C.docxEvidence TableStudy CitationDesignMethodSampleData C.docx
Evidence TableStudy CitationDesignMethodSampleData C.docx
 
Evidence SynthesisCritique the below evidence synthesis ex.docx
Evidence SynthesisCritique the below evidence synthesis ex.docxEvidence SynthesisCritique the below evidence synthesis ex.docx
Evidence SynthesisCritique the below evidence synthesis ex.docx
 
Evidence Collection PolicyScenarioAfter the recent secur.docx
Evidence Collection PolicyScenarioAfter the recent secur.docxEvidence Collection PolicyScenarioAfter the recent secur.docx
Evidence Collection PolicyScenarioAfter the recent secur.docx
 
Everyone Why would companies have quality programs even though they.docx
Everyone Why would companies have quality programs even though they.docxEveryone Why would companies have quality programs even though they.docx
Everyone Why would companies have quality programs even though they.docx
 
Even though technology has shifted HRM to strategic partner, has thi.docx
Even though technology has shifted HRM to strategic partner, has thi.docxEven though technology has shifted HRM to strategic partner, has thi.docx
Even though technology has shifted HRM to strategic partner, has thi.docx
 
Even though people are aware that earthquakes and volcanoes typi.docx
Even though people are aware that earthquakes and volcanoes typi.docxEven though people are aware that earthquakes and volcanoes typi.docx
Even though people are aware that earthquakes and volcanoes typi.docx
 
Evaluative Essay 2 Grading RubricCriteriaLevels of Achievement.docx
Evaluative Essay 2 Grading RubricCriteriaLevels of Achievement.docxEvaluative Essay 2 Grading RubricCriteriaLevels of Achievement.docx
Evaluative Essay 2 Grading RubricCriteriaLevels of Achievement.docx
 
Evaluation Title Research DesignFor this first assignment, .docx
Evaluation Title Research DesignFor this first assignment, .docxEvaluation Title Research DesignFor this first assignment, .docx
Evaluation Title Research DesignFor this first assignment, .docx
 
Evaluation is the set of processes and methods that managers and sta.docx
Evaluation is the set of processes and methods that managers and sta.docxEvaluation is the set of processes and methods that managers and sta.docx
Evaluation is the set of processes and methods that managers and sta.docx
 
Evaluation Plan with Policy RecommendationAfter a program ha.docx
Evaluation Plan with Policy RecommendationAfter a program ha.docxEvaluation Plan with Policy RecommendationAfter a program ha.docx
Evaluation Plan with Policy RecommendationAfter a program ha.docx
 
Evaluating 19-Channel Z-score Neurofeedback Addressi.docx
Evaluating 19-Channel Z-score Neurofeedback  Addressi.docxEvaluating 19-Channel Z-score Neurofeedback  Addressi.docx
Evaluating 19-Channel Z-score Neurofeedback Addressi.docx
 
Evaluate the history of the Data Encryption Standard (DES) and then .docx
Evaluate the history of the Data Encryption Standard (DES) and then .docxEvaluate the history of the Data Encryption Standard (DES) and then .docx
Evaluate the history of the Data Encryption Standard (DES) and then .docx
 
Evaluate the Health History and Medical Information for Mrs. J.,.docx
Evaluate the Health History and Medical Information for Mrs. J.,.docxEvaluate the Health History and Medical Information for Mrs. J.,.docx
Evaluate the Health History and Medical Information for Mrs. J.,.docx
 
Evaluate the environmental factors that contribute to corporate mana.docx
Evaluate the environmental factors that contribute to corporate mana.docxEvaluate the environmental factors that contribute to corporate mana.docx
Evaluate the environmental factors that contribute to corporate mana.docx
 

Recently uploaded

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
BoudhayanBhattachari
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
National Information Standards Organization (NISO)
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 

Recently uploaded (20)

C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
B. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdfB. Ed Syllabus for babasaheb ambedkar education university.pdf
B. Ed Syllabus for babasaheb ambedkar education university.pdf
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"Benner "Expanding Pathways to Publishing Careers"
Benner "Expanding Pathways to Publishing Careers"
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 

Ethical Implications of Social Media Data Mining by Police.docx

  • 1. Ethical Implications of Social Media Data Mining by Police University of Maryland University College (UMUC) Group Epsilon Group Epsilon Executive Summary Introduction History Current Trends Alternatives Conclusion References 2 TABLE OF CONTENTS
  • 2. Group Epsilon EXECUTIVE SUMMARY Social media is constantly inundated with posts that contain rich and timely information about events relevant to public safety Social media can be used track people as they move from one location to the next Software can be deployed to identify key words like “gun”, “fight”, and “shoot” to track posts that are indicative of danger and/or criminal activity The goal of these programs and the partnership with law enforcement is to bypass privacy options of the social media sites Social media data mining has great potential to make policing more proactive – But is it legal? Ethical? Authorities are already using social media, such as posts and comments, to store information and to keep tabs on people Facebook and Instagram oppose this effort 3 Group Epsilon INTRODUCTION Is social media data mining ethical? Should the government and law enforcement agencies be legally authorized to undermine resident privacy in an effort to prevent/deter crime?
  • 3. What is the public’s reasonable expectation of privacy? Is social data mining considered a warrantless search? Social media posts are public – does that make it legal and ethical to monitor an individual’s posts over a period of time? Law enforcement agencies should reveal what data they are collecting, how it is being collected, and what it is being used for Public education/engagement about this effort should be mandatory! Clear guidelines and regulations must be imposed on this process! 4 Group Epsilon HISTORY 100 Representatives attended a Social Media networking workshop. Included federal, state, and local governments, private sector, and news media (to share case studies for learning). Two goals to help emergency management learn how to: Better protect communities. Improve communication during crisis situations. Police have been increasingly using social media 76% to gain tips on crime 72% to monitor public 70% for intelligence gathering 5
  • 4. Group Epsilon HISTORY (cont.) California fires in 2018 used real-time updates on evacuations and effected areas via social media outlets Used to be done by TV and Radio which not everyone got the information. Amber Alerts posted on Facebook and twitter to increase exposure. Jurys using social media during trials is astoundingly high. Juror was “friending” female defendant and got out of jury duty. Results in numerous new trials and overturned verdicts. Arkansas Supreme Court reverses capital murder conviction because of juror repeatedly tweeted comments during trial. 6 Group Epsilon Social Media posts can be loaded with useful data for policing. This data can assist law enforcement with: Quicker Interventions – Crime Prevention, Incident Targeting, and Protest Awareness Intelligence gathering – Hashtags, Live Streaming, Pictures of Emergency Situations, and Potential Criminal Networks Software is presently being used to sift through this collection of data in an effort to pinpoint potential danger – Also used to “flag” and track people Geofeedia:: Bypasses security settings; monitors key words to provide location based social data –”fight”, “shoot”, “bomb”
  • 5. Snaptrends: : Creates “dummy” accounts to bait/attract sexual offenders Media Son : Looks for insider threats through back-end social media monitoring. *Facebook, Instagram, and Twitter have blocked these companies 7 CURRENT TRENDS Group Epsilon American Civil Liberties Union (ACLU) claims law enforcement is targeting racially loaded phrases #blacklivesmatter, #DontShoot, #muslimlivesmatter Boston Police has been accused of prejudice – Their social mining efforts have caused great public distrust Current social media data mining practices are an invasion of privacy and a violation of civil rights Social media posts are public, but bypassing security settings to monitor people over time and tracking citizen’s movement is unethical and should be deemed illegal This could be considered warrantless digital searching Social media can be used for positive police to public engagement - Safety messages, danger areas, etc. Research shows that the existence of this engagement is low Social media is more commonly used to make police look bad 8 CURRENT TRENDS (cont.)
  • 6. Group Epsilon Public safety is becoming more technologically sophisticated Citizens should expect more community engagement by public safety organizations via social media Law enforcement agencies have evolved from utilizing posters to social networks and police radio. Social media is being used in jury trials Jurors collect data via social media to research cases and defendants – Historical understanding of case and those involved This can result in an unfair trial or biased verdicts Social media data mining has influenced how law enforcement agencies respond to protests Tracking highly charged phrases and hashtags provides police with the awareness to keep organized protests under control Also allows police to intervene and sometimes kill protests before they start – Protesting is a legal right that should not be infringed upon – Freedom of speech is being controlled 9 CURRENT TRENDS (cont.) Group Epsilon ALTERNATIVES Social media, if strategically added to the larger information
  • 7. environment, can help to provide the real-time “what,” the “who,” the “why,” and the “how,” and may even help in predicting the cascading effects of decisions, actions, and changing hazards Integrating social data within all aspects of response, from planning, to training and exercises, will help to legitimize its role in public safety and emergency response Police agencies should provide links to their social media accounts on their websites to build followers 10 Group Epsilon ALTERNATIVES (cont.) Published material should also have the same links to increase law enforcement’s ability to communicate with the public Jurors conducting their own research on the Internet could be made a punishable offense (a form of statutory contempt) to stop the use of social media during a trial The use of e-government applications to provide information from the government to citizens in a mono-directional manner 11 Group Epsilon Law enforcement and public safety organizations have the potential to also utilize social media in productive capacities
  • 8. Disseminate productive outreach messages Disseminate information related to criminal activity Alert the public of required information for ongoing cases Utilizing a large social media presence can be advantageous to law enforcement organizations as they can rely on public entities to help solve crimes Using AI and machine learning to access available public information to recreate crime scenes and capture other evidence from pictures and other digital media 12 ALTERNATIVES (cont.) Group Epsilon ALTERNATIVES (cont.) Agencies can incorporate warning and alert systems through their social media fowling to keep citizens in their jurisdictions informed on latest trends Public safety and other governmental services can collaborate with private business and organizations to request assistance with local and regional criminal trends Rather than conduct questionable monitoring of private social media accounts, public safety organizations can also utilize aggregate sentiment to utilize group trending to change policies Examples would be used with Twitter hashtags where large groups of citizens can tag areas of increased criminal activity These tags would then inspire police in the area to change policies related to public safety 13
  • 9. Group Epsilon CONCLUSION Using social media to essentially “flag”, track, or target people should not be allowed – this is unethical There must be rules and regulations imposed to ensure that this effort is legal and does not violate resident privacy Does social mining actually work? Where is the evidence? There must be more testing and more research The U.S. 4th Amendment protects our right to privacy and the 1st Amendment protects our freedom of speech People should not be targeted for what they say online We should not have to adjust the way we talk Social data mining results in racial profiling and can lead to biased policing and unfair trials Be careful what you say and don’t overshare on social media because law enforcement is watching you! 14 Group Epsilon 15 REFERENCES Bousquet, C. (2018). Mining Social Media Data for Policing, the Ethical Way. Retrieved from https://www.govtech.com/public-safety/Mining-Social-Media-
  • 10. Data-for-Policing-the-Ethical-Way.html Brainard, L., & Edlins, M. (2015). Top 10 US municipal police departments and their social media usage. The American Review of Public Administration, 45(6), 728-745. Cohen, S. (2014). Social Media as a Sensor – Legitimizing the Role of Social Media in Public Safety. Retrieved from https://www.ghinternational.com/blog/legitimizing-the-role-of- social-media-in-public-safety Gavigan, J. (2010). Article Archive Details Hendon Publishing. Retrieved from http://www.hendonpub.com/resources/article_archive/results/det ails?id=1536 Karakiz, Maria. (2015). The Impact of Social Media in the Public Sector. Procedia – Social and Behavioral Sciences. 175.10.1016/j.sbspro.2015.01.1214 Pfeifer, W. (2018, December 5). Will Social Media Affect the Outcome of Your Trial? Retrieved from https://www.thebalancesmb.com/social-media-in-the-courtroom- 2151359 Tsytsarau, M. (2013). Large scale aggregated sentiment analytics. DISI - University of Trento International Doctorate School in Information and Communication Technologies. Accessed from: https://pdfs.semanticscholar.org/2d02/03f997c7d51983c57e78ea 2714cc7ec1376c.pdf. Schneider, C. J. (2016). Policing and social media: Social control in an era of new media. Lexington Books. Waters, G. (2012). Social Media and Law Enforcement Potential Risks. FBI Articles. Accessed from https://leb.fbi.gov/articles/featured-articles/social-media-and- law-enforcement. Williams, C. B., Fedorowicz, J., Kavanaugh, A., Mentzer, K., Thatcher, J. B., & Xu, J. (2018). Leveraging social media to achieve a community policing agenda. Government Information Quarterly, 35(2), 210–222
  • 11. Group Epsilon Write a 5-7-page paper. Must be APA 6th Edition format, 1in margin, 12pt font, New Times Roman or Ariel font Double spaced, NO EXTRA SPACES , Properly formatted Section headings as appropriate no less 5-7 legitimate, verifiable sources try not to use the same sources as in the power point, Cover page, abstract, body of paper, intext citations, reference page. This is due Friday October 4, 2019 at 10Am Friday EST 36 hours. Plagiarism Free!! Instructions The Individual Paper is worth 100 points and is 30% of your final grade. In this paper, implement a solution to the ethical situation identified by the group in the group project. The implementation paper is to include, but is not limited to suggested training, identification of stakeholders, the implementation plan and process, and a draft code of ethics. If you make use of an existing code of ethics, make sure to properly cite and reference the work of others. Material from the group project PowerPoint presentation may be incorporated as needed, but remember the vast majority of this paper must be new original material. The body of the paper shall be 5 to 7 pages, excluding other material such as the cover page, abstract, table of contents, graphics and tables, and references. The Individual Implementation Paper shall contain: · Cover Page · Abstract
  • 12. · Body of Paper (10to-12 pages) · References Page The paper shall be formatted as follows: · APA 6th edition · 1 inch margins · 12 point font, either New Times Roman or Arial font style · Double spaced, making sure there are no "extra" spaces in between paragraphs · Properly formatted Section headings as appropriate Individual Paper In the Individual Paper, implement a solution to the ethical situation identified by the group in the group project. The implementation paper is to include, but is not limited to suggested training, identification of stakeholders, the implementation plan and process, and a draft code of ethics. If you make use of an existing code of ethics, make sure to properly cite and reference the work of others. Material from the group project PowerPoint presentation may be incorporated as needed, but remember the vast majority of this paper must be new original material. The body of the paper shall be 10 to 12 pages, excluding other material such as the cover page, abstract, table of contents, graphics and tables, and references.