SlideShare a Scribd company logo
Social Networking Analysis
A STUDY OF TERRORISM
Maria Margarida da Silva Faisco, student l45541Gestão de Dados, Lisboa 2018
Introduction
• England in 2017
• Switzerland in 2017
• Paris in 2017
Gestão de Dados, Lisboa 2018
Social Networking Analyses
Using Online Social Netwoking Sites for Forensic Evidence
Gestão de Dados, Lisboa 2018
Evaluation and
Assessment
Acquisition of
Evidence
Survey of Digital
Scene
Examination of
Digital Evidence
Data
Reconstruction
Conclusion
Figure 1. Process to retrieve evidence of
terrorism from OSNSs. Source: Created by the
author (2018)
• Belkasoft Evidence Center
• Internet Examiner Toolkit
• Internet Evidence Finder
"The selected digital forensic tools were not able to recover
all the data posted on OSNSs. Nevertheless, sufficient
evidence can still be gathered in order to confirm the
likelihood of criminal activities, as each tool was able to
recover a large portion of the evidence posted on OSNSs. "
(Saud Abdulaziz Alshaifi, in 2016, page 119).
A Quantitative Assessment on 26/11 Mumbai Attack
Gestão de Dados, Lisboa 2018
Assessment of
Data Available
Creation of the
Adjacency
Matrix
Drawing a
Graph of all
Conections
Evaluation of
Groups and
Connections
Degree,
Closeness,
Betweenness
and
Eigenvector
Conclusion
Figure 2. Process to understand the nature of terrorist organizations. Source: Created by the author (2018)
Dr Sarita Azad and Dr. Arvind Gupta
Jemaah Islamiyah
Gestão de Dados, Lisboa 2018
Size Number of nodes within a network or data set.
Density
The extent to which links that could possibly exist among persons do in fact exist.
Degree of
Connection
Average number of relations each member has with other members of the
network.
Centrality
Level at which a node is accessible to the persons in the network.
Closeness How close an actor is to others in the network.
Betweenness
Individual’s activity/ability within a network, measuring the ability to control the
flow of information within a network.
Clusters
Areas of a network with a higher density in relation to other areas or cliques
within the network.
Table 1. Network Centrality Measures. Source: Created by the author (2018) but based on the work of Stuart Koschade
Stuart Koschade
Using Social Networking Analyses to Prevent Terrorism
• Collection of Data
• Adjacency Matrix
• Forensic Evidence
• UCINET
• Type of Graph Figure 3. Types of Networks. Source: Journal of Terrorism Research (2011)
Gestão de Dados, Lisboa 2018
Individual Centrality Measures
Degree Centrality Number of connections a node (individual) has in the network
Betweenness
Centrality
Location of each person in
the network 𝑔 𝑥 =
𝑠≠𝑣≠𝑡
𝜎𝑠𝑡 𝑣
𝜎𝑠𝑡
Closeness Centrality
Measures the mean distance
from a node to other node
𝐶 𝑥 =
1
𝑦 𝑑(𝑦, 𝑥)
Eigenvector Centrality
Measures the influence of a
node in the network
Table 2. Individual Centrality Measures. Source: Created by the author (2018)
Gestão de Dados, Lisboa 2018
Network Centrality Measures
Network Centralization
Network Reach
Network Integration
Boundary Spanners
Peripheral Players
Table 3. Network Centrality Measures. Source: Created by the author (2018)
• Who is the central node in the network?
• What sub-groups exist in the network?
• What are the patterns of interaction
between sub-groups?
• What is the overall structure of the network?
• How does information flow in the network?
Gestão de Dados, Lisboa 2018
The 9-11 Example
Figure 4. Matrix with hijackers and their connections. Source: Mapping Networks of Terrorists Cells/ Krebs (2002)
Gestão de Dados, Lisboa 2018
The 9-11 Example
Figure 5. Network extrapolated from UCINET or similar software. Source:
Mapping Networks of Terrorists Cells/ Krebs (2002)
Looking at the graph it was possible to see that
it was a sparse network (network
centralization), that there were many on the
same flight that were more than two steps
away from each other (network reach), and
that the members were far from each other
and from other groups (network integration).
In this network Mr. Valdis E. Krebs got to the
conclusion that they " trade efficiency for
secrecy." (Valdis E. Krebs, in 2002, page 46).
Gestão de Dados, Lisboa 2018
The 9-11 Example
Figure 6. Individual centrality measures regarding the hijackers from 9/11 and their direct contacts.
Source: Mapping Networks of Terrorists Cells/ Krebs (2002)
Mohamed Atta
Gestão de Dados, Lisboa 2018
The End
Gestão de Dados, Lisboa 2018

More Related Content

What's hot

The fragility of twitter social networks against suspended users
The fragility of twitter  social networks against suspended users The fragility of twitter  social networks against suspended users
The fragility of twitter social networks against suspended users
Kadriye Doğan
 
Oxford Digital Humanities Summer School
Oxford Digital Humanities Summer SchoolOxford Digital Humanities Summer School
Oxford Digital Humanities Summer School
Scott A. Hale
 
Safeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist NetworksSafeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist Networks
Parang Saraf
 
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and...
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and...Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and...
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and...
JAYAPRAKASH JPINFOTECH
 
Complex Networks Analysis @ Universita Roma Tre
Complex Networks Analysis @ Universita Roma TreComplex Networks Analysis @ Universita Roma Tre
Complex Networks Analysis @ Universita Roma Tre
Matteo Moci
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...
ecwayerode
 
Deep Context-Awareness: Context Coupling and New Types of Context Information...
Deep Context-Awareness: Context Coupling and New Types of Context Information...Deep Context-Awareness: Context Coupling and New Types of Context Information...
Deep Context-Awareness: Context Coupling and New Types of Context Information...
Hong-Linh Truong
 
Visualizing Networked Collaboration
Visualizing Networked CollaborationVisualizing Networked Collaboration
Visualizing Networked Collaboration
Ahmet Soylu
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of Life
Harish Vaidyanathan
 
Ithet
IthetIthet
Ithet
jianjinshu
 
Social media community using optimized algorithm by M. Gomathi / Lecturer
Social media community using optimized algorithm by M. Gomathi / LecturerSocial media community using optimized algorithm by M. Gomathi / Lecturer
Social media community using optimized algorithm by M. Gomathi / Lecturer
gomathi chlm
 
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
tmra
 
COM494_SNA_DataPrep&NetworkTypes
COM494_SNA_DataPrep&NetworkTypesCOM494_SNA_DataPrep&NetworkTypes
COM494_SNA_DataPrep&NetworkTypes
Kyounghee Hazel Kwon
 
efficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networksefficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networks
swathi78
 

What's hot (14)

The fragility of twitter social networks against suspended users
The fragility of twitter  social networks against suspended users The fragility of twitter  social networks against suspended users
The fragility of twitter social networks against suspended users
 
Oxford Digital Humanities Summer School
Oxford Digital Humanities Summer SchoolOxford Digital Humanities Summer School
Oxford Digital Humanities Summer School
 
Safeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist NetworksSafeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist Networks
 
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and...
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and...Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and...
Minimizing Influence of Rumors by Blockers on Social Networks: Algorithms and...
 
Complex Networks Analysis @ Universita Roma Tre
Complex Networks Analysis @ Universita Roma TreComplex Networks Analysis @ Universita Roma Tre
Complex Networks Analysis @ Universita Roma Tre
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...
 
Deep Context-Awareness: Context Coupling and New Types of Context Information...
Deep Context-Awareness: Context Coupling and New Types of Context Information...Deep Context-Awareness: Context Coupling and New Types of Context Information...
Deep Context-Awareness: Context Coupling and New Types of Context Information...
 
Visualizing Networked Collaboration
Visualizing Networked CollaborationVisualizing Networked Collaboration
Visualizing Networked Collaboration
 
Visually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of LifeVisually Exploring Social Participation in Encyclopedia of Life
Visually Exploring Social Participation in Encyclopedia of Life
 
Ithet
IthetIthet
Ithet
 
Social media community using optimized algorithm by M. Gomathi / Lecturer
Social media community using optimized algorithm by M. Gomathi / LecturerSocial media community using optimized algorithm by M. Gomathi / Lecturer
Social media community using optimized algorithm by M. Gomathi / Lecturer
 
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
Quality, Relevance and Importance in Information Retrieval with Fuzzy Semanti...
 
COM494_SNA_DataPrep&NetworkTypes
COM494_SNA_DataPrep&NetworkTypesCOM494_SNA_DataPrep&NetworkTypes
COM494_SNA_DataPrep&NetworkTypes
 
efficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networksefficient data query in intermittently-connected mobile ad hoc social networks
efficient data query in intermittently-connected mobile ad hoc social networks
 

Similar to Social networking analysis

Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
cscpconf
 
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSAPPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
IJwest
 
Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks
paperpublications3
 
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social NetworksThe Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
Editor IJCATR
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
Arsalan Khan
 
153-Russo Multilayer network analysis of innovation intermediaries activities
153-Russo Multilayer network analysis of innovation intermediaries activities153-Russo Multilayer network analysis of innovation intermediaries activities
153-Russo Multilayer network analysis of innovation intermediaries activities
innovationoecd
 
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSSCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
IJDKP
 
Scalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large NetworksScalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large Networks
IJDKP
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdf
BalasundaramSr
 
Q046049397
Q046049397Q046049397
Q046049397
IJERA Editor
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
Web Mining .ppt
Web Mining .pptWeb Mining .ppt
Web Mining .ppt
NaglaaFathy42
 
Web Mining .ppt
Web Mining .pptWeb Mining .ppt
Web Mining .ppt
NaglaaFathy42
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20
Monisha100
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
ijwscjournal
 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
ijwscjournal
 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
ijwscjournal
 
LAK13 Tutorial Social Network Analysis 4 Learning Analytics
LAK13 Tutorial Social Network Analysis 4 Learning AnalyticsLAK13 Tutorial Social Network Analysis 4 Learning Analytics
LAK13 Tutorial Social Network Analysis 4 Learning Analytics
goehnert
 
Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social Network
Editor IJCATR
 

Similar to Social networking analysis (20)

Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining Exploring the Current Trends and Future Prospects in Terrorist Network Mining
Exploring the Current Trends and Future Prospects in Terrorist Network Mining
 
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKSAPPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
APPLICATION OF CLUSTERING TO ANALYZE ACADEMIC SOCIAL NETWORKS
 
Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks
 
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social NetworksThe Mathematics of Social Network Analysis: Metrics for Academic Social Networks
The Mathematics of Social Network Analysis: Metrics for Academic Social Networks
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
153-Russo Multilayer network analysis of innovation intermediaries activities
153-Russo Multilayer network analysis of innovation intermediaries activities153-Russo Multilayer network analysis of innovation intermediaries activities
153-Russo Multilayer network analysis of innovation intermediaries activities
 
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSSCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
 
Scalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large NetworksScalable Local Community Detection with Mapreduce for Large Networks
Scalable Local Community Detection with Mapreduce for Large Networks
 
SocialCom09-tutorial.pdf
SocialCom09-tutorial.pdfSocialCom09-tutorial.pdf
SocialCom09-tutorial.pdf
 
Q046049397
Q046049397Q046049397
Q046049397
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Web Mining .ppt
Web Mining .pptWeb Mining .ppt
Web Mining .ppt
 
Web Mining .ppt
Web Mining .pptWeb Mining .ppt
Web Mining .ppt
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
 
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
A COMPARATIVE STUDY OF SOCIAL NETWORKING APPROACHES IN IDENTIFYING THE COVERT...
 
LAK13 Tutorial Social Network Analysis 4 Learning Analytics
LAK13 Tutorial Social Network Analysis 4 Learning AnalyticsLAK13 Tutorial Social Network Analysis 4 Learning Analytics
LAK13 Tutorial Social Network Analysis 4 Learning Analytics
 
Sampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social NetworkSampling of User Behavior Using Online Social Network
Sampling of User Behavior Using Online Social Network
 

More from eurosigdoc acm

Blockchain e o Futuro do Setor Financeiro
Blockchain e o Futuro do Setor FinanceiroBlockchain e o Futuro do Setor Financeiro
Blockchain e o Futuro do Setor Financeiro
eurosigdoc acm
 
No code – Caso Prático no App Inventor - BroTrip
No code – Caso Prático no App Inventor - BroTripNo code – Caso Prático no App Inventor - BroTrip
No code – Caso Prático no App Inventor - BroTrip
eurosigdoc acm
 
The oracle problem nos smart contracts
The oracle problem nos smart contractsThe oracle problem nos smart contracts
The oracle problem nos smart contracts
eurosigdoc acm
 
Robotic process automation
Robotic process automation Robotic process automation
Robotic process automation
eurosigdoc acm
 
Robotic Process Automation: caso de estudo Delloite
Robotic Process Automation: caso de estudo DelloiteRobotic Process Automation: caso de estudo Delloite
Robotic Process Automation: caso de estudo Delloite
eurosigdoc acm
 
Projeção do Crowdfunding em Portugal: a plataforma ppl
Projeção do Crowdfunding em Portugal: a plataforma pplProjeção do Crowdfunding em Portugal: a plataforma ppl
Projeção do Crowdfunding em Portugal: a plataforma ppl
eurosigdoc acm
 
Implementação de uma aplicação em Power Apps – Low Code
Implementação de uma aplicação em Power Apps – Low CodeImplementação de uma aplicação em Power Apps – Low Code
Implementação de uma aplicação em Power Apps – Low Code
eurosigdoc acm
 
Proteção de dados e redes sociais
Proteção de dados e redes sociaisProteção de dados e redes sociais
Proteção de dados e redes sociais
eurosigdoc acm
 
CLOUD COMPUTING E SUSTENTABILIDADE EMPRESARIAL
CLOUD COMPUTING E SUSTENTABILIDADE EMPRESARIALCLOUD COMPUTING E SUSTENTABILIDADE EMPRESARIAL
CLOUD COMPUTING E SUSTENTABILIDADE EMPRESARIAL
eurosigdoc acm
 
CROWDFUNDING: IMPACTO DA GAMIFICAÇÃO NAS PLATAFORMAS DE CROWDFUNDING
CROWDFUNDING: IMPACTO DA GAMIFICAÇÃO NAS PLATAFORMAS DE CROWDFUNDINGCROWDFUNDING: IMPACTO DA GAMIFICAÇÃO NAS PLATAFORMAS DE CROWDFUNDING
CROWDFUNDING: IMPACTO DA GAMIFICAÇÃO NAS PLATAFORMAS DE CROWDFUNDING
eurosigdoc acm
 
Low code: O futuro do desenvolvimento de aplicações
Low code: O futuro do desenvolvimento de aplicaçõesLow code: O futuro do desenvolvimento de aplicações
Low code: O futuro do desenvolvimento de aplicações
eurosigdoc acm
 
Robotic Process Automation
Robotic Process AutomationRobotic Process Automation
Robotic Process Automation
eurosigdoc acm
 
Crowdsourcing: DEFINIÇÕES E APLICAÇÕES NA ÁREA DA SAÚDE
Crowdsourcing: DEFINIÇÕES E APLICAÇÕES NA ÁREA DA SAÚDECrowdsourcing: DEFINIÇÕES E APLICAÇÕES NA ÁREA DA SAÚDE
Crowdsourcing: DEFINIÇÕES E APLICAÇÕES NA ÁREA DA SAÚDE
eurosigdoc acm
 
Business Intelligence e o Desporto
Business Intelligence e o DesportoBusiness Intelligence e o Desporto
Business Intelligence e o Desporto
eurosigdoc acm
 
Blockchain
Blockchain Blockchain
Blockchain
eurosigdoc acm
 
Blockchain: viável ou em luta com o meio ambiente?
Blockchain: viável ou em luta com o meio ambiente?Blockchain: viável ou em luta com o meio ambiente?
Blockchain: viável ou em luta com o meio ambiente?
eurosigdoc acm
 
Cloud Computing e a sua Implementação na Educação no Contexto de Pandemia COV...
Cloud Computing e a sua Implementação na Educação no Contexto de Pandemia COV...Cloud Computing e a sua Implementação na Educação no Contexto de Pandemia COV...
Cloud Computing e a sua Implementação na Educação no Contexto de Pandemia COV...
eurosigdoc acm
 
Viabilidade das NFT’s a Longo Prazo
Viabilidade das NFT’s a Longo Prazo Viabilidade das NFT’s a Longo Prazo
Viabilidade das NFT’s a Longo Prazo
eurosigdoc acm
 
Outsystems e o Universo do Low-Code
Outsystems e o Universo do Low-CodeOutsystems e o Universo do Low-Code
Outsystems e o Universo do Low-Code
eurosigdoc acm
 
Erp
ErpErp

More from eurosigdoc acm (20)

Blockchain e o Futuro do Setor Financeiro
Blockchain e o Futuro do Setor FinanceiroBlockchain e o Futuro do Setor Financeiro
Blockchain e o Futuro do Setor Financeiro
 
No code – Caso Prático no App Inventor - BroTrip
No code – Caso Prático no App Inventor - BroTripNo code – Caso Prático no App Inventor - BroTrip
No code – Caso Prático no App Inventor - BroTrip
 
The oracle problem nos smart contracts
The oracle problem nos smart contractsThe oracle problem nos smart contracts
The oracle problem nos smart contracts
 
Robotic process automation
Robotic process automation Robotic process automation
Robotic process automation
 
Robotic Process Automation: caso de estudo Delloite
Robotic Process Automation: caso de estudo DelloiteRobotic Process Automation: caso de estudo Delloite
Robotic Process Automation: caso de estudo Delloite
 
Projeção do Crowdfunding em Portugal: a plataforma ppl
Projeção do Crowdfunding em Portugal: a plataforma pplProjeção do Crowdfunding em Portugal: a plataforma ppl
Projeção do Crowdfunding em Portugal: a plataforma ppl
 
Implementação de uma aplicação em Power Apps – Low Code
Implementação de uma aplicação em Power Apps – Low CodeImplementação de uma aplicação em Power Apps – Low Code
Implementação de uma aplicação em Power Apps – Low Code
 
Proteção de dados e redes sociais
Proteção de dados e redes sociaisProteção de dados e redes sociais
Proteção de dados e redes sociais
 
CLOUD COMPUTING E SUSTENTABILIDADE EMPRESARIAL
CLOUD COMPUTING E SUSTENTABILIDADE EMPRESARIALCLOUD COMPUTING E SUSTENTABILIDADE EMPRESARIAL
CLOUD COMPUTING E SUSTENTABILIDADE EMPRESARIAL
 
CROWDFUNDING: IMPACTO DA GAMIFICAÇÃO NAS PLATAFORMAS DE CROWDFUNDING
CROWDFUNDING: IMPACTO DA GAMIFICAÇÃO NAS PLATAFORMAS DE CROWDFUNDINGCROWDFUNDING: IMPACTO DA GAMIFICAÇÃO NAS PLATAFORMAS DE CROWDFUNDING
CROWDFUNDING: IMPACTO DA GAMIFICAÇÃO NAS PLATAFORMAS DE CROWDFUNDING
 
Low code: O futuro do desenvolvimento de aplicações
Low code: O futuro do desenvolvimento de aplicaçõesLow code: O futuro do desenvolvimento de aplicações
Low code: O futuro do desenvolvimento de aplicações
 
Robotic Process Automation
Robotic Process AutomationRobotic Process Automation
Robotic Process Automation
 
Crowdsourcing: DEFINIÇÕES E APLICAÇÕES NA ÁREA DA SAÚDE
Crowdsourcing: DEFINIÇÕES E APLICAÇÕES NA ÁREA DA SAÚDECrowdsourcing: DEFINIÇÕES E APLICAÇÕES NA ÁREA DA SAÚDE
Crowdsourcing: DEFINIÇÕES E APLICAÇÕES NA ÁREA DA SAÚDE
 
Business Intelligence e o Desporto
Business Intelligence e o DesportoBusiness Intelligence e o Desporto
Business Intelligence e o Desporto
 
Blockchain
Blockchain Blockchain
Blockchain
 
Blockchain: viável ou em luta com o meio ambiente?
Blockchain: viável ou em luta com o meio ambiente?Blockchain: viável ou em luta com o meio ambiente?
Blockchain: viável ou em luta com o meio ambiente?
 
Cloud Computing e a sua Implementação na Educação no Contexto de Pandemia COV...
Cloud Computing e a sua Implementação na Educação no Contexto de Pandemia COV...Cloud Computing e a sua Implementação na Educação no Contexto de Pandemia COV...
Cloud Computing e a sua Implementação na Educação no Contexto de Pandemia COV...
 
Viabilidade das NFT’s a Longo Prazo
Viabilidade das NFT’s a Longo Prazo Viabilidade das NFT’s a Longo Prazo
Viabilidade das NFT’s a Longo Prazo
 
Outsystems e o Universo do Low-Code
Outsystems e o Universo do Low-CodeOutsystems e o Universo do Low-Code
Outsystems e o Universo do Low-Code
 
Erp
ErpErp
Erp
 

Recently uploaded

169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
tanichadda371 #v08
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Sarthak Sobti
 
The Principal Up-and-Coming Risks to Cloud-Based Security!
The Principal Up-and-Coming Risks to Cloud-Based Security!The Principal Up-and-Coming Risks to Cloud-Based Security!
The Principal Up-and-Coming Risks to Cloud-Based Security!
Alec Kassir cozmozone
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
Federico Ast
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
AmitTuteja9
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
dtagbe
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
Febless Hernane
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
thezot
 
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
APNIC
 
HistorySrSec2024 daahi sadhin sgg-25.pdf
HistorySrSec2024 daahi sadhin sgg-25.pdfHistorySrSec2024 daahi sadhin sgg-25.pdf
HistorySrSec2024 daahi sadhin sgg-25.pdf
AdiySgh
 
Lesson6 in spreadsheet 2024 for g12..ppt
Lesson6 in spreadsheet 2024 for g12..pptLesson6 in spreadsheet 2024 for g12..ppt
Lesson6 in spreadsheet 2024 for g12..ppt
ReyLouieSedigo1
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
narwatsonia7
 
peru primero de la alianza con el pacifico
peru primero de la alianza con el pacificoperu primero de la alianza con el pacifico
peru primero de la alianza con el pacifico
FernandoGuevaraVentu2
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
GNAMBIKARAO
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
APNIC
 
India Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with yearIndia Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with year
AkashKumar1733
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
rajesh344555
 
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
keshavtiwari584
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
uqbyfm
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
APNIC
 

Recently uploaded (20)

169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
169+ Call Girls In Navi Mumbai | 9930245274 | Reliability Escort Service Near...
 
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. ITNetwork Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
Network Security and Cyber Laws (Complete Notes) for B.Tech/BCA/BSc. IT
 
The Principal Up-and-Coming Risks to Cloud-Based Security!
The Principal Up-and-Coming Risks to Cloud-Based Security!The Principal Up-and-Coming Risks to Cloud-Based Security!
The Principal Up-and-Coming Risks to Cloud-Based Security!
 
Decentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and EsportsDecentralized Justice in Gaming and Esports
Decentralized Justice in Gaming and Esports
 
DocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptxDocSplit Subsequent Implementation Activation.pptx
DocSplit Subsequent Implementation Activation.pptx
 
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
一比一原版(uc毕业证书)加拿大卡尔加里大学毕业证如何办理
 
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
EASY TUTORIAL OF HOW TO USE CiCi AI BY: FEBLESS HERNANE
 
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
一比一原版新西兰林肯大学毕业证(Lincoln毕业证书)学历如何办理
 
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
IPv6: Unlocking the Potential, presented by Paul Wilson at CommunicAsia 2024
 
HistorySrSec2024 daahi sadhin sgg-25.pdf
HistorySrSec2024 daahi sadhin sgg-25.pdfHistorySrSec2024 daahi sadhin sgg-25.pdf
HistorySrSec2024 daahi sadhin sgg-25.pdf
 
Lesson6 in spreadsheet 2024 for g12..ppt
Lesson6 in spreadsheet 2024 for g12..pptLesson6 in spreadsheet 2024 for g12..ppt
Lesson6 in spreadsheet 2024 for g12..ppt
 
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call GirlsBangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
Bangalore Call Girls 9079923931 With -Cuties' Hot Call Girls
 
peru primero de la alianza con el pacifico
peru primero de la alianza con el pacificoperu primero de la alianza con el pacifico
peru primero de la alianza con el pacifico
 
cyber crime.pptx..........................
cyber crime.pptx..........................cyber crime.pptx..........................
cyber crime.pptx..........................
 
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...Securing BGP: Operational Strategies and Best Practices for Network Defenders...
Securing BGP: Operational Strategies and Best Practices for Network Defenders...
 
India Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with yearIndia Cyber Threat Report of 2024 with year
India Cyber Threat Report of 2024 with year
 
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9967824496 FULL CASH PAYMENT
 
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENTUnlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
Unlimited Fun With Call Girls Hyderabad ✅ 7737669865 💘 FULL CASH PAYMENT
 
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
一比一原版圣托马斯大学毕业证(UST毕业证书)学历如何办理
 
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...
 

Social networking analysis

  • 1. Social Networking Analysis A STUDY OF TERRORISM Maria Margarida da Silva Faisco, student l45541Gestão de Dados, Lisboa 2018
  • 2. Introduction • England in 2017 • Switzerland in 2017 • Paris in 2017 Gestão de Dados, Lisboa 2018 Social Networking Analyses
  • 3. Using Online Social Netwoking Sites for Forensic Evidence Gestão de Dados, Lisboa 2018 Evaluation and Assessment Acquisition of Evidence Survey of Digital Scene Examination of Digital Evidence Data Reconstruction Conclusion Figure 1. Process to retrieve evidence of terrorism from OSNSs. Source: Created by the author (2018) • Belkasoft Evidence Center • Internet Examiner Toolkit • Internet Evidence Finder "The selected digital forensic tools were not able to recover all the data posted on OSNSs. Nevertheless, sufficient evidence can still be gathered in order to confirm the likelihood of criminal activities, as each tool was able to recover a large portion of the evidence posted on OSNSs. " (Saud Abdulaziz Alshaifi, in 2016, page 119).
  • 4. A Quantitative Assessment on 26/11 Mumbai Attack Gestão de Dados, Lisboa 2018 Assessment of Data Available Creation of the Adjacency Matrix Drawing a Graph of all Conections Evaluation of Groups and Connections Degree, Closeness, Betweenness and Eigenvector Conclusion Figure 2. Process to understand the nature of terrorist organizations. Source: Created by the author (2018) Dr Sarita Azad and Dr. Arvind Gupta
  • 5. Jemaah Islamiyah Gestão de Dados, Lisboa 2018 Size Number of nodes within a network or data set. Density The extent to which links that could possibly exist among persons do in fact exist. Degree of Connection Average number of relations each member has with other members of the network. Centrality Level at which a node is accessible to the persons in the network. Closeness How close an actor is to others in the network. Betweenness Individual’s activity/ability within a network, measuring the ability to control the flow of information within a network. Clusters Areas of a network with a higher density in relation to other areas or cliques within the network. Table 1. Network Centrality Measures. Source: Created by the author (2018) but based on the work of Stuart Koschade Stuart Koschade
  • 6. Using Social Networking Analyses to Prevent Terrorism • Collection of Data • Adjacency Matrix • Forensic Evidence • UCINET • Type of Graph Figure 3. Types of Networks. Source: Journal of Terrorism Research (2011) Gestão de Dados, Lisboa 2018
  • 7. Individual Centrality Measures Degree Centrality Number of connections a node (individual) has in the network Betweenness Centrality Location of each person in the network 𝑔 𝑥 = 𝑠≠𝑣≠𝑡 𝜎𝑠𝑡 𝑣 𝜎𝑠𝑡 Closeness Centrality Measures the mean distance from a node to other node 𝐶 𝑥 = 1 𝑦 𝑑(𝑦, 𝑥) Eigenvector Centrality Measures the influence of a node in the network Table 2. Individual Centrality Measures. Source: Created by the author (2018) Gestão de Dados, Lisboa 2018
  • 8. Network Centrality Measures Network Centralization Network Reach Network Integration Boundary Spanners Peripheral Players Table 3. Network Centrality Measures. Source: Created by the author (2018) • Who is the central node in the network? • What sub-groups exist in the network? • What are the patterns of interaction between sub-groups? • What is the overall structure of the network? • How does information flow in the network? Gestão de Dados, Lisboa 2018
  • 9. The 9-11 Example Figure 4. Matrix with hijackers and their connections. Source: Mapping Networks of Terrorists Cells/ Krebs (2002) Gestão de Dados, Lisboa 2018
  • 10. The 9-11 Example Figure 5. Network extrapolated from UCINET or similar software. Source: Mapping Networks of Terrorists Cells/ Krebs (2002) Looking at the graph it was possible to see that it was a sparse network (network centralization), that there were many on the same flight that were more than two steps away from each other (network reach), and that the members were far from each other and from other groups (network integration). In this network Mr. Valdis E. Krebs got to the conclusion that they " trade efficiency for secrecy." (Valdis E. Krebs, in 2002, page 46). Gestão de Dados, Lisboa 2018
  • 11. The 9-11 Example Figure 6. Individual centrality measures regarding the hijackers from 9/11 and their direct contacts. Source: Mapping Networks of Terrorists Cells/ Krebs (2002) Mohamed Atta Gestão de Dados, Lisboa 2018
  • 12. The End Gestão de Dados, Lisboa 2018