This document discusses social media profiling and predictive intelligence. It defines social media profiling as constructing a user's profile using their social media data from platforms like Facebook, Twitter, LinkedIn, etc. This data, including language, location and interests, creates a social profile. Predictive intelligence analyzes current and historical facts to predict future unknown events and is used in marketing, finance, healthcare, crime, and terrorism. The document outlines benefits of social media intelligence analysis like monitoring public opinion, proactive crisis management, and tracking national security information on how terrorists communicate.
Presentation to European Parliament on fake news, changes in our media environment, and what can be done to ensure news and media serve our democracies, with links to underlying independent, evidence-based research.
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Bernard Marr
Online hate speech is a big issue, and many are worried that it leads to radicalization and actions in the real world. Here, we look at how artificial intelligence (AI) can now be used to detect hate speech and predict its impact.
Social Media for Public Safety Telecommunicatorsglarsen911
Instruction, advice, and resources for telecommunicators and other law enforcement agencies wanting to use Facebook, Twitter, YouTube, and other social media services.
Presentation to European Parliament on fake news, changes in our media environment, and what can be done to ensure news and media serve our democracies, with links to underlying independent, evidence-based research.
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Bernard Marr
Online hate speech is a big issue, and many are worried that it leads to radicalization and actions in the real world. Here, we look at how artificial intelligence (AI) can now be used to detect hate speech and predict its impact.
Social Media for Public Safety Telecommunicatorsglarsen911
Instruction, advice, and resources for telecommunicators and other law enforcement agencies wanting to use Facebook, Twitter, YouTube, and other social media services.
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
The following is a podcast for "Protecting Your Brand: The State of Social Infrastructure in The Enterprise." This webinar originially aired on September 30th, 2014. Listen to the recording to learn more:
Social media has quickly become the face of modern communications for organizations. It’s shifted from a branding, advertising, and research experiment to a rich, core communication channel for sales, recruiting, customer service, and marketing. While the blueprint has changed, few in the business can actually discern exactly what it looks like. That's because social media is an external communications channel. Unlike email and web communications that corporations, and particularly IT teams own and operate, social communications are only managed by marketing.
In this webinar, expert speakers will explore new research on the Fortune 500's social media accounts, including the accounts, applications, and tools they use to connect and communicate. From this research, other organizations can learn how to create and understand their social blueprint to better coordinate resources, reduce risk, and maximize social ROI. Specifically we’ll discuss:
· Social accounts, tools, and technology used by Fortune 500 companies
· Understanding your organization’s social communication infrastructure across the entire web
· Coordinating social media content review among marketing and legal/risk personnel
· Monitoring all brand-affiliated social media accounts for audit, protection, and compliance
· Building trust through social media security to maximize your social marketing strategy’s ROI
If we were to look back at some of the most important cyberattacks and cyber-risks that occurred so far in 2016, a mid-year review would very closely resemble Game of Thrones: full of conspiracies, betrayals, shameless pretend-to-be friends and unexpected turns of events – we might even end up believing that the cyber-world served as an inspiration for George R. Martin.
BBC's shoddy analysis about fake news spread in India
PS: Fake news is being spread, there is NO doubt about that.
But there is no easy way to arrive at the outlandish conclusions they have arrived at. Take a look :-) They start off with some "data analysis" and call it qualitative research.
Finding and engaging minority influencers on social mediaElon iMedia
Reach your whole potential audience. This white paper from Elon University's graduate program in Interactive Media describes best practices for reaching minority influencers on social media.
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
SASIG Workshop on “Improving the digital landscape for our children”The Open University
Reflections on the Online Harms White Paper published in April 2019. https://www.gov.uk/government/consultations/online-harms-white-paper
Presented these slides as part of a panel. Agenda of the workshop: https://gallery.mailchimp.com/6a29a22efa92c19681485a0ee/files/f3d318a3-978e-4977-be85-971ecb97ca13/Child_Safety_Online_Agenda_v33.pdf
This is a webinar organised by the Nigerian Library Association, Delta State Chapter, in collaboration with Digital Citizens.
The aim of the webinar is to equip library and information professionals with necessary technologies and strategies needed to play key roles in the dissemination of correct information, and in the information literacy of citizens, in this era of fake news and misinformation.
What is Social Media?Positive Effects/Advantages of Social Media,Negative effects/Disadvantages of Social Media,True research facts,Threats from Social Media,Prevention,Conclusion and Implication
For more information , visit : http://www.computercareer.in/projects-by-cc/
Introduction to Social Media, Types of Social Media, Professional Uses of Social Media, Impact of Social Media, Negative Side of Social Media, Cyber Bullying, Safety Tips are included in this ppt.
I was recently asked to put together a presentation on the fake news phenomenon for discussions with leading journalists and media institutions in a developing country, with extremely poor media literacy but strong growth around social media use, on how to both identify misleading content and also stem its flow, reach and influence.
Download the full presentation as a PowerPoint (with embedded videos) or as an Apple Keynote file, here - https://drive.google.com/open?id=0Bxbk4wYolphwcVk4bV85aEFtYXc
The following is a podcast for "Protecting Your Brand: The State of Social Infrastructure in The Enterprise." This webinar originially aired on September 30th, 2014. Listen to the recording to learn more:
Social media has quickly become the face of modern communications for organizations. It’s shifted from a branding, advertising, and research experiment to a rich, core communication channel for sales, recruiting, customer service, and marketing. While the blueprint has changed, few in the business can actually discern exactly what it looks like. That's because social media is an external communications channel. Unlike email and web communications that corporations, and particularly IT teams own and operate, social communications are only managed by marketing.
In this webinar, expert speakers will explore new research on the Fortune 500's social media accounts, including the accounts, applications, and tools they use to connect and communicate. From this research, other organizations can learn how to create and understand their social blueprint to better coordinate resources, reduce risk, and maximize social ROI. Specifically we’ll discuss:
· Social accounts, tools, and technology used by Fortune 500 companies
· Understanding your organization’s social communication infrastructure across the entire web
· Coordinating social media content review among marketing and legal/risk personnel
· Monitoring all brand-affiliated social media accounts for audit, protection, and compliance
· Building trust through social media security to maximize your social marketing strategy’s ROI
If we were to look back at some of the most important cyberattacks and cyber-risks that occurred so far in 2016, a mid-year review would very closely resemble Game of Thrones: full of conspiracies, betrayals, shameless pretend-to-be friends and unexpected turns of events – we might even end up believing that the cyber-world served as an inspiration for George R. Martin.
BBC's shoddy analysis about fake news spread in India
PS: Fake news is being spread, there is NO doubt about that.
But there is no easy way to arrive at the outlandish conclusions they have arrived at. Take a look :-) They start off with some "data analysis" and call it qualitative research.
Finding and engaging minority influencers on social mediaElon iMedia
Reach your whole potential audience. This white paper from Elon University's graduate program in Interactive Media describes best practices for reaching minority influencers on social media.
Handling fake news and eyewitness mediaAlastair Reid
How to debunk hoaxes effectively, deal with graphic images and understand copyright on social media – as presented at the 2016 Online News Association annual conference
SASIG Workshop on “Improving the digital landscape for our children”The Open University
Reflections on the Online Harms White Paper published in April 2019. https://www.gov.uk/government/consultations/online-harms-white-paper
Presented these slides as part of a panel. Agenda of the workshop: https://gallery.mailchimp.com/6a29a22efa92c19681485a0ee/files/f3d318a3-978e-4977-be85-971ecb97ca13/Child_Safety_Online_Agenda_v33.pdf
This is a webinar organised by the Nigerian Library Association, Delta State Chapter, in collaboration with Digital Citizens.
The aim of the webinar is to equip library and information professionals with necessary technologies and strategies needed to play key roles in the dissemination of correct information, and in the information literacy of citizens, in this era of fake news and misinformation.
What is Social Media?Positive Effects/Advantages of Social Media,Negative effects/Disadvantages of Social Media,True research facts,Threats from Social Media,Prevention,Conclusion and Implication
For more information , visit : http://www.computercareer.in/projects-by-cc/
Introduction to Social Media, Types of Social Media, Professional Uses of Social Media, Impact of Social Media, Negative Side of Social Media, Cyber Bullying, Safety Tips are included in this ppt.
MIMA Summit Social Marketing 101 presentationNathan Wright
Social Marketing 101 presentation given by Greg Swan of Weber Shandwick and Nathan T. Wright of Lava Row at the 2009 MIMA Summit in Minneapolis, Minnesota.
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
Social media users' interests about information protection have seen a sharp ascent throughout the most recent couple of years. Cybercriminals have developed the ability to deceive social based media users into sharing touchy individual data and information.
FakeSocialDetect is an advanced AI-powered system designed to identify and flag suspicious activity on social media platforms. Using cutting-edge algorithms, it analyzes user behavior, content patterns, and network interactions to swiftly detect and mitigate the presence of fake accounts, misinformation, and deceptive practices, ensuring a more authentic and trustworthy online environment.
Through a comprehensive exploration of research findings, case studies, and r...akhileshKumar86166
In the contemporary digital age, the ubiquity of mobile devices has transformed the way we communicate, work, and interact with the world around us. While these technological advancements offer numerous benefits and conveniences, the excessive use of mobile devices has raised concerns about its impact on individuals' physical, mental, and social well-being.
This presentation delves into the various aspects of excess mobile device usage, examining its effects on individuals, relationships, and society as a whole. Through a comprehensive exploration of research findings, case studies, and real-life examples, the presentation sheds light on the following key topics:
Understanding Excessive Mobile Device Usage:
Definition and scope of excessive mobile device usage.
Common behaviors associated with excessive use, such as compulsive checking, social media addiction, and nomophobia (fear of being without a mobile device).
Impacts on Physical Health:
The link between excessive screen time and adverse physical health outcomes, including eye strain, neck and back pain, and disrupted sleep patterns.
Strategies for mitigating the physical health effects of excessive mobile device usage, such as practicing ergonomic habits and implementing screen time limits.
Effects on Mental Well-being:
The psychological consequences of excessive mobile device usage, such as increased stress, anxiety, and depression.
Exploring the role of social comparison, FOMO (fear of missing out), and digital overload in exacerbating mental health issues.
Techniques for promoting digital mindfulness and fostering a healthy relationship with technology, including mindfulness practices and digital detoxes.
Last week I had the pleasure of attending the Social Fresh conference in Tampa, Florida (they have a West Coast version coming up this summer – check it out!). Besides basking in the Florida sunshine, the conference had a tremendous amount to offer. With 300 attendees and a range of presenters, including Chris Brogan, Ted Rubin, Jay Baer and more, my mind was literally exploding at the incredible social insights shared over this two-day event.
Tara, Fact Check Muna! (A Discussion on Information Pandemic and Fake News)Gab Billones
Here are my slides in Episode 2 of the Department of Education (DepEd) Philippines' Wellness Check Webinar Series on the topic of "Fighting the Infodemic."
Topics:
- Context: The Current Media Landscape and the Rise of Citizen Journalism
- The New Global Pandemic: Fake News and Disinformation and Reasons Why It Exists
- Disinformation vs Misinformation vs Mal-information
- Responsible Digital Citizenship and Practical Ways to Spot and Respond to Fake News
References:
1. How Media Landscape Is Changing (richmedia.com/richideas/articles/how-we-consume-media-is-changing)
2. Digital 2020: The Philippines (https://datareportal.com/reports/digital-2020-philippines)
3. WATCH: What's wrong with clickbait headlines? (https://www.rappler.com/newsbreak/fact-check/243857-video-tutorial-keep-clickbait-headlines-from-spreading)
4. https://www.webwise.ie/teachers/what-is-fake-news/
5. Journalism, 'Fake News' and Disinformation: A Handbook for Journalism Education and Training (https://en.unesco.org/fightfakenews)
6. The future of fake news: don't believe everything you read, see or hear (https://www.theguardian.com/technology/2017/jul/26/fake-news-obama-video-trump-face2face-doctored-content)
7. Bellingcat Investigation Toolkit (Bellingcat's Online Investigation Toolkit)
8. Fake News and Cyber Propaganda: The Use and Abuse of Social Media (https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/fake-news-cyber-propaganda-the-abuse-of-social-media)
9. Fake News and Cyber Propaganda: The Use and Abuse of Social Media (https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/fake-news-cyber-propaganda-the-abuse-of-social-media)
10. 5 ways to spot disinformation on your social media feeds (https://abcnews.go.com/US/ways-spot-disinformation-social-media-feeds/story?id=67784438)
11. During this coronavirus pandemic, ‘fake news’ is putting lives at risk: UNESCO (https://news.un.org/en/story/2020/04/1061592)
12. "Fake News", Disinformation, and Propaganda (https://guides.library.harvard.edu/fake)
13. World trends in freedom of expression and media development: global report 2017/2018 (https://unesdoc.unesco.org/ark:/48223/pf0000261065)
14. Fake news and the spread of misinformation: A research roundup (https://journalistsresource.org/studies/society/internet/fake-news-conspiracy-theories-journalism-research/)
15. How to spot coronavirus fake news – an expert guide (https://theconversation.com/how-to-spot-coronavirus-fake-news-an-expert-guide-133843)
16. How to Talk to Your Facebook Friends about Fake News (https://www.theopennotebook.com/2017/02/21/how-to-talk-to-your-facebook-friends-about-fake-news/)\
Russian anarchist and anti-war movement in the third year of full-scale warAntti Rautiainen
Anarchist group ANA Regensburg hosted my online-presentation on 16th of May 2024, in which I discussed tactics of anti-war activism in Russia, and reasons why the anti-war movement has not been able to make an impact to change the course of events yet. Cases of anarchists repressed for anti-war activities are presented, as well as strategies of support for political prisoners, and modest successes in supporting their struggles.
Thumbnail picture is by MediaZona, you may read their report on anti-war arson attacks in Russia here: https://en.zona.media/article/2022/10/13/burn-map
Links:
Autonomous Action
http://Avtonom.org
Anarchist Black Cross Moscow
http://Avtonom.org/abc
Solidarity Zone
https://t.me/solidarity_zone
Memorial
https://memopzk.org/, https://t.me/pzk_memorial
OVD-Info
https://en.ovdinfo.org/antiwar-ovd-info-guide
RosUznik
https://rosuznik.org/
Uznik Online
http://uznikonline.tilda.ws/
Russian Reader
https://therussianreader.com/
ABC Irkutsk
https://abc38.noblogs.org/
Send mail to prisoners from abroad:
http://Prisonmail.online
YouTube: https://youtu.be/c5nSOdU48O8
Spotify: https://podcasters.spotify.com/pod/show/libertarianlifecoach/episodes/Russian-anarchist-and-anti-war-movement-in-the-third-year-of-full-scale-war-e2k8ai4
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
Understanding the Challenges of Street ChildrenSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
This session provides a comprehensive overview of the latest updates to the Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards (commonly known as the Uniform Guidance) outlined in the 2 CFR 200.
With a focus on the 2024 revisions issued by the Office of Management and Budget (OMB), participants will gain insight into the key changes affecting federal grant recipients. The session will delve into critical regulatory updates, providing attendees with the knowledge and tools necessary to navigate and comply with the evolving landscape of federal grant management.
Learning Objectives:
- Understand the rationale behind the 2024 updates to the Uniform Guidance outlined in 2 CFR 200, and their implications for federal grant recipients.
- Identify the key changes and revisions introduced by the Office of Management and Budget (OMB) in the 2024 edition of 2 CFR 200.
- Gain proficiency in applying the updated regulations to ensure compliance with federal grant requirements and avoid potential audit findings.
- Develop strategies for effectively implementing the new guidelines within the grant management processes of their respective organizations, fostering efficiency and accountability in federal grant administration.
Presentation by Jared Jageler, David Adler, Noelia Duchovny, and Evan Herrnstadt, analysts in CBO’s Microeconomic Studies and Health Analysis Divisions, at the Association of Environmental and Resource Economists Summer Conference.
What is the point of small housing associations.pptxPaul Smith
Given the small scale of housing associations and their relative high cost per home what is the point of them and how do we justify their continued existance
Many ways to support street children.pptxSERUDS INDIA
By raising awareness, providing support, advocating for change, and offering assistance to children in need, individuals can play a crucial role in improving the lives of street children and helping them realize their full potential
Donate Us
https://serudsindia.org/how-individuals-can-support-street-children-in-india/
#donatefororphan, #donateforhomelesschildren, #childeducation, #ngochildeducation, #donateforeducation, #donationforchildeducation, #sponsorforpoorchild, #sponsororphanage #sponsororphanchild, #donation, #education, #charity, #educationforchild, #seruds, #kurnool, #joyhome
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
2. Social Media ProfilingSocial Media Profiling
Social Media Profiling is the process of constructing aSocial Media Profiling is the process of constructing a
user’s profile using his or her social media data. Thereuser’s profile using his or her social media data. There
are many mediums & platforms for sharing suchare many mediums & platforms for sharing such
information e.g. Google+, Facebook, Whatsapp, LinkedIninformation e.g. Google+, Facebook, Whatsapp, LinkedIn
& Twitter etc.& Twitter etc.
A person’s social data refers to the personal data,A person’s social data refers to the personal data,
which is generate either online or offline.which is generate either online or offline.
A large amount of such data, including a person’sA large amount of such data, including a person’s
language, location and interest, which is shared throughlanguage, location and interest, which is shared through
social media and social network; and collectively itsocial media and social network; and collectively it
creates a person’s social profile.creates a person’s social profile.
3. Social Media PlatformsSocial Media Platforms --
FacebookFacebook
TwitterTwitter
LinkedInLinkedIn
InstagramInstagram
Google+Google+
WhatsappWhatsapp
YouTube etc.YouTube etc.
4. Social MediaSocial Media –– FacebookFacebook
##did you knowdid you know??
Exposure of Personal Life
Free & open to anyone
Privacy Controls
Be Aware:
Facebook does not share with users who is looking at their profile.
Access to listed friends, family and colleagues.
If you look at someone’s profile often enough, FB assumes you are acquainted and
starts to recommend you to that person. (stalkers) – Careful!!!
Facebook will pay YOU between $500 - $10K if you find a ‘bug’ or can hack your
way ‘’in’’; you’ve saved them the trouble of locating this themselves.
WhatsApp (which can also be used on your computer) allows access to a users
entire contact list, which is a valuable target for hackers. Status: continues to rely
on open sourcing in order to allow programs to fix bugs & improve security.
Criticism: Security
Terrorism
Privacy
6. Social MediaSocial Media –– FacebookFacebook
##facebook crimesfacebook crimes
………Continue to enjoy social media; but BE AWARE of the crimes so
you minimize your risk of becoming a victim!
7 Most Common Facebook Crimes:
Scams
Cyber-
Bullying
Stalking Robbery
Identity
Theft
Defamation
Defamation: is the communication of a false statement that harms the reputation of an
individual person, business, product, group, government, religion, or nation.
9. Social MediaSocial Media -- TwitterTwitter
Twitter messages are public, but users can send private messages;
Free & open to anyone;
Twitter is a real-time information network that connects you to the latest information about what
you find interesting;
Twitter was created in March 2006 by Jack Dorsey, Noah Glass, Biz Stone, and Evan Williams
based in San Francisco, CA.
Free & open to anyone;
Be Aware:
Twitter collects ‘’personal identifiable information’’ and shares it with 3rd parties as
specified in their privacy policy. Twitter has the right to sell this information as an
asset if the company changes hands.
Twitter does not display advertisements, but advertisers can target users based
on their history of tweets & may quote tweets in ads directed specifically to the
user.
Twitter is banned in Iran, China, North Korea. In some countries also: Egypt,
Turkey and Venezuela
12. Amanda Michelle ToddAmanda Michelle Todd
tragedytragedy #call#call--forfor--helphelp
November 27, 1996November 27, 1996 –– October 10, 2012October 10, 2012
Age: 15 / British
Columbian, Canada
Videos on YouTube to tell
about her blackmail
Blackmailed into
showing her breast
on webcam
Cyber-Bullied
Image source: http://i.huffpost.com/gen/812481/thumbs/o-AMANDA-TODD-facebook.jpg
Cyber-Bullied
Physically Assaulted
Video (9-minutes, not one word)
went viral after her death
w/ more than 12 million
views as of Feb. 2017.
Mother ‘Carol’ has created
a program against Cyber-
Bullies since her death.
13. SOCIAL MEDIA TOOLSSOCIAL MEDIA TOOLS
• A range of tools available suitable for SMEs or large corporates, or both.
14. FREE TOOLFREE TOOL –– GOOGLE ALERTSGOOGLE ALERTS
• Google Alerts are emails
sent to you when Google
finds new results that
match your search term
(e.g. web pages,
newspaper articles, blogs)
• You can use Google Alerts
to monitor anything on the
web
www.google.com/alerts
15. Predictive IntelligencePredictive Intelligence --
Predictive Intelligence encompasses aPredictive Intelligence encompasses a
variety of statistical techniques from datavariety of statistical techniques from data
mining, predictive modeling, and learningmining, predictive modeling, and learning
that analyze current and historical facts tothat analyze current and historical facts to
make predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwisemake predictions about future or otherwise
unknown events.unknown events.
Predictive intelligence is used in marketing,Predictive intelligence is used in marketing,
financial services, retail, stock exchange,financial services, retail, stock exchange,
healthcare, child protection, organized crimehealthcare, child protection, organized crime
&& TerrorismTerrorism etc.etc.
16. Social Media IntelligenceSocial Media Intelligence --
ImportanceImportance
Since social media are stored asSince social media are stored as
computerized data (e.g. text, numbers), thecomputerized data (e.g. text, numbers), the
process of monitoring and analyzing theirprocess of monitoring and analyzing their
activities and dialogs becomes easier andactivities and dialogs becomes easier and
more effective.more effective.
Social Media Analytics and motoring toolsSocial Media Analytics and motoring tools
are computational tools used for thisare computational tools used for this
purpose.purpose.
17. PredictionAnalyseAcquire
Social MediaSocial Media IntelligenceIntelligence --
The three keyThe three key actionsactions
Acquire
Evidences
Analyse what
they prove
Predictive
Intelligence
Social Media
Monitoring
18. DataAcquisition
1
SOCIALSOCIAL MEDIA INTELLIGENCEMEDIA INTELLIGENCE
FRAMEWORKFRAMEWORK --
Acquire
Cleansing
& Noise
Filtering
Data
Integration
Natural
Language
Processing
Analytics tools
serving all
types of users
Multichannel
delivery
Integrating data into
centralized hosted
cloud
2
3
4
5
Process &Analyze
PREDICTION
19. CASE STUDYCASE STUDY --
ISIS CASE: RCISIS CASE: RC--14/2015/DLI/NIA14/2015/DLI/NIA
J&K TERROR FINANCING:J&K TERROR FINANCING: RCRC--10/2017/DLI/NIA10/2017/DLI/NIA
FIF CASEFIF CASE
20. Benefits of Social MediaBenefits of Social Media
Intelligence AnalysisIntelligence Analysis
Measure and monitor public opinionMeasure and monitor public opinion
through live monitoring and analysis ofthrough live monitoring and analysis of
public opinion trends and sentiment onpublic opinion trends and sentiment on
social media.social media.
Proactive Crisis Management.Proactive Crisis Management.
Tracking specific national securityTracking specific national security
information, such as how terrorists areinformation, such as how terrorists are
communicating to their audiences and whatcommunicating to their audiences and what
they are communicating.they are communicating.