Exploiting social media for Army operations: Syrian crisis use case

Author(s):  
Sue E. Kase ◽  
Elizabeth K. Bowman ◽  
Md. Tanvir Al Amin ◽  
Tarek Abdelzaher
Keyword(s):  
Use Case ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 102-111
Author(s):  
Bauyrjan Makangali ◽  
Sagynysh Amirbekova ◽  
Marvan Khamitova ◽  
Erkin Baydarov

2021 ◽  
pp. 67-80
Author(s):  
Richard W. Benfield

Abstract This chapter examines the new media landscape of communities (blogging and podcasting), platforms, and social media that gardens use. Case studies are presented of the social media presence of some UK and US gardens.


2021 ◽  
pp. 67-80
Author(s):  
Richard W. Benfield

Abstract This chapter examines the new media landscape of communities (blogging and podcasting), platforms, and social media that gardens use. Case studies are presented of the social media presence of some UK and US gardens.


Author(s):  
Junior Tidal

This chapter will explore how social media assessment is used for library marketing. It will build upon existing literature on how other libraries quantify social media impact in promoting their services. This includes methods on how libraries can gather native application statistics from popular platforms such as Facebook, Twitter, YouTube, and Instagram. An exploration into web analytics will also be explored as evidence of social media impact. The chapter will use case-studies of the Ursula C. Schwerin Library of the New York City College of Technology (City Tech), CUNY, and how social media platforms are used to advertise library events and disseminate news.


Author(s):  
Shalin Hai-Jew

With so much of modern life conducted in online spaces, understanding what is knowable through those spaces is a critical aspect of digital literacy and informational awareness. To increase online transparency, Maltego Carbon 3.5.3 (a penetration testing tool) enables powerful exploration of the Surface Web through its “machines” and “transforms.” Maltego enables the exploration of the interconnections between disparate pieces of online information (including technological understructures, documents, aliases, images, phrases, email addresses, telephone numbers, social media accounts, and geographical location coordinates. In the educational context, this tool may be applied in a number of ways. This chapter summarizes six generic “use cases”: Use Case 1: Understanding an Online / Offline Entity; Use Case 2: Exploring a Domain; Use Case 3: From Physical Location to Cyber and Back Again; Use Case 4: Online Conversations on Social Media Sites; Use Case 5: Eventgraphing: Mapping an Event Online, and Use Case 6: Finding Leads to Enhance Research.


Author(s):  
Kylyn Fernandes ◽  
Ankit Rishi Gupta ◽  
Pratik Panchal ◽  
Ramchandra Mangrulkar

Steganography is the art of hiding messages or files in a way that prevents the detection of the existence of these hidden messages. It encompasses several techniques, including physical methods like invisible ink on paper and digital techniques like hiding text on multimedia files like images and music files. In the modern digital era, steganography has become a useful tool to evade detection and perusal of secret messages. With the advent of social media, it is very easy to encode a message or file onto an image and upload it online for the intended recipients to access, decode, and read or use. In this case of digital steganography of messages or files onto images, an important factor to consider is the effect of image compression on the hidden message. Since most social media and other online image posting websites run some sort of compression, cropping, and other image transformations on the uploaded images, understanding these techniques and their effect on the hidden text can help one choose the most suitable steganography technique to use for a particular use case.


2021 ◽  
pp. 37-44
Author(s):  
Fanni Sukma ◽  
Tri Lestari ◽  
Deddy Prayama ◽  
Dwiny Meidelfi ◽  
Danny Athaya

NEDD Audio Production is a recording studio that provides on-site music or track recording services and track sales. The owner still uses the manual system for scheduling records and still uses social media for track sales. This causes inefficient owner performance. To create a website that provides booking services for recording schedules and purchasing tracks that can help the owner in placing the recording schedule and purchasing tracks efficiently. The design used to create a website using UML (Unified Modeling Language), which consists of Use Case Diagrams.. Meanwhile, the programming language uses PHP and MySQL as a database. The implementation of this website uses a third-party service, namely Midtrans, which is a payment gateway service provider website from Indonesia


2019 ◽  
Vol 8 (3) ◽  
pp. 111 ◽  
Author(s):  
Jingchao Yang ◽  
Manzhu Yu ◽  
Han Qin ◽  
Mingyue Lu ◽  
Chaowei Yang

Social media data have been used to improve geographic situation awareness in the past decade. Although they have free and openly availability advantages, only a small proportion is related to situation awareness, and reliability or trustworthiness is a challenge. A credibility framework is proposed for Twitter data in the context of disaster situation awareness. The framework is derived from crowdsourcing, which states that errors propagated in volunteered information decrease as the number of contributors increases. In the proposed framework, credibility is hierarchically assessed on two tweet levels. The framework was tested using Hurricane Harvey Twitter data, in which situation awareness related tweets were extracted using a set of predefined keywords including power, shelter, damage, casualty, and flood. For each tweet, text messages and associated URLs were integrated to enhance the information completeness. Events were identified by aggregating tweets based on their topics and spatiotemporal characteristics. Credibility for events was calculated and analyzed against the spatial, temporal, and social impacting scales. This framework has the potential to calculate the evolving credibility in real time, providing users insight on the most important and trustworthy events.


2012 ◽  
Vol 45 (3) ◽  
pp. 493-536 ◽  
Author(s):  
Anne Herzberg ◽  
Gerald M Steinberg

This article will examine the opportunities and limitations of using social media in the execution of legal duties relating to the monitoring and enforcement of IHL. The article will first provide an overview of social media. Next, it will briefly summarise the normative framework of IHL as well as the legal duties of the primary actors and promoters of IHL (for example, states, the UN, NGOs, the International Committee of the Red Cross and courts) to monitor and enforce these rules. The article will then address specific legal obligations relating to IHL monitoring and enforcement and the impact of social media on meeting these requirements.Throughout, the article will use case studies from several conflict zones, including Sudan, Uganda, Mexico, Somalia, Gaza and Libya. The article will conclude that social media can play a critical role in promoting IHL education, and monitoring for potential violations. The benefits of this technology, however, are less clear for carrying out legal obligations related to the enforcement of IHL, such as fact-finding, arrest and prosecution. It is essential, therefore, that clear guidelines for utilising this quickly evolving technology, particularly in official fact-finding and judicial frameworks, be established.


Sign in / Sign up

Export Citation Format

Share Document