Social Media Networking and Tactical Intelligence Collection in the Middle East

2019 ◽  
Vol 9 (2) ◽  
pp. 15-28
Author(s):  
Karen Howells

Social media platforms are commonly used as a way to gather intelligence information by intelligence organizations in many countries. The data available from social media networks has been instrumental in aiding the organisation of rebellious activities in a number of Middle East countries. This article features an overview of the use of social media platforms in facilitating civil unrest, leading to an in-depth depiction of the use of such platforms both in Israel and the Palestinian Territories. After analyzing the types of data collected by intelligence agencies in the region, a model for filtering social network data through the use of socialbots is suggested. Using artificial intelligence, it is possible to design, create and build socialbots that can scrutinize enemy or terrorist organisations' data output. Further programming would allow these socialbots to interact with a target and would be able to disseminate propaganda for the intelligence agencies.

Author(s):  
Karen Howells

Social media platforms are commonly used as a way to gather intelligence information by intelligence organizations in many countries. The data available from social media networks has been instrumental in aiding the organisation of rebellious activities in a number of Middle East countries. This article features an overview of the use of social media platforms in facilitating civil unrest, leading to an in-depth depiction of the use of such platforms both in Israel and the Palestinian Territories. After analyzing the types of data collected by intelligence agencies in the region, a model for filtering social network data through the use of socialbots is suggested. Using artificial intelligence, it is possible to design, create and build socialbots that can scrutinize enemy or terrorist organisations' data output. Further programming would allow these socialbots to interact with a target and would be able to disseminate propaganda for the intelligence agencies.


2021 ◽  
Author(s):  
Emmanuel Etuh ◽  
Francis S. Bakpo ◽  
Eneh A.H

We live in a virtual world where actual lifestyles are replicated. The growing reliance on the use of social media networks worldwide has resulted in great concern for information security. One of the factors popularizing the social media platforms is how they connect people worldwide to interact, share content, and engage in mutual interactions of common interest that cut across geographical boundaries. Behind all these incredible gains are digital crime equivalence that threatens the physical socialization. Criminal minded elements and hackers are exploiting social media platforms (SMP) for many nefarious activities to harm others. As detection tools are developed to control these crimes so also hackers’ tactics and techniques are constantly evolving. Hackers are constantly developing new attacking tools and hacking strategies to gain malicious access to systems and attack social media network thereby making it difficult for security administrators and organizations to develop and implement the proper policies and procedures necessary to prevent the hackers’ attacks. The increase in cyber-attacks on the social media platforms calls for urgent and more intelligent security measures to enhance the effectiveness of social media platforms. This paper explores the mode and tactics of hackers’ mode of attacks on social media and ways of preventing their activities against users to ensure secure social cyberspace and enhance virtual socialization. Social media platforms are briefly categorized, the various types of attacks are also highlighted with current state-of-the-art preventive mechanisms to overcome the attacks as proposed in research works, finally, social media intrusion detection mechanism is suggested as a second line of defense to combat cybercrime on social media networks.


2020 ◽  
Author(s):  
Christophe Olivier Schneble ◽  
Maddalena Favaretto ◽  
Bernice Simonne Elger ◽  
David Martin Shaw

BACKGROUND Terms and conditions define the relationship between social media companies and users. However, these legal agreements are long and written in a complex language. It remains questionable whether users understand the terms and conditions and are aware of the consequences of joining such a network. With children from a young age interacting with social media, companies are acquiring large amounts of data, resulting in longitudinal data sets that most researchers can only dream of. The use of social media by children is highly relevant to their mental and physical health for 2 reasons: their health can be adversely affected by social media and their data can be used to conduct health research. OBJECTIVE The aim of this paper is to offer an ethical analysis of how the most common social media apps and services inform users and obtain their consent regarding privacy and other issues and to discuss how lessons from research ethics can lead to trusted partnerships between users and social media companies. Our paper focuses on children, who represent a sensitive group among users of social media platforms. METHODS A thematic analysis of the terms and conditions of the 20 most popular social media platforms and the 2 predominant mobile phone ecosystems (Android and iOS) was conducted. The results of this analysis served as the basis for scoring these platforms. RESULTS The analysis showed that most platforms comply with the age requirements issued by legislators. However, the consent process during sign-up was not taken seriously. Terms and conditions are often too long and difficult to understand, especially for younger users. The same applies to age verification, which is not realized proactively but instead relies on other users who report underaged users. CONCLUSIONS This study reveals that social media networks are still lacking in many respects regarding the adequate protection of children. Consent procedures are flawed because they are too complex, and in some cases, children can create social media accounts without sufficient age verification or parental oversight. Adopting measures based on key ethical principles will safeguard the health and well-being of children. This could mean standardizing the registration process in accordance with modern research ethics procedures: give users the key facts that they need in a format that can be read easily and quickly, rather than forcing them to wade through chapters of legal language that they cannot understand. Improving these processes would help safeguard the mental health of children and other social media users.


2019 ◽  
Vol 12 (3) ◽  
pp. 348-368
Author(s):  
Erkan Yildiz ◽  
Kevin Smets

Abstract Social media are usually associated with democratic political changes in authoritarian countries. However, authoritarian regimes have also learned to control the use of social media platforms. Among the ways of controlling social media, Internet trolling has emerged as an important part of social media networks and strategies. After the Gezi protests in 2013, Turkey has employed trolls to spread official views and counter government critics on social media, and pro-government users have become much more active. The government’s Twitter network has been built, primarily, on so-called ‘Ak trolls’. These have gained more impact in political circumstances, and with the help of state of emergency rules after the coup attempt on 15 July 2016, they have reached a level in which they influence Turkish social, political and Twitter spheres both directly and indirectly. This paper focuses on the tweets of regime supporters and ‘Ak trolls’ in order to explore the characteristics of posts in July 2016, during the days leading up to the coup attempt and in the post-coup period. Our work contributes to existing knowledge of trolls and the social media networks of authoritarian regimes by providing information on their behavior in times of acute conflict and crisis like the coup attempt.


Author(s):  
Ron Fisher ◽  
Ruth McPhail ◽  
Emily You ◽  
Maria Ash

Purpose – The purpose of the paper is to investigate if, and to what degree, social media are used for the recruitment of global supply chain managers. Design/methodology/approach – This is a conceptual paper that discusses how organizations should engage with social media platforms for effective recruitment of global supply chain managers. Findings – Findings are that organizations seeking to employ global supply chain managers, particularly those engaged in B2B activities, lag other industry sectors in adopting new ways of recruiting talent. Building on the findings, we present models of how organizations should move to adopt web-based technologies and the steps needed to engage fully in using social media to recruit global supply chain managers. Research limitations/implications – Global supply chains (including logistics) lag other industry sectors in adopting social media networks for recruitment, and risk missing out on talent if the issues are not addressed. Serious consideration needs to be given, particularly by B2B but also by B2C businesses, in order to attract suitable employees. Employees’ and prospective employees’ expectations will increasingly revolve around the use of social media. Originality/value – The research is original in that it investigates an emerging, contemporaneous issue that is of considerable importance in recruiting global supply chain managers. The research provides value by highlighting that in recruiting global supply chain managers, organizations have been slow to adopt new technologies, and recommends actions to remedy this.


Author(s):  
Judy Wanyoike ◽  
Peter Paul Kithae

The Internet has significantly changed the world and so has social media. Social media has offered a free for all stage for using social network and friends to create awareness and SMEs can leverage on this and advance their business in the international arena. The general objective of the study was to analyze the effect of social media networks on SME performance in the International Arena, with special focus on those operating in Kamukunji area of Nairobi County, Kenya. The study aimed to achieve the following specific objectives; to assess the influence of use of social media networks in customer relations on SMEs Performance in the International Arena and to analyze the influence of use of social media networks while sourcing for inputs on SMEs Performance in the International Arena. Theories underpinning this study included Social Exchange Theory and Social Penetration Theory. The study employed a descriptive research design. The target population of this study comprised of 838 SME firms operating at Kamukunji in Nairobi County. Since the study population was large, the study considered 10% of the population. The researcher interviewed 84 respondents from the shops selected using stratified random sampling technique. Questionnaires were used to obtain important information about the population. Data collected was both quantitative and qualitative in nature. Descriptive statistical tools helped the researcher to describe the data and determine the extent used. Analysis was done quantitatively and qualitatively by use of descriptive statistics. This included percentages, mean and standard deviation which were presented using tables and charts to give a clear picture of the research findings. Results showed that social media platforms have the potential to promote customer relations as well as to source for inputs. Utilization of social media platforms was found to have enhanced SMEs performance in the International Arena to a great extent. The study concluded that customer relations and sourcing for inputs all have significant effects on SMEs performance in the International Arena. The study recommended that in order to promote SMEs performance in global arena, SMEs must invest in building stronger customer relationships especially through utilization of social media platforms Further SMEs should seek to learn and adopt social media tools that provide an opportunity for growth of the business through increased sales, profits and providing employment for Kenyans.


2017 ◽  
Vol 78 (2) ◽  
Author(s):  
Clara Y. Tran ◽  
Jennifer A. Lyon

This cross-sectional survey focused on faculty use and knowledge of author identifiers and researcher networking systems, and professional use of social media, at a large state university. Results from 296 completed faculty surveys representing all disciplines (9.3% response rate) show low levels of awareness and variable resource preferences. The most utilized author identifier was ORCID while ResearchGate, LinkedIn, and Google Scholar were the top profiling systems. Faculty also reported some professional use of social media platforms. The survey data will be utilized to improve library services and develop intra-institutional collaborations in scholarly communication, research networking, and research impact.


2019 ◽  
Vol 13 ◽  
pp. 67-75
Author(s):  
Muhammad Abdullahi Maigari ◽  
Uthman Abdullahi Abdul-Qadir

This paper examines the abduction of the schoolgirls in Chibok Local Government Area of Borno State, Nigeria in 2014. The paper examined how the abduction of the schoolgirls generated responses and support for the rescue of the abducted girls from people and organization from different parts of the globe. The Islamists terrorist organization operating in Borno State has attracted the attention of the world since 2009 when they started attacking government establishments and security installations northeast which later escalated to major cities in Northern Nigeria. Methodologically, the paper utilized secondary sources of data to analyze the phenomenon studied. The paper revealed that the development and innovations in information and communication technology which dismantled traditional and colonial boundaries enabled people to express support, solidarity and assist victims of conflict who resides millions of Kilometers away. This shows that Internet-based communications technology has reduced the distance of time and space that characterised traditional mass media. The campaign for the release of the schoolgirls on the social media platforms particularly Twitter and Facebook has tremendously contributed to the release of some of them. Furthermore, the girls freed from abduction have received proper attention: education and reintegration programmes which enable them to start post-abduction life. In this regard, social media has become a tool for supporting the government in moments of security challenges which the Bring Back Our Girls campaign attracted foreign and domestic assistance to Nigeria in the search of the abducted girls and the fight against the Islamist insurgents.


Sign in / Sign up

Export Citation Format

Share Document