Challenges in the use of social media data for the next generation analyst

This paper discusses the opportunities and challenges present for the next generation analyst in the use of social media data. Focusing particularly on the detection of deception and misinformation within the latter, a review of current approaches is followed by the elaboration of a theoretical model for social media analysis premised on activity based intelligence. Considering this model with regard to latent challenges to analytical performance and potential opportunities for analytical calibration, this discussion articulates an approach for open-source, next generation intelligence analysis.

[1]  Claire Cardie,et al.  Estimating the prevalence of deception in online review communities , 2012, WWW.

[2]  Dongsong Zhang,et al.  Discourse cues to deception in the case of multiple receivers , 2014, Inf. Manag..

[3]  H. Raghav Rao,et al.  Community Intelligence and Social Media Services: A Rumor Theoretic Analysis of Tweets During Social Crises , 2013, MIS Q..

[4]  Rosanna E. Guadagno,et al.  Dating deception: Gender, online dating, and exaggerated self-presentation , 2012, Comput. Hum. Behav..

[5]  J. Burgoon,et al.  Interpersonal Deception Theory , 1996 .

[6]  Sherali Zeadally,et al.  Online deception in social media , 2014, Commun. ACM.

[7]  N. Hara,et al.  Beyond vandalism: Wikipedia trolls , 2010, J. Inf. Sci..

[8]  Eric Schenk,et al.  Towards a characterization of crowdsourcing practices , 2011 .

[9]  Christopher Griffin,et al.  Identifying multi-regime behaviors of memes in Twitter data , 2014, 2014 Science and Information Conference.

[10]  P. Hernon Disinformation and misinformation through the internet: Findings of an exploratory study , 1995 .

[11]  Urs Gasser,et al.  Teens, social media, and privacy , 2013 .

[12]  Divesh Srivastava,et al.  Big Data Integration , 2015, Synthesis Lectures on Data Management.

[13]  Marcel Salathé,et al.  Assessing Vaccination Sentiments with Online Social Media: Implications for Infectious Disease Dynamics and Control , 2011, PLoS Comput. Biol..

[14]  Jacob Ratkiewicz,et al.  Detecting and Tracking Political Abuse in Social Media , 2011, ICWSM.

[15]  Jin Ha Lee,et al.  Notes from the underground city of disinformation: A conceptual investigation , 2011, ASIST.

[16]  Victoria L. Rubin,et al.  Discerning truth from deception: Human judgments and automation efforts , 2012, First Monday.

[17]  Anna Cinzia Squicciarini,et al.  Why and how to deceive: game results with sociological evidence , 2014, Social Network Analysis and Mining.

[18]  Sonja Utz,et al.  Types of Deception and Underlying Motivation , 2005 .

[19]  Victoria L. Rubin,et al.  Identification of Truth and Deception in Text: Application of Vector Space Model to Rhetorical Structure Theory , 2012 .

[20]  Patrick Juola,et al.  Detecting Stylistic Deception , 2012 .

[21]  Nam P. Nguyen,et al.  Containment of misinformation spread in online social networks , 2012, WebSci '12.

[22]  Bo Huang,et al.  Microblog Topic Detection Based on LDA Model and Single-Pass Clustering , 2012, RSCTC.

[23]  Fernando González-Ladrón-de-Guevara,et al.  Towards an integrated crowdsourcing definition , 2012, J. Inf. Sci..

[24]  Dragomir R. Radev,et al.  Rumor has it: Identifying Misinformation in Microblogs , 2011, EMNLP.

[25]  Hsinchun Chen,et al.  Social Media Analytics and Intelligence , 2010, IEEE Intell. Syst..

[26]  Luciano Floridi,et al.  Is Semantic Information Meaningful Data? , 2005, Philosophy and Phenomenological Research.

[27]  Monica T. Whitty,et al.  Would I lie to you? Self-serving lies and other-oriented lies told across different media , 2008, Comput. Hum. Behav..

[28]  E. Santos,et al.  Argument Formation in the Reasoning Process: Toward a Generic Model of Deception Detection , 2012 .

[29]  Jean Underwood,et al.  The lies we tell and what they say about us: Using behavioural characteristics to explain Facebook activity , 2011, Comput. Hum. Behav..

[30]  Brian Ulicny,et al.  Automating Military Intelligence Confidence Assessments for Twitter Messages , 2011 .

[31]  Hu Zhang,et al.  An Improving Deception Detection Method in Computer-Mediated Communication , 2012, J. Networks.

[32]  Jacob Ratkiewicz,et al.  Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.

[33]  S. L. Sporer,et al.  Are Computers Effective Lie Detectors? A Meta-Analysis of Linguistic Cues to Deception , 2015, Personality and social psychology review : an official journal of the Society for Personality and Social Psychology, Inc.

[34]  Anna Cinzia Squicciarini,et al.  Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[35]  Fang Liu,et al.  Rumors on Social Media in disasters: Extending Transmission to Retransmission , 2014, PACIS.

[36]  M. Knapp,et al.  Telling It Like It Isn't: A Review of Theory and Research on Deceptive Communications. , 1979 .

[37]  S. Adams Telling It Like It Isn't , 1996 .

[38]  Avner Caspi,et al.  Online Deception: Prevalence, Motivation, and Emotion , 2006, Cyberpsychology Behav. Soc. Netw..

[39]  Filippo Menczer,et al.  Truthy: enabling the study of online social networks , 2012, CSCW '13.

[40]  Yutaka Matsuo,et al.  Earthquake shakes Twitter users: real-time event detection by social sensors , 2010, WWW '10.

[41]  Yunming Ye,et al.  Detecting hot topics from Twitter: A multiview approach , 2014, J. Inf. Sci..

[42]  William B. Frakes,et al.  Information and misinformation: An investigation of the notions of information, misinformation, informing, and misinforming , 1986, J. Am. Soc. Inf. Sci..

[43]  Rabiyathul Basariya FRAUD DETECTION IN CARD NOT PRESENT TRANSACTIONS BASED ON BEHAVIORAL PATTERN , 2014 .

[44]  Roman Słowiński,et al.  Rough Sets and Current Trends in Computing , 2012, Lecture Notes in Computer Science.

[45]  John R. Carlson,et al.  Deception in Computer-Mediated Communication , 2004 .

[46]  Filippo Menczer,et al.  Clustering memes in social media , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).