Multilevel Visualization Using Enhanced Social Network Analysis with Smartphone Data

While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in people's lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information. The authors therefore use them for tasks varying from direct marketing to forensic analysis. The authors have already seen Social Network Forensics techniques focused on particular networks implementing methods that collect data from user accounts. During the forensic analysis it is common to aggregate information from different sources but, usually, this procedure causes correlation problems. Here, the authors present their method to correlate data gathered from various social networks in combination with smartphones creating a new form of social map of the user under investigation. In addition, the authors introduce a multi level graph that utilises the correlated information from the smartphone and the social networks and demonstrates in three dimensions the relevance of each contact with the suspect.

[1]  Jarke J. van Wijk,et al.  Eurographics/ Ieee-vgtc Symposium on Visualization 2008 Visual Inspection of Multivariate Graphs , 2022 .

[2]  Thies Pfeiffer,et al.  Interactive 3D graphs for web-based social networking platforms , 2011, CISIM 2011.

[3]  Andrew Blyth,et al.  A Unified Approach to Network Traffic and Network Security Visualisation , 2009, 2009 IEEE International Conference on Communications.

[4]  Dario Valentino Forete Log Correlation: Tools and Techniques , 2006 .

[5]  Nello Cristianini,et al.  Nowcasting the mood of the nation , 2012, Significance.

[6]  Pierre Dragicevic,et al.  GraphDice: A System for Exploring Multivariate Social Networks , 2010, Comput. Graph. Forum.

[7]  Andrew Blyth,et al.  Presenting DEViSE: Data Exchange for Visualizing Security Events , 2009, IEEE Computer Graphics and Applications.

[8]  Xin Shuai,et al.  Loose tweets: an analysis of privacy leaks on twitter , 2011, WPES.

[9]  Simson L. Garfinkel,et al.  Digital forensics research: The next 10 years , 2010, Digit. Investig..

[10]  Panagiotis Kanellis,et al.  Digital Crime And Forensic Science in Cyberspace (N/A) , 2006 .

[11]  Mathieu Bastian,et al.  Gephi: An Open Source Software for Exploring and Manipulating Networks , 2009, ICWSM.

[12]  Theodore Tryfonas,et al.  Forensic analysis of wireless networking evidence of Android smartphones , 2012, 2012 IEEE International Workshop on Information Forensics and Security (WIFS).

[13]  Bart van den Hooff,et al.  Lost in space? Cognitive fit and cognitive load in 3D virtual environments , 2013, Comput. Hum. Behav..

[14]  Malcolm K. Sparrow,et al.  The application of network analysis to criminal intelligence: An assessment of the prospects , 1991 .

[15]  Edgar R. Weippl,et al.  Social snapshots: digital forensics for online social networks , 2011, ACSAC '11.

[16]  John Scott What is social network analysis , 2010 .

[17]  Ben Shneiderman,et al.  Interactive Dynamics for Visual Analysis , 2012 .

[18]  Colin Ware,et al.  Visualization of Large Nested Graphs in 3D: Navigation and Interaction , 1998, J. Vis. Lang. Comput..

[19]  Kevin W. Boyack,et al.  OpenOrd: an open-source toolbox for large graph layout , 2011, Electronic Imaging.

[20]  Sotiris Ioannidis,et al.  Digging up social structures from documents on the web , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[21]  Ibrahim Baggili,et al.  Forensic analysis of social networking applications on mobile devices , 2012, Digit. Investig..

[22]  Tamara Munzner,et al.  H3: laying out large directed graphs in 3D hyperbolic space , 1997, Proceedings of VIZ '97: Visualization Conference, Information Visualization Symposium and Parallel Rendering Symposium.

[23]  Ivan Herman,et al.  Graph Visualization and Navigation in Information Visualization: A Survey , 2000, IEEE Trans. Vis. Comput. Graph..

[24]  Wei Qi Yan,et al.  An Overview of Penetration Testing , 2014, Int. J. Digit. Crime Forensics.

[25]  Michael E. Papka,et al.  Visualizing Large, Heterogeneous Data in Hybrid-Reality Environments , 2013, IEEE Computer Graphics and Applications.

[26]  Nello Cristianini,et al.  Nowcasting Events from the Social Web with Statistical Learning , 2012, TIST.

[27]  Hua Lin,et al.  Cryptography-Based Authentication for Protecting Cyber Systems , 2011 .