Tools and Methodologies for Data Collection, Analysis, and Visualization

  • Samer Al-khateeb
  • Nitin Agarwal
Part of the SpringerBriefs in Cybersecurity book series (BRIEFSCYBER)


In this chapter, we briefly introduce a set of tools (mostly free and publicly available) and methodologies that can be used to collect, analyze, and visualize data from OSINF , Facebook , YouTube , Twitter , Blogs , and other sources. We will point out where you can get these tools, the capabilities of each tool, and how we used it in our research. This chapter is meant to give an overview of the tools currently used to conduct social network analysis (SNA) , social cyber forensics (SCF) , and text analytics . We will not cover the details of all the features/capabilities for each tool in this chapter—as some tools may require a whole book by themselves, but we will highlight each tool’s importance and point out the available resources to interested readers. This chapter should help readers finding answers to some research questions using various tools for data collection, analysis, and visualization.


Data collection tools Data analysis tools Data visualization tools 


  1. 1.
    S. Al-khateeb, N. Agarwal, Analyzing deviant cyber flash mobs of ISIL on twitter, in Social Computing, Behavioral-Cultural Modeling, and Prediction (Springer, Cham, 2015), pp. 251–257Google Scholar
  2. 2.
    S. Al-khateeb, N. Agarwal, The rise & fall of# NoBackDoor on Twitter: the Apple vs. FBI case, in Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on (IEEE, Piscataway, 2016), pp. 833–836Google Scholar
  3. 3.
    S. M. Research Foundation. Nodexl: Network overview, discovery and exploration for excel. [Online]. Available:
  4. 4.
    M.A. Smith, B. Shneiderman, N. MilicFrayling, E. Mendes Rodrigues, V. Barash, C. Dunne, T. Capone, A. Perer, E. Gleave, Analyzing (social media) networks with NodeXL, in Proceedings of the Fourth International Conference on Communities and Technologies (ACM, New York, 2009), pp. 255–264. [Online]. Available:
  5. 5.
    J.A. Carter, S. Maher, P.R. Neumann, #Greenbirds: measuring importance and influence in Syrian foreign fighter networks. [Online]. Available:
  6. 6.
    T. Khaund, K.K. Bandeli, M.N. Hussain, A. Obadimu, S. Al-Khateeb, N. Agarwal, Analyzing social and communication network structures of social bots and humans, in 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (IEEE, Piscataway, 2018), pp. 794–797Google Scholar
  7. 7.
    T. Khaund, S. Al-Khateeb, S. Tokdemir, N. Agarwal, Analyzing social bots and their coordination during natural disasters, in International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction and Behavior Representation in Modeling and Simulation (Springer, Cham, 2018), pp. 207–212Google Scholar
  8. 8.
    S. Al-khateeb, N. Agarwal, Examining botnet behaviors for propaganda dissemination: a case study of ISIL’s beheading videos-based propaganda, in 2015 IEEE International Conference on Data Mining Workshop (ICDMW) (IEEE, Piscataway, 2015), pp. 51–57Google Scholar
  9. 9.
    M. Hussain, K.K. Bandeli, M. Nooman, S. Al-khateeb, N. Agarwal, Analyzing the voices during European migrant crisis in blogosphere, in The 2nd International Workshop on Event Analytics using Social Media Data (2017)Google Scholar
  10. 10.
    E.L. Mead, M.N. Hussain, M. Nooman, S. Al-khateeb, N. Agarwal, Assessing situation awareness through blogosphere: a case study on Venezuelan socio-political crisis and the migrant influx, in SOTICS 2017 : The Seventh International Conference on Social Media Technologies, Communication, and Informatics (2017), pp. 22–29Google Scholar
  11. 11.
    Q. Yin, Q. Chen, A social network analysis platform for organizational risk analysis–ora, in 2012 Second International Conference on Intelligent System Design and Engineering Application (ISDEA) (IEEE, Piscataway, 2012), pp. 760–763Google Scholar
  12. 12.
    S. Al-khateeb, K.J. Conlan, N. Agarwal, I. Baggili, F. Breitinger, Exploring deviant hacker networks (DHN) on social media platforms. J. Digit. Forensic Secur. Law 11(2), pp. 7–20. [Online]. Available:
  13. 13.
    IBM Watson Analytics - Overview - United States (2017). [Online]. Available:
  14. 14.
    M.N. Hussain, A. Obadimu, K.K. Bandeli, M. Nooman, S. Al-khateeb, N. Agarwal, A Framework for Blog Data Collection: Challenges and Opportunities (IARIA XPS Press, Venice, 2017)Google Scholar
  15. 15.
    S. Al-khateeb, M.N. Hussain, N. Agarwal, Analyzing Deviant Socio-technical behaviors using social network analysis and cyber forensics-based methodologies, in Big Data Analytics in Cybersecurity, ser. Data Analytics Applications (CRC Press, New York, 2017), pp. 263–280Google Scholar
  16. 16.
    M.N. Hussain, S. Tokdemir, N. Agarwal, S. Al-Khateeb, Analyzing disinformation and crowd manipulation tactics on YouTube, in 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (IEEE, Piscataway, 2018), pp. 1092–1095Google Scholar
  17. 17.
    M.N. Hussain, S. Tokdemir, S. Al-khateeb, K.K. Bandeli, N. Agarwal, Understanding digital ethnography: socio-computational analysis of trending YouTube videos, in International Conference on Social Computing, Behavioral-Cultural Modeling & Prediction and Behavior Representation in Modeling and Simulation (SBP-BRiMS 2018) (2018)Google Scholar
  18. 18.
    S. Tokdemir, N. Agarwal, YouTube data analytics using YouTubeTrackerGoogle Scholar

Copyright information

© The Author(s), under exclusive license to Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Samer Al-khateeb
    • 1
  • Nitin Agarwal
    • 2
  1. 1.Department of Journalism, Media & ComputingCreighton UniversityOmahaUSA
  2. 2.Information Science DepartmentUniversity of Arkansas at Little RockLittle RockUSA

Personalised recommendations