Skip to main content

Online Social Networks: Emerging Security and Safety Applications

  • Conference paper
Book cover Image Processing and Communications Challenges 4

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 184))

Summary

In this paper we discuss emerging security and safety applications of Online Social Networks (OSNs). Due to high worldwide popularity social networking can be considered not only as an effective communication channel and efficient information sharing platform, but also as a useful mechanism to enhance public safety and security, including crisis response and recovery efforts, urban operations, homeland security, and mass events planning. Therefore, in this paper we present real examples of how OSNs can be used for those purposes. We conclude by proposing a correlation framework that can effectively increase capabilities of OSN data management and processing for public safety.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. The 2011 Social Media Consumer Trend and Benchmark Report, Experian Information Solutions (2011)

    Google Scholar 

  2. http://www.simplyzesty.com/social-media/twitter/top-10-most-tweeted-about-events-ever-so-far/ (last visited March 12, 2012)

  3. http://blog.twitter.com/2011/06/global-pulse.html (last visited March 12, 2012)

  4. Internet Standard, Social Media 2012. Raport, II Edycja (2012)

    Google Scholar 

  5. Internet Standard, Social Media 2010. Raport, I Edycja (2010)

    Google Scholar 

  6. National Policing Improvement Agency, Engage: Digital and Social Media for the Police Service, NPIA, London (2010)

    Google Scholar 

  7. Crump, J.: What Are the Police Doing on Twitter? Social Media, the Police and the Public Policy and Internet 3(4) Article 7, (2011)

    Google Scholar 

  8. Pring, C.: Using Social Media for Crisis Management (2011)

    Google Scholar 

  9. Birgfeld, B.: Why Crisis Management and Social Media Must Co-exist (2010)

    Google Scholar 

  10. http://www.alert24.pl/alert24/0,0.html

  11. http://kontakt24.tvn.pl/

  12. http://tvp.info/modul-specjalny/tvp-info-jako-jedyna-telewizja-pokazala-ladowanie-boeinga-na-zywo-zobacz-je-u-nas/5596559 (last visited March 12, 2012)

  13. http://kontakt24.tvn.pl/temat,wyladowal-szczesliwie-eskortowaly-go-f-16,151146.html (last visited March 12, 2012)

  14. http://www.alert24.pl/alert24/1,84880,10608235,Awaria-czarterowego-boeinga--Zawrocil-na-lotnisko.html (last visited March 12, 2012)

  15. http://wiadomosci.gazeta.pl/wiadomosci/1,114873,10608235.html (last visited March 12, 2012)

  16. http://uk.reuters.com/article/2011/11/11/uk-poland-clashes-idUKTRE7AA5BQ20111111 (last visited March 12, 2012)

  17. http://www.tvn24.pl/12690,1724324,0,2,policja-wycenila-straty-po-zadymach-11-listopada-w-stolicy,wiadomosc.html , (last visited March 12, 2012)

  18. http://wiadomosci.gazeta.pl/wiadomosci/1,114873,10668247,Poznan--Nie-dopuscimy-powtorki-11-listopada-w-Warszawie-.html (last visited March 12, 2012)

  19. http://www.tvn24.pl/12690,1724857,0,1,marsz-rownosci-i-pikieta-onr-w-poznaniu,wiadomosc.html (last visited March 12, 2012)

  20. Sayers, M.: Social Media and the Law: Police Explore New Ways to Fight Crime (2011)

    Google Scholar 

  21. http://www.scmagazineus.com/iran-election-protesters-use-twitte-to-recruit-hackers/article/138545/ (last visited March 12, 2012)

  22. Carr, J.: Inside Cyber Warfare. O’Reilly Media (2009)

    Google Scholar 

  23. Osborne, G., Turnbull, B.: Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. In: International Conference on Availability, Reliability and Security, ARES 2009 (2009)

    Google Scholar 

  24. Beckett, J.: Future Directions Framework. State Electronic Evidence Branch, New South Wales Police, Tech. Rep. (2005)

    Google Scholar 

  25. Hristidis, V., et al.: Survey of Data Management and Analysis in Disaster Situations. Journal of Systems and Software 83(10) (2010)

    Google Scholar 

  26. Strom, R., Dorai, C., Buttner, G., Li, Y.: SMILE - Distributed Middleware for Event Stream Processing. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 553–554 (2007)

    Google Scholar 

  27. Barga, R.S., Caituiro-Monge, H.: Event Correlation and Pattern Detection in CEDR. In: Grust, T., Höpfner, H., Illarramendi, A., Jablonski, S., Fischer, F., Müller, S., Patranjan, P.-L., Sattler, K.-U., Spiliopoulou, M., Wijsen, J. (eds.) EDBT 2006. LNCS, vol. 4254, pp. 919–930. Springer, Heidelberg (2006)

    Google Scholar 

  28. Cuppens, F., Miege, A.: Alert Correlation in a Cooperative Intrusion Detection Framework. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 202–215 (2002)

    Google Scholar 

  29. Abadi, D., Carney, D., Cetintemel, U., Cherniack, M., Convey, C., Lee, S., Stonebraker, M., Tatbul, N., Zdonik, S.: Aurora: A New Model and Architecture for Data Stream Management. VLDB Journal 12(2) (2003)

    Google Scholar 

  30. Coppolino, L., D’Antonio, S., Elia, I.A., Romano, L.: From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. In: Lee, S., Narasimhan, P. (eds.) SEUS 2009. LNCS, vol. 5860, pp. 192–202. Springer, Heidelberg (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michał Choraś .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choraś, M., Manso, M., Puchalski, D., Kozik, R., Samp, K. (2013). Online Social Networks: Emerging Security and Safety Applications. In: Choraś, R. (eds) Image Processing and Communications Challenges 4. Advances in Intelligent Systems and Computing, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32384-3_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32384-3_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32383-6

  • Online ISBN: 978-3-642-32384-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics