Summary
In this paper we discuss emerging security and safety applications of Online Social Networks (OSNs). Due to high worldwide popularity social networking can be considered not only as an effective communication channel and efficient information sharing platform, but also as a useful mechanism to enhance public safety and security, including crisis response and recovery efforts, urban operations, homeland security, and mass events planning. Therefore, in this paper we present real examples of how OSNs can be used for those purposes. We conclude by proposing a correlation framework that can effectively increase capabilities of OSN data management and processing for public safety.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
The 2011 Social Media Consumer Trend and Benchmark Report, Experian Information Solutions (2011)
http://www.simplyzesty.com/social-media/twitter/top-10-most-tweeted-about-events-ever-so-far/ (last visited March 12, 2012)
http://blog.twitter.com/2011/06/global-pulse.html (last visited March 12, 2012)
Internet Standard, Social Media 2012. Raport, II Edycja (2012)
Internet Standard, Social Media 2010. Raport, I Edycja (2010)
National Policing Improvement Agency, Engage: Digital and Social Media for the Police Service, NPIA, London (2010)
Crump, J.: What Are the Police Doing on Twitter? Social Media, the Police and the Public Policy and Internet 3(4) Article 7, (2011)
Pring, C.: Using Social Media for Crisis Management (2011)
Birgfeld, B.: Why Crisis Management and Social Media Must Co-exist (2010)
http://tvp.info/modul-specjalny/tvp-info-jako-jedyna-telewizja-pokazala-ladowanie-boeinga-na-zywo-zobacz-je-u-nas/5596559 (last visited March 12, 2012)
http://kontakt24.tvn.pl/temat,wyladowal-szczesliwie-eskortowaly-go-f-16,151146.html (last visited March 12, 2012)
http://www.alert24.pl/alert24/1,84880,10608235,Awaria-czarterowego-boeinga--Zawrocil-na-lotnisko.html (last visited March 12, 2012)
http://wiadomosci.gazeta.pl/wiadomosci/1,114873,10608235.html (last visited March 12, 2012)
http://uk.reuters.com/article/2011/11/11/uk-poland-clashes-idUKTRE7AA5BQ20111111 (last visited March 12, 2012)
http://www.tvn24.pl/12690,1724324,0,2,policja-wycenila-straty-po-zadymach-11-listopada-w-stolicy,wiadomosc.html , (last visited March 12, 2012)
http://wiadomosci.gazeta.pl/wiadomosci/1,114873,10668247,Poznan--Nie-dopuscimy-powtorki-11-listopada-w-Warszawie-.html (last visited March 12, 2012)
http://www.tvn24.pl/12690,1724857,0,1,marsz-rownosci-i-pikieta-onr-w-poznaniu,wiadomosc.html (last visited March 12, 2012)
Sayers, M.: Social Media and the Law: Police Explore New Ways to Fight Crime (2011)
http://www.scmagazineus.com/iran-election-protesters-use-twitte-to-recruit-hackers/article/138545/ (last visited March 12, 2012)
Carr, J.: Inside Cyber Warfare. O’Reilly Media (2009)
Osborne, G., Turnbull, B.: Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. In: International Conference on Availability, Reliability and Security, ARES 2009 (2009)
Beckett, J.: Future Directions Framework. State Electronic Evidence Branch, New South Wales Police, Tech. Rep. (2005)
Hristidis, V., et al.: Survey of Data Management and Analysis in Disaster Situations. Journal of Systems and Software 83(10) (2010)
Strom, R., Dorai, C., Buttner, G., Li, Y.: SMILE - Distributed Middleware for Event Stream Processing. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 553–554 (2007)
Barga, R.S., Caituiro-Monge, H.: Event Correlation and Pattern Detection in CEDR. In: Grust, T., Höpfner, H., Illarramendi, A., Jablonski, S., Fischer, F., Müller, S., Patranjan, P.-L., Sattler, K.-U., Spiliopoulou, M., Wijsen, J. (eds.) EDBT 2006. LNCS, vol. 4254, pp. 919–930. Springer, Heidelberg (2006)
Cuppens, F., Miege, A.: Alert Correlation in a Cooperative Intrusion Detection Framework. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 202–215 (2002)
Abadi, D., Carney, D., Cetintemel, U., Cherniack, M., Convey, C., Lee, S., Stonebraker, M., Tatbul, N., Zdonik, S.: Aurora: A New Model and Architecture for Data Stream Management. VLDB Journal 12(2) (2003)
Coppolino, L., D’Antonio, S., Elia, I.A., Romano, L.: From Intrusion Detection to Intrusion Detection and Diagnosis: An Ontology-Based Approach. In: Lee, S., Narasimhan, P. (eds.) SEUS 2009. LNCS, vol. 5860, pp. 192–202. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Choraś, M., Manso, M., Puchalski, D., Kozik, R., Samp, K. (2013). Online Social Networks: Emerging Security and Safety Applications. In: Choraś, R. (eds) Image Processing and Communications Challenges 4. Advances in Intelligent Systems and Computing, vol 184. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32384-3_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-32384-3_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32383-6
Online ISBN: 978-3-642-32384-3
eBook Packages: EngineeringEngineering (R0)