SURVEI LITERATUR INFORMATION SECURITY INTELLIGENT UNTUK MEMPREDIKSI POTENSI KERUSUHAN MELALUI ANALISA JARINGAN MEDIA SOSIAL
Abstract
Full Text:
PDFReferences
Muthiah, S., Huang, B., Arredondo, J., Mares, D., Getoor, L., Katz, G., Ramakrishnan, N.: Planned Protest Modeling in News and Social Media
Ramakrishnan, N., Butler, P., Muthiah, S., Self, N., Khandpur, R., Saraf, P., Wang, W., Cadena, J., Vullikanti, A., Korkmaz, G., Kuhlman, C., Marathe, A., Zhao, L., Hua, T., Chen, F., Lu, C.T., Huang, B., Srinivasan, A., Trinh, K., Getoor, L., Katz, G., Doyle, A., Ackermann, C., Zavorin, I., Ford, J., Summers, K., Fayed, Y., Arredondo, J., Gupta, D., Mares, D.: ’beating the news’ with embers: Forecasting civil unrest using open source indicators. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’14, pp. 1799–1808. ACM, New York, NY, USA (2014).
Filchenkov, A.A., Azarov, A.A., Abramov, M.V.: What is more predictable in social media: Election outcome or protest action? In: Proceedings of the 2014 Conference on Electronic Governance and Open Society: Challenges in Eurasia. EGOSE ’14, pp. 157–161. ACM, New York, NY, USA (2014).
Chris Hale, W.: Extremism on the world wide web: a research review. Criminal Justice Studies 25(4), 343–356 (2012)
Wang, M.C.G.A., Chen, X.Z.H., Mao, D.Z.W.: Intelligence and security informatics (2011)
Yannakogeorgos, P.: Rethinking the threat of cyberterrorism. In: Chen, T.M., Jarvis, L., Macdonald, S. (eds.) Cyberterrorism, pp. 43–62. Springer, ??? (2014).
Ula, M., & Fuadi, W. (2017, February). A method for evaluating information security governance (ISG) components in banking environment. In Journal of Physics: Conference Series (Vol. 812, No. 1, p. 012031). IOP Publishing.
Compton, R., Lee, C., Xu, J., Artieda-Moncada, L., Lu, T.-C., Silva, L., Macy, M.: Using publicly visible social media to build detailed forecasts of civil unrest. Security Informatics 3(1) (2014).
Xu, J., Lu, T.-C., Compton, R., Allen, D.: Civil unrest prediction: A tumblr-based exploration. In: Kennedy, W., Agarwal, N., Yang, S. (eds.) Social Computing, Behavioral-Cultural Modeling and Prediction 2014. Lecture Notes in Computer Science, vol. 8393, pp. 403–411. Springer
Chen, F., Neill, D.B.: Non-parametric scan statistics for event detection and forecasting in heterogeneous social media graphs. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. KDD ’14, pp. 1166–1175. ACM, New York, NY, USA (2014).
Hua, T., Lu, C.-T., Ramakrishnan, N., Chen, F., Arredondo, J., Mares, D., Summers, K.: Analyzing civil unrest through social media. Computer 46(12), 80–84 (2013).
Colbaugh, R., Glass, K.: Early warning analysis for social diffusion events. Security Informatics 1(1), 1–26 (2012)
Leets, L.: Responses to internet hate sites: Is speech too free in cyberspace? Communication Law & Policy 6(2), 287–317 (2001)
Mahmood, S.: Online social networks: The overt and covert communication channels for terrorists and beyond. In: Homeland Security (HST), 2012 IEEE Conference on Technologies For, pp. 574–579 (2012). IEEE
Fisher, A.: How jihadist networks maintain a persistent online presence. Perspectives on Terrorism 9(3) (2015)
DOI: https://doi.org/10.29103/sisfo.v3i1.6302
Article Metrics
Abstract Views : 101 timesPDF Downloaded : 10 times
Refbacks
- There are currently no refbacks.
Copyright (c) 2019 Munirul ula
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Universitas Malikussaleh |
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.