O'Reilly logo

Application of Big Data for National Security by Babak Akhgar, Gregory B. Saathoff, Hamid R. Arabnia, Richard Hill, Andrew Staniforth, Petra Saskia Bayerl

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

Mining Social Media

Architecture, Tools, and Approaches to Detecting Criminal Activity

Marcello Trovati

Abstract

Social media have been increasingly used as a means of information gathering and sharing in criminal activities. The ability to expose and analyze any such activity is at the core of crime detection, providing a variety of techniques and platforms that facilitate the decision-making process in this field.

Keywords

Bayesian networks; Data mining; Information retrieval; Social media; Text mining

Introduction

In his famous article, “Computing Machinery and Intelligence,” Turing (1950) begins by introducing the question, “Can machines think?”
Since the dawn of artificial intelligence research, the possibility of creating machines able ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required