You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the proceedings of the 16th International Conference on Social, Cultural, and Behavioral Modeling, SBP-BRiMS 2023, which was held in Pittsburgh, PA, USA in September 2023. The 31 full papers presented in this volume were carefully reviewed and selected from 73 submissions. The papers were organized in topical sections as follows: Detecting malign influence; human behavior modeling; and social-cyber behavior modeling.
Why do terrorist organizations use children to support their cause and carry out their activities? Small Arms uncovers the brutal truth behind the mobilization of children by terrorist groups. Mia Bloom and John Horgan show us the grim underbelly of society that allows and even encourages the use of children to conduct terrorist activities. They provide readers with the who, what, when, why, and how of this increasingly concerning situation, illuminating a phenomenon that to most of us seems abhorrent. And yet, they argue, for terrorist groups the use of children carries many benefits. Children possess skills that adults lack. They often bring innovation and creativity. Children are, in fact...
This textbook provides a comprehensive and reader-friendly introduction to the field of computational social science (CSS). Presenting a unified treatment, the text examines in detail the four key methodological approaches of automated social information extraction, social network analysis, social complexity theory, and social simulation modeling. This updated new edition has been enhanced with numerous review questions and exercises to test what has been learned, deepen understanding through problem-solving, and to practice writing code to implement ideas. Topics and features: contains more than a thousand questions and exercises, together with a list of acronyms and a glossary; examines the similarities and differences between computers and social systems; presents a focus on automated information extraction; discusses the measurement, scientific laws, and generative theories of social complexity in CSS; reviews the methodology of social simulations, covering both variable- and object-oriented models.
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive an...
None
This book presents recent developments on the theoretical, algorithmic, and application aspects of Big Data in Complex and Social Networks. The book consists of four parts, covering a wide range of topics. The first part of the book focuses on data storage and data processing. It explores how the efficient storage of data can fundamentally support intensive data access and queries, which enables sophisticated analysis. It also looks at how data processing and visualization help to communicate information clearly and efficiently. The second part of the book is devoted to the extraction of essential information and the prediction of web content. The book shows how Big Data analysis can be used to understand the interests, location, and search history of users and provide more accurate predictions of User Behavior. The latter two parts of the book cover the protection of privacy and security, and emergent applications of big data and social networks. It analyzes how to model rumor diffusion, identify misinformation from massive data, and design intervention strategies. Applications of big data and social networks in multilayer networks and multiparty systems are also covered in-depth.
All social and policy researchers need to synthesize data into a visual representation. Producing good visualizations combines creativity and technique. This book teaches the techniques and basics to produce a variety of visualizations, allowing readers to communicate data and analyses in a creative and effective way. Visuals for tables, time series, maps, text, and networks are carefully explained and organized, showing how to choose the right plot for the type of data being analysed and displayed. Examples are drawn from public policy, public safety, education, political tweets, and public health. The presentation proceeds step by step, starting from the basics, in the programming languages R and Python so that readers learn the coding skills while simultaneously becoming familiar with the advantages and disadvantages of each visualization. No prior knowledge of either Python or R is required. Code for all the visualizations are available from the book's website.