Loughborough University
Browse
National Security and Social Media Monitoring - A Presentation of the EMOTIVE and Related Systems.pdf (190.52 kB)

National security and social media monitoring: a presentation of the emotive and related systems

Download (190.52 kB)
conference contribution
posted on 2015-09-15, 14:01 authored by Martin SykoraMartin Sykora, Tom JacksonTom Jackson, Ann O'Brien, Suzanne Elayan
Today social media streams, such as Twitter, represent vast amounts of 'real-time' daily streaming data. Topics on these streams cover every range of human communication, ranging from banal banter, to serious reactions to events and information sharing regarding any imaginable product, item or entity. It has now become the norm for publicly visible events to break news over social media streams first, and only then followed by main stream media picking up on the news. It has been suggested in literature that social-media are a valid, valuable and effective real-time tool for gauging public subjective reactions to events and entities. Due to the vast big-data that is generated on a daily basis on social media streams, monitoring and gauging public reactions has to be automated and most of all scalable - i.e. human, expert monitoring is generally unfeasible. In this paper the EMOTIVE system, a project funded jointly by the DSTL (Defence Science and Technology Laboratory) and EPSRC, which focuses on monitoring fine-grained emotional responses relating to events of national security importance, will be presented. Similar systems for monitoring national security events are also presented and the primary traits of such national security social media monitoring systems are introduced and discussed.

History

School

  • Business and Economics

Department

  • Business

Published in

Proceedings - 2013 European Intelligence and Security Informatics Conference, EISIC 2013

Pages

172 - 175

Citation

SYKORA, M.D. ...et al., 2013. National security and social media monitoring: a presentation of the emotive and related systems. Proceedings of the 2013 European Intelligence and Security Informatics Conference, (EISIC 2013), Uppsala, pp.172-175.

Publisher

© IEEE

Version

  • AM (Accepted Manuscript)

Publisher statement

This work is made available according to the conditions of the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND 4.0) licence. Full details of this licence are available at: https://creativecommons.org/licenses/by-nc-nd/4.0/

Publication date

2013

Notes

This is a conference paper [© IEEE]. It is also available at: http://ieeexplore.ieee.org/ Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE

ISBN

9780769550626

Language

  • en