L. Overbey, Gregory McKoy, Jesse Gordon, Shannon McKitrick
{"title":"Automated sensing and social network analysis in virtual worlds","authors":"L. Overbey, Gregory McKoy, Jesse Gordon, Shannon McKitrick","doi":"10.1109/ISI.2010.5484741","DOIUrl":null,"url":null,"abstract":"In the last decade, social network analysis (SNA) tools have gained considerable interest in intelligence and security communities, as terrorist networks have become more global, decentralized, and flexible. Additionally, recent concerns have been voiced that virtual worlds provide likely breeding grounds for terrorism recruitment, communication, and coordination activities. This paper outlines research involving a survey of the approaches criminal or terrorist groups can take to covertly advance their causes in virtual environments. In addition, a methodology for collecting, storing, and analyzing information about virtual world cyber-behaviors is presented. As an initial effort, data collection devices were created in the virtual world Second Life (SL). These devices are capable of recording a variety of behavioral data about avatars in SL, and then piping that information to an external database. Information from the database can then be analyzed using SNA. Preliminary results indicate that a combined approach utilizing manual and automated intelligence techniques along with SNA provide valuable insights into the structure, function, and key players within virtual world social networks.","PeriodicalId":434501,"journal":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE International Conference on Intelligence and Security Informatics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2010.5484741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13
Abstract
In the last decade, social network analysis (SNA) tools have gained considerable interest in intelligence and security communities, as terrorist networks have become more global, decentralized, and flexible. Additionally, recent concerns have been voiced that virtual worlds provide likely breeding grounds for terrorism recruitment, communication, and coordination activities. This paper outlines research involving a survey of the approaches criminal or terrorist groups can take to covertly advance their causes in virtual environments. In addition, a methodology for collecting, storing, and analyzing information about virtual world cyber-behaviors is presented. As an initial effort, data collection devices were created in the virtual world Second Life (SL). These devices are capable of recording a variety of behavioral data about avatars in SL, and then piping that information to an external database. Information from the database can then be analyzed using SNA. Preliminary results indicate that a combined approach utilizing manual and automated intelligence techniques along with SNA provide valuable insights into the structure, function, and key players within virtual world social networks.
在过去十年中,随着恐怖分子网络变得更加全球化、分散和灵活,社会网络分析(SNA)工具在情报和安全社区中获得了相当大的兴趣。此外,最近有人担心,虚拟世界可能为恐怖分子招募、交流和协调活动提供温床。本文概述了一项涉及犯罪或恐怖组织在虚拟环境中秘密推进其事业的调查方法的研究。此外,还提出了一种收集、存储和分析虚拟世界网络行为信息的方法。作为最初的努力,数据收集设备是在虚拟世界Second Life (SL)中创建的。这些设备能够记录SL中虚拟人物的各种行为数据,然后将这些信息传送到外部数据库。然后可以使用SNA分析数据库中的信息。初步结果表明,利用人工和自动智能技术以及SNA的组合方法为虚拟世界社交网络中的结构、功能和关键参与者提供了有价值的见解。