{"title":"大型事件在线监控","authors":"Johan Fernquist, Lisa Kaati","doi":"10.1109/EISIC.2018.00015","DOIUrl":null,"url":null,"abstract":"In this paper, we describe an approach that can be used to monitor activity online that concerns large events. We propose six different tasks that can be used separately or in combination. The different tasks include analyzing messages from various actors, understanding the impact of messages to receivers, studying online discussions, analyzing hate and threats directed towards people and threats towards the execution of the large event and finally if there are any ongoing influential operations directed towards the general public. To illustrate how the approach can be used, we provide some examples of the different steps when monitoring online environments a few months before the Swedish general election in 2018.","PeriodicalId":110487,"journal":{"name":"2018 European Intelligence and Security Informatics Conference (EISIC)","volume":"28 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Online Monitoring of Large Events\",\"authors\":\"Johan Fernquist, Lisa Kaati\",\"doi\":\"10.1109/EISIC.2018.00015\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we describe an approach that can be used to monitor activity online that concerns large events. We propose six different tasks that can be used separately or in combination. The different tasks include analyzing messages from various actors, understanding the impact of messages to receivers, studying online discussions, analyzing hate and threats directed towards people and threats towards the execution of the large event and finally if there are any ongoing influential operations directed towards the general public. To illustrate how the approach can be used, we provide some examples of the different steps when monitoring online environments a few months before the Swedish general election in 2018.\",\"PeriodicalId\":110487,\"journal\":{\"name\":\"2018 European Intelligence and Security Informatics Conference (EISIC)\",\"volume\":\"28 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 European Intelligence and Security Informatics Conference (EISIC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EISIC.2018.00015\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 European Intelligence and Security Informatics Conference (EISIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EISIC.2018.00015","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we describe an approach that can be used to monitor activity online that concerns large events. We propose six different tasks that can be used separately or in combination. The different tasks include analyzing messages from various actors, understanding the impact of messages to receivers, studying online discussions, analyzing hate and threats directed towards people and threats towards the execution of the large event and finally if there are any ongoing influential operations directed towards the general public. To illustrate how the approach can be used, we provide some examples of the different steps when monitoring online environments a few months before the Swedish general election in 2018.