SlideShare une entreprise Scribd logo
1  sur  36
Enhancing Soft Power (ESP) Analysis and Situational Awareness over network of  Computers, Sensors, People, and Content for enhancing Soft Power AmitSheth, LexisNexis Eminent Scholar  Director, Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis) Wright State University http://knoesis.org
“…challenge accepted paradigms to propose new ways of fighting from air, space, and cyberspace.” - General Stephen Lorenz
A General who led recent war “It’s not the number of people you kill,  it’s the number of people you convince.”
Network Analysis & Visualization Consider all challenges that can be addressed by advanced semantic analytics and visualization in the cyberspace Cyberspace = {computers/networks,  sensors,  social <people, conversations>} For issues effecting security in cyberspace and to enhancing military’s capacity to project soft power So broadly, People-Content-NetworkAnalysis and Visualization
Institutions Involved Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis), UCI (Ramesh Jain), OSU Faculty in Visual Analytics [Srini Parthasarthy]  WSU Faculty in Internet/WWW, Semantic Web, Sensor Web, Social Computing, Network Security [Bin Wang] , Visualization [Tom Wischgoll], and Cognitive Science [John Flach,…] Optionally, faculty at Indiana University Center for Complex Networks & Systems, and Purdue University Preliminary thoughts on COE on Enhancing Soft Power (ESP)
Networks in Cyberspace Networks in Cyber Space Sensor Networks Computer Networks Social Networks
Networks and Cyber Security Networks in Cyber Space Cyber Security Sensor Networks Computer Networks Social Networks
Networks and Soft Power Networks in Cyber Space Computer Networks Sensor Networks Soft Power Citizen Sensing Social Networks
Hard Power – “Carrots and Sticks”
Soft Power: “The Second Face of Power” “Affect behavior through attraction” “Soft power is attractive power” Also called cooptive power:  the ability to shape the preferences of others getting others to want the outcomes that we want
How important is soft power? Henry Crumpton– CIA covert-op leader Hard power – 25% Soft power – 75% Wield soft power (to counter terror groups in Iraq and Afghanistan) through Empowerment of native people Developmental and educational projects Measure impact of policy alternatives development initiatives
Using soft power and monitoring its effects One approach – Analyze  online social networks Kno.e.sis Ohio State Aggregate social perceptions Analyze with a focus theme  Use spatio-temporal aspects Provide sentiment, intension, cultural analysis Visualize the interaction graphs formed in social networks  (more later) Twitris (live demo) How hard is this?
Twitris: Architecture
Twitris: Features and Research Issues Data intensive Processing and storage of data Vs meta data Timeliness Live resource aggregation Near real time  Tunable spatio-temporal scope/weights Global Iran election Vs. Local health care debate Parallel programming,  cloud computing (map-reduce) Information retrieval, natural language processing (harder with casual text),  machine learning Semantic Web technologies, Web 2.0 tools
Twitris: Ongoing investigations For a given viral “tweet” study network of people who reply or re-tweet do this across space and theme variation of content HCR – Health care reform, IE – Iran election, ISWC – Intl. Semantic Web  conference
Sparse and Dense ReTweet Graphs - Call for action vs. Information Sharing tweets Showing retweet (forward chains) of a viral tweet in the HealthCare Debate data “Join @MarkUdall @RitterForCO and @BennetForCO to support an up-or-down vote on the public option http://tr.im/Cm2u”
Sparse and Dense ReTweet Graphs - Call for action vs. Information Sharing tweets Showing retweet (forward chains) of a viral tweet in the Iran data “Iran Election Crisis:  10 Incredible YouTube Videos http://bit.ly/vPDLo” Both network and content are important in studying social dynamics (here, information diffusion)
Analysis of Conversation and Chatter  Use language constructs to analyze sentiments  and intentions
Visual Analytics for Dynamic Interaction Networks Model social networks as graphs ,[object Object]
Their interactions are edges
Groups of connected people are communities (clusters)
Edge weights capture relative importance
Addition and deletion of edges and nodes represent changes in the networkChallenges ,[object Object]
Characterize the types of changes and potential causes
Facilitate interactive interrogation,[object Object]
Paradigm: Overview, Zoom, Filter, and DoD Event detection proceeds iteratively: Events are computed from time Ti to time Ti+1 Clusters at time Ti compared with those at Ti+1  Use only nodes that are active at either time which leads to significant time savings. Views (map normalized measures -> colors) Coarsening using multilevel hierarchies of nodes Graph view, community view, event view, and node view
Network Visualizer Architecture
Coarse View of a Wikipedia Subgraph
Zoom and Filter Snapshot
Event View: Importance of Ranking
Semantic Annotations for any resource in cyberspace (message, text, images, and AV) ,[object Object]
 Use the metadata to process and elicit information from a given set of resources,[object Object]
 Type of company
 Industry affiliation
 Sector
 Exchange

Contenu connexe

Tendances

Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacy
Chris Furton
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mapping
Fred Zimmerman
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia Watson
Patricia M Watson
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
Pukhraj Singh
 

Tendances (20)

Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacy
 
Threats_Report_2013
Threats_Report_2013Threats_Report_2013
Threats_Report_2013
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mapping
 
Cnsm2011
Cnsm2011Cnsm2011
Cnsm2011
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia Watson
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyo
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Big Data Social Network Analysis
Big Data Social Network AnalysisBig Data Social Network Analysis
Big Data Social Network Analysis
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 
Using Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in GeolocationUsing Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
 

Similaire à Enhancing Soft Power: using cyberspace to enhance Soft Power

Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)
Jan Sifra
 
Contractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACContractor-Borner-SNA-SAC
Contractor-Borner-SNA-SAC
webuploader
 
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Amit Sheth
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Tin180 VietNam
 

Similaire à Enhancing Soft Power: using cyberspace to enhance Soft Power (20)

Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...
Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...
Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation Model
 
Web and Complex Systems Lab @ Kno.e.sis
Web and Complex Systems Lab @ Kno.e.sisWeb and Complex Systems Lab @ Kno.e.sis
Web and Complex Systems Lab @ Kno.e.sis
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...
 
Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)
 
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebOpen Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
 
InSTEDD HISA Conference
InSTEDD HISA ConferenceInSTEDD HISA Conference
InSTEDD HISA Conference
 
InSTEDD: Collaboration in Disease Surveillance & Response
InSTEDD: Collaboration in Disease Surveillance & ResponseInSTEDD: Collaboration in Disease Surveillance & Response
InSTEDD: Collaboration in Disease Surveillance & Response
 
Contractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACContractor-Borner-SNA-SAC
Contractor-Borner-SNA-SAC
 
Computing for Human Experience [v3, Aug-Oct 2010]
Computing for Human Experience [v3, Aug-Oct 2010]Computing for Human Experience [v3, Aug-Oct 2010]
Computing for Human Experience [v3, Aug-Oct 2010]
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence Platform
 
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...
 
Final Next Generation Content Management
Final    Next  Generation  Content  ManagementFinal    Next  Generation  Content  Management
Final Next Generation Content Management
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends
 
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Enhancing Soft Power: using cyberspace to enhance Soft Power

  • 1. Enhancing Soft Power (ESP) Analysis and Situational Awareness over network of Computers, Sensors, People, and Content for enhancing Soft Power AmitSheth, LexisNexis Eminent Scholar Director, Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis) Wright State University http://knoesis.org
  • 2. “…challenge accepted paradigms to propose new ways of fighting from air, space, and cyberspace.” - General Stephen Lorenz
  • 3. A General who led recent war “It’s not the number of people you kill, it’s the number of people you convince.”
  • 4. Network Analysis & Visualization Consider all challenges that can be addressed by advanced semantic analytics and visualization in the cyberspace Cyberspace = {computers/networks, sensors, social <people, conversations>} For issues effecting security in cyberspace and to enhancing military’s capacity to project soft power So broadly, People-Content-NetworkAnalysis and Visualization
  • 5. Institutions Involved Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis), UCI (Ramesh Jain), OSU Faculty in Visual Analytics [Srini Parthasarthy] WSU Faculty in Internet/WWW, Semantic Web, Sensor Web, Social Computing, Network Security [Bin Wang] , Visualization [Tom Wischgoll], and Cognitive Science [John Flach,…] Optionally, faculty at Indiana University Center for Complex Networks & Systems, and Purdue University Preliminary thoughts on COE on Enhancing Soft Power (ESP)
  • 6. Networks in Cyberspace Networks in Cyber Space Sensor Networks Computer Networks Social Networks
  • 7. Networks and Cyber Security Networks in Cyber Space Cyber Security Sensor Networks Computer Networks Social Networks
  • 8. Networks and Soft Power Networks in Cyber Space Computer Networks Sensor Networks Soft Power Citizen Sensing Social Networks
  • 9. Hard Power – “Carrots and Sticks”
  • 10. Soft Power: “The Second Face of Power” “Affect behavior through attraction” “Soft power is attractive power” Also called cooptive power: the ability to shape the preferences of others getting others to want the outcomes that we want
  • 11. How important is soft power? Henry Crumpton– CIA covert-op leader Hard power – 25% Soft power – 75% Wield soft power (to counter terror groups in Iraq and Afghanistan) through Empowerment of native people Developmental and educational projects Measure impact of policy alternatives development initiatives
  • 12. Using soft power and monitoring its effects One approach – Analyze online social networks Kno.e.sis Ohio State Aggregate social perceptions Analyze with a focus theme Use spatio-temporal aspects Provide sentiment, intension, cultural analysis Visualize the interaction graphs formed in social networks (more later) Twitris (live demo) How hard is this?
  • 14. Twitris: Features and Research Issues Data intensive Processing and storage of data Vs meta data Timeliness Live resource aggregation Near real time Tunable spatio-temporal scope/weights Global Iran election Vs. Local health care debate Parallel programming, cloud computing (map-reduce) Information retrieval, natural language processing (harder with casual text), machine learning Semantic Web technologies, Web 2.0 tools
  • 15. Twitris: Ongoing investigations For a given viral “tweet” study network of people who reply or re-tweet do this across space and theme variation of content HCR – Health care reform, IE – Iran election, ISWC – Intl. Semantic Web conference
  • 16. Sparse and Dense ReTweet Graphs - Call for action vs. Information Sharing tweets Showing retweet (forward chains) of a viral tweet in the HealthCare Debate data “Join @MarkUdall @RitterForCO and @BennetForCO to support an up-or-down vote on the public option http://tr.im/Cm2u”
  • 17. Sparse and Dense ReTweet Graphs - Call for action vs. Information Sharing tweets Showing retweet (forward chains) of a viral tweet in the Iran data “Iran Election Crisis: 10 Incredible YouTube Videos http://bit.ly/vPDLo” Both network and content are important in studying social dynamics (here, information diffusion)
  • 18. Analysis of Conversation and Chatter Use language constructs to analyze sentiments and intentions
  • 19.
  • 21. Groups of connected people are communities (clusters)
  • 22. Edge weights capture relative importance
  • 23.
  • 24. Characterize the types of changes and potential causes
  • 25.
  • 26. Paradigm: Overview, Zoom, Filter, and DoD Event detection proceeds iteratively: Events are computed from time Ti to time Ti+1 Clusters at time Ti compared with those at Ti+1 Use only nodes that are active at either time which leads to significant time savings. Views (map normalized measures -> colors) Coarsening using multilevel hierarchies of nodes Graph view, community view, event view, and node view
  • 28. Coarse View of a Wikipedia Subgraph
  • 29. Zoom and Filter Snapshot
  • 31.
  • 32.
  • 33. Type of company
  • 40.
  • 44. Atlanta Falcons
  • 47. Dan Reeves
  • 48. Location: AtlantaVoqutte/Taalee Semantic Engine “NSF Playoff” Node Metadata-rich Value-added Node Object Content Information (OCI)
  • 49.
  • 50. Extract event information from Internet resources
  • 51. Visualize event data through space, time, and themeSET On the Web: Semantic Event Tracker
  • 52. Trusted Active Perception Abstracting high level understanding (perception) from low level sensor (SIGINT) data from heterogeneous sensors E.g., recognizing a storm event in an area of interest at the time of interest from variety of hundred to thousands of heterogeneous sensor data Trusted Perception Cycle demo
  • 53.
  • 54. Liberates parties from needing to know exact IP addresses
  • 55. Routing based on Semantic Concepts
  • 57. Single or very few traversals of network stack
  • 58. Content is routed by the physical network based on the Semantics
  • 60. Control based on message content in addition to origin (or destination)
  • 61.
  • 62. Way Ahead: Content Analysis to Identify Radicalization or Recruiting Collaborate with linguists, social scientists, and other computer scientists to analayze social network content (Twitter, Facebook, MySpace) to weed out radical elements. Alleged Fort Hood Shooter’s online post 6 months before the massacre “If one suicide bomber can kill 100 enemy soldiers because they were caught off guard that would be considered a strategic victory” - Maj. NidalMalikHasan
  • 63. Way Ahead: Use and Detect misuse of Soft Power Web sites in a major world power are required to employ people who monitor and delete objectionable content; tens of thousands of others are paid to “guide” bulletin board Web exchanges in the government’s favor. Use social network analysis to sense sentiments Iranian reaction to Hilary Clinton’s statements on the election. Impact of giving (partial) control to an “ally” to operate drones in the area
  • 64. Significant Infrastructure Whole-Body Laser Range Scanner VERITAS stereoscopic 3D visualization AVL NMR

Notes de l'éditeur

  1. There are three types of networks in cyber space as shown on the slide.
  2. Cyber security encompassespreventing, detecting, and responding to attacks on computing infrastructure.For the purpose of this talk we are only concerned about network infrastructure.Computer networks connect systems whose contents are fairly stable.Sensor networks connect sensing devices to gather up-to-date information on battlefield activities (in this context).We will talk about these aspects a bit later.
  3. Treating people who participate in social networks as belonging to the cyberspace community.Using their participation to elicit public opinion and trends which further guide government decisions.Soft power – next slidehttp://smallwarsjournal.com/blog/2009/01/the-soft-side-of-airpower/
  4. Let’s talk about what is hard power first. (The next few slides are from an article by Joseph S. Nye Jr. (former Dean, Harvard school of government) in the publication “Compass: A journal of leadership” published by the center for public leadership, Harvard University)Power – influence the behaviors of others to get the outcomes one wantsWe can affect behavior of others byCarrots – inducing them with paymentsSticks – coercing them with threats
  5. Attraction here is usually done through intangible assets – attractive personality (or friendly disposition in the case of a government), political values and policies that are seen as legitimate or having moral authority.Limitations of soft power – difficult to wield and takes a lot of time to see the effects. Also, hard to quantify the effects.But nevertheless useful – hard power alone can fail completely (Hitler, Saddam Hussain)
  6. Transition to the next slide – This is all great, but in general how do we use soft power and measure its effects?
  7. Monitoring soft power effects and leveraging citizen sensing through social network analysis and visualization
  8. Twitris’ features – and the CS research we use/leverage
  9. Twitris’ features – and the CS research we use/leverage
  10. The ones marked in red all formally defined in Srini’s work.Interactive interrogation – ability to interactively select and zoom down to clusters, entities of interest, as well as specific dynamic interactions and events that govern evolution of networks over time.
  11. The ones marked red in the second bullet are indices formally defined.Observe that events and behavioral measures are sometimes associated with clusters and sometimes with nodesStability – measures the tendency of a node to interact with the same nodes over a period of time.Sociability – measure of the number of a different interactions that a node participates inInfluence of node – indicates how other nodes behave when this node joins or leaves a cluster (do other leave when this node leaves/ do a lot of nodes join the cluster that this node joins)Popularity - of a cluster measures how many nodes does it attract
  12. Various views are useful for different tasks. We can track a person’s activities in the network (node view),or zoom in on a community where a number of critical events have taken place (community view), orPick a particular event and get info on it across various clusters.DoD = details on demand
  13. Muri paper, Ramesh’s figure.