Dr Panos Andriotis Panagiotis.Andriotis@uwe.ac.uk
Senior Lecturer in Computer Forensics and Security
Multilevel visualization using enhanced social network analysis with smartphone data
Andriotis, Panagiotis; Tzermias, Zacharias; Mparmpaki, Anthi; Ioannidis, Sotiris; Oikonomou, George
Authors
Zacharias Tzermias
Anthi Mparmpaki
Sotiris Ioannidis
George Oikonomou
Abstract
While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in peopleàs lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information. The authors therefore use them for tasks varying from direct marketing to forensic analysis. The authors have already seen Social Network Forensics techniques focused on particular networks implementing methods that collect data from user accounts. During the forensic analysis it is common to aggregate information from different sources but, usually, this procedure causes correlation problems. Here, the authors present their method to correlate data gathered from various social networks in combination with smartphones creating a new form of social map of the user under investigation. In addition, the authors introduce a multi level graph that utilises the correlated information from the smartphone and the social networks and demonstrates in three dimensions the relevance of each contact with the suspect. Copyright © 2013, IGI Global.
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 1, 2013 |
Publication Date | Jan 1, 2013 |
Journal | International Journal of Digital Crime and Forensics |
Print ISSN | 1941-6210 |
Electronic ISSN | 1941-6229 |
Publisher | IGI Global |
Peer Reviewed | Peer Reviewed |
Volume | 5 |
Issue | 4 |
Pages | 34-54 |
DOI | https://doi.org/10.4018/ijdcf.2013100103 |
Keywords | multilevel, visualization, social, network, analysis, smartphone, data |
Public URL | https://uwe-repository.worktribe.com/output/936619 |
Publisher URL | http://dx.doi.org/10.4018/ijdcf.2013100103 |
You might also like
Smartphone message sentiment analysis
(2014)
Book Chapter
Studying users’ adaptation to Android's run-time fine-grained access control system
(2018)
Journal Article
JPEG steganography detection with Benford's Law
(2013)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search