Alexander Semenov, Alexander G. Nikolaev, J. Veijalainen
{"title":"Online activity traces around a “Boston bomber”","authors":"Alexander Semenov, Alexander G. Nikolaev, J. Veijalainen","doi":"10.1145/2492517.2500316","DOIUrl":null,"url":null,"abstract":"This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.","PeriodicalId":442230,"journal":{"name":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2492517.2500316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.