SlideShare uma empresa Scribd logo
1 de 36
Enhancing Soft Power (ESP) Analysis and Situational Awareness over network of  Computers, Sensors, People, and Content for enhancing Soft Power AmitSheth, LexisNexis Eminent Scholar  Director, Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis) Wright State University http://knoesis.org
“…challenge accepted paradigms to propose new ways of fighting from air, space, and cyberspace.” - General Stephen Lorenz
A General who led recent war “It’s not the number of people you kill,  it’s the number of people you convince.”
Network Analysis & Visualization Consider all challenges that can be addressed by advanced semantic analytics and visualization in the cyberspace Cyberspace = {computers/networks,  sensors,  social <people, conversations>} For issues effecting security in cyberspace and to enhancing military’s capacity to project soft power So broadly, People-Content-NetworkAnalysis and Visualization
Institutions Involved Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis), UCI (Ramesh Jain), OSU Faculty in Visual Analytics [Srini Parthasarthy]  WSU Faculty in Internet/WWW, Semantic Web, Sensor Web, Social Computing, Network Security [Bin Wang] , Visualization [Tom Wischgoll], and Cognitive Science [John Flach,…] Optionally, faculty at Indiana University Center for Complex Networks & Systems, and Purdue University Preliminary thoughts on COE on Enhancing Soft Power (ESP)
Networks in Cyberspace Networks in Cyber Space Sensor Networks Computer Networks Social Networks
Networks and Cyber Security Networks in Cyber Space Cyber Security Sensor Networks Computer Networks Social Networks
Networks and Soft Power Networks in Cyber Space Computer Networks Sensor Networks Soft Power Citizen Sensing Social Networks
Hard Power – “Carrots and Sticks”
Soft Power: “The Second Face of Power” “Affect behavior through attraction” “Soft power is attractive power” Also called cooptive power:  the ability to shape the preferences of others getting others to want the outcomes that we want
How important is soft power? Henry Crumpton– CIA covert-op leader Hard power – 25% Soft power – 75% Wield soft power (to counter terror groups in Iraq and Afghanistan) through Empowerment of native people Developmental and educational projects Measure impact of policy alternatives development initiatives
Using soft power and monitoring its effects One approach – Analyze  online social networks Kno.e.sis Ohio State Aggregate social perceptions Analyze with a focus theme  Use spatio-temporal aspects Provide sentiment, intension, cultural analysis Visualize the interaction graphs formed in social networks  (more later) Twitris (live demo) How hard is this?
Twitris: Architecture
Twitris: Features and Research Issues Data intensive Processing and storage of data Vs meta data Timeliness Live resource aggregation Near real time  Tunable spatio-temporal scope/weights Global Iran election Vs. Local health care debate Parallel programming,  cloud computing (map-reduce) Information retrieval, natural language processing (harder with casual text),  machine learning Semantic Web technologies, Web 2.0 tools
Twitris: Ongoing investigations For a given viral “tweet” study network of people who reply or re-tweet do this across space and theme variation of content HCR – Health care reform, IE – Iran election, ISWC – Intl. Semantic Web  conference
Sparse and Dense ReTweet Graphs - Call for action vs. Information Sharing tweets Showing retweet (forward chains) of a viral tweet in the HealthCare Debate data “Join @MarkUdall @RitterForCO and @BennetForCO to support an up-or-down vote on the public option http://tr.im/Cm2u”
Sparse and Dense ReTweet Graphs - Call for action vs. Information Sharing tweets Showing retweet (forward chains) of a viral tweet in the Iran data “Iran Election Crisis:  10 Incredible YouTube Videos http://bit.ly/vPDLo” Both network and content are important in studying social dynamics (here, information diffusion)
Analysis of Conversation and Chatter  Use language constructs to analyze sentiments  and intentions
Visual Analytics for Dynamic Interaction Networks Model social networks as graphs ,[object Object]
Their interactions are edges
Groups of connected people are communities (clusters)
Edge weights capture relative importance
Addition and deletion of edges and nodes represent changes in the networkChallenges ,[object Object]
Characterize the types of changes and potential causes
Facilitate interactive interrogation,[object Object]
Paradigm: Overview, Zoom, Filter, and DoD Event detection proceeds iteratively: Events are computed from time Ti to time Ti+1 Clusters at time Ti compared with those at Ti+1  Use only nodes that are active at either time which leads to significant time savings. Views (map normalized measures -> colors) Coarsening using multilevel hierarchies of nodes Graph view, community view, event view, and node view
Network Visualizer Architecture
Coarse View of a Wikipedia Subgraph
Zoom and Filter Snapshot
Event View: Importance of Ranking
Semantic Annotations for any resource in cyberspace (message, text, images, and AV) ,[object Object]
 Use the metadata to process and elicit information from a given set of resources,[object Object]
 Type of company
 Industry affiliation
 Sector
 Exchange

Mais conteúdo relacionado

Mais procurados

Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChris Furton
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radarSaraJayneTerp
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mappingFred Zimmerman
 
Cnsm2011
Cnsm2011Cnsm2011
Cnsm2011j22fung
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharingblogzilla
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonPatricia M Watson
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018Pukhraj Singh
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghPukhraj Singh
 
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Pukhraj Singh
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyoLora Aroyo
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)Pukhraj Singh
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...Araz Taeihagh
 
Using Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in GeolocationUsing Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in GeolocationShalin Hai-Jew
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachAndry Alamsyah
 

Mais procurados (20)

Christopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacyChristopher furton-darpa-project-memex-erodes-internet-privacy
Christopher furton-darpa-project-memex-erodes-internet-privacy
 
Threats_Report_2013
Threats_Report_2013Threats_Report_2013
Threats_Report_2013
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
Cybercrime & global mapping
Cybercrime & global mappingCybercrime & global mapping
Cybercrime & global mapping
 
Cnsm2011
Cnsm2011Cnsm2011
Cnsm2011
 
Cybercrime and data sharing
Cybercrime and data sharingCybercrime and data sharing
Cybercrime and data sharing
 
Leveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia WatsonLeveraging Digital Forensics | Patricia Watson
Leveraging Digital Forensics | Patricia Watson
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
Synergy in Joint Cyber Operations - Indian National Defence University & HQ I...
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
 
Sas web 2010 lora-aroyo
Sas web 2010 lora-aroyoSas web 2010 lora-aroyo
Sas web 2010 lora-aroyo
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Big Data Social Network Analysis
Big Data Social Network AnalysisBig Data Social Network Analysis
Big Data Social Network Analysis
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...How does fakenews spread understanding pathways of disinformation spread thro...
How does fakenews spread understanding pathways of disinformation spread thro...
 
Using Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in GeolocationUsing Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
Using Maltego Tungsten to Explore Cyber-Physical Confluence in Geolocation
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
 

Semelhante a Enhancing Soft Power: using cyberspace to enhance Soft Power

Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...
Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...
Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...Amit Sheth
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelJohn Gerber
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecuritySaqib Chaudhry
 
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...Artificial Intelligence Institute at UofSC
 
Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Jan Sifra
 
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebOpen Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebNoshir Contractor
 
InSTEDD: Collaboration in Disease Surveillance & Response
InSTEDD: Collaboration in Disease Surveillance & ResponseInSTEDD: Collaboration in Disease Surveillance & Response
InSTEDD: Collaboration in Disease Surveillance & ResponseInSTEDD
 
Contractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACContractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACwebuploader
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformSean Ben
 
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...Amit Sheth
 
Final Next Generation Content Management
Final    Next  Generation  Content  ManagementFinal    Next  Generation  Content  Management
Final Next Generation Content ManagementScott Abel
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3archiejones4
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trendsYi-Lang Tsai
 
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...Amit Sheth
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...Tin180 VietNam
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalyticsDaniel John
 

Semelhante a Enhancing Soft Power: using cyberspace to enhance Soft Power (20)

Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...
Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...
Semantic Integration of Citizen Sensor Data and Multilevel Sensing: A compreh...
 
TOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation ModelTOTEM: Threat Observation, Tracking, and Evaluation Model
TOTEM: Threat Observation, Tracking, and Evaluation Model
 
Web and Complex Systems Lab @ Kno.e.sis
Web and Complex Systems Lab @ Kno.e.sisWeb and Complex Systems Lab @ Kno.e.sis
Web and Complex Systems Lab @ Kno.e.sis
 
How Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber SecurityHow Data Analytics is Re-defining Modern Era in Cyber Security
How Data Analytics is Re-defining Modern Era in Cyber Security
 
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...
Citizen Sensing: Opportunities and Challenges in Mining Social Signals and Pe...
 
Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)Reality Mining (Nathan Eagle)
Reality Mining (Nathan Eagle)
 
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebOpen Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
 
InSTEDD: Collaboration in Disease Surveillance & Response
InSTEDD: Collaboration in Disease Surveillance & ResponseInSTEDD: Collaboration in Disease Surveillance & Response
InSTEDD: Collaboration in Disease Surveillance & Response
 
InSTEDD HISA Conference
InSTEDD HISA ConferenceInSTEDD HISA Conference
InSTEDD HISA Conference
 
Contractor-Borner-SNA-SAC
Contractor-Borner-SNA-SACContractor-Borner-SNA-SAC
Contractor-Borner-SNA-SAC
 
Computing for Human Experience [v3, Aug-Oct 2010]
Computing for Human Experience [v3, Aug-Oct 2010]Computing for Human Experience [v3, Aug-Oct 2010]
Computing for Human Experience [v3, Aug-Oct 2010]
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence Platform
 
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...
Computing for Human Experience: Sensors, Perception, Semantics, Social Comput...
 
Final Next Generation Content Management
Final    Next  Generation  Content  ManagementFinal    Next  Generation  Content  Management
Final Next Generation Content Management
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3
 
20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends20160713 2016 the honeynet projct annual workshop focus and global trends
20160713 2016 the honeynet projct annual workshop focus and global trends
 
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...Microsoft Research Cambridge 20071207   Workshop On Online Social Networks (T...
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Network Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and ApplicationsNetwork Science: Theory, Modeling and Applications
Network Science: Theory, Modeling and Applications
 

Último

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 

Último (20)

Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 

Enhancing Soft Power: using cyberspace to enhance Soft Power

  • 1. Enhancing Soft Power (ESP) Analysis and Situational Awareness over network of Computers, Sensors, People, and Content for enhancing Soft Power AmitSheth, LexisNexis Eminent Scholar Director, Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis) Wright State University http://knoesis.org
  • 2. “…challenge accepted paradigms to propose new ways of fighting from air, space, and cyberspace.” - General Stephen Lorenz
  • 3. A General who led recent war “It’s not the number of people you kill, it’s the number of people you convince.”
  • 4. Network Analysis & Visualization Consider all challenges that can be addressed by advanced semantic analytics and visualization in the cyberspace Cyberspace = {computers/networks, sensors, social <people, conversations>} For issues effecting security in cyberspace and to enhancing military’s capacity to project soft power So broadly, People-Content-NetworkAnalysis and Visualization
  • 5. Institutions Involved Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis), UCI (Ramesh Jain), OSU Faculty in Visual Analytics [Srini Parthasarthy] WSU Faculty in Internet/WWW, Semantic Web, Sensor Web, Social Computing, Network Security [Bin Wang] , Visualization [Tom Wischgoll], and Cognitive Science [John Flach,…] Optionally, faculty at Indiana University Center for Complex Networks & Systems, and Purdue University Preliminary thoughts on COE on Enhancing Soft Power (ESP)
  • 6. Networks in Cyberspace Networks in Cyber Space Sensor Networks Computer Networks Social Networks
  • 7. Networks and Cyber Security Networks in Cyber Space Cyber Security Sensor Networks Computer Networks Social Networks
  • 8. Networks and Soft Power Networks in Cyber Space Computer Networks Sensor Networks Soft Power Citizen Sensing Social Networks
  • 9. Hard Power – “Carrots and Sticks”
  • 10. Soft Power: “The Second Face of Power” “Affect behavior through attraction” “Soft power is attractive power” Also called cooptive power: the ability to shape the preferences of others getting others to want the outcomes that we want
  • 11. How important is soft power? Henry Crumpton– CIA covert-op leader Hard power – 25% Soft power – 75% Wield soft power (to counter terror groups in Iraq and Afghanistan) through Empowerment of native people Developmental and educational projects Measure impact of policy alternatives development initiatives
  • 12. Using soft power and monitoring its effects One approach – Analyze online social networks Kno.e.sis Ohio State Aggregate social perceptions Analyze with a focus theme Use spatio-temporal aspects Provide sentiment, intension, cultural analysis Visualize the interaction graphs formed in social networks (more later) Twitris (live demo) How hard is this?
  • 14. Twitris: Features and Research Issues Data intensive Processing and storage of data Vs meta data Timeliness Live resource aggregation Near real time Tunable spatio-temporal scope/weights Global Iran election Vs. Local health care debate Parallel programming, cloud computing (map-reduce) Information retrieval, natural language processing (harder with casual text), machine learning Semantic Web technologies, Web 2.0 tools
  • 15. Twitris: Ongoing investigations For a given viral “tweet” study network of people who reply or re-tweet do this across space and theme variation of content HCR – Health care reform, IE – Iran election, ISWC – Intl. Semantic Web conference
  • 16. Sparse and Dense ReTweet Graphs - Call for action vs. Information Sharing tweets Showing retweet (forward chains) of a viral tweet in the HealthCare Debate data “Join @MarkUdall @RitterForCO and @BennetForCO to support an up-or-down vote on the public option http://tr.im/Cm2u”
  • 17. Sparse and Dense ReTweet Graphs - Call for action vs. Information Sharing tweets Showing retweet (forward chains) of a viral tweet in the Iran data “Iran Election Crisis: 10 Incredible YouTube Videos http://bit.ly/vPDLo” Both network and content are important in studying social dynamics (here, information diffusion)
  • 18. Analysis of Conversation and Chatter Use language constructs to analyze sentiments and intentions
  • 19.
  • 21. Groups of connected people are communities (clusters)
  • 22. Edge weights capture relative importance
  • 23.
  • 24. Characterize the types of changes and potential causes
  • 25.
  • 26. Paradigm: Overview, Zoom, Filter, and DoD Event detection proceeds iteratively: Events are computed from time Ti to time Ti+1 Clusters at time Ti compared with those at Ti+1 Use only nodes that are active at either time which leads to significant time savings. Views (map normalized measures -> colors) Coarsening using multilevel hierarchies of nodes Graph view, community view, event view, and node view
  • 28. Coarse View of a Wikipedia Subgraph
  • 29. Zoom and Filter Snapshot
  • 31.
  • 32.
  • 33. Type of company
  • 40.
  • 44. Atlanta Falcons
  • 47. Dan Reeves
  • 48. Location: AtlantaVoqutte/Taalee Semantic Engine “NSF Playoff” Node Metadata-rich Value-added Node Object Content Information (OCI)
  • 49.
  • 50. Extract event information from Internet resources
  • 51. Visualize event data through space, time, and themeSET On the Web: Semantic Event Tracker
  • 52. Trusted Active Perception Abstracting high level understanding (perception) from low level sensor (SIGINT) data from heterogeneous sensors E.g., recognizing a storm event in an area of interest at the time of interest from variety of hundred to thousands of heterogeneous sensor data Trusted Perception Cycle demo
  • 53.
  • 54. Liberates parties from needing to know exact IP addresses
  • 55. Routing based on Semantic Concepts
  • 57. Single or very few traversals of network stack
  • 58. Content is routed by the physical network based on the Semantics
  • 60. Control based on message content in addition to origin (or destination)
  • 61.
  • 62. Way Ahead: Content Analysis to Identify Radicalization or Recruiting Collaborate with linguists, social scientists, and other computer scientists to analayze social network content (Twitter, Facebook, MySpace) to weed out radical elements. Alleged Fort Hood Shooter’s online post 6 months before the massacre “If one suicide bomber can kill 100 enemy soldiers because they were caught off guard that would be considered a strategic victory” - Maj. NidalMalikHasan
  • 63. Way Ahead: Use and Detect misuse of Soft Power Web sites in a major world power are required to employ people who monitor and delete objectionable content; tens of thousands of others are paid to “guide” bulletin board Web exchanges in the government’s favor. Use social network analysis to sense sentiments Iranian reaction to Hilary Clinton’s statements on the election. Impact of giving (partial) control to an “ally” to operate drones in the area
  • 64. Significant Infrastructure Whole-Body Laser Range Scanner VERITAS stereoscopic 3D visualization AVL NMR

Notas do Editor

  1. There are three types of networks in cyber space as shown on the slide.
  2. Cyber security encompassespreventing, detecting, and responding to attacks on computing infrastructure.For the purpose of this talk we are only concerned about network infrastructure.Computer networks connect systems whose contents are fairly stable.Sensor networks connect sensing devices to gather up-to-date information on battlefield activities (in this context).We will talk about these aspects a bit later.
  3. Treating people who participate in social networks as belonging to the cyberspace community.Using their participation to elicit public opinion and trends which further guide government decisions.Soft power – next slidehttp://smallwarsjournal.com/blog/2009/01/the-soft-side-of-airpower/
  4. Let’s talk about what is hard power first. (The next few slides are from an article by Joseph S. Nye Jr. (former Dean, Harvard school of government) in the publication “Compass: A journal of leadership” published by the center for public leadership, Harvard University)Power – influence the behaviors of others to get the outcomes one wantsWe can affect behavior of others byCarrots – inducing them with paymentsSticks – coercing them with threats
  5. Attraction here is usually done through intangible assets – attractive personality (or friendly disposition in the case of a government), political values and policies that are seen as legitimate or having moral authority.Limitations of soft power – difficult to wield and takes a lot of time to see the effects. Also, hard to quantify the effects.But nevertheless useful – hard power alone can fail completely (Hitler, Saddam Hussain)
  6. Transition to the next slide – This is all great, but in general how do we use soft power and measure its effects?
  7. Monitoring soft power effects and leveraging citizen sensing through social network analysis and visualization
  8. Twitris’ features – and the CS research we use/leverage
  9. Twitris’ features – and the CS research we use/leverage
  10. The ones marked in red all formally defined in Srini’s work.Interactive interrogation – ability to interactively select and zoom down to clusters, entities of interest, as well as specific dynamic interactions and events that govern evolution of networks over time.
  11. The ones marked red in the second bullet are indices formally defined.Observe that events and behavioral measures are sometimes associated with clusters and sometimes with nodesStability – measures the tendency of a node to interact with the same nodes over a period of time.Sociability – measure of the number of a different interactions that a node participates inInfluence of node – indicates how other nodes behave when this node joins or leaves a cluster (do other leave when this node leaves/ do a lot of nodes join the cluster that this node joins)Popularity - of a cluster measures how many nodes does it attract
  12. Various views are useful for different tasks. We can track a person’s activities in the network (node view),or zoom in on a community where a number of critical events have taken place (community view), orPick a particular event and get info on it across various clusters.DoD = details on demand
  13. Muri paper, Ramesh’s figure.