Software requirement specifications for a social-media threat assessment tool
Barnett, Craig T.
MetadataShow full item record
Police officers are often the targets of threats, both verbal and written. Twitter and Facebook allow the communications of these threats quickly, anonymously and in high volume. Law enforcement agencies become overwhelmed trying to determine which are the most serious, since they have limited investigators. Identifying threats that have a high likelihood of violence is also very subjective. How can risk assessment of these threats be improved? As an answer to this question, a software-requirement specification document details a new software that starts the threat assessment process earlier. This software incorporates a social media and language sentiment analyzer, criminal history information and threshold, and confidence scoring to alert law enforcement of threats likely to end in violence. Twitter and Facebook posts that reach a predetermined score alert investigators of a high probability threat on which investigators can focus their efforts. During the development of the software proposal, this thesis finds that implementing this software could improve law enforcement intervention to threats communicated over social media.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Deering, Viviane; Grates, Patrick; Hedge, Tom; Kung, Sein; Martinez, Maria; Mcarthy, Percival; Pugh, Kevin; Radojkovic, Sasha (Monterey, California. Naval Postgraduate School, 2006-09); NPS-SE-06-002This project concentrates on implementing network centric military operations with specific threat engagement scenarios using legacy and future warfare systems based on open architecture concepts. These systems may be ...
Elkins, Aaron C.; Burgoon, Judee; Nunamaker, Jay (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2012-04);"Our voices are encoded with emotional information. While it is complex and difficult to develop software to classify emotion and deception from the voice, it is possible. Using experimental methods, this research examines ...
Hayes, Nathaniel J. (Monterey, California. Naval Postgraduate School, 2013-03);The threat of degradation or disruption from cyber infiltration, espionage, and theft to militarily and nationally critical information and network systems poses a significant challenge to DoD and DON. To mitigate this ...