Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events
September 18, 2023
This study explores the internal dynamics and networks of terrorist groups in cyberspace—in particular, Al-Qaeda and the Islamic State of Iraq and al-Sham (ISIS). Using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016, this research analyzes these two terrorist groups through the lens of a cyber-conflict theory that integrates ...
The Transnationalisation of Far Right Discourse on Twitter
September 18, 2023
How transnational are the audiences of far right parties and movements on Twitter? While an increasing number of contributions addresses the topic of transnationalism in far right politics, few systematic investigations exist on the actors and discourses favored in transnational exchanges on social media. Building on the literature on the far right, social movements, transnationalism ...
Finding Extremists in Online Social Networks
September 18, 2023
Online extremists’ use of social media poses a new form of threat to the general public. These extremists range from cyberbullies to terrorist organizations. Social media providers often suspend the extremists’ accounts in response to user complaints. However, extremist users can simply create new accounts and continue their activities. In this work we present a ...
Mapping Extremist Communities: A Social Network Analysis Approach
September 18, 2023
In the domain of computer science, the last years have witnessed the improvement of social network analysis at scale. One of the most challenging aspects of social network analysis is community detection; analysts use a variety of tools to visualise the spontaneous group structure emerging from interactions and friendship relations in multi-million-user networks. This visualisation, ...
The Spider-man Behavior Protocol: Exploring both Public and Dark Social Networks for Fake Identity Detection in Terrorism Informatics
September 18, 2023
Hiding true personality behind a facade is one of the basic tricks adopted by humans who live double lives for illegal purposes. In particular terrorists have historically adopted the protocol of a facade behaviour coupled with a second life consisting mainly in illegal activities and their planning. Nowadays a few cases of behaviours that hide ...