Journal Article |
Predicting Behavioural Patterns in Discussion Forums using Deep Learning on Hypergraphs
View Abstract
Online discussion forums provide open workspace allowing users to share information, exchange ideas, address problems, and form groups. These forums feature multimodal posts and analyzing them requires a framework that can integrate heterogeneous information extracted from the posts, i.e. text, visual content and the information about user interactions with the online platform and each other. In this paper, we develop a generic framework that can be trained to identify communication behavior and patterns in relation to an entity of interest, be it user, image or text in internet forums. As the case study we use the analysis of violent online political extremism content, which has been a major challenge for domain experts. We demonstrate the generalizability and flexibility of our framework in predicting relational information between multimodal entities by conducting extensive experimentation around four practical use cases.
|
2019 |
Arya, D., Rudinac, S. and Worring, M. |
View
Publisher
|
Report |
The Role of Social Networks in Facilitating and Preventing Domestic Radicalization: What Research Sponsored by the National Institute of Justice Tells Us
View Abstract
In 2012, the National Institute of Justice’s (NIJ) Domestic Radicalization to Terrorism program began funding research on issues related to domestic radicalization and terrorism in the United States. NIJ-sponsored research has addressed a variety of factors that can play a role in both facilitating and preventing domestic radicalization, including social networks. This report synthesizes findings from that research, focusing on the role that peer relationships and social dynamics can play as either a gateway to or a gatekeeper preventing radicalization in the United States.
|
2024 |
Aryaeinejad, K. and Scherer, T.L. |
View
Publisher
|
MA Thesis |
An Analysis Of International Agreements Over Cybersecurity
View Abstract
Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and made publicly available, the International Cybersecurity Cooperation Dataset (ICCD), which contains over 350 international cybersecurity agreements and pertinent metadata. Each agreement is marked per which subtopics within cybersecurity related agreements it covers. These typologies are:
• Discussion and Dialogue
• Research
• Confidence Building Measures
• Incident Response
• Crime
• Capacity Building
• Activity Limiting
• Defense
• Terrorism
Drawing on ICCD and R for summary statistics and significance tests, as well as some quantitative insights, this research explores the relationship between different agreements, organizations, and other possibly related factors. The most significant takeaways from this research are:
1. Governments view cybersecurity in terms of relative advantages and are hesitant to engage competitors with agreements over topics like incident response and capacity building.
2. Authoritarian governments are involved with agreements over controlling or projecting state power and government authority while democratic governments focus on resilience and defense.
3. There are two groupings of authoritarian governments, those with high technical capabilities and those without. Technically capable governments focus on agreements over terrorism, and they also often end up participating in activity limiting agreements. Those without are preoccupied with agreements over criminal activity.
4. Discussion and dialogue agreements tend to accompany agreements over additional topics about one fifth of the time. While policy-makers shouldn’t create a hard rule out of this statistic, it does possibly strengthen an optimistic hypothesis that dialogue consistently leads to agreements.
Hopefully this research invigorates researchers’ interest in studying and understanding when cooperation over cybersecurity is successful or not. Policy-makers will need this knowledge if they are to achieve their goals in an environment that is rapidly increasing in state actors and
complexity
|
2018 |
Ashbaugh, L. |
View
Publisher
|
Journal |
Online De-Radicalization? Countering Violent Extremist Narratives: Message, Messenger and Media Strategy
View Abstract
Is “online de-radicalization” possible? Given the two growing phenomena of “online radicalization” and “behavioral/ideological/organizational de-radicalization,” this article outlines a broad strategy for countering the narratives of violent extremists. It argues that an effective counter-narrative should be built on three pillars. The first is an effective comprehensive message that dismantles and counter-argues against every dimension of the extremist narrative, namely the theological, political, historical, instrumental and sociopsychological dimensions. The second pillar is the messengers. The article argues that for the first time in the history of Jihadism a “critical mass” of former militants, who rebelled not only against the current behaviour of their former colleagues but also against the ideology supporting it, has come into existence. This “critical mass” can constitute the core of credible messengers, especially the few de-radicalized individuals and groups that still maintain influence and respect among vulnerable communities. The third pillar is the dissemination and attraction strategy of the counter-narratives(s) which focuses on the role of the media. The author of the article outlines a broad framework, which is a part of a UN-sponsored, comprehensive research project on countering the extremists narrative.
|
2010 |
Ashour, O. |
View
Publisher
|
Journal Article |
On Frogs, Monkeys, and Execution Memes: Exploring the Humor-Hate Nexus at the Intersection of Neo-Nazi and Alt-Right Movements in Sweden
View Abstract
This article is based on a case study of the online media practices of the militant neo-Nazi organization the Nordic Resistance Movement, currently the biggest and most active extreme-right actor in Scandinavia. I trace a recent turn to humor, irony, and ambiguity in their online communication and the increasing adaptation of stylistic strategies and visual aesthetics of the Alt-Right inspired by online communities such as 4chan, 8chan, Reddit, and Imgur. Drawing on a visual content analysis of memes (N = 634) created and circulated by the organization, the analysis explores the place of humor, irony, and ambiguity across these cultural expressions of neo-Nazism and how ideas, symbols, and layers of meaning travel back and forth between neo-Nazi and Alt-right groups within Sweden today.
|
2021 |
Askanius, T. |
View
Publisher
|
Report |
Visualisation report of emerging extremist narratives across Europe
View Abstract
The purpose of this report is to provide a comprehensive overview of existing knowledge on contemporary extremist narratives circulating online in three countries across Europe; Austria, Bulgaria and Sweden. To achieve this, the report draws on a review of an extensive body of previous research and secondary data sources, pursuing two primary objectives: firstly, it maps what kind of extremist narratives are on offer across Europe today, and second, it identifies where across the digital mainstream, these are currently in circulation.
|
2024 |
Askanius, T., Haselbacher, M., Reeger, U. and Stoencheva, J. |
View
Publisher
|