Journal Article |
Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter
View Abstract
The Islamic State of Iraq and ash-Sham (ISIS) continues to use social media as an essential element of its campaign to motivate support. On Twitter, ISIS’ unique ability to leverage unaffiliated sympathizers that simply retweet propaganda has been identified as a primary mechanism in their success in motivating both recruitment and “lone wolf” attacks. The present work explores a large community of Twitter users whose activity supports ISIS propaganda diffusion in varying degrees. Within this ISIS supporting community, we observe a diverse range of actor types, including fighters, propagandists, recruiters, religious scholars, and unaffiliated sympathizers. The interaction between these users offers unique insight into the people and narratives critical to ISIS’ sustainment. In their entirety, we refer to this diverse set of users as an online extremist community or OEC. We present Iterative Vertex Clustering and Classification (IVCC), a scalable analytic approach for OEC detection in annotated heterogeneous networks, and provide an illustrative case study of an online community of over 22,000 Twitter users whose online behavior directly advocates support for ISIS or contibutes to the group’s propaganda dissemination through retweets.
|
2017 |
Benigni, MC., Joseph, K. and Carley, KM. |
View
Publisher
|
Journal Article |
Online Extremism Detection: A Systematic Literature Review With Emphasis on Datasets, Classification Techniques, Validation Methods, and Tools
View Abstract
Social media platforms are popular for expressing personal views, emotions and beliefs. Social media platforms are influential for propagating extremist ideologies for group-building, fund-raising, and recruitment. To monitor and control the outreach of extremists on social media, detection of extremism in social media is necessary. The existing extremism detection literature on social media is limited by specific ideology, subjective validation methods, and binary or tertiary classification. A comprehensive and comparative survey of datasets, classification techniques, validation methods with online extremism detection tool is essential. The systematic literature review methodology (PRISMA) was used. Sixty-four studies on extremism research were collected, including 31 from SCOPUS, Web of Science (WoS), ACM, IEEE, and 33 thesis, technical and analytical reports using Snowballing technique. The survey highlights the role of social media in propagating online radicalization and the need for extremism detection on social media platforms. The review concludes lack of publicly available, class-balanced, and unbiased datasets for better detection and classification of social-media extremism. Lack of validation techniques to evaluate correctness and quality of custom data sets without human interventions, was found. The information retrieval unveiled that contemporary research work is prejudiced towards ISIS ideology. We investigated that deep learning based automated extremism detection techniques outperform other techniques. The review opens the research opportunities for developing an online, publicly available automated tool for extremism data collection and detection. The survey results in conceptualization of architecture for construction of multi-ideology extremism text dataset with robust data validation techniques for multiclass classification of extremism text.
|
2021 |
Gaikwad, M., Ahirrao, S., Phansalkar, S. and Kotecha, K. |
View
Publisher
|
Report |
Online Extremism in North Macedonia: Politics, Ethnicities and Religion
View Abstract
The Strong Cities Network (SCN) conducted an online mapping exercise to investigate the main extremist narratives deployed in North Macedonia. Using a mixed method of automated collection and expert manual qualitative online research, SCN identified the main narratives across political, ethnic and religiously inspired extremist and hate groups. On the basis of these findings, SCN provided a comprehensive set of recommendations for national government, local authorities, civil society and the private tech sector to help inform a more comprehensive response to these online harms. The findings from this study will also inform multi-agency work the network is carrying out with the community.
|
2022 |
Dukic, S. |
View
Publisher
|
Policy |
Online Extremism: Challenges and Opportunities in the Western Balkans
View Abstract
The Western Balkans faces a double challenge from online extremism. Online platforms are facilitating the specific targeting of the region by diverse international extremist narratives. Meanwhile regional histories and geopolitics are being appropriated to justify extremist actions and narratives around the world. This is part of a wider trend that underscores the growing challenge posed by the proliferation of transnational extremist ideologies on online platforms, both violent jihadist and extreme right wing. In the Western Balkans, this poses a number of specific risks. While the issue of the prevention, mitigation, and regulation of online extremism is a global one, there are a number of region-specific considerations relevant to effective policy and practitioner responses.
|
2020 |
Comerford, M. and Dukic, S. |
View
Publisher
|
Policy |
Online Extremism: More Complete Information Needed about Hate Crimes that Occur on the Internet
View Abstract
A hate crime occurs nearly every hour in the U.S., based on data reported to the FBI. Investigations of recent hate crimes have suggested that exposure to hate speech on the internet may have contributed to the attackers’ biases against their victims. In 2021, the FBI placed hate crimes at the same national threat priority level as preventing domestic violent extremism.
GAO was asked to review information on hate crimes and hate speech on the internet. This report examines (1) the extent to which DOJ collects data on hate crimes that occur on the internet, (2) what company data indicate about steps selected companies have taken to remove hate speech and violent extremist speech from their internet platforms, and (3) what is known about users’ experience with, or expression of, hate speech on the internet, and its relationship to hate crimes and domestic violent extremism.
GAO analyzed U.S. hate crime data and interviewed DOJ officials. GAO analyzed data and interviewed officials from six selected companies operating internet platforms with publicly available policies prohibiting hate and violent extremist speech. GAO assessed peer reviewed and nonprofit studies that described hate speech on the internet, hate crimes, and domestic violent extremist incidents.
|
2024 |
US Government Accountability Office |
View
Publisher
|
Journal Article |
Online Extremism: Research Trends in Internet Activism, Radicalization, and Counter-Strategies
View Abstract
This article reviews the academic literature on how and for what purposes violent extremists use the Internet, at both an individual and organizational level. After defining key concepts like extremism, cyber-terrorism and online radicalization, it provides an overview of the virtual extremist landscape, tracking its evolution from static websites and password-protected forums to mainstream social media and encrypted messaging apps. The reasons why violent extremist organizations use online tools are identified and evaluated, touching on propaganda, recruitment, logistics, funding, and hacking. After this, the article turns to the ways violent extremist individuals use the Internet, discussing its role as a facilitator for socialization and learning. The review concludes by considering the emergent literature on how violent extremism is being countered online, touching on both defensive and offensive measures.
|
2020 |
Winter, C., Neumann, P., Meleagrou-Hitchens, A., Ranstorp, M., Vidino, L. and Fürst, J. |
View
Publisher
|