Journal Article |
Stereotypical Bias Removal for Hate Speech Detection Task using Knowledge-based Generalizations
View Abstract
With the ever-increasing cases of hate spread on social media platforms, it is critical to design abuse detection mechanisms to pro-actively avoid and control such incidents. While there exist methods for hate speech detection, they stereotype words and hence suffer from inherently biased training. Bias removal has been traditionally studied for structured datasets, but we aim at bias mitigation from unstructured text data. In this paper, we make two important contributions. First, we systematically design methods to quantify the bias for any model and propose algorithms for identifying the set of words which the model stereotypes. Second, we propose novel methods leveraging knowledge-based generalizations for bias-free learning. Knowledge-based generalization provides an effective way to encode knowledge because the abstraction they provide not only generalizes content but also facilitates retraction of information from the hate speech detection classifier, thereby reducing the imbalance. We experiment with multiple knowledge generalization policies and analyze their effect on general performance and in mitigating bias. Our experiments with two real-world datasets, a Wikipedia Talk Pages dataset (WikiDetox) of size ~ 96k and a Twitter dataset of size ~ 24k, show that the use of knowledge-based generalizations results in better performance by forcing the classifier to learn from generalized content. Our methods utilize existing knowledge-bases and can easily be extended to other tasks.
|
2019 |
Badjatiya, P., Gupta, M. and Varma, V. |
View
Publisher
|
Journal Article |
The Rise of Jihadist Propaganda on Social Networks
View Abstract
Using a dataset of over 1.9 million messages posted on Twitter by about 25,000 ISIS members, we explore how ISIS makes use of social media to spread its propaganda and to recruit militants from the Arab world and across the globe. By distinguishing between violence-driven, theological, and sectarian content, we trace the connection between online rhetoric and key events on the ground. To the best of our knowledge, ours is one of the first studies to focus on Arabic content, while most literature focuses on English content. Our findings yield new important insights about how social media is used by radical militant groups to target the Arab-speaking world, and reveal important patterns in their propaganda efforts.
|
2016 |
Badawy, A., Ferrara, E. |
View
Publisher
|
MA Thesis |
Online Radicalization Of White Women To Organized White Supremacy
View Abstract
Since its early mainstream adoption in the 1990s, the Internet has been leveraged by white supremacist groups to recruit and radicalize individuals. Twenty years later, social media platforms, like YouTube, reddit, and Twitter, continue to further this practice. The attention of researchers has been primarily centered on white supremacist men, and this focus on white men erases white women’s roles as active agents in the spread of white supremacy, skewing our understanding of white supremacy as a whole. This study used digital ethnography and interviews to examine the ways white women are radicalized to organized white supremacy through popular social media platforms YouTube, reddit, and Twitter. The study found white women were radicalized by engaging with posts and joining communities focusing on beauty, anti-feminism or “The Red Pill,” traditionalist gender values or #TradLives, and alt-right politics. White supremacist recruiters leveraged gendered topics and weaponized platform features – likes, sharing, comments, recommendation algorithms, etc. – to cultivate a sense of community. Through involvement with these communities, women were introduced to racialized perspectives on each topic, usually after a catalytic pop culture or newsworthy event, and slowly radicalized to organized white supremacy.
|
2019 |
Badalich, S. |
View
Publisher
|
Journal |
Fishermen or Swarm Dynamics? Should we Understand Jihadist Online-Radicalization as a Top-Down or Bottom-Up Process?
View Abstract
The internet has profoundly changed the way we communicate, including how jihadist
groups seek to reach Western audiences with their propaganda strategies. Cases of believed
online-radicalization call for a re-evaluation of radicalization processes, previously thought
to depend on face-to-face interactions. Based on the Hoffman-Sageman debate on whether
top-down or bottom-up processes drive terrorism, this essay explores both social movement
and organizational approaches to understand online-radicalization. Do jihadist
organizations such as Al-Qaeda and IS act as ‘fishermen’, actively engaging in the
radicalization processes of individual recruits, or is radicalization driven by social group
dynamics with little organizational involvement? Essentially, the larger question is: What
role do organizational structures play for radicalization in times of ‘virtual jihad’? Bottomup
radicalization processes are facilitated online, because the conditions for Sageman’s
‘bunch of guys’ are replicated by the characteristics of virtual communication: an echo
chamber effect causes frame-alignment through repetition and enables ‘digital natives’ to
communicate claims that resonate with other ‘digital natives’. Top-down structures are
influential, because organizations continue to employ sophisticated propaganda
development, preachers and special recruiters or ‘fishermen’. The article finds evidence for
both schools of thought and concludes that the internet facilitates both types of
radicalization mechanisms. Only a holistic strategy will be successful in battling onlineradicalization
and must include both targeting direct channels through which the
organizations execute control over recruits, and breaking the echo chamber created by
social movement dynamics in the virtual world. While countermeasures need to include the
provision of alternative social narratives and the utilization of ‘digital natives’ to make
counter-messages more effective, organizational structures need to be tackled
simultaneously, not only by identifying and arresting preachers and recruiters, but also
through stronger internet governance tools and collaboration with social media companies.
|
2017 |
Baaken, T., and Schlegel, L. |
View
Publisher
|
Report |
The Terror Times: The Depth and Breadth of the Islamic State Alternative News Outlet Ecosystem Online
View Abstract
This report highlights the networks, supporters, and the platforms of Islamic State disinformation disseminators, focusing on popular social media platforms as well as encrypted messaging applications. These disinformation networks are creating self-branded media outlets with followers in the tens of thousands, and often with innocuous names like “Global Happenings,” “DRIL” and “Media Center,” to evade moderation and takedowns. These same networks use coded language and a codebook of emojis to spread Islamic State “news” to other networks of supporters, who similarly evade moderation. These ‘alternative news outlets’ are trying to outcompete narratives publicized by government officials as well as independent mainstream media and individual journalists – groups that were also heavily targeted by Islamic State.
|
2022 |
Ayad, M., Khan, N. and al-Tamimi, A. |
View
Publisher
|
Report |
The Cloud Caliphate: Archiving the Islamic State in Real-Time
View Abstract
This joint report by the Institute for Strategic Dialogue (ISD) and the Combating Terrorism Center (CTC) at West Point offers a preliminary survey and analysis of one of the largest known online repositories of Islamic State materials in order to increase understanding of how violent extremist groups and their supporters manage, preserve, and protect information relevant to their cause. Seemingly managed by sympathizers of the Islamic State, the large cache of digital files, here nicknamed the “Cloud Caliphate,” provides researchers, policymakers, and counterterrorism practitioners additional insights into how and why groups and their adherents maintain archives of such material.
The core analysis breaks into seven different parts. After reviewing the likely origins of the repository, the first section describes its composition, and the second discusses evidence concerning cyber support from other online actors. Sections three through six explore specific folders within the archive, which pertain to matters concerning the Islamic State’s organizational predecessors and a range of notable leaders, ideologues, and scholars. Section seven of the report highlights a real-world case involving the use of the “Cloud Caliphate” archive by an Islamic State supporter. The report concludes with a reflective discussion that notes potential policy considerations for those tasked with confronting the Islamic State’s exploitation of information and communications technologies.
|
2021 |
Ayad, M., Amarasingam, A. and Alexander, A. |
View
Publisher
|