Journal |
An Approach for Dynamic Identification of Online Radicalization in Social Networks
View Abstract
The Online Social Network (OSN) has evolved as a popular platform enabling rich topic-centric interactions and serving as a medium to facilitate online radicalization (Behr et al. 2013). Keeping in view the growing need of uncovering online radicalization, we focus on the information network of Twitter and present an approach for identifying dynamic communities, which arise due to “radical” topic-centric user interactions. The approach at successive timestamps deploys evolving topic-entity maps along with evolving interaction graphs. We propose “Rate of Overlap (ROAct)” to determine the similarity among successive community timestamps. We further validate our approach using an open dataset of criminal offences in the city of Denver, Colorado. The approach presented is simple, fast, and effective for dynamic identification of topic-centric communities and, thus, will enable law enforcement agencies to identify hidden radicalization.
|
2015 |
Wadhwa, P. and Bhatia, M.P.S. |
View
Publisher
|
Journal Article |
An Approach for Radicalization Detection Based on Emotion Signals and Semantic Similarity
View Abstract
The Internet has become an important tool for modern terrorist groups as a means of spreading their propaganda messages and recruitment purposes. Previous studies have shown that the analysis of social signs can help in the analysis, detection, and prediction of radical users. In this work, we focus on the analysis of affect signs in social media and social networks, which has not been yet previously addressed. The article contributions are: (i) a novel dataset to be used in radicalization detection works, (ii) a method for utilizing an emotion lexicon for radicalization detection, and (iii) an application to the radical detection domain of an embedding-based semantic similarity model. Results show that emotion can be a reliable indicator of radicalization, as well as that the proposed feature extraction methods can yield high-performance scores.
|
2020 |
Araque, O. and Iglesias, C.A. |
View
Publisher
|
Journal Article |
An Empirical Study on Collective Online Behaviors of Extremist Supporters
View Abstract
Online social media platforms such as Twitter have been found to be misused by extremist groups, including Islamic State of Iraq and Syria (ISIS), who attract and recruit social media users. To prevent their influence from expanding in the online social media platforms, it is required to understand the online behaviors of these extremist group users and their followers, for predicting and identifying potential security threats. We present an empirical study about ISIS followers’ online behaviors on Twitter, proposing to classify their tweets in terms of political and subjectivity polarities. We first develop a supervised classification model for the polarity classification, based on natural language processing and clustering methods. We then develop a statistical analysis of term-polarity correlations, which leads us to successfully observe ISIS followers’ online behaviors, which are in line with the reports of experts.
|
2017 |
Kim, J-J., Liu, Y., Lim, W.Y., and Thing, V.L.L. |
View
Publisher
|
Journal Article |
An Ensemble Method for Radicalization and Hate Speech Detection Online Empowered by Sentic Computing
View Abstract
The dramatic growth of the Web has motivated researchers to extract knowledge from enormous repositories and to exploit the knowledge in myriad applications. In this study, we focus on natural language processing (NLP) and, more concretely, the emerging field of affective computing to explore the automation of understanding human emotions from texts. This paper continues previous efforts to utilize and adapt affective techniques into different areas to gain new insights. This paper proposes two novel feature extraction methods that use the previous sentic computing resources AffectiveSpace and SenticNet. These methods are efficient approaches for extracting affect-aware representations from text. In addition, this paper presents a machine learning framework using an ensemble of different features to improve the overall classification performance. Following the description of this approach, we also study the effects of known feature extraction methods such as TF-IDF and SIMilarity-based sentiment projectiON (SIMON). We perform a thorough evaluation of the proposed features across five different datasets that cover radicalization and hate speech detection tasks. To compare the different approaches fairly, we conducted a statistical test that ranks the studied methods. The obtained results indicate that combining affect-aware features with the studied textual representations effectively improves performance. We also propose a criterion considering both classification performance and computational complexity to select among the different methods.
|
2021 |
Araque, O. and Iglesias, C. A. |
View
Publisher
|
Journal Article |
An Exploration of the Involuntary Celibate (Incel) Subculture Online
View Abstract
Incels, a portmanteau of the term involuntary celibates, operate in online communities to discuss difficulties in attaining sexual relationships. Past reports have found that multiple elements of the incel culture are misogynistic and favorable towards violence. Further, several violent incidents have been linked to this community, which suggests that incel communities may resemble other ideologically motivated extremist groups. The current study employed an inductive qualitative analysis of over 8,000 posts made in two online incel communities to identify the norms, values, and beliefs of these groups from a subcultural perspective. Analyses found that the incel community was structured around five interrelated normative orders: the sexual market, women as naturally evil, legitimizing masculinity, male oppression, and violence. The implications of this analysis for our understanding of extremism and the role of the internet in radicalization to violence are considered in depth.
|
2020 |
Liggett O’Malley, R. and Holt, K.M. |
View
Publisher
|
Journal Article |
An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom
View Abstract
Terrorism, crime, and war are all familiar notions; however, the way in which these have been altered through cyberspace is not yet fully, nor unanimously, understood through definitions, theories, and approaches. Although the threat level of terrorism in the UK has lowered to moderate, the threat posed by cyber terrorism has nonetheless heightened throughout the COVID pandemic due to the greater necessity and presence of technology in our lives. This research aimed to highlight the necessity for a unanimous cyber terrorism definition and framework and further aimed to determine what perceptions are held by the general public regarding cyber terrorism through a mixed methods approach. The literature review confirms that there is an absence of a unanimously agreed upon definition of cyber terrorism, and furthermore that the existing academic definitions are not compatible with UK legislation. In addition, the literature review highlights an absence of a cyber terrorism framework that classifies what kind of terrorist activity is cyber enabled or cyber dependent. Quantitative data from the online survey find a couple of significant effects implying the necessity for greater diversity amongst stakeholders which could potentially enhance the detection and prevention of terrorism in the UK. The qualitative data find that although there is some agreement amongst the sample population in views held towards cyber terrorism, some misconceptions are nonetheless present which could have implications on the general public’s ability to identify and report cyber terrorist activity. Overall, the findings from the literature review and the primary data collection aid in developing a cyber terrorism definition that is compatible with UK legislative definitions, and further aids in developing a terrorist activity framework that succinctly highlights the inextricable links between traditional, cyber enabled, and cyber-dependent terrorism.
|
2021 |
Jangada Correia, V. |
View
Publisher
|