data mining
Blog
‘Terrorism Informatics’ Part IV: Predicting Extremist Behaviour
March 24, 2021This is the fourth and final in a series of four original Blog posts; the first is HERE the second is HERE the third is HERE. [Ed.] By Matti Pohjonen The previous cluster of methods looked at in the blog post series included methods developed to extrapolate insight from the content produced online and on social ...
Blog
‘Terrorism Informatics’ Part III: Analysing Extremist Content
March 17, 2021This is the third in a series of four original Blog posts; the first is HERE and the second is HERE. [Ed.] By Matti Pohjonen The previous blog posts looked at the costs and benefits of using network analysis to identify extremist networks. It suggested that one challenge in such network analysis-based research approaches is ...
Blog
‘Terrorism Informatics’ Part II: Identifying Extremist Networks
March 10, 2021This is the second in a series of four original Blog posts; the first is HERE. [Ed.] By Matti Pohjonen The first blog post in this series explored how researchers interested in computational methods can assess the trade-off between the validity of the methods used and the potentially adverse social costs of using them in ...
Blog
‘Terrorism Informatics’ Part I: A Framework for Researchers
March 3, 2021This series of four blog posts builds on discussions had during the ‘Inside the Black Box of “Terrorism Informatics”: A Cost-benefit Analysis of Using Computational Techniques in Violent Online Political Extremism Research’ workshop organised by VOX-Pol in 2018. [Ed.] By Matti Pohjonen One of the most pressing challenges in research on violent online extremism is ...