Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter

被引:0
作者
Nouh, Mariam [1 ]
Nurse, Jason R. C. [2 ]
Goldsmith, Michael [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford, England
[2] Univ Kent, Sch Comp, Canterbury, Kent, England
来源
2019 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI) | 2019年
关键词
radicalization; extremism; data mining; social media; machine learning; Twitter; TERRORISM;
D O I
10.1109/isi.2019.8823548
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet and, in particular, Online Social Networks have changed the way that terrorist and extremist groups can influence and radicalise individuals. Recent reports show that the mode of operation of these groups starts by exposing a wide audience to extremist material online, before migrating them to less open online platforms for further radicalization. Thus, identifying radical content online is crucial to limit the reach and spread of the extremist narrative. In this paper, our aim is to identify measures to automatically detect radical content in social media. We identify several signals, including textual, psychological and behavioural, that together allow for the classification of radical messages. Our contribution is threefold: (1) we analyze propaganda material published by extremist groups and create a contextual text-based model of radical content, (2) we build a model of psychological properties inferred from these material, and (3) we evaluate these models on Twitter to determine the extent to which it is possible to automatically identify online radical tweets. Our results show that radical users do exhibit distinguishable textual, psychological, and behavioural properties. We find that the psychological properties are among the most distinguishing features. Additionally, our results show that textual models using vector embedding features significantly improves the detection over TF-IDF features. We validate our approach on two experiments achieving high accuracy Our findings can he utilized as signals for detecting online radicalization activities.
引用
收藏
页码:98 / 103
页数:6
相关论文
共 28 条
[1]  
Alfifi M., 2017, BADLY EVOLVED EXPLOR, P218
[2]  
[Anonymous], 2018, N.Y. TiMEs
[3]   Detecting Jihadist Messages on Twitter [J].
Ashcroft, Michael ;
Fisher, Ali ;
Kaati, Lisa ;
Omer, Enghin ;
Prucha, Nico .
2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, :161-164
[4]  
Carrington P.J., 2011, The SAGE Handbook of Social Network Analysis, P236, DOI [10.4135/9781446294413, DOI 10.4135/9781446294413]
[5]  
Chen C., 2004, Tech. Rep
[6]  
Collobert R., 2008, Proceedings of the 25th international conference on Machine learning, V25, P160, DOI DOI 10.1145/1390156.1390177
[7]  
De Choudhury M, 2013, P INT AAAI C WEB SOC, V7, P128, DOI [10.1609/icwsm.v7i1.14432, DOI 10.1609/ICWSM.V7I1.14432]
[8]  
Devyatkin D, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS (ISI), P188, DOI 10.1109/ISI.2017.8004907
[9]   PATHWAYS TO VIOLENT EXTREMISM IN THE DIGITAL ERA [J].
Edwards, Charlie ;
Gribbon, Luke .
RUSI JOURNAL, 2013, 158 (05) :40-47
[10]  
Elzinga Paul, 2010, 2010 IEEE International Conference on Intelligence and Security Informatics (ISI 2010), P77, DOI 10.1109/ISI.2010.5484773