Understanding the Roots of Radicalisation on Twitter

被引:36
作者
Fernandez, Miriam [1 ]
Asif, Moizzah [1 ]
Alani, Harith [1 ]
机构
[1] Open Univ, Milton Keynes, Bucks, England
来源
WEBSCI'18: PROCEEDINGS OF THE 10TH ACM CONFERENCE ON WEB SCIENCE | 2018年
关键词
Online Radicalisation; Radicalisation Influence; Counter-terrorism; RADICALIZATION; TERRORISM; STAIRCASE;
D O I
10.1145/3201064.3201082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an increasingly digital world, identifying signs of online extremism sits at the top of the priority list for counter-extremist agencies.(1) Researchers and governments are investing in the creation of advanced information technologies to identify and counter extremism through intelligent large-scale analysis of online data. However, to the best of our knowledge, these technologies are neither based on, nor do they take advantage of, the existing theories and studies of radicalisation. In this paper we propose a computational approach for detecting and predicting the radicalisation influence a user is exposed to, grounded on the notion of 'roots of radicalisation' from social science models. This approach has been applied to analyse and compare the radicalisation level of 112 pro-ISIS vs. 112 "general" Twitter users. Our results show the effectiveness of our proposed algorithms in detecting and predicting radicalisation influence, obtaining up to 0.9 F-1 measure for detection and between 0.7 and 0.8 precision for prediction. While this is an initial attempt towards the effective combination of social and computational perspectives, more work is needed to bridge these disciplines, and to build on their strengths to target the problem of online radicalisation.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 36 条
  • [1] Agarwal S, 2015, LECT NOTES COMPUT SC, V8956, P431, DOI 10.1007/978-3-319-14977-6_47
  • [2] [Anonymous], 2015, SICUREZZA TERRORISMO
  • [3] [Anonymous], ICCT RES PAP
  • [4] [Anonymous], 2015, ARXIV151106858
  • [5] [Anonymous], 1998, SIGIR 98 P 21 ANN IN, DOI DOI 10.1145/290941.291008
  • [6] [Anonymous], 2014, STOPWORDS FILTERING
  • [7] Detecting Jihadist Messages on Twitter
    Ashcroft, Michael
    Fisher, Ali
    Kaati, Lisa
    Omer, Enghin
    Prucha, Nico
    [J]. 2015 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2015, : 161 - 164
  • [8] Basave Amparo Elizabeth Cano, 2013, INT JOINT C NAT LANG
  • [9] Berger J., 2013, INT CTR STUDY RADICA
  • [10] Berger Jonathon M, 2015, BROOKINGS PROJECT US, V3, P4