Abstract
Social media has been leveraged by many groups to share their ideas, ideology, and other messages. Some of these posts promote extremist ideology. In this paper, we propose an approach for identifying users who engage in extremist discussions online. Our approach uses detailed feature selection to identify relevant posts and then uses a novel weighted network that models the information flow between the publishers of the relevant posts. An empirical evaluation of a post collection crawled from a web forum containing racially driven discussions and a tweet stream discussing the ISIS extremist group show that our proposed method for relevant post identification is significantly better than the state of the art and using a network flow graph for user identification leads to very accurate user identification.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
vaderSentiment is also the tool employed by [18] to identify extremist users.
References
Stanford corenlp sentiment analyzer. http://stanfordnlp.github.io/CoreNLP/sentiment.html
Stromfront. https://www.stormfront.org/forum/
Vader sentiment analysis. https://github.com/cjhutto/vaderSentiment
Abbasi, A., Chen, H.: Applying authorship analysis to extremist-group web forum messages. IEEE Intell. Syst. 20(5), 67–75 (2005)
Agarwal, S., Sureka, A.: Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats. CoRR, abs/1511.06858 (2015)
Berger, J., Morgan, J.: The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter. Brookings Proj. US Relat. Islamic World 3(20) (2015)
Berger, J., Strathearn, B.: Who matters online: measuring influence, evaluating content and countering violent extremism in online social networks (2013)
Bouchard, M., Joffres, K., Frank, R.: Preliminary analytical considerations in designing a terrorism and extremism online network extractor. In: Mago, V.K., Dabbaghian, V. (eds.) Computational Models of Complex Systems. ISRL, vol. 53, pp. 171–184. Springer, Cham (2014). doi:10.1007/978-3-319-01285-8_11
Buntain, C., Golbeck, J., Liu, B., LaFree, G.: Evaluating public response to the Boston Marathon bombing and other acts of terrorism through Twitter. In: ICWSM, pp. 555–558 (2016)
Burnap, P., Williams, M.L., Sloan, L., et al.: Tweeting the terror: modelling the social media reaction to the woolwich terrorist attack. Soc. Netw. Anal. Mining 4(1), 1–14 (2014)
Chakrabarti, S.: Dynamic personalized pagerank in entity-relation graphs. In: WWW, pp. 571–580. ACM (2007)
Chatfield, A.T., Reddick, C.G., Brajawidagda, U.: Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided Twitter networks. In: dg.o, pp. 239–249. ACM (2015)
Manning, C., Raghavan, P., Schtze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)
Dahlin, J., Johansson, F., Kaati, L., Martenson, C., Svenson, P.: Combining entity matching techniques for detecting extremist behavior on discussion boards. In: ASONAM, pp. 850–857. IEEE (2012)
Hale, W.C.: Extremism on the world wide web: a research review. Crim. Justice Stud. 25(4), 343–356 (2012)
Mei, J., Frank, R.: Sentiment crawling: extremist content collection through a sentiment analysis guided web-crawler. In: ASONAM. ACM (2015)
Rowe, M., Saif, H.: Mining pro-isis radicalisation signals from social media users. In: ICWSM, pp. 329–338 (2016)
Scrivens, R., Davies, G., Frank, R., Mei, J.: Sentiment-based identification of radical authors. In: ICDMW, pp. 979–986. IEEE (2015)
Wei, Y., Singh, L., Martin, S.: Identification of extremism on Twitter. In: Social Network Analysis Surveillance Technologies (SNAT) at ASONAM (2016)
Zhou, Y., Reid, E., Qin, J., Chen, H., Lai, G.: Us domestic extremist groups on the web: link and content analysis. IEEE Intell. Syst. 20(5), 44–51 (2005)
Acknowledgments
We thank subject matter experts for labeling data and their general subject matter expertise provided throughout the process. This work was supported in part by the National Science Foundation (NSF) Grant SMA-1338507 and the Georgetown University Mass Data Institute (MDI).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wei, Y., Singh, L. (2017). Using Network Flows to Identify Users Sharing Extremist Content on Social Media. In: Kim, J., Shim, K., Cao, L., Lee, JG., Lin, X., Moon, YS. (eds) Advances in Knowledge Discovery and Data Mining. PAKDD 2017. Lecture Notes in Computer Science(), vol 10234. Springer, Cham. https://doi.org/10.1007/978-3-319-57454-7_26
Download citation
DOI: https://doi.org/10.1007/978-3-319-57454-7_26
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57453-0
Online ISBN: 978-3-319-57454-7
eBook Packages: Computer ScienceComputer Science (R0)