Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Modeling Islamist Extremist Communications on Social Media using Contextual Dimensions: Religion, Ideology, and Hate

Published: 07 November 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Terror attacks have been linked in part to online extremist content. Online conversations are cloaked in religious ambiguity, with deceptive intentions, often twisted from mainstream meaning to serve a malevolent ideology. Although tens of thousands of Islamist extremism supporters consume such content, they are a small fraction relative to peaceful Muslims. The efforts to contain the ever-evolving extremism on social media platforms have remained inadequate and mostly ineffective. Divergent extremist and mainstream contexts challenge machine interpretation, with a particular threat to the precision of classification algorithms. Radicalization is a subtle long-running persuasive process that occurs over time. Our context-aware computational approach to the analysis of extremist content on Twitter breaks down this persuasion process into building blocks that acknowledge inherent ambiguity and sparsity that likely challenge both manual and automated classification. Based on prior empirical and qualitative research in social sciences, particularly political science, we model this process using a combination of three contextual dimensions -- religion, ideology, and hate -- each elucidating a degree of radicalization and highlighting independent features to render them computationally accessible. We utilize domain-specific knowledge resources for each of these contextual dimensions such as Qur'an for religion, the books of extremist ideologues and preachers for political ideology and a social media hate speech corpus for hate. The significant sensitivity of the Islamist extremist ideology and its local and global security implications require reliable algorithms for modelling such communications on Twitter. Our study makes three contributions to reliable analysis: (i) Development of a computational approach rooted in the contextual dimensions of religion, ideology, and hate, which reflects strategies employed by online Islamist extremist groups, (ii) An in-depth analysis of relevant tweet datasets with respect to these dimensions to exclude likely mislabeled users, and (iii) A framework for understanding online radicalization as a process to assist counter-programming. Given the potentially significant social impact, we evaluate the performance of our algorithms to minimize mislabeling, where our context-aware approach outperforms a competitive baseline by 10.2% in precision, thereby enhancing the potential of such tools for use in human review.

    References

    [1]
    Dilshod Achilov and Sedat Sen. 2017. Got political Islam? Are politically moderate Muslims really different from radicals? International Political Science Review (2017).
    [2]
    Swati Agarwal and Ashish Sureka. 2014. A focused crawler for mining hate and extremism promoting videos on YouTube. In Proceedings of the 25th ACM conference on Hypertext and social media .
    [3]
    Swati Agarwal and Ashish Sureka. 2015. Using knn and svm based one-class classifier for detecting online radicalization on twitter. In International Conference on Distributed Computing and Internet Technology .
    [4]
    Swati Agarwal and Ashish Sureka. 2016. Spider and the flies: Focused crawling on tumblr to detect hate promoting communities. arXiv preprint arXiv:1603.09164 (2016).
    [5]
    Swati Agarwal, Ashish Sureka, and Vikram Goyal. 2015. Open source social media analytics for intelligence and security informatics applications. In International Conference on Big Data Analytics .
    [6]
    Séraphin Alava, Divina Frau-Meigs, and Ghayda Hassan. 2017. Youth and violent extremism on social media: mapping the research .
    [7]
    Tarique Anwar and Muhammad Abulaish. 2015. Ranking radically influential web forum users. IEEE Transactions on Information Forensics and Security (2015).
    [8]
    I Budak Arpinar, Ugur Kursuncu, and Dilshod Achilov. 2016. Social media analytics to identify and counter islamist extremism: Systematic detection, evaluation, and challenging of extremist narratives online. In 2016 International Conference on Collaboration Technologies and Systems (CTS). IEEE, 611--612.
    [9]
    Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. 2015. Detecting jihadist messages on twitter. In 2015 European Intelligence and Security Informatics Conference .
    [10]
    Ben Athiwaratkun, Andrew Gordon Wilson, and Anima Anandkumar. 2018. Probabilistic fasttext for multi-sense word embeddings. arXiv preprint arXiv:1806.02901 (2018).
    [11]
    Imran Awan. 2017. Cyber-extremism: Isis and the power of social media. Society, Vol. 54, 2 (2017), 138--149.
    [12]
    Adam Badawy and Emilio Ferrara. 2018. The rise of jihadist propaganda on social networks. Journal of Computational Social Science (2018).
    [13]
    Jonathon M Berger and Jonathon Morgan. 2015. The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on US Relations with the Islamic World (2015).
    [14]
    Phil Blunsom, Kyunghyun Cho, Shay Cohen, Edward Grefenstette, Karl Moritz Hermann, Laura Rimell, Jason Weston, and Scott Wen-tau Yih. 2016. Proceedings of the 1st Workshop on Representation Learning for NLP. In Proceedings of the 1st Workshop on Representation Learning for NLP .
    [15]
    Piotr Bojanowski, Edouard Grave, Armand Joulin, and Tomas Mikolov. 2017. Enriching word vectors with subword information. Transactions of the Association for Computational Linguistics, Vol. 5 (2017), 135--146.
    [16]
    Gerlof Bouma. 2009. Normalized (pointwise) mutual information in collocation extraction. Proceedings of GSCL (2009), 31--40.
    [17]
    Bérénice Boutin, Grégory Chauzal, Jessica Dorsey, Marjolein Jegerings, Christophe Paulussen, Johanna Pohl, Alastair Reed, and Sofia Zavagli. 2016. The foreign fighters phenomenon in the European Union. Profiles, threats & policies. The International Centre for Counter-Terrorism--The Hague. doi (2016).
    [18]
    Lorraine Bowman-Grieve and Maura Conway. 2012. Exploring the form and function of dissident Irish Republican online discourses. Media, War & Conflict (2012).
    [19]
    Gary R Bunt. 2003. Islam in the digital age: E-jihad, online fatwas and cyber Islamic environments .Pluto Press.
    [20]
    Ricardo JGB Campello, Davoud Moulavi, and Jörg Sander. 2013. Density-based clustering based on hierarchical density estimates. In Pacific-Asia conference on knowledge discovery and data mining .
    [21]
    Amparo Elizabeth Cano Basave, Yulan He, Kang Liu, and Jun Zhao. 2013. A weakly supervised bayesian model for violence detection in social media. (2013).
    [22]
    Lu Chen, Ingmar Weber, and Adam Okulicz-Kozaryn. 2014. US religious landscape on Twitter. In International Conference on Social Informatics .
    [23]
    David Cook. 2015. Understanding jihad .Univ of California Press.
    [24]
    Thomas Davidson, Dana Warmsley, Michael Macy, and Ingmar Weber. 2017. Automated Hate Speech Detection and the Problem of Offensive Language. In Proceedings of the 11th International AAAI Conference on Web and Social Media (ICWSM '17). 512--515.
    [25]
    Seran De Leede, Renate Haupfleisch, Katja Korolkova, and Monika Natter. 2017. Radicalisation and Violent Extremism-Focus on Women: How Women Become Radicalised, and how to Empower Them to Prevent Radicalisation .
    [26]
    Miriam Fernandez and Harith Alani. 2018. Contextual Semantics for Radicalisation Detection on Twitter. (2018).
    [27]
    Miriam Fernandez, Moizzah Asif, and Harith Alani. 2018. Understanding the roots of radicalisation on twitter. In Proceedings of the 10th ACM Conference on Web Science .
    [28]
    Emilio Ferrara, Wen-Qiang Wang, Onur Varol, Alessandro Flammini, and Aram Galstyan. 2016. Predicting online extremism, content adopters, and interaction reciprocity. In International conference on social informatics .
    [29]
    Martyn Frampton, Ali Fisher, Nico Prucha, and David H Petraeus. 2017. The new Netwar: Countering extremism online .Policy Exchange.
    [30]
    Manas Gaur, Amanuel Alambo, Joy Prakash Sain, Ugur Kursuncu, Krishnaprasad Thirunarayan, Ramakanth Kavuluru, Amit Sheth, Randy Welton, and Jyotishman Pathak. 2019. Knowledge-aware assessment of severity of suicide risk for early intervention. In The World Wide Web Conference. ACM, 514--525.
    [31]
    Manas Gaur, Ugur Kursuncu, Amanuel Alambo, Amit Sheth, Raminta Daniulaityte, Krishnaprasad Thirunarayan, and Jyotishman Pathak. 2018. Let Me Tell You About Your Mental Health!: Contextualized Classification of Reddit Posts to DSM-5 for Web-based Intervention. In Proceedings of the 27th ACM International Conference on Information and Knowledge Management. ACM, 753--762.
    [32]
    Mohammed Hafez and Creighton Mullins. 2015. The radicalization puzzle: A theoretical synthesis of empirical approaches to homegrown extremism. Studies in Conflict & Terrorism (2015).
    [33]
    Scott Helfstein. 2012. Edges of radicalization: Ideas, individuals and networks in violent extremism . Technical Report. MILITARY ACADEMY WEST POINT NY COMBATING TERRORISM CENTER.
    [34]
    Ghaffar Hussain and Erin Marie Saltman. 2014. Jihad trending: A comprehensive analysis of online extremism and how to counter it .
    [35]
    Lisa Kaati, Enghin Omer, Nico Prucha, and Amendra Shrestha. 2015. Detecting multipliers of jihadism on twitter. In 2015 IEEE International Conference on Data Mining Workshop (ICDMW) .
    [36]
    Ugur Kursuncu, Manas Gaur, Usha Lokala, Anurag Illendula, Krishnaprasad Thirunarayan, Raminta Daniulaityte, Amit Sheth, and I Budak Arpinar. 2018. What's ur Type? Contextualized Classification of User Types in Marijuana-Related Communications Using Compositional Multiview Embedding. In 2018 IEEE/WIC/ACM International Conference on Web Intelligence (WI). IEEE, 474--479.
    [37]
    Ugur Kursuncu, Manas Gaur, Usha Lokala, Krishnaprasad Thirunarayan, Amit Sheth, and I Budak Arpinar. 2019. Predictive Analysis on Twitter: Techniques and Applications. In Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining . Springer, 67--104.
    [38]
    Wagdy Loza. 2007. The psychology of extremism and terrorism: A Middle-Eastern perspective. Aggression and Violent Behavior (2007).
    [39]
    Laurens van der Maaten and Geoffrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research (2008).
    [40]
    Mary L McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia medica: Biochemia medica (2012).
    [41]
    Alexander Meleagrou-Hitchens, Seamus Hughes, and Bennett Clifford. 2018. The travelers: American jihadists in Syria and Iraq .
    [42]
    Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013a. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013).
    [43]
    Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013b. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems .
    [44]
    Jeffrey Pennington, Richard Socher, and Christopher Manning. 2014. Glove: Global vectors for word representation. In Proceedings of the 2014 conference on empirical methods in natural language processing (EMNLP) . 1532--1543.
    [45]
    Jialun Qin, Yilu Zhou, Edna Reid, Guanpi Lai, and Hsinchun Chen. 2007. Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity. International Journal of Human-Computer Studies, Vol. 65, 1 (2007), 71--84.
    [46]
    Matthew Rowe and Hassan Saif. 2016. Mining pro-ISIS radicalisation signals from social media users. In Tenth International AAAI Conference on Web and Social Media .
    [47]
    Hassan Saif, Thomas Dickinson, Leon Kastler, Miriam Fernandez, and Harith Alani. 2017. A semantic graph-based approach for radicalisation detection on social media. In European semantic web conference .
    [48]
    Prathusha K Sarma, Yingyu Liang, and William A Sethares. 2018. Domain Adapted Word Embeddings for Improved Sentiment Classification. arXiv preprint arXiv:1805.04576 (2018).
    [49]
    Jacob R Scanlon and Matthew S Gerber. 2014. Automatic detection of cyber-recruitment by violent extremists. Security Informatics (2014).
    [50]
    Jacob R Scanlon and Matthew S Gerber. 2015. Forecasting violent extremist cyber recruitment. IEEE Transactions on Information Forensics and Security (2015).
    [51]
    Joseph A Schafer. 2002. Spinning the web of hate: Web-based hate propagation by extremist organizations. Journal of Criminal Justice and Popular Culture (2002).
    [52]
    Amit Sheth, Sujan Perera, Sanjaya Wijeratne, and Krishnaprasad Thirunarayan. 2017. Knowledge will propel machine understanding of content: extrapolating from current examples. In Proceedings of the International Conference on Web Intelligence. ACM, 1--9.
    [53]
    Jamin Shin, Andrea Madotto, and Pascale Fung. 2018. Interpreting Word Embeddings with Eigenvector Analysis. (2018).
    [54]
    PK Srijith, Mark Hepple, Kalina Bontcheva, and Daniel Preotiuc-Pietro. 2017. Sub-story detection in Twitter with hierarchical Dirichlet processes. Information Processing & Management (2017).
    [55]
    Ashish Sureka and Swati Agarwal. 2014. Learning to classify hate and extremism promoting tweets. In 2014 IEEE Joint Intelligence and Security Informatics Conference .
    [56]
    Yee W Teh, Michael I Jordan, Matthew J Beal, and David M Blei. 2005. Sharing clusters among related groups: Hierarchical Dirichlet processes. In Advances in neural information processing systems .
    [57]
    Alain Van Hiel and Ivan Mervielde. 2003. The measurement of cognitive complexity and its relationship with political extremism. Political Psychology (2003).
    [58]
    Lorenzo Vidino and Seamus Hughes. 2015. ISIS in America: From retweets to Raqqa .
    [59]
    Pooja Wadhwa and MPS Bhatia. 2013. Tracking on-line radicalization using investigative data mining. In 2013 National Conference on Communications (NCC) .

    Cited By

    View all
    • (2024)Legal regulation of confessional relations in KazakhstanPharos Journal of Theology10.46222/pharosjot.105.37Online publication date: Jun-2024
    • (2024)The Virality of Hate Speech on Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/36410258:CSCW1(1-22)Online publication date: 26-Apr-2024
    • (2023)Behind Blue Skies: A Multimodal Automated Content Analysis of Islamic Extremist Propaganda on InstagramSocial Media + Society10.1177/205630512211504049:1(205630512211504)Online publication date: 18-Jan-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Proceedings of the ACM on Human-Computer Interaction
    Proceedings of the ACM on Human-Computer Interaction  Volume 3, Issue CSCW
    November 2019
    5026 pages
    EISSN:2573-0142
    DOI:10.1145/3371885
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2019
    Published in PACMHCI Volume 3, Issue CSCW

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. contextual dimensions
    2. islamist extremism
    3. multi-dimensional modeling
    4. radicalization
    5. user modeling

    Qualifiers

    • Research-article

    Funding Sources

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)419
    • Downloads (Last 6 weeks)26
    Reflects downloads up to

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Legal regulation of confessional relations in KazakhstanPharos Journal of Theology10.46222/pharosjot.105.37Online publication date: Jun-2024
    • (2024)The Virality of Hate Speech on Social MediaProceedings of the ACM on Human-Computer Interaction10.1145/36410258:CSCW1(1-22)Online publication date: 26-Apr-2024
    • (2023)Behind Blue Skies: A Multimodal Automated Content Analysis of Islamic Extremist Propaganda on InstagramSocial Media + Society10.1177/205630512211504049:1(205630512211504)Online publication date: 18-Jan-2023
    • (2023)Football and the video assistant referee: A grounded theory approachProceedings of the Institution of Mechanical Engineers, Part P: Journal of Sports Engineering and Technology10.1177/17543371231213739Online publication date: 30-Dec-2023
    • (2023)Multi-Ideology, Multiclass Online Extremism Dataset, and Its Evaluation Using Machine LearningComputational Intelligence and Neuroscience10.1155/2023/45631452023Online publication date: 1-Jan-2023
    • (2023)A Comprehensive Survey of Detection and Prevention Approaches for Online Radicalization: Identifying Gaps and Future DirectionsIEEE Access10.1109/ACCESS.2023.332699511(120463-120491)Online publication date: 2023
    • (2023)BREE-HD: A Transformer-Based Model to Identify Threats on TwitterIEEE Access10.1109/ACCESS.2023.329107211(67180-67190)Online publication date: 2023
    • (2023)ChildProtect: A parental control application for tracking hostile surfing contentEntertainment Computing10.1016/j.entcom.2022.10051744(100517)Online publication date: Jan-2023
    • (2023)Integrated content-network analysis to discover influential collectives for studying social cyber-threats from online social movementsSocial Network Analysis and Mining10.1007/s13278-023-01124-613:1Online publication date: 23-Sep-2023
    • (2023)User Identity Modeling to Characterize Communication Patterns of Domestic Extremists Behavior on Social MediaSocial, Cultural, and Behavioral Modeling10.1007/978-3-031-43129-6_22(219-230)Online publication date: 20-Sep-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media