Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks

Published: 09 May 2023 Publication History
  • Get Citation Alerts
  • Abstract

    Extremism is a growing threat worldwide that presents a significant danger to public safety and national security. Social networks provide extremists with spaces to spread their ideas through commentaries or tweets, often in Asian English. In this paper, we propose an intelligent approach that cleans the text’s content, analyzes its sentiment, and extracts its features after converting it to digital data for machine learning treatments. We apply 16 intelligent machine learning classifiers for extremism detection and classification. The proposed artificial intelligence methods for Asian English language data are used to extract the essential features from the text. Our evaluation of the proposed model with an extremism dataset proves its effectiveness compared to the standard classification models based on various performance metrics. The proposed model achieves 93,6% accuracy for extremism detection and 97,0% for extremism classification.

    References

    [1]
    BS ISO 5725-1. 1994. Accuracy (Trueness and precision) of measurement methods and results - Part 1: General principles and definitions. 1.
    [2]
    A. Rajaraman and J. D. Ullman. 2011. Data Mining. Mining of Massive Datasets. 1–17. DOI:
    [3]
    Ahmed I. A. Abd-Elaal, Ahmed Z. Badr, and Hani M. K. Mahdi. 2020. Detecting Violent Radical Accounts on Twitter, Vol. 11. 1 pages.
    [4]
    S. Agarwal and A. Sureka. 2015. Using a KNN and SVM-based One-class Classifier to Detect Online Radicalization on Twitter. In International Conference on Distributed Computing and Internet Technology. 431–442.
    [5]
    T. Alsbouí, Mohammad Hammoudeh, Zuhair Bandar, and Andy Nisbet. 2011. An overview and classification of approaches to information extraction in wireless sensor networks.
    [6]
    E. Anwas, Yuni Sugiarti, Anggraeni Permatasari, Jaka Warsihna, Zulfikri Anas, Leli Alhapip, Heni Siswanto, and Rahmi Rivalina. 2020. Social media usage for enhancing English language skill. (2020).
    [7]
    Michael Ashcroft, Ali Fisher, Lisa Kaati, Enghin Omer, and Nico Prucha. 2015. Detecting jihadist messages on Twitter. In 2015 European Intelligence and Security Informatics Conference. 161–164. DOI:
    [8]
    Nicholas M. Ball and Robert J. Brunner. 2010. Data Mining and Machine Learning in Astronomy, Vol. 19. arXiv:0906.2173v2 [astro-ph.IM]. 1049–1106. DOI:
    [9]
    Ekaba Bisong. 2019. Introduction to Scikit-learn. Springer, 215–229. DOI:
    [10]
    Kingsley Bolton and John Bacon-Shone. 2020. The statistics of English across Asia. The Handbook of Asian Englishes. 49–80.
    [11]
    Emre Calisir and Marco Brambilla. 2018. The problem of data cleaning for knowledge extraction from social media. Springer. DOI:
    [12]
    F. Cheong and C. Cheong. 2011. Social media data mining- a social network analysis of tweets during the 2010-2011 Australian floods. Pacific Asia Conference on Information Systems (PACIS) (July 2011), 5–9.
    [13]
    Tom De Smedt and Walter Daelemans. 2012. “Terribly beautiful!” (terribly beautiful): A Subjectivity Lexicon for Dutch Adjectives. In LREC. 3568–3572.
    [14]
    Guilain Denoeux and Lynn Carter. 2011. Guide to the Drivers of Violent Extremism. United States Agency for International Development.
    [15]
    Adam Arvidsson, Elanor Colleoni, and Alessandro Rozza. 2014. Echo Chamber or Public Sphere? Predicting Political Orientation and Measuring Political Homophily in Twitter using Big Data. Number 64, 317–332.
    [16]
    Joeran Beel, Bela Gipp, Stefan Langer, and Corinna Breitinger. 2016. Research-paper Recommender Systems: A Literature Survey, Vol. 17. International Journal on Digital Libraries. 305–338. DOI:
    [17]
    Mohammad Hammoudeh, Robert Newman, Christopher Dennett, Sarah Mount, and Omar Aldabbas. 2015. Map as a service: A framework for visualising and maximising information return from multi-modal wireless sensor networks. Sensors 15, 9 (2015), 22970–23003.
    [18]
    Guangwei Hu and Sandra Lee McKay. 2012. English language education in East Asia: Some recent developments. Journal of Multilingual and Multicultural Development 33, 4 (2012), 345–362. DOI: arXiv:
    [19]
    A. S. M. Kayes, Rudri Kalaria, Iqbal H. Sarker, Md. Islam, Paul A. Watters, Alex Ng, Mohammad Hammoudeh, Shahriar Badsha, Indika Kumara, et al. 2020. A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues. Sensors 20, 9 (2020), 2464.
    [20]
    Ga Young Lee, Lubna Alzamil, Bakhtiyar Doskenov, and Arash Termehchy. 2021. A survey on data cleaning methods for improved machine learning model performance. arXiv. DOI:
    [21]
    Erich L. Lehmann and George Casella. 2006. Theory of Point Estimation. Springer Science & Business Media.
    [22]
    E. Lenihan. 2022. A Classification of Antifa Twitter Accounts based on Social Network Mapping and Linguistic Analysis, Vol. 12. DOI:
    [23]
    Quanzhi Li, Sameena Shah, Rui Fang, Armineh Nourbakhsh, and Xiaomo Liu. 2016. Tweet sentiment analysis by incorporating sentiment-specific word embedding and weighted text features. In 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI’16). 568–571. DOI:
    [24]
    M. C. Benigni, K. Joseph, and K. M. Carley. 2017. Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter. 12, 12. DOI:
    [25]
    Muneera Muftah. 2022. Impact of social media on learning English language during the COVID-19 pandemic. PSU Research Review (2022).
    [26]
    Shynar Mussiraliyeva, Milana Bolatbek, Batyrkhan Omarov, Zhanar Medetbek, Gulshat Baispay, and Ruslan Ospanov. 2020. On detecting online radicalization and extremism using natural language processing. In 2020 21st International Arab Conference on Information Technology (ACIT’20). IEEE, 1–5. DOI:
    [27]
    M. David and W. Powers. 2011. Evaluation: From Precision, Recall and F-measure to ROC, Informedness, Markedness and Correlation. arXiv:2010.16061v1. 37–63. DOI:
    [28]
    D. Ramachandran and R. Parvathi. 2019. Analysis of Twitter specific preprocessing technique for tweets. DOI:
    [29]
    Parupalli Rao. 2019. The Role of English as a Global Language, Vol. 4. 65–79.
    [30]
    G. Thippa Reddy, Sweta Bhattacharya, S. Siva Ramakrishnan, Chiranji Lal Chowdhary, Saqib Hakak, Rajesh Kaluri, and M. Praveen Kumar Reddy. 2020. An ensemble based machine learning model for diabetic retinopathy classification. In 2020 International Conference on Emerging Trends in Information Technology and Engineering (ic-ETITE’20). 1–6. DOI:
    [31]
    Zia Ul Rehman, Sagheer Abbas, Muhammad Adnan Khan, Ghulam Mustafa, Hira Fayyaz, Muhammad Hanif, and Muhammad Anwar Saeed. 2021. Understanding the language of ISIS: An empirical approach to detect radical content on Twitter using machine learning. 2, 66, 1075–1090. DOI:
    [32]
    Ryan Compton, Craig Lee, Jiejun Xu, and Michael Macy. September 2014. Using publicly visible social media to build detailed forecasts of civil unrest (September 2014). DOI:
    [33]
    S. Agarwal and A. Sureka. 2015. Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats.
    [34]
    Hassan Saif, Thomas Dickinson, Leon Kastler, Miriam Fernandez, and Harith Alani. 2017. A semantic graph-based approach for radicalisation detection on social media. In The Semantic Web, Eva Blomqvist, Diana Maynard, Aldo Gangemi, Rinke Hoekstra, Pascal Hitzler, and Olaf Hartig (Eds.). Springer International Publishing, Cham, 571–587.
    [35]
    Aditi Sarker, Partha Chakraborty, S. M. Shaheen Sha, and Kawshik Banerjee. 2020. Improvised Technique for Analyzing Data and Detecting Terrorist Attack Using Machine Learning Approach Based on Twitter Data. Journal of Computer and Communications, Vol. 7 8, 50–62. DOI:
    [37]
    Omar Sharif, Mohammed Moshiul Hoque, A. S. M. Kayes, Raza Nowrozy, and Iqbal H. Sarker. 2020. Detecting suspicious texts using machine learning techniques. 18, 10, 1075–1090.
    [38]
    Simona Trip, Carmen Hortensia Bora, Mihai Marian, Angelica Halmajan, and Marius Ioan Drugas. 2019. Psychological mechanisms involved in radicalization and extremism. A rational emotive behavioral conceptualization. Frontiers in Psychology. DOI:
    [39]
    Devrim Unal, Mohammad Hammoudeh, and Mehmet Sabir Kiraz. 2020. Policy specification and verification for blockchain and smart contracts in 5G networks. ICT Express 6, 1 (2020), 43–47.
    [40]
    Bertie Vidgen, Austin Botelho, David Broniatowski, Ella Guest, Matthew Hall, Helen Margetts, Rebekah Tromble, Zeerak Waseem, and Scott Hale. 2020. Detecting East Asian Prejudice on Social Media. (2020). DOI:
    [41]
    Ibrahim Abu W. Farha and Magdy. 2019. Mazajak: An online Arabic sentiment analyser. Proceedings of the Fourth Arabic Natural Language Processing Workshop. 192–198.
    [42]
    Zhou Wang and Alan C. Bovik. 2009. Mean squared error: Love it or leave it? A new look at signal fidelity measures. IEEE Signal Processing Magazine 26, 1 (2009), 98–117.

    Cited By

    View all
    • (2024)Using Transformers to Classify Arabic Dialects on Social Networks2024 6th International Conference on Pattern Analysis and Intelligent Systems (PAIS)10.1109/PAIS62114.2024.10541289(1-7)Online publication date: 24-Apr-2024
    • (2024)Social media sentiment analysis and opinion mining in public securityJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10177635:9Online publication date: 1-Feb-2024
    • (2023)A Comprehensive Survey of Detection and Prevention Approaches for Online Radicalization: Identifying Gaps and Future DirectionsIEEE Access10.1109/ACCESS.2023.332699511(120463-120491)Online publication date: 2023

    Index Terms

    1. An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Asian and Low-Resource Language Information Processing
      ACM Transactions on Asian and Low-Resource Language Information Processing  Volume 22, Issue 5
      May 2023
      653 pages
      ISSN:2375-4699
      EISSN:2375-4702
      DOI:10.1145/3596451
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 09 May 2023
      Online AM: 19 January 2023
      Accepted: 25 September 2022
      Revised: 09 September 2022
      Received: 01 May 2022
      Published in TALLIP Volume 22, Issue 5

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Machine learning
      2. Natural Language Processing
      3. social networks
      4. sentiment analysis
      5. extremism

      Qualifiers

      • Research-article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)118
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 27 Jul 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Using Transformers to Classify Arabic Dialects on Social Networks2024 6th International Conference on Pattern Analysis and Intelligent Systems (PAIS)10.1109/PAIS62114.2024.10541289(1-7)Online publication date: 24-Apr-2024
      • (2024)Social media sentiment analysis and opinion mining in public securityJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2023.10177635:9Online publication date: 1-Feb-2024
      • (2023)A Comprehensive Survey of Detection and Prevention Approaches for Online Radicalization: Identifying Gaps and Future DirectionsIEEE Access10.1109/ACCESS.2023.332699511(120463-120491)Online publication date: 2023

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media