Abstract
Online social media platforms such as Twitter have been found to be misused by extremist groups, including Islamic State of Iraq and Syria (ISIS), who attract and recruit social media users. To prevent their influence from expanding in the online social media platforms, it is required to understand the online behaviors of these extremist group users and their followers, for predicting and identifying potential security threats. We present an empirical study about ISIS followers’ online behaviors on Twitter, proposing to classify their tweets in terms of political and subjectivity polarities. We first develop a supervised classification model for the polarity classification, based on natural language processing and clustering methods. We then develop a statistical analysis of term-polarity correlations, which leads us to successfully observe ISIS followers’ online behaviors, which are in line with the reports of experts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
islamicstate, syria, syrian, isis, iraqi, iraq, aleppo, assad, mosul, palmyra, ramiallolah, fallujah, ramadi, homs, kuffar, kafir, kufr, amaq, sheikh, shia, damascus, deir ezzor, abu bakr al-baghdadi, #albaghdadi, raqqah, nusayri, azaz, awlaki, anwar al-awlaki, islamic, islam, yarmouk, khanaser, khanase, tadmur, daraa.
- 5.
- 6.
- 7.
References
Alhadi, A.C., Gottron, T., Staab, S.: Exploring user purpose writing single tweets. In: WebSci. ACM (2011)
Banerjee, N., Chakraborty, D., Joshi, A., Mittal, S., Rai, A., Ravindran, B.: Towards analyzing micro-blogs for detection and classification of real-time intentions. In: ICWSM (2012)
Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993–1022 (2003)
Brooking, E.T., Singer, P.W.: War goes viral: how social media is being weaponized across the world. The Atlantic (2016). https://www.theatlantic.com/magazine/archive/2016/11/war-goes-viral/501125/
Chae, J., Thom, D., Jang, Y., Kim, S., Ertl, T., Ebert, D.S.: Public behavior response analysis in disaster events utilizing visual analytics of microblog data. Comput. Graph. (Pergamon) 38(1), 51–60 (2014)
Chen, D., Manning, C.D.: A fast and accurate dependency parser using neural networks. In: EMNLP, pp. 740–750 (2014)
Chen, T., Guestrin, C.: XGBoost : Reliable large-scale tree boosting system. In: SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 785–794 (2016)
Chen, Z., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Identifying intention posts in discussion forums. In: HLT-NAACL, pp. 1041–1050 (2013)
Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge University Press, Cambridge (2000)
Daszykowski, M., Walczak, B.: Density-based clustering methods. Compr. Chemometr. 2, 635–654 (2010)
Fisher, A.: Swarmcast: how Jihadist networks maintain a persistent online presence. Perspect. Terror. 9(3), 3–20 (2015)
Gómez-Adorno, H., Pinto, D., Montes, M., Sidorov, G., Alfaro, R.: Content and style features for automatic detection of users’ intentions in tweets. In: Ibero-American Conference on Artificial Intelligence, pp. 120–128 (2014)
Hamroun, M., Gouider, M.S., Said, L.B.: Customer intentions analysis of twitter based on semantic patterns. In: WISDOM (2015)
Iyyer, M., Enns, P., Boyd-Graber, J., Resnik, P.: Political ideology detection using recursive neural networks. In: ACL, pp. 1113–1122 (2014)
Klausen, J.: Tweeting the Jihad: social media networks of western foreign fighters in Syria and Iraq. Stud. Conflict Terror. 38(1), 1–22 (2015)
Levy, O., Goldberg, Y.: Dependency-based word embeddings. In: ACL, pp. 302–308 (2014)
Liu, S., Wang, X., Chen, J., Zhu, J., Guo, B.: TopicPanorama: a full picture of relevant topics. In: IEEE Conference on Visual Analytics Science and Technology, pp. 183–192 (2014)
Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., Baldwin, T.: ISISisNotislam or DeportAllMuslims?: Predicting unspoken views. In: ACM Conference on Web Science, pp. 95–106 (2016)
Magdy, W., Darwish, K., Weber, I.: FailedRevolutions: using twitter to study the antecedents of ISIS support. First Monday 21(2), 1481–1492 (2016)
Mikolov, T., Sutskever, I., Chen, K., Corrado, G., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111–3119 (2013)
Mohammad, S.M., Kiritchenko, S., Martin, J.: Identifying purpose behind electoral tweets. In: Proceedings of the Second International Workshop on Issues of Sentiment Discovery and Opinion Mining (2013)
Prentice, S., Taylor, P.J., Rayson, P., Hoskins, A., O’Loughlin, B.: Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict. Inf. Syst. Front. 13(1), 61–73 (2011)
Purohit, H., Dong, G., Shalin, V., Thirunarayan, K., Sheth, A.: Intent classification of short-text on social media. In: IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), pp. 222–228 (2015)
Rowe, M., Saif, H.: Mining Pro-ISIS radicalisation signals from social media users. In: International Conference on Weblogs and Social Media, pp. 329–338 (2016)
Rudas, C., Surányi, O., Yasseri, T., Török, J.: Understanding and coping with extremism in an online collaborative environment: a data-driven modeling. PLoS ONE 12(3), e0173561 (2017)
Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Secur. Inf. 3(1), 1–10 (2014)
Scanlon, J.R., Gerber, M.S.: Forecasting violent extremist cyber recruitment. IEEE Trans. Inf. Forensics Secur. 10(11), 2461–2470 (2015)
Sun, G., Wu, Y., Liu, S., Peng, T.Q., Zhu, J.J., Liang, R.: EvoRiver: visual analysis of topic coopetition on social media. IEEE Trans. Visual. Comput. Graph. 20(12), 1753–1762 (2014)
Tang, J., Liu, H.: An unsupervised feature selection framework for social media data. IEEE Trans. Knowl. Data Eng. 26(12), 2914–2927 (2014)
Wang, J., Cong, G., Zhao, W.X., Li, X.: Mining user intents in Twitter: a semi-supervised approach to inferring intent categories for tweets. In: AAAI, pp. 318–324 (2015)
Wang, X., Liu, Y., SUN, C., Wang, B., Wang, X.: Predicting polarities of tweets by composing word embeddings with long short-term memory. In: ACL/IJCNLP, pp. 1343–1353 (2015)
Yu, B., Kaufmann, S., Diermeier, D.: Classifying party affiliation from political speech. J. Inf. Technol. Pol. 5(1), 33–48 (2008)
Acknowledgement
This material is based on research work supported by the Singapore National Research Foundation under NCR Award No. NRF2014NCR-NCR001-034.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Kim, Jj., Liu, Y., Lim, W.Y., Thing, V.L.L. (2017). An Empirical Study on Collective Online Behaviors of Extremist Supporters. In: Cong, G., Peng, WC., Zhang, W., Li, C., Sun, A. (eds) Advanced Data Mining and Applications. ADMA 2017. Lecture Notes in Computer Science(), vol 10604. Springer, Cham. https://doi.org/10.1007/978-3-319-69179-4_31
Download citation
DOI: https://doi.org/10.1007/978-3-319-69179-4_31
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69178-7
Online ISBN: 978-3-319-69179-4
eBook Packages: Computer ScienceComputer Science (R0)