Skip to main content

An Empirical Study on Collective Online Behaviors of Extremist Supporters

  • Conference paper
  • First Online:
Advanced Data Mining and Applications (ADMA 2017)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10604))

Included in the following conference series:

Abstract

Online social media platforms such as Twitter have been found to be misused by extremist groups, including Islamic State of Iraq and Syria (ISIS), who attract and recruit social media users. To prevent their influence from expanding in the online social media platforms, it is required to understand the online behaviors of these extremist group users and their followers, for predicting and identifying potential security threats. We present an empirical study about ISIS followers’ online behaviors on Twitter, proposing to classify their tweets in terms of political and subjectivity polarities. We first develop a supervised classification model for the polarity classification, based on natural language processing and clustering methods. We then develop a statistical analysis of term-polarity correlations, which leads us to successfully observe ISIS followers’ online behaviors, which are in line with the reports of experts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://blog.twitter.com/2016/combating-violent-extremism.

  2. 2.

    https://www.kaggle.com/kzaman/how-isis-uses-twitter.

  3. 3.

    http://www.tomgibara.com/clustering/fast-spatial/.

  4. 4.

    islamicstate, syria, syrian, isis, iraqi, iraq, aleppo, assad, mosul, palmyra, ramiallolah, fallujah, ramadi, homs, kuffar, kafir, kufr, amaq, sheikh, shia, damascus, deir ezzor, abu bakr al-baghdadi, #albaghdadi, raqqah, nusayri, azaz, awlaki, anwar al-awlaki, islamic, islam, yarmouk, khanaser, khanase, tadmur, daraa.

  5. 5.

    https://www.nytimes.com/2016/01/15/world/middleeast/a-news-agency-with-scoops-directly-from-isis-and-a-veneer-of-objectivity.html.

  6. 6.

    https://www.wilsoncenter.org/article/timeline-rise-and-spread-the-islamic-state, http://edition.cnn.com/2014/08/08/world/isis-fast-facts/.

  7. 7.

    http://edition.cnn.com/2015/12/28/middleeast/iraq-military-retakes-ramadi/.

References

  1. Alhadi, A.C., Gottron, T., Staab, S.: Exploring user purpose writing single tweets. In: WebSci. ACM (2011)

    Google Scholar 

  2. Banerjee, N., Chakraborty, D., Joshi, A., Mittal, S., Rai, A., Ravindran, B.: Towards analyzing micro-blogs for detection and classification of real-time intentions. In: ICWSM (2012)

    Google Scholar 

  3. Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993–1022 (2003)

    MATH  Google Scholar 

  4. Brooking, E.T., Singer, P.W.: War goes viral: how social media is being weaponized across the world. The Atlantic (2016). https://www.theatlantic.com/magazine/archive/2016/11/war-goes-viral/501125/

  5. Chae, J., Thom, D., Jang, Y., Kim, S., Ertl, T., Ebert, D.S.: Public behavior response analysis in disaster events utilizing visual analytics of microblog data. Comput. Graph. (Pergamon) 38(1), 51–60 (2014)

    Article  Google Scholar 

  6. Chen, D., Manning, C.D.: A fast and accurate dependency parser using neural networks. In: EMNLP, pp. 740–750 (2014)

    Google Scholar 

  7. Chen, T., Guestrin, C.: XGBoost : Reliable large-scale tree boosting system. In: SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 785–794 (2016)

    Google Scholar 

  8. Chen, Z., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Identifying intention posts in discussion forums. In: HLT-NAACL, pp. 1041–1050 (2013)

    Google Scholar 

  9. Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge University Press, Cambridge (2000)

    Book  MATH  Google Scholar 

  10. Daszykowski, M., Walczak, B.: Density-based clustering methods. Compr. Chemometr. 2, 635–654 (2010)

    Google Scholar 

  11. Fisher, A.: Swarmcast: how Jihadist networks maintain a persistent online presence. Perspect. Terror. 9(3), 3–20 (2015)

    Google Scholar 

  12. Gómez-Adorno, H., Pinto, D., Montes, M., Sidorov, G., Alfaro, R.: Content and style features for automatic detection of users’ intentions in tweets. In: Ibero-American Conference on Artificial Intelligence, pp. 120–128 (2014)

    Google Scholar 

  13. Hamroun, M., Gouider, M.S., Said, L.B.: Customer intentions analysis of twitter based on semantic patterns. In: WISDOM (2015)

    Google Scholar 

  14. Iyyer, M., Enns, P., Boyd-Graber, J., Resnik, P.: Political ideology detection using recursive neural networks. In: ACL, pp. 1113–1122 (2014)

    Google Scholar 

  15. Klausen, J.: Tweeting the Jihad: social media networks of western foreign fighters in Syria and Iraq. Stud. Conflict Terror. 38(1), 1–22 (2015)

    Article  Google Scholar 

  16. Levy, O., Goldberg, Y.: Dependency-based word embeddings. In: ACL, pp. 302–308 (2014)

    Google Scholar 

  17. Liu, S., Wang, X., Chen, J., Zhu, J., Guo, B.: TopicPanorama: a full picture of relevant topics. In: IEEE Conference on Visual Analytics Science and Technology, pp. 183–192 (2014)

    Google Scholar 

  18. Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., Baldwin, T.: ISISisNotislam or DeportAllMuslims?: Predicting unspoken views. In: ACM Conference on Web Science, pp. 95–106 (2016)

    Google Scholar 

  19. Magdy, W., Darwish, K., Weber, I.: FailedRevolutions: using twitter to study the antecedents of ISIS support. First Monday 21(2), 1481–1492 (2016)

    Article  Google Scholar 

  20. Mikolov, T., Sutskever, I., Chen, K., Corrado, G., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111–3119 (2013)

    Google Scholar 

  21. Mohammad, S.M., Kiritchenko, S., Martin, J.: Identifying purpose behind electoral tweets. In: Proceedings of the Second International Workshop on Issues of Sentiment Discovery and Opinion Mining (2013)

    Google Scholar 

  22. Prentice, S., Taylor, P.J., Rayson, P., Hoskins, A., O’Loughlin, B.: Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict. Inf. Syst. Front. 13(1), 61–73 (2011)

    Article  Google Scholar 

  23. Purohit, H., Dong, G., Shalin, V., Thirunarayan, K., Sheth, A.: Intent classification of short-text on social media. In: IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), pp. 222–228 (2015)

    Google Scholar 

  24. Rowe, M., Saif, H.: Mining Pro-ISIS radicalisation signals from social media users. In: International Conference on Weblogs and Social Media, pp. 329–338 (2016)

    Google Scholar 

  25. Rudas, C., Surányi, O., Yasseri, T., Török, J.: Understanding and coping with extremism in an online collaborative environment: a data-driven modeling. PLoS ONE 12(3), e0173561 (2017)

    Article  Google Scholar 

  26. Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Secur. Inf. 3(1), 1–10 (2014)

    Article  Google Scholar 

  27. Scanlon, J.R., Gerber, M.S.: Forecasting violent extremist cyber recruitment. IEEE Trans. Inf. Forensics Secur. 10(11), 2461–2470 (2015)

    Article  Google Scholar 

  28. Sun, G., Wu, Y., Liu, S., Peng, T.Q., Zhu, J.J., Liang, R.: EvoRiver: visual analysis of topic coopetition on social media. IEEE Trans. Visual. Comput. Graph. 20(12), 1753–1762 (2014)

    Article  Google Scholar 

  29. Tang, J., Liu, H.: An unsupervised feature selection framework for social media data. IEEE Trans. Knowl. Data Eng. 26(12), 2914–2927 (2014)

    Article  Google Scholar 

  30. Wang, J., Cong, G., Zhao, W.X., Li, X.: Mining user intents in Twitter: a semi-supervised approach to inferring intent categories for tweets. In: AAAI, pp. 318–324 (2015)

    Google Scholar 

  31. Wang, X., Liu, Y., SUN, C., Wang, B., Wang, X.: Predicting polarities of tweets by composing word embeddings with long short-term memory. In: ACL/IJCNLP, pp. 1343–1353 (2015)

    Google Scholar 

  32. Yu, B., Kaufmann, S., Diermeier, D.: Classifying party affiliation from political speech. J. Inf. Technol. Pol. 5(1), 33–48 (2008)

    Article  Google Scholar 

Download references

Acknowledgement

This material is based on research work supported by the Singapore National Research Foundation under NCR Award No. NRF2014NCR-NCR001-034.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jung-jae Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Kim, Jj., Liu, Y., Lim, W.Y., Thing, V.L.L. (2017). An Empirical Study on Collective Online Behaviors of Extremist Supporters. In: Cong, G., Peng, WC., Zhang, W., Li, C., Sun, A. (eds) Advanced Data Mining and Applications. ADMA 2017. Lecture Notes in Computer Science(), vol 10604. Springer, Cham. https://doi.org/10.1007/978-3-319-69179-4_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69179-4_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69178-7

  • Online ISBN: 978-3-319-69179-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics