ABSTRACT
The deliberate misuse of technical infrastructure (including the Web and social media) for cyber deviant and cybercriminal behaviour, ranging from the spreading of extremist and terrorism-related material to online fraud and cyber security attacks, is on the rise. This workshop aims to better understand such phenomena and develop methods for tackling them in an effective and efficient manner. The workshop brings together interdisciplinary researchers and experts in Web search, security informatics, social media analysis, machine learning, and digital forensics, with particular interests in cyber security. The workshop programme includes refereed papers, invited talks and a panel discussion for better understanding the current landscape, as well as the future of data mining for detecting cyber deviance.
- Chatfield, A. T., Reddick, C. G., and Brajawidagda, U. 2015. Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided Twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research. ACM. New York, NY, USA, 239--249. DOI: http://dx.doi.org/10.1145/2757401.2757408. Google ScholarDigital Library
- Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science, Volume 5, Issue 11. DOI: http://dx.doi.org/10.1140/epjds/s13688-016-0072-6. Google ScholarCross Ref
- Burnap, P., Javed, A., Rana, O. F. and Awan, M.S. 2015. Real-time Classification of Malicious URLs on Twitter using Machine Activity Data. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2015), ACM, New York, NY, USA, 970--977. DOI: http://dx.doi.org/10.1145/2808797.2809281. Google ScholarDigital Library
- Microsoft's approach to terrorist content online. Retrieved December 12, 2016, from Microsoft's official blog: https://blogs.microsoft.com/on-the-issues/2016/05/20/microsofts-approach-terrorist-content-online.Google Scholar
- Combating Violent Extremism. Retrieved December, 12, 2016, from Twitter's official blog: https://blog.twitter.com/2016/combating-violent-extremism.Google Scholar
- Partnering to Help Curb Spread of Online Terrorist Content. Retrieved December 12, 2016, from Facebook's newsroom. http://newsroom.fb.com/news/2016/12/partnering-to-help-curb-spread-of-online-terrorist-content/.Google Scholar
- Hendler, J. and Berners-Lee, T. 2010. From the Semantic Web to social machines: A research challenge for AI on the World Wide Web, Artificial Intelligence, Volume 174, Issue 2, Pages 156--161, ISSN 0004-3702, DOI: http://dx.doi.org/10.1016/j.artint.2009.11.010. Google ScholarDigital Library
- Choo, KKR. 2011. The cyber threat landscape: Challenges and future research directions, Computers & Security, Volume 30, Issue 8, Pages 719--731, ISSN 0167-4048, DOI: http://dx.doi.org/10.1016/j.cose.2011.08.004. Google ScholarDigital Library
Index Terms
- 1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web
Comments