skip to main content
10.1145/3018661.3022760acmconferencesArticle/Chapter ViewAbstractPublication PageswsdmConference Proceedingsconference-collections
abstract

1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web

Authors Info & Claims
Published:02 February 2017Publication History

ABSTRACT

The deliberate misuse of technical infrastructure (including the Web and social media) for cyber deviant and cybercriminal behaviour, ranging from the spreading of extremist and terrorism-related material to online fraud and cyber security attacks, is on the rise. This workshop aims to better understand such phenomena and develop methods for tackling them in an effective and efficient manner. The workshop brings together interdisciplinary researchers and experts in Web search, security informatics, social media analysis, machine learning, and digital forensics, with particular interests in cyber security. The workshop programme includes refereed papers, invited talks and a panel discussion for better understanding the current landscape, as well as the future of data mining for detecting cyber deviance.

References

  1. Chatfield, A. T., Reddick, C. G., and Brajawidagda, U. 2015. Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided Twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research. ACM. New York, NY, USA, 239--249. DOI: http://dx.doi.org/10.1145/2757401.2757408. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Burnap, P. and Williams, M. L. 2016. Us and them: identifying cyber hate on Twitter across multiple protected characteristics. EPJ Data Science, Volume 5, Issue 11. DOI: http://dx.doi.org/10.1140/epjds/s13688-016-0072-6. Google ScholarGoogle ScholarCross RefCross Ref
  3. Burnap, P., Javed, A., Rana, O. F. and Awan, M.S. 2015. Real-time Classification of Malicious URLs on Twitter using Machine Activity Data. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2015), ACM, New York, NY, USA, 970--977. DOI: http://dx.doi.org/10.1145/2808797.2809281. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Microsoft's approach to terrorist content online. Retrieved December 12, 2016, from Microsoft's official blog: https://blogs.microsoft.com/on-the-issues/2016/05/20/microsofts-approach-terrorist-content-online.Google ScholarGoogle Scholar
  5. Combating Violent Extremism. Retrieved December, 12, 2016, from Twitter's official blog: https://blog.twitter.com/2016/combating-violent-extremism.Google ScholarGoogle Scholar
  6. Partnering to Help Curb Spread of Online Terrorist Content. Retrieved December 12, 2016, from Facebook's newsroom. http://newsroom.fb.com/news/2016/12/partnering-to-help-curb-spread-of-online-terrorist-content/.Google ScholarGoogle Scholar
  7. Hendler, J. and Berners-Lee, T. 2010. From the Semantic Web to social machines: A research challenge for AI on the World Wide Web, Artificial Intelligence, Volume 174, Issue 2, Pages 156--161, ISSN 0004-3702, DOI: http://dx.doi.org/10.1016/j.artint.2009.11.010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Choo, KKR. 2011. The cyber threat landscape: Challenges and future research directions, Computers & Security, Volume 30, Issue 8, Pages 719--731, ISSN 0167-4048, DOI: http://dx.doi.org/10.1016/j.cose.2011.08.004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. 1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in
                  • Published in

                    cover image ACM Conferences
                    WSDM '17: Proceedings of the Tenth ACM International Conference on Web Search and Data Mining
                    February 2017
                    868 pages
                    ISBN:9781450346757
                    DOI:10.1145/3018661

                    Copyright © 2017 Owner/Author

                    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 2 February 2017

                    Check for updates

                    Qualifiers

                    • abstract

                    Acceptance Rates

                    WSDM '17 Paper Acceptance Rate80of505submissions,16%Overall Acceptance Rate498of2,863submissions,17%

                    Upcoming Conference

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader