ABSTRACT
Social media are widely used among terrorists to communicate and disseminate their activities. User-to-user interaction (e.g. mentions, follows) leads to the formation of complex networks, with topology that reveals key-players and key-communities in the terrorism domain. Both the administrators of social media platforms and Law Enforcement Agencies seek to identify not only single users but groups of terrorism-related users so that they can reduce the impact of their information exchange efforts. To this end, we propose a novel framework that combines community detection with key-player identification to retrieve communities of terrorism-related social media users. Experiments show that most of the members of each retrieved key-community are already suspended by Twitter, violating its terms, and are hence associated with terrorism-oriented content with high probability.
- Ala Berzinji, Lisa Kaati, and Ahmed Rezine. 2012. Detecting key players in terrorist networks. In Intelligence and Security Informatics Conference (EISIC), 2012 European. IEEE, 297--302. Google ScholarDigital Library
- Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb- vre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 2008, 10 (2008), P10008.Google ScholarCross Ref
- Ludvig Bohlin, Daniel Edler, Andrea Lancichinetti, and Martin Rosvall. 2014. Community detection and visualization of networks with the map equation framework. In Measuring Scholarly Impact. Springer, 3--34.Google Scholar
- Phillip Bonacich and Paulette Lloyd. 2001. Eigenvector-like measures of centrality for asymmetric relations. Social networks 23, 3 (2001), 191.Google Scholar
- Sergey Brin and Lawrence Page. 2012. Reprint of: The anatomy of a large-scale hypertextual web search engine. Computer networks 56, 18 (2012), 3825--3833. Google ScholarDigital Library
- Akemi Takeoka Chatfield, Christopher G Reddick, and Uuf Brajawidagda. 2015. Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research. ACM, 239--249. Google ScholarDigital Library
- Aaron Clauset, Mark EJ Newman, and Cristopher Moore. 2004. Finding community structure in very large networks. Physical review E 70, 6 (2004), 066111.Google Scholar
- Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3 (2010), 75--174.Google Scholar
- Linton C Freeman. 1978. Centrality in social networks conceptual clarification. Social networks 1, 3 (1978), 215--239.Google Scholar
- Ilias Gialampoukidis, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. 2016. Key player identification in terrorism-related social media networks using centrality measures. In European Intelligence and Security Informatics Conference (EISIC 2016), August. 17-19.Google ScholarCross Ref
- Ilias Gialampoukidis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kom- patsiaris. 2016. Community detection in complex networks based on DBSCAN* and a Martingale process. In Semantic and Social Media Adaptation and Personal- ization (SMAP), 2016 11th International Workshop on. IEEE, 1--6.Google Scholar
- Michelle Girvan and Mark EJ Newman. 2002. Community structure in social and biological networks. Proceedings of the national academy of sciences 99, 12 (2002), 7821--7826.Google ScholarCross Ref
- Steve Harenberg, Gonzalo Bello, L Gjeltema, Stephen Ranshous, Jitendra Harlalka, Ramona Seay, Kanchana Padmanabhan, and Nagiza Samatova. 2014. Community detection in large-scale networks: a survey and empirical evaluation. Wiley Interdisciplinary Reviews: Computational Statistics 6, 6 (2014), 426--439.Google ScholarDigital Library
- Jytte Klausen. 2015. Tweeting the Jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism 38, 1 (2015), 1--22.Google ScholarCross Ref
- Valdis Krebs. 2002. Uncloaking terrorist networks. First Monday 7, 4 (2002).Google Scholar
- Fragkiskos D Malliaros and Michalis Vazirgiannis. 2013. Clustering and com- munity detection in directed networks: A survey. Physics Reports 533, 4 (2013), 95--142.Google ScholarCross Ref
- ME Newman and M Girvan. 2004. Finding and evaluating community structure in networks. Physical Review E 69, 2 (2004), 026113.Google ScholarCross Ref
- Tingyuan Nie, Zheng Guo, Kun Zhao, and Zhe-Ming Lu. 2016. Using mapping entropy to identify node centrality in complex networks. Physica A: Statistical Mechanics and its Applications 453 (2016), 290--297.Google Scholar
- Onook Oh, Manish Agrawal, and H Raghav Rao. 2011. Information control and terrorism: Tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers 13, 1 (2011), 33--43. Google ScholarDigital Library
- Symeon Papadopoulos, Yiannis Kompatsiaris, Athena Vakali, and Ploutarchos Spyridonos. 2012. Community detection in social media. Data Mining and Knowledge Discovery 24, 3 (2012), 515--554. Google ScholarDigital Library
- Pascal Pons and Matthieu Latapy. 2006. Computing communities in large networks using random walks. J. Graph Algorithms Appl. 10, 2 (2006), 191--218.Google ScholarCross Ref
- Jialun Qin, Jennifer J Xu, Daning Hu, Marc Sageman, and Hsinchun Chen. 2005. Analyzing terrorist networks: A case study of the global salafi jihad network. In Intelligence and security informatics. Springer, 287--304. Google ScholarDigital Library
- Usha Nandini Raghavan, Réka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical Review E 76, 3 (2007), 036106.Google ScholarCross Ref
- Martin Rosvall, Daniel Axelsson, and Carl T Bergstrom. 2009. The map equation. The European Physical Journal Special Topics 178, 1 (2009), 13--23.Google ScholarCross Ref
- Martin Rosvall and Carl T Bergstrom. 2008. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences 105, 4 (2008), 1118--1123.Google ScholarCross Ref
- Sudhir Saxena, K Santhanam, and Aparna Basu. 2004. Application of social network analysis (SNA) to terrorist networks in Jammu & Kashmir. Strategic Analysis 28, 1 (2004), 84--101.Google ScholarCross Ref
- Robin L Thompson. 2011. Radicalization and the use of social media. Journal of strategic security 4, 4 (2011), 167.Google ScholarCross Ref
- Robyn Torok. 2010. "Make A Bomb In Your Mums Kitchen": Cyber Recruiting And Socialisation of "White Moors" and Home Grown Jihadists. (2010).Google Scholar
- Ines Von Behr. 2013. Radicalisation in the digital era: The use of the Internet in 15 cases of terrorism and extremism. (2013).Google Scholar
- Jie Xu, Daning Hu, and Hsinchun Chen. 2009. The dynamics of terrorist net- works: Understanding the survival mechanisms of Global Salafi Jihad. Journal of Homeland Security and Emergency Management 6, 1 (2009), 1--15Google ScholarCross Ref
Index Terms
- Detection of Terrorism-related Twitter Communities using Centrality Scores
Recommendations
Finding news-topic oriented influential twitter users based on topic related hashtag community detection
Recently, more and more users would like to collect and provide information about news topics in Twitter, which is one of the most popular microblogging services. Virtual communities defined by hashtags in Twitter are created for exchanging information ...
Measuring influence on Twitter
i-KNOW '11: Proceedings of the 11th International Conference on Knowledge Management and Knowledge TechnologiesThere are currently over 175 million Twitter accounts worldwide, making Twitter one of the most popular and most observed Social Media platform. But Twitter is not so much a social network where the exchange of personal information is facilitated -- in ...
Celebrity's self-disclosure on Twitter and parasocial relationships
This study investigated how celebrities' self-disclosure on personal social media accounts, particularly Twitter, affects fans' perceptions. An online survey was utilized among a sample of 429 celebrity followers on Twitter. Results demonstrated that ...
Comments