skip to main content
10.1145/3078897.3080534acmconferencesArticle/Chapter ViewAbstractPublication PagesmmConference Proceedingsconference-collections
research-article

Detection of Terrorism-related Twitter Communities using Centrality Scores

Authors Info & Claims
Published:06 June 2017Publication History

ABSTRACT

Social media are widely used among terrorists to communicate and disseminate their activities. User-to-user interaction (e.g. mentions, follows) leads to the formation of complex networks, with topology that reveals key-players and key-communities in the terrorism domain. Both the administrators of social media platforms and Law Enforcement Agencies seek to identify not only single users but groups of terrorism-related users so that they can reduce the impact of their information exchange efforts. To this end, we propose a novel framework that combines community detection with key-player identification to retrieve communities of terrorism-related social media users. Experiments show that most of the members of each retrieved key-community are already suspended by Twitter, violating its terms, and are hence associated with terrorism-oriented content with high probability.

References

  1. Ala Berzinji, Lisa Kaati, and Ahmed Rezine. 2012. Detecting key players in terrorist networks. In Intelligence and Security Informatics Conference (EISIC), 2012 European. IEEE, 297--302. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb- vre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 2008, 10 (2008), P10008.Google ScholarGoogle ScholarCross RefCross Ref
  3. Ludvig Bohlin, Daniel Edler, Andrea Lancichinetti, and Martin Rosvall. 2014. Community detection and visualization of networks with the map equation framework. In Measuring Scholarly Impact. Springer, 3--34.Google ScholarGoogle Scholar
  4. Phillip Bonacich and Paulette Lloyd. 2001. Eigenvector-like measures of centrality for asymmetric relations. Social networks 23, 3 (2001), 191.Google ScholarGoogle Scholar
  5. Sergey Brin and Lawrence Page. 2012. Reprint of: The anatomy of a large-scale hypertextual web search engine. Computer networks 56, 18 (2012), 3825--3833. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Akemi Takeoka Chatfield, Christopher G Reddick, and Uuf Brajawidagda. 2015. Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research. ACM, 239--249. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Aaron Clauset, Mark EJ Newman, and Cristopher Moore. 2004. Finding community structure in very large networks. Physical review E 70, 6 (2004), 066111.Google ScholarGoogle Scholar
  8. Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3 (2010), 75--174.Google ScholarGoogle Scholar
  9. Linton C Freeman. 1978. Centrality in social networks conceptual clarification. Social networks 1, 3 (1978), 215--239.Google ScholarGoogle Scholar
  10. Ilias Gialampoukidis, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kompatsiaris. 2016. Key player identification in terrorism-related social media networks using centrality measures. In European Intelligence and Security Informatics Conference (EISIC 2016), August. 17-19.Google ScholarGoogle ScholarCross RefCross Ref
  11. Ilias Gialampoukidis, Theodora Tsikrika, Stefanos Vrochidis, and Ioannis Kom- patsiaris. 2016. Community detection in complex networks based on DBSCAN* and a Martingale process. In Semantic and Social Media Adaptation and Personal- ization (SMAP), 2016 11th International Workshop on. IEEE, 1--6.Google ScholarGoogle Scholar
  12. Michelle Girvan and Mark EJ Newman. 2002. Community structure in social and biological networks. Proceedings of the national academy of sciences 99, 12 (2002), 7821--7826.Google ScholarGoogle ScholarCross RefCross Ref
  13. Steve Harenberg, Gonzalo Bello, L Gjeltema, Stephen Ranshous, Jitendra Harlalka, Ramona Seay, Kanchana Padmanabhan, and Nagiza Samatova. 2014. Community detection in large-scale networks: a survey and empirical evaluation. Wiley Interdisciplinary Reviews: Computational Statistics 6, 6 (2014), 426--439.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jytte Klausen. 2015. Tweeting the Jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism 38, 1 (2015), 1--22.Google ScholarGoogle ScholarCross RefCross Ref
  15. Valdis Krebs. 2002. Uncloaking terrorist networks. First Monday 7, 4 (2002).Google ScholarGoogle Scholar
  16. Fragkiskos D Malliaros and Michalis Vazirgiannis. 2013. Clustering and com- munity detection in directed networks: A survey. Physics Reports 533, 4 (2013), 95--142.Google ScholarGoogle ScholarCross RefCross Ref
  17. ME Newman and M Girvan. 2004. Finding and evaluating community structure in networks. Physical Review E 69, 2 (2004), 026113.Google ScholarGoogle ScholarCross RefCross Ref
  18. Tingyuan Nie, Zheng Guo, Kun Zhao, and Zhe-Ming Lu. 2016. Using mapping entropy to identify node centrality in complex networks. Physica A: Statistical Mechanics and its Applications 453 (2016), 290--297.Google ScholarGoogle Scholar
  19. Onook Oh, Manish Agrawal, and H Raghav Rao. 2011. Information control and terrorism: Tracking the Mumbai terrorist attack through twitter. Information Systems Frontiers 13, 1 (2011), 33--43. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Symeon Papadopoulos, Yiannis Kompatsiaris, Athena Vakali, and Ploutarchos Spyridonos. 2012. Community detection in social media. Data Mining and Knowledge Discovery 24, 3 (2012), 515--554. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Pascal Pons and Matthieu Latapy. 2006. Computing communities in large networks using random walks. J. Graph Algorithms Appl. 10, 2 (2006), 191--218.Google ScholarGoogle ScholarCross RefCross Ref
  22. Jialun Qin, Jennifer J Xu, Daning Hu, Marc Sageman, and Hsinchun Chen. 2005. Analyzing terrorist networks: A case study of the global salafi jihad network. In Intelligence and security informatics. Springer, 287--304. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Usha Nandini Raghavan, Réka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical Review E 76, 3 (2007), 036106.Google ScholarGoogle ScholarCross RefCross Ref
  24. Martin Rosvall, Daniel Axelsson, and Carl T Bergstrom. 2009. The map equation. The European Physical Journal Special Topics 178, 1 (2009), 13--23.Google ScholarGoogle ScholarCross RefCross Ref
  25. Martin Rosvall and Carl T Bergstrom. 2008. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences 105, 4 (2008), 1118--1123.Google ScholarGoogle ScholarCross RefCross Ref
  26. Sudhir Saxena, K Santhanam, and Aparna Basu. 2004. Application of social network analysis (SNA) to terrorist networks in Jammu & Kashmir. Strategic Analysis 28, 1 (2004), 84--101.Google ScholarGoogle ScholarCross RefCross Ref
  27. Robin L Thompson. 2011. Radicalization and the use of social media. Journal of strategic security 4, 4 (2011), 167.Google ScholarGoogle ScholarCross RefCross Ref
  28. Robyn Torok. 2010. "Make A Bomb In Your Mums Kitchen": Cyber Recruiting And Socialisation of "White Moors" and Home Grown Jihadists. (2010).Google ScholarGoogle Scholar
  29. Ines Von Behr. 2013. Radicalisation in the digital era: The use of the Internet in 15 cases of terrorism and extremism. (2013).Google ScholarGoogle Scholar
  30. Jie Xu, Daning Hu, and Hsinchun Chen. 2009. The dynamics of terrorist net- works: Understanding the survival mechanisms of Global Salafi Jihad. Journal of Homeland Security and Emergency Management 6, 1 (2009), 1--15Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Detection of Terrorism-related Twitter Communities using Centrality Scores

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              MFSec '17: Proceedings of the 2nd International Workshop on Multimedia Forensics and Security
              June 2017
              32 pages
              ISBN:9781450350341
              DOI:10.1145/3078897

              Copyright © 2017 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 6 June 2017

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              MFSec '17 Paper Acceptance Rate5of9submissions,56%Overall Acceptance Rate5of9submissions,56%

              Upcoming Conference

              MM '24
              MM '24: The 32nd ACM International Conference on Multimedia
              October 28 - November 1, 2024
              Melbourne , VIC , Australia

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader