2,519
Views
35
CrossRef citations to date
0
Altmetric
Articles

Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors

, &
Pages 39-59 | Received 22 Jan 2016, Accepted 21 Dec 2016, Published online: 18 Jan 2017

References

  • Abbasi, A., & Chen, H. (2005). Applying authorship analysis to extremist-group web forum messages. Intelligent Systems, 20(5), 67–75. doi: 10.1109/MIS.2005.81
  • Amble, J. C. (2012). Combating terrorism in the new media environment. Studies in Conflict and Terrorism, 35(5), 3–10. doi: 10.1080/1057610X.2012.666819
  • Apache Software Foundation. (2015). Welcome to apache OpenNLP. Retrieved from https://opennlp.apache.org/
  • Back, L. (2002). Aryans reading Adorno: Cyber-culture and twenty-first century racism. Ethnic and Racial Studies, 25(4), 628–651. doi: 10.1080/01419870220136664
  • Bermingham, A., Conway, M., McInerney, L., O’Hare, N., & Smeaton, A. F. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. Proceedings of the 2009 international conference on advances in Social Network Analysis Mining, Athens, Greece, pp. 231–236.
  • Bouchard, M., Joffres, K., & Frank, R. (2014). Preliminary analytical considerations in designing a terrorism and extremism online network extractor. In V. Mago & V. Dabbaghian (Eds.), Computational models of complex systems (pp. 171–184). New York, NY: Springer.
  • Bouchard, M., & Nash, R. (2015). Researching terrorism and counter-terrorism through a network lens. In M. Bouchard (Ed.), Social networks, terrorism and counter-terrorism: Radical and connected (pp. 48–60). New York, NY: Routledge.
  • Bowman-Grieve, L. (2009). Exploring “stormfront:” A virtual community of the radical right. Studies in Conflict and Terrorism, 32(11), 989–1007. doi: 10.1080/10576100903259951
  • Bowman-Grieve, L. (2013). A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment. Security Informatics, 2(9), 1–5.
  • Brown, I., & Korff, D. (2009). Terrorism and the proportionality of internet surveillance. European Journal of Criminology, 6(2), 119–134. doi: 10.1177/1477370808100541
  • Brynielsson, J., Horndahl, A., Johansson, F., Kaati, L., Martenson, C., & Svenson, P. (2012). Analysis of weak signals for detecting lone wolf terrorist. Proceedings of the European intelligence and security informatics conference, Odense, Denmark, pp. 197–204.
  • Burnap, P., Williams, M. L., Sloan, L., Rana, O., Housley, W., Edwards, A., … Voss, A. (2014). Tweeting the terror: Modelling the social media reaction to the Woolwich terrorist attack. Social Network Analysis and Mining, 4, 1–14. doi: 10.1007/s13278-014-0206-4
  • Campana, A., & Ducol, B. (2014). Voices of the “Caucasus emirate”: Mapping and analyzing north Caucasus insurgency websites. Terrorism and Political Violence. doi:10.1080/09546553.2013.848797
  • Chalothorn, T., & Ellman, J. (2012). Using SentiWordNet and sentiment analysis for detecting radical content on web forums. Proceedings of the 6th conference on software, knowledge, information management and application, Chengdu, China, pp. 9–11.
  • Chen, H. (2012). Dark Web: Exploring and data mining the dark side of the web. New York, NY: Springer.
  • Cohen, K., Johansson, F., Kaati, L., & Mork, J. (2014). Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence, 26(1), 246–256. doi: 10.1080/09546553.2014.849948
  • Conway, M. (2006). Terrorism and the internet: New media–new threat? Parliamentary Affairs, 59(2), 283–298. doi: 10.1093/pa/gsl009
  • Conway, M., & McInerney, L. (2008). Jihad video and auto-radicalisation: Evidence from an exploratory YouTube study. In D. Ortiz-Arroyo, H. L. Larsen, & D. Zeng (Eds.), Intelligence and security informatics: European conference, EuroISI 2008 (pp. 108–118). New York, NY: Springer.
  • Davies, G., Bouchard, M., Wu, E., Joffres, K., & Frank, R. (2015). Terrorist and extremist organizations’ use of the internet for recruitment. In M. Bouchard (Ed.), Social networks, terrorism and counter-terrorism: Radical and connected (pp. 105–127). New York, NY: Routledge.
  • Ducol, B. (2012). Uncovering the French-speaking jihadisphere: An exploratory analysis. Media, War & Conflict, 5(1), 51–70. doi: 10.1177/1750635211434366
  • Feldman, R. (2013). Techniques and applications for sentiment analysis. Communications of the ACM, 56(4), 82–89. doi: 10.1145/2436256.2436274
  • Ferraro, J., Daumé, H., Duvall, S., Chapman, W., Harkema, H., & Haug, P. (2013). Improving performance of natural language processing part-of-speech tagging on clinical narratives through domain adaptation. American Medical Information Association, 20(5), 931–939. doi: 10.1136/amiajnl-2012-001453
  • Frank, R., Bouchard, M., Davies, G., & Mei, J. (2015). Spreading the message digitally: A look into extremist content on the internet. In R. G. Smith, R. C.-C. Cheung, & L. Y.-C. Lau (Eds.), Cybercrime risks and responses: Eastern and western perspectives (pp. 130–145). London: Palgrave Macmillian.
  • Fu, T., Abbasi, A., & Chen, H. (2010). A focused crawler for Dark Web forums. Journal of American Society for Information Science and Technology, 61(6), 1213–1231.
  • Galvin, T. (2010, February 8). Amnesty international doubles down on appeasement. The National Post. Retrieved from http://oped.ca/National-Post/terry-glavin-amnesty-international-doubles-down-on-appeasement/
  • Gawaher. (2015). Islamic forum. Retrieved from http://www.gawaher.com
  • Ghiassi, M., Skinner, J., & Zimbra, D. (2013). Twitter brand sentiment analysis: A hybrid system using n-gram analysis and dynamic artificial neutral network. Expert Systems with Applications, 40(16), 6266–6282. doi: 10.1016/j.eswa.2013.05.057
  • Hegghammer, T. (2014). Interpersonal trust on Jihadi internet forums. Retrieved from http://hegghammer.com/_files/Interpersonal_trust.pdf
  • Hu, M., & Bing, L. (2004). Mining and summarizing customer reviews. Proceedings of the ACM SIGKDD international conference on knowledge discovery and data mining, Seattle, Washington.
  • Internet Live Stats. (2016). Total number of websites. Retrieved from http://www.internetlivestats.com/total-number-of-websites/
  • Internet World Stats. (2016). Internet growth statistics. Retrieved from http://www.internetworldstats.com/emarketing.htm
  • ISI-ICDM Workshop on Intelligence and Security Informatics Challenge. (2015). Challenge. Retrieved from http://cci.drexel.edu/isi/isi-icdm2015/challenge.html
  • Islamic Network. (2015). Our mission. Retrieved from http://www.islamicnetwork.net/our-mission/
  • Kennedy, J., & Weimann, G. (2011). The strength of weak terrorist ties. Terrorism and Political Violence, 23(2), 201–212. doi: 10.1080/09546553.2010.521087
  • Klausen, J. (2015). Tweeting the jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict and Terrorism, 38(1), 1–22. doi: 10.1080/1057610X.2014.974948
  • Klausen, J., Barbieri, E. T., Reichlin-Melnick, A., & Zelin, A. Y. (2012). The YouTube jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53.
  • Meddaugh, P. M., & Kay, J. (2009). Hate speech or ‘reasonable racism?’ The other in stormfront. Journal of Mass Media Ethics, 24(4), 251–268. doi: 10.1080/08900520903320936
  • Mei, J., & Frank, R. (2015). Sentiment crawling: Extremist content collection through a sentiment analysis guided web-crawler. Proceedings of the international symposium on foundations of open source Intelligence and Security Informatics, Paris, France, pp. 1024–1027.
  • Murray, D., & Simcox, R. (2014, July 21). The evidence shows that cage is a pro-terrorist group. The Telegraph. Retrieved from http://www.telegraph.co.uk/news/uknews/law-and-order/10981050/The-evidence-shows-that-Cage-is-a-pro-terrorist-group.html
  • Nauta, A. (2013). Radical Islam, globalisation and social media: Martyrdom videos on the internet. In M. Gillespie, D. E. J. Herbert, & A. Greenhill (Eds.), Social media and religious change (pp. 121–142). Hawthorne, NY: Walter de Gruyter.
  • Neumann, P., & Rogers, B. (2007). Recruitment and mobilisation for the Islamist Militant Movement in Europe. King’s College London for the European Commission (Directorate General Justice, Freedom and Security).
  • Reid, E., & Chen, H. (2007). Internet-savvy U.S. and Middle East extremist groups. Mobilization: An International Quarterly Review, 12(2), 177–192.
  • Reid, E., Qin, J., Zhou, Y., Lai, G., Sageman, M., Weimann, G., & Chen, H. (2005). Collecting and analyzing the presence of terrorists on the web: A case study of jihad websites. Proceedings of the IEEE international conference on intelligence and security informatics, Atlanta, GA.
  • Rogan, A. (2006). Jihadism online – a study of how Al-Qaida and radical Islamist groups use the internet for terrorist purposes. FFI Rapport.
  • Rucker, P., & Tate, J. (2009, December 29). In online posts apparently by Detroit suspect, religious ideals collide. The Washington Post. Retrieved from http://www.washingtonpost.com/wp-dyn/content/article/2009/12/28/AR2009122802492.html
  • Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia: University of Pennsylvania Press.
  • Sageman, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26(4), 565–580. doi: 10.1080/09546553.2014.895649
  • Schafer, J. A. (2002). Spinning the web of hate: Web-based propagation by extremist organization. Journal of Criminal Justice and Popular Culture, 9(2), 69–88.
  • Seib, P., & Janbek, D. M. (2011). Global terrorism and new media: The post-al Qaeda generation. London: Routledge.
  • Spencer, R. (2004, March 20). Jihad at Islamicawakening.com. Jihad Watch. Retrieved from http://www.jihadwatch.org/2004/03/jihad-at-islamicawakeningcom
  • Stevens, T., & Neumann, P. R. (2009). Countering online radicalisation: A strategy for action. London: International Centre for the Study of Radicalisation and Political Violence.
  • Thelwall, M., & Buckley, K. (2013). Topic-based sentiment analysis for the social web: The role of mood and issue-related words. Journal of the American Society for Information Science and Technology, 64(8), 1608–1617. doi: 10.1002/asi.22872
  • Thet, T., Na, J., & Khoo, C. (2010). Aspect-based sentiment analysis of movie reviews on discussion board. Journal of Information Science, 36(6), 823–848. doi: 10.1177/0165551510388123
  • Thiesmeyer, L. (1999). Racism on the web: Its rhetoric and marketing. Ethics and Information Technology, 1(2), 117–125. doi: 10.1023/A:1010090811116
  • Thomas, T. L. (2003). Al Qaeda and the internet: The danger of “cyberplanning”. Parameters, 33(1), 112–123.
  • Torres-Soriano, M. R. (2013). The dynamics of the creation, evolution, and disappearance of terrorist internet forums. International Journal of Conflict and Violence, 7(1), 164–178.
  • Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the internet. Studies in Conflict and Terrorism, 25(5), 317–332. doi: 10.1080/10576100290101214
  • Turn to Islam. (2015a). About us. Retrieved from http://turntoislam.com/about/
  • Turn to Islam. (2015b). Salamyou Muslim social network. Retrieved from http://turntoislam.com
  • Weimann, G. (2004). www.terror.net: How modern terrorism uses the internet (United States Institute of Peace (USIP) Special Report, 116, pp. 1–12).
  • Weimann, G. (2006). Virtual disputes: The use of the internet for terrorist debates. Studies in Conflict and Terrorism, 29(7), 623–639. doi: 10.1080/10576100600912258
  • Weimann, G. (2008). The psychology of mass-mediated terrorism. American Behavioral Scientist, 52(1), 69–86. doi: 10.1177/0002764208321342
  • Weimann, G. (2010). Terror on Facebook, Twitter, and YouTube. Brown Journal of World Affairs, 16(2), 45–54.
  • Whine, M. (1999). Cyberspace – a new medium for communication, command, and control by extremists. Studies in Conflict and Terrorism, 22(3), 231–245. doi: 10.1080/105761099265748
  • Zhang, Y., Zeng, S., Huang, C.-N., Fan, L., Yu, X., Dang, Y., … Chen, H. (2010). Developing a Dark Web collection and infrastructure for computational and social sciences. Proceedings of the 2010 IEEE international conference on Intelligence and Security Informatics, Atlanta, GA.
  • Zhou, Y., Qin, J., Lai, G., Reid, E., & Chen, H. (2005). Building knowledge management system for researching terrorist groups on the web. Proceedings of the 11th Americas conference on information systems, Omaha, NE.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.