Please wait a minute...
Data Analysis and Knowledge Discovery  2018, Vol. 2 Issue (10): 2-8    DOI: 10.11925/infotech.2096-3467.2018.0742
Current Issue | Archive | Adv Search |
Review of Techniques Detecting Online Extremism and Radicalization
Wang Xin(), Feng Wen’gang
School of Criminal Investigation and Counter Terrorism, People’s Public Security University of China, Beijing 100038, China
Research Center for Public Security Intelligence, People’s Public Security University of China, Beijing 100038, China
Download: PDF (450 KB)   HTML ( 7
Export: BibTeX | EndNote (RIS)      
Abstract  

[Objective] This paper reviews the technical solutions for detecting online extremism and radicalization. [Methods] First, we retrieved the needed literature by conducting keyword search with several popular academic databases. Then, we reviewed these papers and summarized their theoretical frameworks, data sources, labelling method, and algorithms. [Results] Researchers have obtained insights from the latest psychology and sociology studies, which helped them refine the detection indicators and methods. The two popular techniques used in this field were based on lexicon method and machine learning algorithm. Although machine-learning methods had the advantages of better accuracy and faster speed, it is very hard for us to construct the training data sets. [Limitations] We did not compare the effectiveness of different solutions. [Conclusions] The reviewed techniques are still developing and more quantitative research is required to analyze the radicalization process. We need to co-operate with sociology and psychology researchers to develop new models and better training data sets.

Key wordsKnowledge Discovery      Machine Learning      Radicalization      Extremism     
Received: 09 July 2018      Published: 12 November 2018
ZTFLH:  TP393 G35  

Cite this article:

Wang Xin,Feng Wen’gang. Review of Techniques Detecting Online Extremism and Radicalization. Data Analysis and Knowledge Discovery, 2018, 2(10): 2-8.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.2096-3467.2018.0742     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2018/V2/I10/2

类别 方法
Lexicon based Rule-based, Statistic-based
Machine learning SVM, KNN, Adaboost/Decision Tree, Na?ve Bayes, Logistic Regression, Random Forest
[1] 王飞跃, 王珏. 情报与安全信息学研究的现状与展望[J]. 中国基础科学, 2005, 7(2): 24-29.
doi: 10.3969/j.issn.1009-2412.2005.02.005
[1] (Wang Feiyue, Wang Jue.Intelligence and Security Informatics: The State of the Art and Outlook[J]. China Basic Science, 2005, 7(2): 24-29.)
doi: 10.3969/j.issn.1009-2412.2005.02.005
[2] Locicero A.Why “Good Kids” Turn into Deadly Terrorists: Deconstructing the Accused Boston Marathon Bombers and Others Like Them[M]. Santa Barbara: Praeger, 2014: 37-53.
[3] Borum R.Radicalization into Violent Extremism II: A Review of Conceptual Models and Empirical Research[J]. Journal of Strategic Security, 2011, 4(4): 37-62.
doi: 10.5038/1944-0472.4.4.2
[4] Kundnani A.Radicalisation: The Journey of a Concept[J]. Race & Class, 2012, 54(2): 3-25.
[5] Torok R.Developing an Explanatory Model for the Process of Online Radicalisation and Terrorism[J]. Security Informatics, 2013, 2(1): 1-10.
doi: 10.1186/2190-8532-2-1
[6] UK Government.CONTEST: UK Strategy for Countering Terrorism[R]. 2011.
[7] Argomaniz J.European Union Responses to Terrorist Use of the Internet[J]. Cooperation and Conflict, 2014, 50(2): 250-268.
[8] Brussels. A Europe that Protects: Commission Reinforces EU Response to Illegal Content Online[EB/OL]. [2018-04-01]. .
[9] Berger J M, Morgan J.The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter[A]// The Brookings Project on U.S. Relations with the Islamic World[M]. The Brookings Institution. https://www.brookings. edu/wp-content/uploads/2016/06/isis_Twitter_census_berger_morgan.pdf.
[10] Correa D, Sureka A.Solutions to Detect and Analyze Online Radicalization: A Survey[OL]. arXiv Preprint. arXiv: 1301.4916.
[11] Agarwal S, Sureka A.Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats[OL]. arXiv Preprint. arXiv: 1511.06858.
[12] Last M, Markov A, Kandel A.Multi-lingual Detection of Terrorist Content on the Web[M]. Berlin, Heidelberg: Springer, 2006: 16-30.
[13] Huang C, Fu T, Chen H.Text-based Video Content Classification for Online Video-sharing Sites[J]. Journal of the Association for Information Science and Technology, 2010, 61(5): 891-906.
[14] Greevy E, Smeaton A F.Classifying Racist Texts Using a Support Vector Machine[C]// Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. 2004: 468-469.
[15] Fu T, Huang C N, Chen H.Identification of Extremist Videos in Online Video Sharing Sites[C]// Proceedings of the 2009 IEEE International Conference on Intelligence and Security Informatics. 2009: 179-181.
[16] Scanlon J R, Gerber M S.Automatic Detection of Cyber- recruitment By Violent Extremists[J]. Security Informatics, 2014, 3(1): 5.
doi: 10.1186/s13388-014-0005-5
[17] Agarwal S, Sureka A.Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter[C]// Proceedings of the 11th International Conference on Distributed Computing and Internet Technology. 2015: 431-442.
[18] Badjatiya P, Gupta,M S, Gupta M, et al. Deep Learning for Hate Speech Detection in Tweets[C]//Proceedings of the 26th International Conference on World Wide Web Companion. 2017: 759-760.
[19] Behr I V, Reding A, Edwards C, et al.Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism[R]. Rand Corporation, 2013.
[20] Azizan S A, Aziz I A.Terrorism Detection Based Sentiment Analysis Using Machine Learning[J]. Journal of Engineering and Applied Sciences, 2017, 12(3): 691-698.
[21] Ferrara E, Wang W Q, Varol O, et al.Predicting Online Extremism, Content Adopters, and Interaction Reciprocity[C]// Proceedings of the 2016 International Conference on Social Informatics. Springer, 2016: 22-39.
[22] Lara-Cabrera R, Pardo A G, Benouaret K, et al.Measuring the Radicalisation Risk in Social Networks[J]. IEEE Access, 2017(5): 10892-10900.
[23] Saidi F, Trabelsi Z, Salah K, et al.Approaches to Analyze Cyber Terrorist Communities: Survey and Challenges[J]. Computer and Security, 2017, 66: 66-80.
doi: 10.1016/j.cose.2016.12.017
[24] Benigni M C, Joseph K, Carley K M.Online Extremism and the Communities that Sustain It: Detecting the ISIS Supporting Community on Twitter[J]. PLoS ONE, 2017, 12(12): e0181405.
doi: 10.1371/journal.pone.0181405 pmid: 29194446
[25] Wadhwa P, Bhatia M P S. Tracking On-line Radicalization Using Investigative Data Mining[C]// Proceedings of the 2013 National Conference on Communications. 2013: 1-5.
[26] Ross B, Rist M, Carbonell G, et al.Measuring the Reliability of Hate Speech Annotations: The Case of the European Refugee Crisi[OL]. arXiv Preprint. arXiv:1701.08118.
[27] Waseem Z.Are You a Racist or am I Seeing Things? Annotator Influence on Hate Speech Detection on Twitter[C]// Proceedings of the 2016 EMNLP Workshop on Natural Language Processing and Computational Social Science. 2016: 138-142.
[28] Waseem Z, Hovy D.Hateful Symbols or Hateful People? Predictive Features for Hate Speech Detection on Twitter[C]// Proceedings of the 2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. 2016: 88-93.
[29] Gitari N D, Zuping Z, Damien H, et al.A Lexicon-based Approach for Hate Speech Detection[J]. International Journal of Multimedia and Ubiquitous Engineering, 2015, 10(4): 215-230.
[30] Thakkar H, Patel D.Approaches for Sentiment Analysis on Twitter: A State-of-Art Study[OL]. arXiv Preprint. arXiv: 1512.01043.
[31] Medhat W, Hassan A, Korashy H.Sentiment Analysis Algorithms and Applications: A Survey[J]. Ain Shams Engineering Journal, 2014, 5(4): 1093-1113.
doi: 10.1016/j.asej.2014.04.011
[1] Wang Hanxue,Cui Wenjuan,Zhou Yuanchun,Du Yi. Identifying Pathogens of Foodborne Diseases with Machine Learning[J]. 数据分析与知识发现, 2021, 5(9): 54-62.
[2] Chen Donghua,Zhao Hongmei,Shang Xiaopu,Zhang Runtong. Optimizing Large Hospital Operating Rooms with Data Analytics[J]. 数据分析与知识发现, 2021, 5(9): 115-128.
[3] Che Hongxin,Wang Tong,Wang Wei. Comparing Prediction Models for Prostate Cancer[J]. 数据分析与知识发现, 2021, 5(9): 107-114.
[4] Su Qiang, Hou Xiaoli, Zou Ni. Predicting Surgical Infections Based on Machine Learning[J]. 数据分析与知识发现, 2021, 5(8): 65-75.
[5] Cao Rui,Liao Bin,Li Min,Sun Ruina. Predicting Prices and Analyzing Features of Online Short-Term Rentals Based on XGBoost[J]. 数据分析与知识发现, 2021, 5(6): 51-65.
[6] Zhong Jiawa,Liu Wei,Wang Sili,Yang Heng. Review of Methods and Applications of Text Sentiment Analysis[J]. 数据分析与知识发现, 2021, 5(6): 1-13.
[7] Xiang Zhuoyuan,Liu Zhicong,Wu Yu. Adaptive Recommendation Model Based on User Behaviors[J]. 数据分析与知识发现, 2021, 5(4): 103-114.
[8] Dai Bing,Hu Zhengyin. Review of Studies on Literature-Based Discovery[J]. 数据分析与知识发现, 2021, 5(4): 1-12.
[9] Chai Guorong,Wang Bin,Sha Yongzhong. Public Health Risk Forecasting with Multiple Machine Learning Methods Combined:Case Study of Influenza Forecasting in Lanzhou, China[J]. 数据分析与知识发现, 2021, 5(1): 90-98.
[10] Chen Dong,Wang Jiandong,Li Huiying,Cai Sihang,Huang Qianqian,Yi Chengqi,Cao Pan. Forecasting Poultry Turnovers with Machine Learning and Multiple Factors[J]. 数据分析与知识发现, 2020, 4(7): 18-27.
[11] Liang Ye,Li Xiaoyuan,Xu Hang,Hu Yiran. CLOpin: A Cross-Lingual Knowledge Graph Framework for Public Opinion Analysis and Early Warning[J]. 数据分析与知识发现, 2020, 4(6): 1-14.
[12] Yang Heng,Wang Sili,Zhu Zhongming,Liu Wei,Wang Nan. Recommending Domain Knowledge Based on Parallel Collaborative Filtering Algorithm[J]. 数据分析与知识发现, 2020, 4(6): 15-21.
[13] Hu Zhengyin,Liu Leilei,Dai Bing,Qin Xiaochu. Discovering Subject Knowledge in Life and Medical Sciences with Knowledge Graph[J]. 数据分析与知识发现, 2020, 4(11): 1-14.
[14] Wang Shuyi,Liu Sai,Ma Zheng. Microblog Image Privacy Classification with Deep Transfer Learning[J]. 数据分析与知识发现, 2020, 4(10): 80-92.
[15] Ruojia Wang,Lu Zhang,Jimin Wang. Automatic Triage of Online Doctor Services Based on Machine Learning[J]. 数据分析与知识发现, 2019, 3(9): 88-97.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn