This 2013 paper focuses on the modelling of terrorist networks online and addresses changes in technology and the associated creation of new security dynamics and threats.
This 2014 report by the International Centre for the Study of Radicalization and Political Violence (ICSR) presents the findings of a 12-month study on the social media profiles of 190 Western and European foreign fighters.
This paper discusses automated methods for detecting online radicalization and radical communities on various platforms, from websites, to forums, to social media platforms such as Facebook, YouTube, Twitter, and others.
This paper explores the use of crawling global social networking platforms to undercover previously unknown radicalized individuals. To prove the utility of this process the authors collect a YouTube dataset from a group that potentially has a radicalizing agenda.
This 2013 article analyzes content generated on Twitter during the attacks at the Boston Marathon in April 2013. The authors perform an in-depth characterization of what factors influenced malicious content and profiles becoming viral.
This 2012 paper develops a novel methodology for modeling cyber-collective social networks (CSMs) from individual, community, and transnational perspectives. The authors do this by utilizing existing collective action theories and computational approaches for social network analysis.
This 2014 paper utilizes a form of network representation that incorporates multiple data views to uncover and categorize networks of accounts that fall into four broadly defined groups in the Syrian conflict.
The article aims to build an unsupervised model to estimate relationship strength based on profile similarity and interaction activity.
This survey reviews the literature and concepts of the data mining of social networks, with special emphasis on their representation as a graph structure. The article is divided into two principal parts:
This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism