This article studied a selection of right-wing extremist (RWE) groups on Twitter. The authors looked at particular language-based networks as case studies, collecting Twitter data for groups across eight countries.
This article focuses on the use of linguistic “weak signals”—digital traces of intent—in social media as a tool of counterterrorism aimed at preventing lone-wolf attacks.
The authors of this article propose a methodology for automatically identifying events and their associated user-contributed social media documents (such as those posted on Flickr, YouTube, and Facebook) to enable event browsing and search in state-of-the-art search engines.
This paper examines approaches for analyzing Twitter messages to distinguish between those covering real-world events and non-event messages. To validate this work the authors applied their process to 2.6 million Twitter messages.
This article is an update of the September 2014 conference presentation given at the 2014 Advances in Databases and Information Systems Conference (ADBIS 2014). The article focuses on the detection of communities within Online Social Networks.
This is a slideshow of the June 2011 lecture on the topic of community detection using graphs with a focus on Social Media applications.
This short article is the Research Brief for the full report: “Lights, Camera, Jihad: Al-Shabaab’s Western Media Strategy”, which is also available in this Portal.
This 2010 post focuses on the distance between nodes within social networks and particularly those with disconnected components. Key node centrality is defined by the author as the inverse of farness, and in turn, the sum of distances to all other nodes within a given network structure.
This 2013 paper focuses on measuring relationship strength on Facebook based on user’s activities and profile information. The authors critique social network research focused on friendship networks.
This 2012 article focuses on the detection of hidden relationship structures in online social networks including the characteristics of relationship structures on Facebook. The authors argue that graphs fail to capture the finer qualities of online social network relationships.
This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism
+1-613-755-4007 • info@secdev.foundation
Copyright © 2014 - 2017 • The SecDev Foundation