Skip to main content

Search form

Social Networks

You are here

Home

"Social Media, Online Networks and the Preven ...

2014

In 2013, The SecDev Group undertook a 10-month Kanishka-funded project that set out, in part,  to explore methodologies and technologies for open source social media (OSSM) research and their potential utility for detecting weak signals of radicalization towards violent extremism online.

Read more

Detecting Online Extremist Networks Using Open Sou ...

2014

This research note summarizes experimental research conducted by The SecDev Group in 2013, as part of a Public Safety Canada, Kanishka-funded project looking at social media analytics and the prevention of violent extremism.

Read more

Detecting Toxic Content using Open Source Social M ...

2014

This experiment used the Twitter profile of a U.K. national, verified to be an active foreign fighter (FF) in the Syrian civil war, as the seed for constructing a network topology based on social media interactions.

Read more

Assessment of A Foreign Fighter’s Twitter Trajec ...

2014

This summary captures the main findings of a longitudinal content analysis of a known foreign fighter’s (FF) public social media activity for signs of radicalization toward violent extremism.

Read more

Review of Social Science Literature on Radicalizat ...

2014

This 2014 paper reviewed relevant empirical social science studies to gain perspective on two questions: 1) Are there accepted risk factors or indicators that signal increasing radicalization on the pathway to violent extremism?

Read more

Mining Communities and Their Relationships in Blog ...

October 2006

This article outlines a semi-automated approach for analyzing the content and structure of online hate groups active on blogging platforms.

Read more

Who Matters Online: Measuring Influence, Evaluatin ...

March 2013

This 2013 article focuses on identifying and measuring the influence of extremist accounts on Twitter, assessing extremist content, and determining ways to counter violent extremism (CVE) in online social networks.

Read more

Twitterrank: Finding Topic-Sensitive Influential T ...

2010

This article focuses on the problem of identifying influential Twitter users using Machine Learning (ML) techniques and Natural Language Processing (NLP).

Read more

Network Vulnerabilities and Strategic Intelligence ...

January 1991

This seminal 1991 article examines the strategic applications of network analysis methodologies for law enforcement.

Read more

Preliminary Analytical Considerations in Designing ...

2014

This 2014 paper presents a web-crawler called the Terrorism and Extremism Network Extractor (TENE), designed to gather information about extremist activities on the Internet.

Read more

Pages

  • 1
  • 2
  • 3
  • next ›
  • last »

About us


This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism

MORE

Contact info

+1-613-755-4007 •  info@secdev.foundation

Copyright © 2014 - 2017 • The SecDev Foundation

  • Home
  • The SecDev Foundation