• Sonmez E and Seckin Codal K. (2024). Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approach. Security Journal. 10.1057/s41284-024-00421-9. 37:4. (1360-1381). Online publication date: 1-Dec-2024.

    https://link.springer.com/10.1057/s41284-024-00421-9

  • Liu Z, Luo C and Lu J. (2023). Hate speech in the Internet context: Unpacking the roles of Internet penetration, online legal regulation, and online opinion polarization from a transnational perspective. Information Development. 10.1177/02666669221148487. 40:4. (533-549). Online publication date: 1-Nov-2024.

    https://journals.sagepub.com/doi/10.1177/02666669221148487

  • Mussiraliyeva S, Baisylbayeva K, Bolatbek M and Yeltay Z. (2024). Decoding Ideology: Machine Learning-Based Detection of Extremist Content 2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS). 10.1109/ICCNS62192.2024.10776480. 979-8-3503-5469-0. (114-120).

    https://ieeexplore.ieee.org/document/10776480/

  • Runge E. (2024). Israel, Palästina und Bilder-Fragen. kommunikation@gesellschaft. 10.15460/kommges.2024.25.1.1413. 25:1.

    https://journals.sub.uni-hamburg.de/hup2/kommges/article/view/1413

  • Risius M, Blasiak K, Wibisono S and Louis W. (2023). The digital augmentation of extremism: Reviewing and guiding online extremism research from a sociotechnical perspective. Information Systems Journal. 10.1111/isj.12454. 34:3. (931-963). Online publication date: 1-May-2024.

    https://onlinelibrary.wiley.com/doi/10.1111/isj.12454

  • Sen A, De S and Pal J. (2024). Networks and Influencers in Online Propaganda Events: A Comparative Study of Three Cases in India. Proceedings of the ACM on Human-Computer Interaction. 8:CSCW1. (1-27). Online publication date: 17-Apr-2024.

    https://doi.org/10.1145/3653709

  • Müller V and Gries T. (2024). Ideology and the Microfoundations of Conflict

    https://academic.oup.com/book/55900

  • Me G and Mucci M. (2024). Identifying Daesh-Related Propaganda Using OSINT and Clustering Analysis. Cybersecurity Challenges in the Age of AI, Space Communications and Cyborgs. 10.1007/978-3-031-47594-8_6. (97-146).

    https://link.springer.com/10.1007/978-3-031-47594-8_6

  • Tundis A, Shams A and Mühlhäuser M. (2023). From the detection towards a pyramidal classification of terrorist propaganda. Journal of Information Security and Applications. 10.1016/j.jisa.2023.103646. 79. (103646). Online publication date: 1-Dec-2023.

    https://linkinghub.elsevier.com/retrieve/pii/S2214212623002302

  • Sharma S. (2024). Online Radicalisation: How Social Media Is Promoting Islamist Militancy. South Asian Survey. 10.1177/09715231231218822. 30:2. (189-209). Online publication date: 1-Sep-2023.

    http://journals.sagepub.com/doi/10.1177/09715231231218822

  • Tulga A. Comparison of Turkish and English-Speaking ISIS Sympathizers’ Twitter Content between 2015 and 2016. Innovation in the Social Sciences. 10.1163/27730611-bja10013. 1:2. (234-262).

    https://brill.com/view/journals/iss/1/2/article-p234_2.xml

  • Walk E, Garimella K and Christia F. (2023). Displacement and return in the internet Era: Social media for monitoring migration decisions in Northern Syria. World Development. 10.1016/j.worlddev.2023.106268. 168. (106268). Online publication date: 1-Aug-2023.

    https://linkinghub.elsevier.com/retrieve/pii/S0305750X23000864

  • Rabiei Zadeh A. (2023). Artificial Intelligence and Modern Information Technologies Applications in Islamic Sciences: A Survey. International Journal on Perceptive and Cognitive Computing. 10.31436/ijpcc.v9i2.403. 9:2. (48-61).

    https://journals.iium.edu.my/kict/index.php/IJPCC/article/view/403

  • Yumitro G, Febriani R, Roziqin A and Indraningtyas A. (2023). Bibliometric analysis of international publication trends on social media and terrorism by using the Scopus database. Frontiers in Communication. 10.3389/fcomm.2023.1140461. 8.

    https://www.frontiersin.org/articles/10.3389/fcomm.2023.1140461/full

  • Ikwu R, Giommoni L, Javed A, Burnap P and Williams M. (2023). Digital fingerprinting for identifying malicious collusive groups on Twitter. Journal of Cybersecurity. 10.1093/cybsec/tyad014. 9:1. Online publication date: 5-Jan-2023.

    https://academic.oup.com/cybersecurity/article/doi/10.1093/cybsec/tyad014/7240368

  • Gaikwad M, Ahirrao S, Phansalkar S, Kotecha K, Rani S and Putzu L. (2023). Multi-Ideology, Multiclass Online Extremism Dataset, and Its Evaluation Using Machine Learning. Computational Intelligence and Neuroscience. 2023. Online publication date: 1-Jan-2023.

    https://doi.org/10.1155/2023/4563145

  • Saal J and Liedhegener A. (2023). Dark Social Capital und dschihadistische Radikalisierung in Deutschland. Eine Netzwerkanalyse. Gesellschaftliche Ausgangsbedingungen für Radikalisierung und Co-Radikalisierung. 10.1007/978-3-658-40559-5_12. (399-440).

    https://link.springer.com/10.1007/978-3-658-40559-5_12

  • Salaam C and Rawat D. (2022). Terrorism Detection and Approaches to Fairness: A Brief Literature Review 2022 IEEE Global Humanitarian Technology Conference (GHTC). 10.1109/GHTC55712.2022.9910986. 978-1-6654-5097-3. (277-282).

    https://ieeexplore.ieee.org/document/9910986/

  • Karakuş M and Ak Ö. (2022). Pornification of the Cyberspace During Intrastate Conflicts. Fighting for Empowerment in an Age of Violence. 10.4018/978-1-6684-4964-6.ch011. (189-210).

    https://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-6684-4964-6.ch011

  • Wang S, Edgerton J and Hoevel P. (2022). Resilience to stress in bipartite networks: application to the Islamic State recruitment network. Journal of Complex Networks. 10.1093/comnet/cnac017. 10:4. Online publication date: 29-Jun-2022.

    https://academic.oup.com/comnet/article/doi/10.1093/comnet/cnac017/6647930

  • Hamdi S. (2021). Mining ideological discourse on Twitter: The case of extremism in Arabic. Discourse & Communication. 10.1177/17504813211043706. 16:1. (76-92). Online publication date: 1-Feb-2022.

    http://journals.sagepub.com/doi/10.1177/17504813211043706

  • Shafia and Chachoo M. (2022). Social Network Analysis Based Criminal Community Identification Model with Community Structures and Node Attributes 2022 4th International Conference on Smart Systems and Inventive Technology (ICSSIT). 10.1109/ICSSIT53264.2022.9716286. 978-1-6654-0118-0. (334-339).

    https://ieeexplore.ieee.org/document/9716286/

  • Gaikwad M, Ahirrao S, Kotecha K and Abraham A. Multi-Ideology Multi-Class Extremism Classification Using Deep Learning Techniques. IEEE Access. 10.1109/ACCESS.2022.3205744. 10. (104829-104843).

    https://ieeexplore.ieee.org/document/9885202/

  • Naganjaneyulu S, Tarun G, Sriram Y, Rama Devi B and Manoj P. (2022). Classification of Extreme Reviews from Online Products Using RNN Model. Proceedings of Second International Conference on Sustainable Expert Systems. 10.1007/978-981-16-7657-4_25. (297-303).

    https://link.springer.com/10.1007/978-981-16-7657-4_25

  • Gaikwad M, Ahirrao S, Phansalkar S and Kotecha K. (2021). Multi-Ideology ISIS/Jihadist White Supremacist (MIWS) Dataset for Multi-Class Extremism Text Classification. Data. 10.3390/data6110117. 6:11. (117).

    https://www.mdpi.com/2306-5729/6/11/117

  • Tundis A, Mukherjee G and Mühlhäuser M. (2021). An Algorithm for the Detection of Hidden Propaganda in Mixed-Code Text over the Internet. Applied Sciences. 10.3390/app11052196. 11:5. (2196).

    https://www.mdpi.com/2076-3417/11/5/2196

  • Masood M and Abbasi R. (2021). Using graph embedding and machine learning to identify rebels on twitter. Journal of Informetrics. 10.1016/j.joi.2020.101121. 15:1. (101121). Online publication date: 1-Feb-2021.

    https://linkinghub.elsevier.com/retrieve/pii/S1751157720306386

  • Gaikwad M, Ahirrao S, Phansalkar S and Kotecha K. Online Extremism Detection: A Systematic Literature Review With Emphasis on Datasets, Classification Techniques, Validation Methods, and Tools. IEEE Access. 10.1109/ACCESS.2021.3068313. 9. (48364-48404).

    https://ieeexplore.ieee.org/document/9383220/

  • Aldera S, Emam A, Al-Qurishi M, Alrubaian M and Alothaim A. Online Extremism Detection in Textual Content: A Systematic Literature Review. IEEE Access. 10.1109/ACCESS.2021.3064178. 9. (42384-42396).

    https://ieeexplore.ieee.org/document/9371676/

  • Saal J. (2021). Mobilizing Members. The Dark Social Capital of Religious Radicals. 10.1007/978-3-658-32842-9_7. (153-302).

    https://link.springer.com/10.1007/978-3-658-32842-9_7

  • Saal J. (2021). Data Sources and Methods of Data Analysis. The Dark Social Capital of Religious Radicals. 10.1007/978-3-658-32842-9_3. (69-92).

    https://link.springer.com/10.1007/978-3-658-32842-9_3

  • Almoqbel M and Xu S. (2019). Computational Mining of Social Media to Curb Terrorism. ACM Computing Surveys. 52:5. (1-25). Online publication date: 30-Sep-2020.

    https://doi.org/10.1145/3342101

  • Rieger D, Frischlich L and Bente G. (2019). Dealing with the dark side: The effects of right-wing extremist and Islamist extremist propaganda from a social identity perspective. Media, War & Conflict. 10.1177/1750635219829165. 13:3. (280-299). Online publication date: 1-Sep-2020.

    https://journals.sagepub.com/doi/10.1177/1750635219829165

  • Torregrosa J, Thorburn J, Lara-Cabrera R, Camacho D and Trujillo H. (2019). Linguistic analysis of pro-ISIS users on Twitter. Behavioral Sciences of Terrorism and Political Aggression. 10.1080/19434472.2019.1651751. 12:3. (171-185). Online publication date: 2-Jul-2020.

    https://www.tandfonline.com/doi/full/10.1080/19434472.2019.1651751

  • McElreath D, Doss D, McElreath L, Lindsley A, Lusk G, Skinner J and Wellman A. (2020). The Communicating and Marketing of Radicalism. Cyber Warfare and Terrorism. 10.4018/978-1-7998-2466-4.ch039. (631-653).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-2466-4.ch039

  • Maseri A, Norman A, Eke C, Ahmad A and Molok N. Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping. IEEE Access. 10.1109/ACCESS.2020.2994658. 8. (92929-92944).

    https://ieeexplore.ieee.org/document/9093872/

  • Kießling B, Homburg J, Drozdzynski T and Burkhardt S. (2020). State Propaganda on Twitter. Disinformation in Open Online Media. 10.1007/978-3-030-39627-5_14. (182-197).

    http://link.springer.com/10.1007/978-3-030-39627-5_14

  • Campedelli G, Cruickshank I and M. Carley K. (2019). A complex networks approach to find latent clusters of terrorist groups. Applied Network Science. 10.1007/s41109-019-0184-6. 4:1. Online publication date: 1-Dec-2019.

    https://appliednetsci.springeropen.com/articles/10.1007/s41109-019-0184-6

  • Simek O, Shah D and Heier A. (2019). Prototype and Analytics for Discovery and Exploitation of Threat Networks on Social Media 2019 European Intelligence and Security Informatics Conference (EISIC). 10.1109/EISIC49498.2019.9108895. 978-1-7281-6735-0. (9-16).

    https://ieeexplore.ieee.org/document/9108895/

  • Tundis A, Böck L, Stanilescu V and Mühlhäuser M. Limits in the data for detecting criminals on social media. Proceedings of the 14th International Conference on Availability, Reliability and Security. (1-8).

    https://doi.org/10.1145/3339252.3341483

  • Tundis A, Jain A, Bhatia G and Muhlhauser M. (2019). Similarity Analysis of Criminals on Social Networks: An Example on Twitter 2019 28th International Conference on Computer Communication and Networks (ICCCN). 10.1109/ICCCN.2019.8847028. 978-1-7281-1856-7. (1-9).

    https://ieeexplore.ieee.org/document/8847028/

  • Rege A and VanZant S. (2019). Examining the Roles of Muhajirahs in the Islamic State via Twitter 2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA). 10.1109/CyberSA.2019.8899639. 978-1-7281-0232-0. (1-8).

    https://ieeexplore.ieee.org/document/8899639/

  • Chetty N and Alathur S. (2019). Trigger Event and Hate Content: Insights from Twitter Analytics 2019 International Conference on Advances in Computing and Communication Engineering (ICACCE). 10.1109/ICACCE46606.2019.9079952. 978-1-7281-3250-1. (1-5).

    https://ieeexplore.ieee.org/document/9079952/

  • Courty A, Rane H and Ubayasiri K. (2018). Blood and ink: the relationship between Islamic State propaganda and Western media. The Journal of International Communication. 10.1080/13216597.2018.1544162. 25:1. (69-94). Online publication date: 2-Jan-2019.

    https://www.tandfonline.com/doi/full/10.1080/13216597.2018.1544162

  • Zahra K, Azam F, Butt W and Ilyas F. A Framework for User Characterization based on Tweets Using Machine Learning Algorithms. Proceedings of the 2018 VII International Conference on Network, Communication and Computing. (11-16).

    https://doi.org/10.1145/3301326.3301373

  • Tundis A, Bhatia G, Jain A and Muhlhauser M. (2018). Supporting the Identification and the Assessment of Suspicious Users on Twitter Social Media 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). 10.1109/NCA.2018.8548321. 978-1-5386-7659-2. (1-10).

    https://ieeexplore.ieee.org/document/8548321/

  • McElreath D, Doss D, McElreath L, Lindsley A, Lusk G, Skinner J and Wellman A. The Communicating and Marketing of Radicalism. International Journal of Cyber Warfare and Terrorism. 10.4018/IJCWT.2018070103. 8:3. (26-45).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJCWT.2018070103

  • Fernandez M, Asif M and Alani H. Understanding the Roots of Radicalisation on Twitter. Proceedings of the 10th ACM Conference on Web Science. (1-10).

    https://doi.org/10.1145/3201064.3201082

  • Siegel A and Tucker J. (2017). The Islamic State’s information warfare. Journal of Language and Politics. 10.1075/jlp.17005.sie. 17:2. (258-280). Online publication date: 7-May-2018.

    http://www.jbe-platform.com/content/journals/10.1075/jlp.17005.sie

  • Helberger N, Pierson J and Poell T. (2017). Governing online platforms: From contested to cooperative responsibility. The Information Society. 10.1080/01972243.2017.1391913. 34:1. (1-14). Online publication date: 1-Jan-2018.

    https://www.tandfonline.com/doi/full/10.1080/01972243.2017.1391913

  • Kalpakis G, Tsikrika T, Gialampoukidis I, Papadopoulos S, Vrochidis S and Kompatsiaris I. (2018). Analysis of Suspended Terrorism-Related Content on Social Media. Community-Oriented Policing and Technological Innovations. 10.1007/978-3-319-89294-8_11. (107-118).

    http://link.springer.com/10.1007/978-3-319-89294-8_11

  • Wei Y and Singh L. (2018). Detecting Users Who Share Extremist Content on Twitter. Surveillance in Action. 10.1007/978-3-319-68533-5_17. (351-368).

    http://link.springer.com/10.1007/978-3-319-68533-5_17

  • Reuter C, Pätsch K and Runft E. (2017). IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study. i-com. 10.1515/icom-2017-0013. 16:2. (181-193). Online publication date: 28-Aug-2017.. Online publication date: 1-Aug-2017.

    https://www.degruyter.com/document/doi/10.1515/icom-2017-0013/html

  • Gilperez-Lopez I, Torregrosa J, Barhamgi M and Camacho D. (2017). An Initial Study on Radicalization Risk Factors: Towards an Assessment Software Tool 2017 28th International Workshop on Database and Expert Systems Applications (DEXA). 10.1109/DEXA.2017.19. 978-1-5386-1051-0. (11-16).

    http://ieeexplore.ieee.org/document/8049677/

  • Gialampoukidis I, Kalpakis G, Tsikrika T, Papadopoulos S, Vrochidis S and Kompatsiaris I. Detection of Terrorism-related Twitter Communities using Centrality Scores. Proceedings of the 2nd International Workshop on Multimedia Forensics and Security. (21-25).

    https://doi.org/10.1145/3078897.3080534

  • Tsikrika T, Akhgar B, Katos V, Vrochidis S, Burnap P and Williams M. 1st International Workshop on Search and Mining Terrorist Online Content & Advances in Data Science for Cyber Security and Risk on the Web. Proceedings of the Tenth ACM International Conference on Web Search and Data Mining. (823-824).

    https://doi.org/10.1145/3018661.3022760

  • Wei Y and Singh L. (2017). Using Network Flows to Identify Users Sharing Extremist Content on Social Media. Advances in Knowledge Discovery and Data Mining. 10.1007/978-3-319-57454-7_26. (330-342).

    https://link.springer.com/10.1007/978-3-319-57454-7_26

  • Wei Y, Singh L and Martin S. Identification of extremism on Twitter. Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. (1251-1255).

    /doi/10.5555/3192424.3192654

  • Gialampoukidis I, Kalpakis G, Tsikrika T, Vrochidis S and Kompatsiaris I. (2016). Key Player Identification in Terrorism-Related Social Media Networks Using Centrality Measures 2016 European Intelligence and Security Informatics Conference (EISIC). 10.1109/EISIC.2016.029. 978-1-5090-2857-3. (112-115).

    http://ieeexplore.ieee.org/document/7870202/

  • Wei Y, Singh L and Martin S. (2016). Identification of extremism on Twitter 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). 10.1109/ASONAM.2016.7752398. 978-1-5090-2846-7. (1251-1255).

    http://ieeexplore.ieee.org/document/7752398/

  • Harrak Srifi Y. Transnational Extremism, Social Media and the State. SSRN Electronic Journal. 10.2139/ssrn.3740992.

    https://www.ssrn.com/abstract=3740992

  • Mitts T. From Isolation to Radicalization: Anti-Muslim Hostility and Support for ISIS in the West. SSRN Electronic Journal. 10.2139/ssrn.2795660.

    https://www.ssrn.com/abstract=2795660