[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-319-47874-6_3guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Predicting Online Extremism, Content Adopters, and Interaction Reciprocity

Published: 11 November 2016 Publication History

Abstract

We present a machine learning framework that leverages a mixture of metadata, network, and temporal features to detect extremist users, and predict content adopters and interaction reciprocity in social media. We exploit a unique dataset containing millions of tweets generated by more than 25 thousand users who have been manually identified, reported, and suspended by Twitter due to their involvement with extremist campaigns. We also leverage millions of tweets generated by a random sample of 25 thousand regular users who were exposed to, or consumed, extremist content. We carry out three forecasting tasks, (i) to detect extremist users, (ii) to estimate whether regular users will adopt extremist content, and finally (iii) to predict whether users will reciprocate contacts initiated by extremists. All forecasting tasks are set up in two scenarios: a post hoc (time independent) prediction task on aggregated data, and a simulated real-time prediction task. The performance of our framework is extremely promising, yielding in the different forecasting scenarios up to 93 % AUC for extremist user detection, up to 80 % AUC for content adoption prediction, and finally up to 72 % AUC for interaction reciprocity forecasting. We conclude by providing a thorough feature analysis that helps determine which are the emerging signals that provide predictive power in different scenarios.

References

[1]
Agarwal, S., Sureka, A.: A focused crawler for mining hate and extremism promoting videos on youtube. In: Proceedings of the 25th ACM Conference on Hypertext and Social Media, pp. 294–296 (2014)
[2]
Agarwal, S., Sureka, A.: Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats. arXiv preprint (2015). arXiv:1511.06858
[3]
Agarwal S and Sureka A Natarajan R, Barua G, and Patra MR Using KNN and SVM based one-class classifier for detecting online radicalization on twitter Distributed Computing and Internet Technology 2015 Heidelberg Springer 431-442
[4]
Agarwal, S., Sureka, A.: Spider and the flies: Focused crawling on tumblr to detect hate promoting communities. arXiv preprint (2016). arXiv:1603.09164
[5]
Berger, J., Morgan, J.: The ISIS twitter census: Defining and describing the population of isis supporters on twitter. The Brookings Project on US Relations with the Islamic World 3(20) (2015)
[6]
Berger, J., Perez, H.: The Islamic States diminishing returns on Twitter. GW Program on extremism 2–16 (2016)
[7]
Berger, J., Strathearn, B.: Who matters online: measuring influence, evaluating content and countering violent extremism in online social networks. Int. Centre Study Radicalisation (2013)
[8]
Bermingham, A., Conway, M., McInerney, L., O’Hare, N., Smeaton, A.F.: Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In: 2009 International Conference on Advances in Social Network Analysis and Mining (ASONAM), pp. 231–236. IEEE (2009)
[9]
Breiman L Random forests Mach. Learn. 2001 45 1 5-32
[10]
Chen H, Chung W, Qin J, Reid E, Sageman M, and Weimann G Uncovering the dark web: A case study of jihad on the web J. Am. Soc. Inf. Sci. Technol. 2008 59 8 1347-1359
[11]
Cockburn P The rise of Islamic State: ISIS and the new Sunni revolution 2015 London Verso Books
[12]
Conover MD, Davis C, Ferrara E, McKelvey K, Menczer F, and Flammini A The geospatial characteristics of a social movement communication network PloS One 2013 8 3 e55957
[13]
Conover MD, Ferrara E, Menczer F, and Flammini A The digital evolution of occupy wall street PloS One 2013 8 5 e64679
[14]
Correa, D., Sureka, A.: Solutions to detect and analyze online radicalization: a survey. arXiv preprint (2013). arXiv:1301.4916
[15]
Davis, C.A., Varol, O., Ferrara, E., Flammini, A., Menczer, F.: Botornot: A system to evaluate social bots. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 273–274. International World Wide Web Conferences Steering Committee (2016)
[16]
Ferrara E, Varol O, Davis C, Menczer F, and Flammini A The rise of social bots Commun. ACM 2016 59 7 96-104
[17]
Ferrara, E., Varol, O., Menczer, F., Flammini, A.: Detection of promoted social media campaigns. In: Proceedings of the 10th International Conference on Web and Social Media (2016)
[18]
Fisher A How jihadist networks maintain a persistent online presence Perspect. Terrorism 2015 9 3 3-20
[19]
Ghosh, R., Surachawala, T., Lerman, K.: Entropy-based classification of retweeting activity on twitter. In: Proceedings of KDD workshop on Social Network Analysis (SNA-KDD), August 2011
[20]
Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 211–220. ACM (2009)
[21]
González-Bailón S, Borge-Holthoefer J, Rivero A, and Moreno Y The dynamics of protest recruitment through an online network Sci. Rep. 2011 1 197
[22]
Guyon I and Elisseeff A An introduction to variable and feature selection J. Mach. Learn. Res. 2003 3 1157-1182
[23]
Hastie T, Tibshirani R, Friedman J, and Franklin J The elements of statistical learning: data mining, inference and prediction Math. Intell. 2005 27 2 83-85
[24]
Johnson NF, Zheng M, Vorobyeva Y, Gabriel A, Qi H, Velasquez N, Manrique P, Johnson D, Restrepo E, Song C, and Wuchty S New online ecology of adversarial aggregates: Isis and beyond Science 2016 352 6292 1459-1463
[25]
Lerman, K., Ghosh, R.: Information contagion: an empirical study of the spread of news on digg and twitter social networks. In: Proceedings of the 4th International AAAI Conference on Weblogs and Social Media, pp. 90–97 (2010)
[26]
Magdy W, Darwish K, and Weber I #failedrevolutions: Using Twitter to study the antecedents of ISIS support First Monday 2016 21 2 1481-1492
[27]
Mislove, A., Lehmann, S., Ahn, Y.Y., Onnela, J.P., Rosenquist, J.N.: Understanding the demographics of twitter users. In: Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (2011)
[28]
Pedregosa F, Varoquaux G, Gramfort A, Michel V, Thirion B, Grisel O, Blondel M, Prettenhofer P, Weiss R, Dubourg V, et al. Scikit-learn: Machine learning in python J. Mach. Learn. Res. 2011 12 2825-2830
[29]
Qi, X., Christensen, K., Duval, R., Fuller, E., Spahiu, A., Wu, Q., Zhang, C.Q.: A hierarchical algorithm for clustering extremist web pages. In: 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 458–463 (2010)
[30]
Ratkiewicz, J., Conover, M., Meiss, M., Goncalves, B., Flammini, A., Menczer, F.: Detecting and tracking political abuse in social media. In: Proceedings of the 5th International AAAI Conference on Weblogs and Social Media, pp. 297–304 (2011)
[31]
Reardon S Terrorism: science seeks roots of terror Nature 2015 517 7535 420-421
[32]
Rowe, M., Saif, H.: Mining pro-ISIS radicalisation signals from social media users. In: Proceedings of the 10th International Conference on Web and Social Media (2016)
[33]
Scanlon JR and Gerber MS Automatic detection of cyber-recruitment by violent extremists Secur. Inf. 2014 3 1 1-10
[34]
Schiermeier Q Terrorism: Terror prediction hits limits Nature 2015 517 7535 419
[35]
Stern J and Berger JM ISIS: The state of terror 2015 New York Harper
[36]
Subrahmanian V, Azaria A, Durst S, Kagan V, Galstyan A, Lerman K, Zhu L, Ferrara E, Flammini A, and Menczer F The DARPA Twitter bot challenge Computer 2016 49 6 38-46
[37]
Sureka, A., Agarwal, S.: Learning to classify hate and extremism promoting tweets. In: 2014 IEEE Joint Intelligence and Security Informatics Conference (JISIC), pp. 320–320. IEEE (2014)
[38]
Tausczik YR and Pennebaker JW The psychological meaning of words: LIWC and computerized text analysis methods J. Lang. Soc. Psychol. 2010 29 1 24-54
[39]
Varol, O., Ferrara, E., Ogan, C.L., Menczer, F., Flammini, A.: Evolution of online user behavior during a social upheaval. In: Proceedings of the 2014 ACM Conference on Web Science, pp. 81–90. ACM (2014)
[40]
Vergani M and Bliuc AM The evolution of the ISIS’ language: a quantitative analysis of the language of the first year of dabiq magazine Secur. Terrorism Soc. 2015 1 2 217-224
[41]
Weiss M and Hassan H ISIS: Inside the army of terror 2015 New York Simon and Schuster

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Social Informatics: 8th International Conference, SocInfo 2016, Bellevue, WA, USA, November 11-14, 2016, Proceedings, Part II
Nov 2016
527 pages
ISBN:978-3-319-47873-9
DOI:10.1007/978-3-319-47874-6
  • Editors:
  • Emma Spiro,
  • Yong-Yeol Ahn

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 11 November 2016

Author Tags

  1. Social media
  2. Online extremism
  3. Radicalization prediction

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media