{"title":"Detection and Prediction of Terrorist Activities and Threatening Events in Twitter - A Survey","authors":"Mary Lisa Leenuse, Dhanya S. Pankaj, Rahul Raj M","doi":"10.1109/ICCC57789.2023.10165097","DOIUrl":null,"url":null,"abstract":"Twitter is one of the prominent social media applications which influence civilians due to its fast information dissemination. Researchers have shown that the majority of the tweets posted involve the current issues prevailing in society. Terrorism is a global threat to the peaceful existence of humanity. Terrorists widely use online social media platforms to communicate and propagate their activities. User-to-user interaction leads a major role in the formation of complex communication in the terrorism domain. This paper aims to discuss the different methods in literature used to identify both single and groups of users who are related to terrorist activities. The study focuses on the different techniques for identifying threatening activities, detecting terrorist attacks and predicting terrorist attacks.","PeriodicalId":192909,"journal":{"name":"2023 International Conference on Control, Communication and Computing (ICCC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Control, Communication and Computing (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCC57789.2023.10165097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Twitter is one of the prominent social media applications which influence civilians due to its fast information dissemination. Researchers have shown that the majority of the tweets posted involve the current issues prevailing in society. Terrorism is a global threat to the peaceful existence of humanity. Terrorists widely use online social media platforms to communicate and propagate their activities. User-to-user interaction leads a major role in the formation of complex communication in the terrorism domain. This paper aims to discuss the different methods in literature used to identify both single and groups of users who are related to terrorist activities. The study focuses on the different techniques for identifying threatening activities, detecting terrorist attacks and predicting terrorist attacks.