{"title":"通过社会网络结构分析发现网络极端主义","authors":"M. Petrovskiy, M. Chikunov","doi":"10.1109/INFOCT.2019.8711254","DOIUrl":null,"url":null,"abstract":"The activity of extremist organizations on the Internet is continuously growing with the increase of Web’s usage for means of communication. Therefore analysis of radical members in social networks provides important information on how to prevent them propagate ideology and recruiting new members in the future. But nowadays terrorists often use confidential chats and private threads to communicate, thus it’s quite hard to detect them using only the public messages they generate. In fact, it is usually known that some users of social networks are dangerous, another are innocent, and no information is available about the remaining users. In this paper, we propose an approach for detecting radical users of social network among unknown ones by analyzing their relationships and features as of vertices of social graph without usage of any information about text content they generate. We find that the proposed method is very promising and may be efficiently used for real-time monitoring systems and future terrorism and extremism research.","PeriodicalId":369231,"journal":{"name":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Online Extremism Discovering through Social Network Structure Analysis\",\"authors\":\"M. Petrovskiy, M. Chikunov\",\"doi\":\"10.1109/INFOCT.2019.8711254\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The activity of extremist organizations on the Internet is continuously growing with the increase of Web’s usage for means of communication. Therefore analysis of radical members in social networks provides important information on how to prevent them propagate ideology and recruiting new members in the future. But nowadays terrorists often use confidential chats and private threads to communicate, thus it’s quite hard to detect them using only the public messages they generate. In fact, it is usually known that some users of social networks are dangerous, another are innocent, and no information is available about the remaining users. In this paper, we propose an approach for detecting radical users of social network among unknown ones by analyzing their relationships and features as of vertices of social graph without usage of any information about text content they generate. We find that the proposed method is very promising and may be efficiently used for real-time monitoring systems and future terrorism and extremism research.\",\"PeriodicalId\":369231,\"journal\":{\"name\":\"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)\",\"volume\":\"21 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCT.2019.8711254\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 2nd International Conference on Information and Computer Technologies (ICICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCT.2019.8711254","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Online Extremism Discovering through Social Network Structure Analysis
The activity of extremist organizations on the Internet is continuously growing with the increase of Web’s usage for means of communication. Therefore analysis of radical members in social networks provides important information on how to prevent them propagate ideology and recruiting new members in the future. But nowadays terrorists often use confidential chats and private threads to communicate, thus it’s quite hard to detect them using only the public messages they generate. In fact, it is usually known that some users of social networks are dangerous, another are innocent, and no information is available about the remaining users. In this paper, we propose an approach for detecting radical users of social network among unknown ones by analyzing their relationships and features as of vertices of social graph without usage of any information about text content they generate. We find that the proposed method is very promising and may be efficiently used for real-time monitoring systems and future terrorism and extremism research.