{"title":"Twitter中恐怖活动和威胁事件的检测和预测——一项调查","authors":"Mary Lisa Leenuse, Dhanya S. Pankaj, Rahul Raj M","doi":"10.1109/ICCC57789.2023.10165097","DOIUrl":null,"url":null,"abstract":"Twitter is one of the prominent social media applications which influence civilians due to its fast information dissemination. Researchers have shown that the majority of the tweets posted involve the current issues prevailing in society. Terrorism is a global threat to the peaceful existence of humanity. Terrorists widely use online social media platforms to communicate and propagate their activities. User-to-user interaction leads a major role in the formation of complex communication in the terrorism domain. This paper aims to discuss the different methods in literature used to identify both single and groups of users who are related to terrorist activities. The study focuses on the different techniques for identifying threatening activities, detecting terrorist attacks and predicting terrorist attacks.","PeriodicalId":192909,"journal":{"name":"2023 International Conference on Control, Communication and Computing (ICCC)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Detection and Prediction of Terrorist Activities and Threatening Events in Twitter - A Survey\",\"authors\":\"Mary Lisa Leenuse, Dhanya S. Pankaj, Rahul Raj M\",\"doi\":\"10.1109/ICCC57789.2023.10165097\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Twitter is one of the prominent social media applications which influence civilians due to its fast information dissemination. Researchers have shown that the majority of the tweets posted involve the current issues prevailing in society. Terrorism is a global threat to the peaceful existence of humanity. Terrorists widely use online social media platforms to communicate and propagate their activities. User-to-user interaction leads a major role in the formation of complex communication in the terrorism domain. This paper aims to discuss the different methods in literature used to identify both single and groups of users who are related to terrorist activities. The study focuses on the different techniques for identifying threatening activities, detecting terrorist attacks and predicting terrorist attacks.\",\"PeriodicalId\":192909,\"journal\":{\"name\":\"2023 International Conference on Control, Communication and Computing (ICCC)\",\"volume\":\"137 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Control, Communication and Computing (ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCC57789.2023.10165097\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Control, Communication and Computing (ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCC57789.2023.10165097","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detection and Prediction of Terrorist Activities and Threatening Events in Twitter - A Survey
Twitter is one of the prominent social media applications which influence civilians due to its fast information dissemination. Researchers have shown that the majority of the tweets posted involve the current issues prevailing in society. Terrorism is a global threat to the peaceful existence of humanity. Terrorists widely use online social media platforms to communicate and propagate their activities. User-to-user interaction leads a major role in the formation of complex communication in the terrorism domain. This paper aims to discuss the different methods in literature used to identify both single and groups of users who are related to terrorist activities. The study focuses on the different techniques for identifying threatening activities, detecting terrorist attacks and predicting terrorist attacks.