SlideShare a Scribd company logo
1 of 42
1
Staffordshire University 5th March 2020
Online Radicalisation: Work,
Challenges and Future
Directions
Presenting: Miriam Fernandez
@miriam_fs
fernandezmiriam
@miriamfs
2
Staffordshire University 5th March 2020
Targeting Societal Challenges by Analysing Social
Media Data
2
3
Staffordshire University 5th March 2020
4
Staffordshire University 5th March 2020
5
Staffordshire University 5th March 2020
Online
Radicalisation
• Is the process by which
individuals are introduced
to ideological messages
and belief systems that
encourage movement from
mainstream beliefs toward
extreme views, primarily
through the use of online
media[International Assoc of Chiefs of Police and United States of
America]
6
Staffordshire University 5th March 2020
Islamic State in Iraq and Syria (ISIS)
Social Media Propaganda & Recruiting
7
Staffordshire University 5th March 2020
ISIS on Social Media
8
Staffordshire University 5th March 2020
What are the mechanisms that govern the process of
radicalisation, and online radicalisation in particular?
Social Science
Factors
Roots
Stages
Failed Integration
Poverty
Discrimination
Pre-radicalisation
Self-identification
Indoctrination
Jihadization
Micro, or individual roots
Meso, or social roots
Macro, or global roots
9
Staffordshire University 5th March 2020
Computer
Science
Data
Collection
Analysis
Detection
Prediction
Communication flow
Spiritual authorities
Propaganda
Language evolution
Radicalisation process
Radicalisation channels
Lexicon-based
Machine-learningUsers
Content
False Positives
Adopt extremist content (share)
Interact with extremist accounts
10
Staffordshire University 5th March 2020
Online
Radicalisation
Research:
Challenges
Fernandez Miriam and Alani Harith (2020). Online Extremism:
Challenges and Opportunities for Artificial Intelligence. Policing and
Artificial Intelligence Book. Editors Dr John L.M. McDaniel and Prof
Ken (In press)
11
Staffordshire University 5th March 2020
Main Challenges
lack of a common definition of prohibited
radical and extremist internet activity
comparison against a control
group
comparison against approaches
(no replication studies)
Content adaptation
User-Account adaptation
Platform adaptation
Technology adaptation
technology needs to comply with legislation that
can sometimes be ambiguous or contradictory,
particularly when it comes to the tension between
security, privacy and freedom of expression.
12
Staffordshire University 5th March 2020
Mechanisms for Data Collection, Verification and
Validation
13
Staffordshire University 5th March 2020
Data Issues
14
Staffordshire University 5th March 2020
RQ. How can we translate the different
aspects of social theories of radicalisation into
computational methods to enable the
automatic identification of radicalised
behaviour?
15
Staffordshire University 5th March 2020
Fernandez, Miriam, Moizzah Asif, and Harith Alani. "Understanding the
roots of radicalisation on twitter." Proceedings of the 10th ACM
Conference on Web Science. 2018.
Fernandez, Miriam; Gonzalez-Pardo, Antonio and Alani,
Harith (2019). Radicalisation Influence in Social Media. Journal of Web
Science, 6
Understanding the
roots of
radicalisation on
twitter
16
Staffordshire University 5th March 2020
Roots of Radicalisation & Radicalisation Influence
Micro or
Individual roots
Macro or
Global roots
Meso or
Group roots
Radicalisation
Influence
Content from
friends
Authored
posts
Content from news
and other websites
Radicalisation Influence
• Individual: similarity of own content to
radicalisation terminology
• Social: similarity of retweeted content from
followees to radicalization terminology
• Global: similarity of content shared from news
and websites to radicalization terminology
17
Staffordshire University 5th March 2020
Modelling Roots of Radicalisation
Feeling lonely today  http://url1
RT @diabla We need to fight for our
brothers! http://url2
RT @minid Allah is always with you!
RT @dk Dabiq is our message! http://url2
RT @hobbes what a beautiful day today! 
I have brothers who pray for me! http://url3
@Calvi
n
Micro or
Individual roots
Meso or Group roots
Macro or
Global roots
http://url1
http://url2
http://url3
18
Staffordshire University 5th March 2020
Calculating Radicalisation Influence
Radicalisation Lexicon w1
w2
w3
19
Staffordshire University 5th March 2020
Experiments & Results
General
• 112 accounts
manually
assessed as
“general” by 2
annotators
• 197,743 tweets
Datasets
Pro-ISIS
• 112 pro-ISIS
accounts
• 17,350 tweets
20
Staffordshire University 5th March 2020
Social Influence
The more
radicalisation
content a user is
exposed to and
shares, the more
likely for them to
adopt a similar
language over time.
• The network is the essence of social
media platforms.
• Harm propagates across the network,
and influences recipients over time.
• Need to protect and alert users to
harmful influences and influencers.
• Monitor and regulate the use of
networking recommendation
algorithms.
Individual influence: similarity of own content to radicalisation terminology
Socialinfluence:similarityof
retweetedcontenttoradicalisation
terminology
Tools to measure radicalisation influence and
behaviour
21
Staffordshire University 5th March 2020
Predicting Radicalisation Influence
w1 w2 w3 w4 ? W5
w1 w2 w3 w5
w6 w11 w7 w1
Present Prediction
Radicalisation
Influence
Collaborative
Filtering
 1) Look for users
that have a
similar word-use /
“rating” pattern to
that of the active
user
 2) use the ratings
of users found in
step 1 to
compute the
predictions for
the active user
22
Staffordshire University 5th March 2020
Fernandez, Miriam and Alani, Harith (2018). Contextual Semantics for
Radicalisation Detection on Twitter. In: Semantic Web for Social Good
Workshop (SW4SG) at International Semantic Web Conference 2018, 9
Oct 2018, CEUR.
Saif, Hassan; Dickinson, Thomas; Kastler, Leon; Fernandez,
Miriam and Alani, Harith (2017). A Semantic Graph-Based Approach for
Radicalisation Detection on Social Media. In: ESWC 2017: The Semantic
Web - Proceedings, Part I, Lecture Notes in Computer Science, Springer,
Contextual
Semantics for
Radicalisation
Detection on Twitter
23
Staffordshire University 5th March 2020
Radical Terminology: Usage Divergence
pro-ISIS
users
“general”
users
Radical Terminology
24
Staffordshire University 5th March 2020
Tweets
Conceptual.
Semantics.
Extraction
DBpedia
Semantic.Graph.
Representation
Frequent.Semantic.
Subgraph.Mining
Classifier.Training
Pipeline of detecting pro-ISIS stances using semantic sub-graph mining-based feature extraction
• Extract and use the semantic interdependencies and relations between
words to learn patterns of radicalisation.
ISIS
Syria
Jihadist Group
Country
(Military Intervention Against ISIL, place, Syria)
Entities Concepts Semantic Relations
Semantic Graph-based Approach for Pro-ISIS
Stance Detection
25
Staffordshire University 5th March 2020
Semantic Graph-based Approach for Pro-ISIS
Stance Detection
Step 1. Conceptual Semantic Extraction
Training Data: 566 pro-ISIS users / 566 anti-ISIS users (extracted using lexicons)
Entity Extraction and
Semantics Mapping
Syria -> Country
ISIL-> Jihadist Group
Syria -> Country
ISIL-> Jihadist Group
DBpedia
Step 2. Semantic Graph Representation
Step 3. Sub-graph Mining CloseGraph Method (Yan and Han 2003)
26
Staffordshire University 5th March 2020
Evaluation & Results
• Baseline for comparison SVM classifiers trained from Unigrams,
Topic, Sentiment and Network feature sets.
• 10-Folds cross validation over 30 runs
86.3 86.3
84.8
86
91.7
84.4 84.4
81
87.1
92.8
80
82
84
86
88
90
92
94
Unigrams Sentiment Topics Network Semantics
anti-ISIS pro-ISIS
Exploration of semantic
sub-graphs
• pro-ISIS users tend to
discuss about
religion, historical
events and ethnicity
• anti-ISIS users focus
more on politics,
geographical
locations and
interventions against
ISIS
27
Staffordshire University 5th March 2020
Global
(Mis)perceptions of
Radicalisation
28
Staffordshire University 5th March 2020
Global (mis)perception of radicalisation
• Same messages are
judged very differently
in different parts of the
world
• Highlights differences
and potential bias
Not-Radical
Radical
Tie
NA: North America
SA: South America
ME: Middle East
AS: Asia
EU: Europe
AF: Africa
29
Staffordshire University 5th March 2020
Online
‘extreme’
Misogyny
Farrell Tracie, Fernandez Miriam, Novotny Jakub and Alani Harith
(2019). Exploring Misogyny across the Manosphere in Reddit. 10th
ACM Conference on Web Science
30
Staffordshire University 5th March 2020
The Manosphere
31
Staffordshire University 5th March 2020
Experiencing the Manosphere
Resentment of Women
Attribution of Blame
32
Staffordshire University 5th March 2020
RQ2: Which groups express the
most violent attitudes and what are
the most common forms of online
misogynistic violence?
RQ1. How do these communities
differ in terms of their use of violent or
misogynistic speech?
Studying Misogyny at Scale
I/NON-FEMINIST
“Manosphere”
aligned
Agents”
Future emerging
orms
eminism
Pick-up Artists
(PUA)
Involuntarily Celibate
(INCEL)
Men’s Rights Activists
(MRA)
Men Going Their
Own Way (MGTOW)
ans
“Menenists”
Father’s Rights
33
Staffordshire University 5th March 2020
Feminist/Sociological
• Historical/contextual
approaches
• Rich description of
communities
Existing Approaches
• Small number of
researchers
• Mostly qualitative
Computer Science
• Observational
studies, analysing
specific data
• Predictive studies
• Preference for certain
platforms
• Less attention to
sociological/feminist
models
34
Staffordshire University 5th March 2020
Our Approach
1. Grounded on exploring feminist
models at scale
2. Utilising a dataset of 6M posts,
300K conversations on Reddit
3. Observing that data over a longer
period of time (2011-2018)
35
Staffordshire University 5th March 2020
Feminist Sociological Models
• Misogyny includes: belittling, hostility, sexual
violence, and physical violence, patriarchy
(Code, 2002)
• Misogyny is often accompanied by homophobic
and racist rhetoric (Davies, 2008)
• Misogyny is developing towards: stoicism and
flipped narratives of feminism (Zuckerberg, 2018
and Ging, 2017)
36
Staffordshire University 5th March 2020
Ingesting and Annotating Terms
• Terms taken from a variety of online dictionaries
for profanity, racist or homophobic abuse,
violence verbs and hate speech (2,454 unique
terms)
• Annotated using a coding scheme developed
from the literature
37
Staffordshire University 5th March 2020
Development of the Lexicons
• creation of 9 lexicons
• 1300 annotated terms
38
Staffordshire University 5th March 2020
Selection of Subreddits
39
Staffordshire University 5th March 2020
Authors
• Increase in authorship since 2016
• Sharpest in r/braincels after r/incels is quarantined
40
Staffordshire University 5th March 2020
Studying the Manosphere at Scale
Sexual Violence
Hostility
41
Staffordshire University 5th March 2020
What we learned
• Authorship in the more violent
communities appears to be growing.
• Language within misogynistic groups
appears to have become more hostile
over time, which corroborates existing
feminist scholarship. Non-violent groups
tend to express more stoicism.
• Groups who expressed the most violent
attitudes toward women also express
violent attitudes toward other
minorities or groups that experience
exclusion. Co-occurrence found in
feminist scholarship.
• Hostility is the most common type of
misogynistic violence.
RQ1. How do these communities
differ in terms of their use of violent or
misogynistic speech?
RQ2: Which groups express the
most violent attitudes and what are
the most common forms of online
misogynistic violence?
42
Staffordshire University 5th March 2020
Thanks for Listening!

More Related Content

What's hot

Presentation on big data in Madrid 18.04.2013
Presentation on big data in Madrid 18.04.2013Presentation on big data in Madrid 18.04.2013
Presentation on big data in Madrid 18.04.2013Petter Bae Brandtzæg
 
Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication NiraliMakvana1
 
Social media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social mediaSocial media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social mediaIan McCarthy
 
Digital Demography - Keynote at SocInfo'18
Digital Demography - Keynote at SocInfo'18Digital Demography - Keynote at SocInfo'18
Digital Demography - Keynote at SocInfo'18Ingmar Weber
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaDavid Thompson
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Sciencejournal ijrtem
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1Dave King
 
Dialogue-Earth:-Mining-Social-Media
Dialogue-Earth:-Mining-Social-MediaDialogue-Earth:-Mining-Social-Media
Dialogue-Earth:-Mining-Social-MediaTom Masterman
 
WIA 2015 Executive Summary
WIA 2015 Executive SummaryWIA 2015 Executive Summary
WIA 2015 Executive SummaryEvan Beck
 
Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)Paul Bradshaw
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper handleyrr
 
Data on Polarization, Peace, and Propaganda
Data on Polarization, Peace, and PropagandaData on Polarization, Peace, and Propaganda
Data on Polarization, Peace, and PropagandaIngmar Weber
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 
Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...Ian McCarthy
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineBrenden Brown
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the GovernmentKady Chiu
 

What's hot (20)

Presentation on big data in Madrid 18.04.2013
Presentation on big data in Madrid 18.04.2013Presentation on big data in Madrid 18.04.2013
Presentation on big data in Madrid 18.04.2013
 
8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable8th Milestones meeting: Cyber violence roundtable
8th Milestones meeting: Cyber violence roundtable
 
Mass media and communication
Mass media and communication Mass media and communication
Mass media and communication
 
Social media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social mediaSocial media? It's serious! Understanding the dark side of social media
Social media? It's serious! Understanding the dark side of social media
 
Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015Society Meets Social Media at reyerson-2015
Society Meets Social Media at reyerson-2015
 
Digital Demography - Keynote at SocInfo'18
Digital Demography - Keynote at SocInfo'18Digital Demography - Keynote at SocInfo'18
Digital Demography - Keynote at SocInfo'18
 
Literature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social MediaLiterature Review of Information Behaviour on Social Media
Literature Review of Information Behaviour on Social Media
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
Social media mining hicss 46 part 1
Social media mining   hicss 46 part 1Social media mining   hicss 46 part 1
Social media mining hicss 46 part 1
 
Dialogue-Earth:-Mining-Social-Media
Dialogue-Earth:-Mining-Social-MediaDialogue-Earth:-Mining-Social-Media
Dialogue-Earth:-Mining-Social-Media
 
WIA 2015 Executive Summary
WIA 2015 Executive SummaryWIA 2015 Executive Summary
WIA 2015 Executive Summary
 
Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)Teaching data journalism (Abraji 2021)
Teaching data journalism (Abraji 2021)
 
Social Media Paper
Social Media Paper Social Media Paper
Social Media Paper
 
Data on Polarization, Peace, and Propaganda
Data on Polarization, Peace, and PropagandaData on Polarization, Peace, and Propaganda
Data on Polarization, Peace, and Propaganda
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...Do your employees think your slogan is “fake news?” A framework for understan...
Do your employees think your slogan is “fake news?” A framework for understan...
 
A Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy OnlineA Call to Action: Protecting the Right to Consumer Privacy Online
A Call to Action: Protecting the Right to Consumer Privacy Online
 
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...
 
Social Media for the Government
Social Media for the GovernmentSocial Media for the Government
Social Media for the Government
 

Similar to Online Radicalisation Research Challenges

The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0Weiai Wayne Xu
 
A Systematic Survey on Detection of Extremism in Social Media
A Systematic Survey on Detection of Extremism in Social MediaA Systematic Survey on Detection of Extremism in Social Media
A Systematic Survey on Detection of Extremism in Social MediaRSIS International
 
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...ijtsrd
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...Liliana Bounegru
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocialMedia.org
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Michelle Ferrier
 
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Bernard Marr
 
Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Scott A. Hale
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
 
Digital development and Online Gender-Based Violence
Digital development and Online Gender-Based ViolenceDigital development and Online Gender-Based Violence
Digital development and Online Gender-Based ViolenceAnand Sheombar
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitterijtsrd
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The InternetJacob Gee
 
Ben Sheniderman, Technology-Mediated Social Computing
Ben Sheniderman, Technology-Mediated Social ComputingBen Sheniderman, Technology-Mediated Social Computing
Ben Sheniderman, Technology-Mediated Social ComputingAngela Brandt
 
Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and RadicalizationAmit Sheth
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaCOMRADES project
 
Standing Against the Online White Nationalist Movement
Standing Against the Online White Nationalist MovementStanding Against the Online White Nationalist Movement
Standing Against the Online White Nationalist Movementkbesnoy
 

Similar to Online Radicalisation Research Challenges (20)

AIISC’s research in Social Good/Social Harm, Public Health and Epidemiology
AIISC’s research in  Social Good/Social Harm,  Public Health and EpidemiologyAIISC’s research in  Social Good/Social Harm,  Public Health and Epidemiology
AIISC’s research in Social Good/Social Harm, Public Health and Epidemiology
 
The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0The Networked Creativity in the Censored Web 2.0
The Networked Creativity in the Censored Web 2.0
 
A Systematic Survey on Detection of Extremism in Social Media
A Systematic Survey on Detection of Extremism in Social MediaA Systematic Survey on Detection of Extremism in Social Media
A Systematic Survey on Detection of Extremism in Social Media
 
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
Surveillance and Monitoring in the Social Media Era: Threats and Opportunitie...
 
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...What Actor-Network Theory (ANT) and digital methods can do for data journalis...
What Actor-Network Theory (ANT) and digital methods can do for data journalis...
 
Social network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason BaldridgeSocial network analysis and audience segmentation, presented by Jason Baldridge
Social network analysis and audience segmentation, presented by Jason Baldridge
 
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
Defense Against The Digital Dark Arts: Navigating Online Spaces as a Journali...
 
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
Can Artificial Intelligence Predict The Spread Of Online Hate Speech?
 
Who are We Studying: Humans or Bots?
Who are We Studying: Humans or Bots? Who are We Studying: Humans or Bots?
Who are We Studying: Humans or Bots?
 
Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...Big Tech & Disinformation: What are the main threats and how can journalists ...
Big Tech & Disinformation: What are the main threats and how can journalists ...
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
Capstone_SingleSpaced
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpaced
 
Embeddedmedia
EmbeddedmediaEmbeddedmedia
Embeddedmedia
 
Digital development and Online Gender-Based Violence
Digital development and Online Gender-Based ViolenceDigital development and Online Gender-Based Violence
Digital development and Online Gender-Based Violence
 
A Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on TwitterA Survey of Methods for Spotting Spammers on Twitter
A Survey of Methods for Spotting Spammers on Twitter
 
Moral Censorship on The Internet
Moral Censorship on The InternetMoral Censorship on The Internet
Moral Censorship on The Internet
 
Ben Sheniderman, Technology-Mediated Social Computing
Ben Sheniderman, Technology-Mediated Social ComputingBen Sheniderman, Technology-Mediated Social Computing
Ben Sheniderman, Technology-Mediated Social Computing
 
Understanding Online Socials Harm: Examples of Harassment and Radicalization
Understanding Online Socials Harm:  Examples of Harassment and RadicalizationUnderstanding Online Socials Harm:  Examples of Harassment and Radicalization
Understanding Online Socials Harm: Examples of Harassment and Radicalization
 
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social MediaA Semantic Graph-based Approach for Radicalisation Detection on Social Media
A Semantic Graph-based Approach for Radicalisation Detection on Social Media
 
Standing Against the Online White Nationalist Movement
Standing Against the Online White Nationalist MovementStanding Against the Online White Nationalist Movement
Standing Against the Online White Nationalist Movement
 

More from Miriam Fernandez

Mining Social Media Data For Policing
Mining Social Media Data For PolicingMining Social Media Data For Policing
Mining Social Media Data For PolicingMiriam Fernandez
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media DataMiriam Fernandez
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsMiriam Fernandez
 
Slides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptxSlides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptxMiriam Fernandez
 
Artificial Intelligence for Policing
Artificial Intelligence for PolicingArtificial Intelligence for Policing
Artificial Intelligence for PolicingMiriam Fernandez
 
OUSocial OUSocMed conference
OUSocial OUSocMed conference OUSocial OUSocMed conference
OUSocial OUSocMed conference Miriam Fernandez
 
On the use of social media for evidence-based policing
On the use of social media for evidence-based policingOn the use of social media for evidence-based policing
On the use of social media for evidence-based policingMiriam Fernandez
 
SocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs WorkshopSocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs WorkshopMiriam Fernandez
 
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...Miriam Fernandez
 
ESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from FacebookESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from FacebookMiriam Fernandez
 
Wm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-finalWm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-finalMiriam Fernandez
 
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...Miriam Fernandez
 

More from Miriam Fernandez (17)

Mining Social Media Data For Policing
Mining Social Media Data For PolicingMining Social Media Data For Policing
Mining Social Media Data For Policing
 
Introduction to Mining Social Media Data
Introduction to Mining Social Media DataIntroduction to Mining Social Media Data
Introduction to Mining Social Media Data
 
Online Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future DirectionsOnline Misinformation: Challenges and Future Directions
Online Misinformation: Challenges and Future Directions
 
Slides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptxSlides 28-feb-2018-v2.pptx
Slides 28-feb-2018-v2.pptx
 
Artificial Intelligence for Policing
Artificial Intelligence for PolicingArtificial Intelligence for Policing
Artificial Intelligence for Policing
 
OUSocial OUSocMed conference
OUSocial OUSocMed conference OUSocial OUSocMed conference
OUSocial OUSocMed conference
 
On the use of social media for evidence-based policing
On the use of social media for evidence-based policingOn the use of social media for evidence-based policing
On the use of social media for evidence-based policing
 
SocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs WorkshopSocInfo2014 CityLabs Workshop
SocInfo2014 CityLabs Workshop
 
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
ECSM2014: Using Social Media To Inform Policy Making: To whom are we listenin...
 
ESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from FacebookESWC 2014 Tutorial Handson 1: Collect Data from Facebook
ESWC 2014 Tutorial Handson 1: Collect Data from Facebook
 
ESWC 2014 Tutorial Part 4
ESWC 2014 Tutorial Part 4ESWC 2014 Tutorial Part 4
ESWC 2014 Tutorial Part 4
 
ESWC 2014 Tutorial part 3
ESWC 2014 Tutorial part 3ESWC 2014 Tutorial part 3
ESWC 2014 Tutorial part 3
 
ESWC 2014 Tutorial part 2
ESWC 2014 Tutorial part 2ESWC 2014 Tutorial part 2
ESWC 2014 Tutorial part 2
 
ESWC 2014 Tutorial part 1
ESWC 2014 Tutorial part 1ESWC 2014 Tutorial part 1
ESWC 2014 Tutorial part 1
 
Wm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-finalWm unit1.6-slides-semantic web-final
Wm unit1.6-slides-semantic web-final
 
CAEPIA 2011
CAEPIA 2011CAEPIA 2011
CAEPIA 2011
 
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
Iswc 2011: Linking Data Across Universities: An Integrated Video Lectures Dat...
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Online Radicalisation Research Challenges

  • 1. 1 Staffordshire University 5th March 2020 Online Radicalisation: Work, Challenges and Future Directions Presenting: Miriam Fernandez @miriam_fs fernandezmiriam @miriamfs
  • 2. 2 Staffordshire University 5th March 2020 Targeting Societal Challenges by Analysing Social Media Data 2
  • 5. 5 Staffordshire University 5th March 2020 Online Radicalisation • Is the process by which individuals are introduced to ideological messages and belief systems that encourage movement from mainstream beliefs toward extreme views, primarily through the use of online media[International Assoc of Chiefs of Police and United States of America]
  • 6. 6 Staffordshire University 5th March 2020 Islamic State in Iraq and Syria (ISIS) Social Media Propaganda & Recruiting
  • 7. 7 Staffordshire University 5th March 2020 ISIS on Social Media
  • 8. 8 Staffordshire University 5th March 2020 What are the mechanisms that govern the process of radicalisation, and online radicalisation in particular? Social Science Factors Roots Stages Failed Integration Poverty Discrimination Pre-radicalisation Self-identification Indoctrination Jihadization Micro, or individual roots Meso, or social roots Macro, or global roots
  • 9. 9 Staffordshire University 5th March 2020 Computer Science Data Collection Analysis Detection Prediction Communication flow Spiritual authorities Propaganda Language evolution Radicalisation process Radicalisation channels Lexicon-based Machine-learningUsers Content False Positives Adopt extremist content (share) Interact with extremist accounts
  • 10. 10 Staffordshire University 5th March 2020 Online Radicalisation Research: Challenges Fernandez Miriam and Alani Harith (2020). Online Extremism: Challenges and Opportunities for Artificial Intelligence. Policing and Artificial Intelligence Book. Editors Dr John L.M. McDaniel and Prof Ken (In press)
  • 11. 11 Staffordshire University 5th March 2020 Main Challenges lack of a common definition of prohibited radical and extremist internet activity comparison against a control group comparison against approaches (no replication studies) Content adaptation User-Account adaptation Platform adaptation Technology adaptation technology needs to comply with legislation that can sometimes be ambiguous or contradictory, particularly when it comes to the tension between security, privacy and freedom of expression.
  • 12. 12 Staffordshire University 5th March 2020 Mechanisms for Data Collection, Verification and Validation
  • 13. 13 Staffordshire University 5th March 2020 Data Issues
  • 14. 14 Staffordshire University 5th March 2020 RQ. How can we translate the different aspects of social theories of radicalisation into computational methods to enable the automatic identification of radicalised behaviour?
  • 15. 15 Staffordshire University 5th March 2020 Fernandez, Miriam, Moizzah Asif, and Harith Alani. "Understanding the roots of radicalisation on twitter." Proceedings of the 10th ACM Conference on Web Science. 2018. Fernandez, Miriam; Gonzalez-Pardo, Antonio and Alani, Harith (2019). Radicalisation Influence in Social Media. Journal of Web Science, 6 Understanding the roots of radicalisation on twitter
  • 16. 16 Staffordshire University 5th March 2020 Roots of Radicalisation & Radicalisation Influence Micro or Individual roots Macro or Global roots Meso or Group roots Radicalisation Influence Content from friends Authored posts Content from news and other websites Radicalisation Influence • Individual: similarity of own content to radicalisation terminology • Social: similarity of retweeted content from followees to radicalization terminology • Global: similarity of content shared from news and websites to radicalization terminology
  • 17. 17 Staffordshire University 5th March 2020 Modelling Roots of Radicalisation Feeling lonely today  http://url1 RT @diabla We need to fight for our brothers! http://url2 RT @minid Allah is always with you! RT @dk Dabiq is our message! http://url2 RT @hobbes what a beautiful day today!  I have brothers who pray for me! http://url3 @Calvi n Micro or Individual roots Meso or Group roots Macro or Global roots http://url1 http://url2 http://url3
  • 18. 18 Staffordshire University 5th March 2020 Calculating Radicalisation Influence Radicalisation Lexicon w1 w2 w3
  • 19. 19 Staffordshire University 5th March 2020 Experiments & Results General • 112 accounts manually assessed as “general” by 2 annotators • 197,743 tweets Datasets Pro-ISIS • 112 pro-ISIS accounts • 17,350 tweets
  • 20. 20 Staffordshire University 5th March 2020 Social Influence The more radicalisation content a user is exposed to and shares, the more likely for them to adopt a similar language over time. • The network is the essence of social media platforms. • Harm propagates across the network, and influences recipients over time. • Need to protect and alert users to harmful influences and influencers. • Monitor and regulate the use of networking recommendation algorithms. Individual influence: similarity of own content to radicalisation terminology Socialinfluence:similarityof retweetedcontenttoradicalisation terminology Tools to measure radicalisation influence and behaviour
  • 21. 21 Staffordshire University 5th March 2020 Predicting Radicalisation Influence w1 w2 w3 w4 ? W5 w1 w2 w3 w5 w6 w11 w7 w1 Present Prediction Radicalisation Influence Collaborative Filtering  1) Look for users that have a similar word-use / “rating” pattern to that of the active user  2) use the ratings of users found in step 1 to compute the predictions for the active user
  • 22. 22 Staffordshire University 5th March 2020 Fernandez, Miriam and Alani, Harith (2018). Contextual Semantics for Radicalisation Detection on Twitter. In: Semantic Web for Social Good Workshop (SW4SG) at International Semantic Web Conference 2018, 9 Oct 2018, CEUR. Saif, Hassan; Dickinson, Thomas; Kastler, Leon; Fernandez, Miriam and Alani, Harith (2017). A Semantic Graph-Based Approach for Radicalisation Detection on Social Media. In: ESWC 2017: The Semantic Web - Proceedings, Part I, Lecture Notes in Computer Science, Springer, Contextual Semantics for Radicalisation Detection on Twitter
  • 23. 23 Staffordshire University 5th March 2020 Radical Terminology: Usage Divergence pro-ISIS users “general” users Radical Terminology
  • 24. 24 Staffordshire University 5th March 2020 Tweets Conceptual. Semantics. Extraction DBpedia Semantic.Graph. Representation Frequent.Semantic. Subgraph.Mining Classifier.Training Pipeline of detecting pro-ISIS stances using semantic sub-graph mining-based feature extraction • Extract and use the semantic interdependencies and relations between words to learn patterns of radicalisation. ISIS Syria Jihadist Group Country (Military Intervention Against ISIL, place, Syria) Entities Concepts Semantic Relations Semantic Graph-based Approach for Pro-ISIS Stance Detection
  • 25. 25 Staffordshire University 5th March 2020 Semantic Graph-based Approach for Pro-ISIS Stance Detection Step 1. Conceptual Semantic Extraction Training Data: 566 pro-ISIS users / 566 anti-ISIS users (extracted using lexicons) Entity Extraction and Semantics Mapping Syria -> Country ISIL-> Jihadist Group Syria -> Country ISIL-> Jihadist Group DBpedia Step 2. Semantic Graph Representation Step 3. Sub-graph Mining CloseGraph Method (Yan and Han 2003)
  • 26. 26 Staffordshire University 5th March 2020 Evaluation & Results • Baseline for comparison SVM classifiers trained from Unigrams, Topic, Sentiment and Network feature sets. • 10-Folds cross validation over 30 runs 86.3 86.3 84.8 86 91.7 84.4 84.4 81 87.1 92.8 80 82 84 86 88 90 92 94 Unigrams Sentiment Topics Network Semantics anti-ISIS pro-ISIS Exploration of semantic sub-graphs • pro-ISIS users tend to discuss about religion, historical events and ethnicity • anti-ISIS users focus more on politics, geographical locations and interventions against ISIS
  • 27. 27 Staffordshire University 5th March 2020 Global (Mis)perceptions of Radicalisation
  • 28. 28 Staffordshire University 5th March 2020 Global (mis)perception of radicalisation • Same messages are judged very differently in different parts of the world • Highlights differences and potential bias Not-Radical Radical Tie NA: North America SA: South America ME: Middle East AS: Asia EU: Europe AF: Africa
  • 29. 29 Staffordshire University 5th March 2020 Online ‘extreme’ Misogyny Farrell Tracie, Fernandez Miriam, Novotny Jakub and Alani Harith (2019). Exploring Misogyny across the Manosphere in Reddit. 10th ACM Conference on Web Science
  • 30. 30 Staffordshire University 5th March 2020 The Manosphere
  • 31. 31 Staffordshire University 5th March 2020 Experiencing the Manosphere Resentment of Women Attribution of Blame
  • 32. 32 Staffordshire University 5th March 2020 RQ2: Which groups express the most violent attitudes and what are the most common forms of online misogynistic violence? RQ1. How do these communities differ in terms of their use of violent or misogynistic speech? Studying Misogyny at Scale I/NON-FEMINIST “Manosphere” aligned Agents” Future emerging orms eminism Pick-up Artists (PUA) Involuntarily Celibate (INCEL) Men’s Rights Activists (MRA) Men Going Their Own Way (MGTOW) ans “Menenists” Father’s Rights
  • 33. 33 Staffordshire University 5th March 2020 Feminist/Sociological • Historical/contextual approaches • Rich description of communities Existing Approaches • Small number of researchers • Mostly qualitative Computer Science • Observational studies, analysing specific data • Predictive studies • Preference for certain platforms • Less attention to sociological/feminist models
  • 34. 34 Staffordshire University 5th March 2020 Our Approach 1. Grounded on exploring feminist models at scale 2. Utilising a dataset of 6M posts, 300K conversations on Reddit 3. Observing that data over a longer period of time (2011-2018)
  • 35. 35 Staffordshire University 5th March 2020 Feminist Sociological Models • Misogyny includes: belittling, hostility, sexual violence, and physical violence, patriarchy (Code, 2002) • Misogyny is often accompanied by homophobic and racist rhetoric (Davies, 2008) • Misogyny is developing towards: stoicism and flipped narratives of feminism (Zuckerberg, 2018 and Ging, 2017)
  • 36. 36 Staffordshire University 5th March 2020 Ingesting and Annotating Terms • Terms taken from a variety of online dictionaries for profanity, racist or homophobic abuse, violence verbs and hate speech (2,454 unique terms) • Annotated using a coding scheme developed from the literature
  • 37. 37 Staffordshire University 5th March 2020 Development of the Lexicons • creation of 9 lexicons • 1300 annotated terms
  • 38. 38 Staffordshire University 5th March 2020 Selection of Subreddits
  • 39. 39 Staffordshire University 5th March 2020 Authors • Increase in authorship since 2016 • Sharpest in r/braincels after r/incels is quarantined
  • 40. 40 Staffordshire University 5th March 2020 Studying the Manosphere at Scale Sexual Violence Hostility
  • 41. 41 Staffordshire University 5th March 2020 What we learned • Authorship in the more violent communities appears to be growing. • Language within misogynistic groups appears to have become more hostile over time, which corroborates existing feminist scholarship. Non-violent groups tend to express more stoicism. • Groups who expressed the most violent attitudes toward women also express violent attitudes toward other minorities or groups that experience exclusion. Co-occurrence found in feminist scholarship. • Hostility is the most common type of misogynistic violence. RQ1. How do these communities differ in terms of their use of violent or misogynistic speech? RQ2: Which groups express the most violent attitudes and what are the most common forms of online misogynistic violence?
  • 42. 42 Staffordshire University 5th March 2020 Thanks for Listening!

Editor's Notes

  1. Salafi jihadist militant group that follows an Islamic fundamentalist, Wahhabi doctrine of Sunni Islam who managed in less than a year to capture of large swathes of land across Syria and Iraq
  2. What differentiate ISIS from other extremist and radicalized groups is their effective and successful use of Social media to promote their propaganda and recruited new members online. In fact ISIS is considered by many research and governmental organizations as the most successful Jihadi group online This has reflected by large number of people from the west adopting ISIS propaganda and move to joining them in Syria and Iraq CNN has estimated that up to 11,000 foreigners have travelled to Syria to take up arms agains Bashar Al Assad's government. When Islamic majority countries aren't taken into account, then the vast majority of these come from Russia, unsurprising given its large Muslim population. Substantial numbers of fighters have also come from France, the United Kingdom and Germany - some 700, 500 and 300 respectively. Over 100 fighers have also travelled to Syria from the United States. leading organisations in the use of social media for sharing their propaganda, for raising funds, and for radicalising and recruiting individuals around the globe. According to a 2015 U.S government report,3 this organisation succeeded in recruiting more than 25,000 foreign fighters in Syria and Iraq, including 4,500 from Europe and North America.
  3. In 2007 the New York Police Department (NYPD) published their own model of radicalisation [33], focused on Jihadi-Salafi ideology and “the west”. This model is composed of four distinct phases. Pre-radicalisation; most individuals at this stage have lived “ordinary” lives and have little, if any criminal history. In a second stage, self-identification, individuals, influenced by both, internal and external factors, (loosing a job, alienation and discrimination, death in the close family, etc.) begin to explore Salafi Islam. In the third phase, indoctrination, individuals progressively intensify their beliefs and conclude that circumstances exist where action is required to support the cause. In the final phase, jihadisation, individuals accept their individual duty to participate in violent jihad and self-designate themselves as holy warriors.
  4. It is however difficult to understand how the radicalisation process tends to kickstart and evolve online, especially when the amount of traffic generated in social media is so vast. Manual analysis is impractical and thus automatic techniques need to be used. We need to look at online radicalisation as a process, and to leverage closer the knowledge of theoretical models of radicalisation to design more effective technological solutions to tracking online radicalisation.
  5. When a user participates in a social media platform, she can perform two main actions in terms of posting: (i) creating and posting new content and (ii) sharing content posted by someone within her network. In our work we assume that the micro (individual) root is captured by all the posts that the user has created. Similarly, the meso (or social) influence is captured by all the post that the user has shared.We are aware that a user is exposed to more information than the one that she shares. However, when a user is sharing a piece of content, it is a strong indicator that that piece of content has somehow influenced the user who is making it part of her own ideas and believes. Within the posts that a user creates or shares from her network we can also find links (URLs) to external sites (YouTube videos, news sites, blogs, etc.). These sites capture the macro (global) level of influence over an individual.
  6. Need to remember that FB, Instagram, Twitter, etc etc are made up of networks. network is backbone when it comes to regulating and sanitising the platforms, we need to take the network into account. We need to understand how people get influenced on these networks, and how harm propagates across them. Dataset from kaggle 112 pro-ISIS 112 general accounts who used ISIS terminology
  7. As discussed before, the discriminative power of features used for radicalisation detection often relies on the latent semantic interdependencies that exist between certain words in tweets. As such, the proposed approach aims to extract and use such interdependencies and relations to learn patterns of radicalisation.
  8. One of the first things that we noticed about the discourse around feminism within the manosphere was the lack of attention to intersectionality - the different (sometimes contradictory) perspectives, experiences and goals within the feminist community. In fact feminism was grounded on rejecting essentialism in defining what it means to be a woman. Likewise, feminists question essentialism in what it means to be a man. Their lack of attention to those differences may have contributed to the belief that feminists are contradicting themselves, avoiding or rejecting the alternative explanation that feminists might feel differently on certain issues and advocate different solutions to different problems. To help improve transparency in our OWN research on the manosphere and to explore the differences between communities, we decided to pick apart what is meant with the term misogyny and examine each of those aspects across several communities on Reddit.
  9. In the paper we talk about some ethnographic studies that were conducted by researchers Kendall and Lin, who spent a considerable amount of time engaging with the communities they were studying, talking to members, being a part of online discussion.
  10. We chose a a range of communities that are speaking about incels, ranging from more mainstream subreddits like MGTOW, to self-proclaimed non-violent incels, to groups with more extreme language. We also included two groups that are anti-incel, to be able to compare their language use with that of more extreme communities. Finally, we included two subreddits as controls, one that generally uses sexually explicit terms and discusses women’s anatomy (would be likely to use the same sexualised terms we would expect to find in other groups) and a group of self-reported women incels, who would be likely speaking about some of the same injustices as their male peers without explicitly misogynistic language