Presentation to South Hub: Social Cybersecurity WG
Related paper:
Ugur Kursuncu, Manas Gaur, Carlos Castillo, Amanuel Alambo, Krishnaprasad Thirunarayan, Valerie Shalin, Dilshod Achilov, I. Budak Arpinar, Amit Sheth.
Modeling Islamist Extremist Communications on Social Media using Contextual Dimensions: Religion, Ideology, and Hate. Proc. of The 22nd ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2019).
https://dl.acm.org/doi/pdf/10.1145/3359253
The Great Escape
The government is going after Vijay Mallya but another
absconder, Jatin Mehta of Winsome Diamonds, seems to
have got away scot- free with Rs 7,000 crore owed to
banks. An India Legal investigation shows that a Swiss
bank account in his wife Sonia’s name is being used to
transfer funds. Why are the authorities reluctant to
pursue the man linked to the Adani family?
Conceptual frameworks for understanding global jihadism braniffbraniff
This brief is meant to serve as an introduction to global jihadism, by examining the al-Qa'ida centric movement from multiple vantage points, including grand historical, theological, political, virtual and organizational.
Terrorism can be defined as most infectious disease in today world. It can also be considered as a fatal communicable disease where people do not get sufficient time to revive themselves. It is a purposive creation of some segments of vested interest groups in the World with having a broader view of mass destructions; dislocate the people from their origin of the place. They utilize such mechanism which is success to spread very fast the fear psychosis among the people so that these people lose the faith and confidence among themselves resulting in victimization and untimely death of mass population. Since invention of life, the World must have witnessed of several activities those are barbaric in nature and the amount of loss may be equilibrium to today’s loss on terrorist attack, but unfortunate that, it was not defined and measured in any angles by the intellectual people. Human beings are always in favour of peace and prosperity. Today we will behave ourselves in such a way for our self-gratification, we forget us as a human being. Therefore, it is not only a question in Mumbai attack, attacked on our parliament or WT Centre in USA wherever may be. We find that, these perpetrators are human being those are having no colour and castes. The pressure from burgeoning population face by world today should never be compensated with this activity which ultimately kills us, destroy us and deprive us from achieving our goals. Today time has come to recognize that interest groups, those are not only instigating the vulnerable people to engage these activities, but also pushing us into the World of miseries and poverty at large. Therefore, this paper discusses various issues of terrorism and its impact on us.
A FORCE MORE POWERFUL: CONFRONTING TERRORISM NONVIOLENTLYgrellet
To prevent terrorism now and in the future, we need to turn to nonviolent measures that do not perpetuate the problem. Such measures exit and they are viable. Let's talk.
The Great Escape
The government is going after Vijay Mallya but another
absconder, Jatin Mehta of Winsome Diamonds, seems to
have got away scot- free with Rs 7,000 crore owed to
banks. An India Legal investigation shows that a Swiss
bank account in his wife Sonia’s name is being used to
transfer funds. Why are the authorities reluctant to
pursue the man linked to the Adani family?
Conceptual frameworks for understanding global jihadism braniffbraniff
This brief is meant to serve as an introduction to global jihadism, by examining the al-Qa'ida centric movement from multiple vantage points, including grand historical, theological, political, virtual and organizational.
Terrorism can be defined as most infectious disease in today world. It can also be considered as a fatal communicable disease where people do not get sufficient time to revive themselves. It is a purposive creation of some segments of vested interest groups in the World with having a broader view of mass destructions; dislocate the people from their origin of the place. They utilize such mechanism which is success to spread very fast the fear psychosis among the people so that these people lose the faith and confidence among themselves resulting in victimization and untimely death of mass population. Since invention of life, the World must have witnessed of several activities those are barbaric in nature and the amount of loss may be equilibrium to today’s loss on terrorist attack, but unfortunate that, it was not defined and measured in any angles by the intellectual people. Human beings are always in favour of peace and prosperity. Today we will behave ourselves in such a way for our self-gratification, we forget us as a human being. Therefore, it is not only a question in Mumbai attack, attacked on our parliament or WT Centre in USA wherever may be. We find that, these perpetrators are human being those are having no colour and castes. The pressure from burgeoning population face by world today should never be compensated with this activity which ultimately kills us, destroy us and deprive us from achieving our goals. Today time has come to recognize that interest groups, those are not only instigating the vulnerable people to engage these activities, but also pushing us into the World of miseries and poverty at large. Therefore, this paper discusses various issues of terrorism and its impact on us.
A FORCE MORE POWERFUL: CONFRONTING TERRORISM NONVIOLENTLYgrellet
To prevent terrorism now and in the future, we need to turn to nonviolent measures that do not perpetuate the problem. Such measures exit and they are viable. Let's talk.
This slideshow explores the uses of Many Eyes as a classroom teaching and analysis tool. In particular, it looks at how students at St. Edward's University in Rhetorical Criticism analyze speech texts using visualization tools available on Many Eyes. Tag Clouds, Wordles, and Word Trees are combined to determine word frequencies and clusters. These findings are used to create a rhetorical analysis based upon Kenneth Burke's Cluster Criticism.
Assessing ISIS: Success or Failure of Islamist Insurgenciesinventionjournals
Assessing the current and long-term success of the Islamist insurgent group, the “Islamic State” (hereafter “ISIS”), requires not only identifying prerequisites for conducting insurgency but also assessing the group’s ability to attain the goals proclaimed by its ideology or program. Such success or failure can be determined by a systematic comparison with other Islamist insurgent groups which have either failed or succeeded in achieving their stated objectives. Examining the historical and theological backgrounds of movements, such as al Qaeda and Hezbollah, reveals that success requires having visible leadership openly controlling a territory and providing security and social services to its population. The importance of territorial control, a social-political infrastructure, and external legitimation is demonstrated by the relative success of groups enjoying Iranian support, such as Hezbollah, over Islamist groups following the non-state strategy of al Qaeda. ISIS has a visible leadership openly controlling a territory and providing at least minimal security and social services to its population but lacking belligerent status and having rejected alliances with like-minded Salafist groups sharing most of its goals. Another essential but often overlooked condition for success for militant Islamist movements is the endorsement of the traditional Muslim Ulema as guardians of the Islamic faith.
International Religious Freedom & Urgencies for World Peace, Security, Justic...JAMESESCHAEFER
A Proposal to Implement US Department of State Grassroots World Religious Freedom Peacebuilding. Too long have grassroots peacebuilding solutions for international religious freedom been neglected or overlooked. They have not received urgent, serious national or international support, interest, or action. Now is the time to implement—to “jumpstart”—urgent religious freedom peacebuilding with highly professional, grassroots personnel, training, mobilization, sponsorship, and action. And, the U.S. Department of State Office of International Religious Freedom can do it!
The corresponding video is at https://youtu.be/ztNHKLTHBrA AIISC conducts foundational and translational research in AI. In this talk, we review part of the AIISC's research in Social Good, Social Harm, and Public Health.
This talk was given to the UofSC College on Information and Communication.
Additional project details at http://wiki.aiisc.ai
#UnitedCVE: Countering Violent Extremism and Counter NarrativesOnnik James Krikorian
First draft of slides for my presentation on Countering Violent Extremism (CVE) and Counter Narratives this coming Wednesday at the Caucasus Research Resource Centre (CRRC) in Tbilisi, Georgia. It will also look at the potential value of CVE practice in traditional conflict resolution settings.
Alexandria, Virginia (November 19, 2014) — ENODO Global, Inc. presented at the Countering Terrorism and Violent Extremism conference held at the Defence Academy of the United Kingdom. The conference, part of the Symposia at Shrivenham series, provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration and exchange of experience and knowledge. Such multi-perspective open exchanges lead to constructive questioning and a synthesis of ideas in a relaxed but professional environment.
This presentation provided solutions for how governments and corporations can design and implement effective population-centric communications and engagement strategies. By adopting a proactive approach to counter civil unrest, institutions can delegitimize activist’s narratives and activities, diminish their influence and utility, and build cohesion between government institutions, companies, and communities. This allows for channeling of resources to address grievances in an ordered, constructive manner.
Overview of preventing and countering violent extremismRichard Ali
This slide gives an overview of preventing and countering violent extremism (PCVE) for a Nigerian audience of senior government officals. A historical background is given as well as an exploration of state response and other factors that gave rise to PCVE as a specialism and a practice.
Understanding Online Socials Harm: Examples of Harassment and RadicalizationAmit Sheth
https://dbsec2019.cse.sc.edu/Keynote.html
Abstract: As social media permeates our daily life, there has been a sharp rise in the misuse of social media affecting our society in large. Specifically, harassment and radicalization have become two major problems on social media platforms with significant implications on the well-being of individuals as well as communities. A 2017 Pew Research survey on online harassment found that 66% of adult Internet users have observed online harassment and 41% have personally experienced it. Nearly 18% of Americans have faced severe forms of harassment online such as physical threats, harassment over a sustained period, sexual harassment or stalking. Moreover, malicious organizations (e.g., terrorist groups, white nationalists not classified legally as terrorists but as a group with extreme ideology) have been using social media for sharing their propaganda and misinformation to persuade individuals and eventually recruit them to propagate their ideology. These communications related to harassment and radicalization are complex concerning their language and contextual characteristics, making recognition of such narratives challenging for researchers as well as social media companies. As most of the existing approaches fail to capture fundamental nuances in the language of these communications, two prominent challenges have emerged: ambiguity and sparsity. Sole data level bottom-up analysis has been unsuccessful in revealing the actual meaning of the content. Considering the significant sensitivity of these problems and its implications at individual and community levels, a potential solution requires reliable algorithms for modeling such communications.
Our approach to understanding communications between source and target requires deciphering the unique language, semantic and contextual characteristics, including sentiment, emotion, and intention. This context-aware and knowledge-enhanced computational approach to the analysis of these narratives breaks down this long-running and complex process into contextual building blocks that acknowledge inherent ambiguity and sparsity. Based on prior empirical and qualitative research in social sciences, particularly cognitive psychology, and political science, we model this process using a combination of contextual dimensions -- e.g., for Islamist radicalization: religion, ideology, and hate -- each elucidating a degree of radicalization and highlighting independent features to render them computationally accessible.
This slideshow explores the uses of Many Eyes as a classroom teaching and analysis tool. In particular, it looks at how students at St. Edward's University in Rhetorical Criticism analyze speech texts using visualization tools available on Many Eyes. Tag Clouds, Wordles, and Word Trees are combined to determine word frequencies and clusters. These findings are used to create a rhetorical analysis based upon Kenneth Burke's Cluster Criticism.
Assessing ISIS: Success or Failure of Islamist Insurgenciesinventionjournals
Assessing the current and long-term success of the Islamist insurgent group, the “Islamic State” (hereafter “ISIS”), requires not only identifying prerequisites for conducting insurgency but also assessing the group’s ability to attain the goals proclaimed by its ideology or program. Such success or failure can be determined by a systematic comparison with other Islamist insurgent groups which have either failed or succeeded in achieving their stated objectives. Examining the historical and theological backgrounds of movements, such as al Qaeda and Hezbollah, reveals that success requires having visible leadership openly controlling a territory and providing security and social services to its population. The importance of territorial control, a social-political infrastructure, and external legitimation is demonstrated by the relative success of groups enjoying Iranian support, such as Hezbollah, over Islamist groups following the non-state strategy of al Qaeda. ISIS has a visible leadership openly controlling a territory and providing at least minimal security and social services to its population but lacking belligerent status and having rejected alliances with like-minded Salafist groups sharing most of its goals. Another essential but often overlooked condition for success for militant Islamist movements is the endorsement of the traditional Muslim Ulema as guardians of the Islamic faith.
International Religious Freedom & Urgencies for World Peace, Security, Justic...JAMESESCHAEFER
A Proposal to Implement US Department of State Grassroots World Religious Freedom Peacebuilding. Too long have grassroots peacebuilding solutions for international religious freedom been neglected or overlooked. They have not received urgent, serious national or international support, interest, or action. Now is the time to implement—to “jumpstart”—urgent religious freedom peacebuilding with highly professional, grassroots personnel, training, mobilization, sponsorship, and action. And, the U.S. Department of State Office of International Religious Freedom can do it!
The corresponding video is at https://youtu.be/ztNHKLTHBrA AIISC conducts foundational and translational research in AI. In this talk, we review part of the AIISC's research in Social Good, Social Harm, and Public Health.
This talk was given to the UofSC College on Information and Communication.
Additional project details at http://wiki.aiisc.ai
#UnitedCVE: Countering Violent Extremism and Counter NarrativesOnnik James Krikorian
First draft of slides for my presentation on Countering Violent Extremism (CVE) and Counter Narratives this coming Wednesday at the Caucasus Research Resource Centre (CRRC) in Tbilisi, Georgia. It will also look at the potential value of CVE practice in traditional conflict resolution settings.
Alexandria, Virginia (November 19, 2014) — ENODO Global, Inc. presented at the Countering Terrorism and Violent Extremism conference held at the Defence Academy of the United Kingdom. The conference, part of the Symposia at Shrivenham series, provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration and exchange of experience and knowledge. Such multi-perspective open exchanges lead to constructive questioning and a synthesis of ideas in a relaxed but professional environment.
This presentation provided solutions for how governments and corporations can design and implement effective population-centric communications and engagement strategies. By adopting a proactive approach to counter civil unrest, institutions can delegitimize activist’s narratives and activities, diminish their influence and utility, and build cohesion between government institutions, companies, and communities. This allows for channeling of resources to address grievances in an ordered, constructive manner.
Overview of preventing and countering violent extremismRichard Ali
This slide gives an overview of preventing and countering violent extremism (PCVE) for a Nigerian audience of senior government officals. A historical background is given as well as an exploration of state response and other factors that gave rise to PCVE as a specialism and a practice.
Understanding Online Socials Harm: Examples of Harassment and RadicalizationAmit Sheth
https://dbsec2019.cse.sc.edu/Keynote.html
Abstract: As social media permeates our daily life, there has been a sharp rise in the misuse of social media affecting our society in large. Specifically, harassment and radicalization have become two major problems on social media platforms with significant implications on the well-being of individuals as well as communities. A 2017 Pew Research survey on online harassment found that 66% of adult Internet users have observed online harassment and 41% have personally experienced it. Nearly 18% of Americans have faced severe forms of harassment online such as physical threats, harassment over a sustained period, sexual harassment or stalking. Moreover, malicious organizations (e.g., terrorist groups, white nationalists not classified legally as terrorists but as a group with extreme ideology) have been using social media for sharing their propaganda and misinformation to persuade individuals and eventually recruit them to propagate their ideology. These communications related to harassment and radicalization are complex concerning their language and contextual characteristics, making recognition of such narratives challenging for researchers as well as social media companies. As most of the existing approaches fail to capture fundamental nuances in the language of these communications, two prominent challenges have emerged: ambiguity and sparsity. Sole data level bottom-up analysis has been unsuccessful in revealing the actual meaning of the content. Considering the significant sensitivity of these problems and its implications at individual and community levels, a potential solution requires reliable algorithms for modeling such communications.
Our approach to understanding communications between source and target requires deciphering the unique language, semantic and contextual characteristics, including sentiment, emotion, and intention. This context-aware and knowledge-enhanced computational approach to the analysis of these narratives breaks down this long-running and complex process into contextual building blocks that acknowledge inherent ambiguity and sparsity. Based on prior empirical and qualitative research in social sciences, particularly cognitive psychology, and political science, we model this process using a combination of contextual dimensions -- e.g., for Islamist radicalization: religion, ideology, and hate -- each elucidating a degree of radicalization and highlighting independent features to render them computationally accessible.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Italy Agriculture Equipment Market Outlook to 2027harveenkaur52
Agriculture and Animal Care
Ken Research has an expertise in Agriculture and Animal Care sector and offer vast collection of information related to all major aspects such as Agriculture equipment, Crop Protection, Seed, Agriculture Chemical, Fertilizers, Protected Cultivators, Palm Oil, Hybrid Seed, Animal Feed additives and many more.
Our continuous study and findings in agriculture sector provide better insights to companies dealing with related product and services, government and agriculture associations, researchers and students to well understand the present and expected scenario.
Our Animal care category provides solutions on Animal Healthcare and related products and services, including, animal feed additives, vaccination
2.Cellular Networks_The final stage of connectivity is achieved by segmenting...JeyaPerumal1
A cellular network, frequently referred to as a mobile network, is a type of communication system that enables wireless communication between mobile devices. The final stage of connectivity is achieved by segmenting the comprehensive service area into several compact zones, each called a cell.
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfFlorence Consulting
Quattordicesimo Meetup di Milano, tenutosi a Milano il 23 Maggio 2024 dalle ore 17:00 alle ore 18:30 in presenza e da remoto.
Abbiamo parlato di come Axpo Italia S.p.A. ha ridotto il technical debt migrando le proprie APIs da Mule 3.9 a Mule 4.4 passando anche da on-premises a CloudHub 1.0.
Understanding User Behavior with Google Analytics.pdfSEO Article Boost
Unlocking the full potential of Google Analytics is crucial for understanding and optimizing your website’s performance. This guide dives deep into the essential aspects of Google Analytics, from analyzing traffic sources to understanding user demographics and tracking user engagement.
Traffic Sources Analysis:
Discover where your website traffic originates. By examining the Acquisition section, you can identify whether visitors come from organic search, paid campaigns, direct visits, social media, or referral links. This knowledge helps in refining marketing strategies and optimizing resource allocation.
User Demographics Insights:
Gain a comprehensive view of your audience by exploring demographic data in the Audience section. Understand age, gender, and interests to tailor your marketing strategies effectively. Leverage this information to create personalized content and improve user engagement and conversion rates.
Tracking User Engagement:
Learn how to measure user interaction with your site through key metrics like bounce rate, average session duration, and pages per session. Enhance user experience by analyzing engagement metrics and implementing strategies to keep visitors engaged.
Conversion Rate Optimization:
Understand the importance of conversion rates and how to track them using Google Analytics. Set up Goals, analyze conversion funnels, segment your audience, and employ A/B testing to optimize your website for higher conversions. Utilize ecommerce tracking and multi-channel funnels for a detailed view of your sales performance and marketing channel contributions.
Custom Reports and Dashboards:
Create custom reports and dashboards to visualize and interpret data relevant to your business goals. Use advanced filters, segments, and visualization options to gain deeper insights. Incorporate custom dimensions and metrics for tailored data analysis. Integrate external data sources to enrich your analytics and make well-informed decisions.
This guide is designed to help you harness the power of Google Analytics for making data-driven decisions that enhance website performance and achieve your digital marketing objectives. Whether you are looking to improve SEO, refine your social media strategy, or boost conversion rates, understanding and utilizing Google Analytics is essential for your success.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Understanding Factors driving Extremism on Social Media
1. Understanding factors driving
Extremism on Social Media
Icons by thenounproject
Slides by SlideModel
Ugur Kursuncu, Amit Sheth
AI Institute, University of South Carolina
Team: Ugur Kursuncu, Manas Gaur, JM Berger, Carlos Castillo, Amanuel Alambo, Krishnaprasad Thirunarayan,
Valerie Shalin, Dilshod Achilov, I. Budak Arpinar, Amit Sheth
South Big Data Hub, Social Cyber Security Working Group
April 2, 2020
Artificial Intelligence
Institute
2. 2
● Efforts by online platforms are
inadequate.
● Governments insist that the
industry has a ‘social
responsibility’ to do more to
remove harmful content.
● If unsolved, social media
platforms will continue to
negatively impact the society.
Online Extremism - Ongoing Open Problem
4. 4
● 1000 Americans between 1980 and
2011 (including 300 Americans
since 2011) have attempted to
travel or traveled.
● > 5000 individuals from Europe have
traveled to Join Extremist Terrorist
Groups (ISIS, Al-Qaeda) abroad
through 2015,
● Most inspired and persuaded online.
*George Washington University, Program on Extremism
“The Travelers”
5. ● 24 year old college student from Alabama became
radicalized on Twitter. After a year, moved to Syria to join
ISIS.
● Self-taught, she read verses from the Qur’an, but interpreted
them with others in the extremist network.
● Persuaded that when the true Islamic State is declared, it is
obligatory to do hijrah, which they see as the pilgrimage to
‘the State’. 5
*New York Times: “Alabama Woman Who Joined ISIS Can’t Return Home, U.S. Says”
Illustrative Case
6. (e.g., recruiter, follower) with
respect to different stages of
radicalization.
Modeling users
content and psychological
process over time.
Persuasive
relevant to Islamist
extremism.
Domain Knowledge
of the context (“jihad” has
different meaning in
different context)
Multidimensionality
Radicalization
Challenges & Potential Solutions
7. 7
0
None
Mainstream
religious views
and
orientations
Indicator:
Islam; Allah;
jihad (self
struggle); halal;
democracy,
islam, salah,
fatwa, hajj.
1
Low
Attitudinal
support for
politically
moderate
Islamism
Indicator:
Hadith;
Caliphate
(Khilafah)
justified;
Sharia better
(than secular
law);
Hypocrisy west.
2
Elevated
Emergent
support for
exclusive rule of
the Shari’a law
Indicator:
Shariah best;
revenge
(justified);
jihad (against
West); justify
Daesh (ISIS)
3
High
Support for
extremist networks
and travel to “Darul
Islam”
Indicator:
Kafir; infidel;
hijrah to Darul-
Islam;
(supporting)
fatwa Al-
Awlaki;
mushrikeen.
4
Severe
Call for action
to join the fight
and the use of
violence.
Indicator:
apostate;
sahwat; taghut;
kill; kafir; kuffar;
murtadd;
tawaghit;
al_baghdadi;
martyrdom
khilafah
Radicalization Scale (Dilshod Achilov et al.)
8. 8
Analysis of content in context can provide deeper understanding
of the factors characterizing the radicalization process.
Non-extremist
ordinary
individual
Radicalized
extremist
individual
0 1 2 4
SevereHighLowNone Elevated
3
Radicalization Process over time (Dilshod Achilov et al.)
9. Incorrect classification of
non-extremist as extremist
can be harmful.
False alarm might potentially
impact millions of innocent
people. 9
Local and Global security implications -
Need for reliable prediction of online
terrorist activities.
Cautionary Note
10. ● Verified and suspended by Twitter.
● Time frame: Oct 2010 – Aug 2017
● Includes 538 extremist users, from two resources. (Fernandez, 2018) (Ferrara,
2016)
○ Twitter verified users by anti-abuse team.
○ Lucky Troll Club
● 538 Non-extremist users were created from an annotated muslim religious
dataset that contains Muslim users. (Chen, 2014)
-Miriam Fernandez, Moizzah Asif, and Harith Alani. 2018. Understanding the roots of radicalisation on twitter. In Proceedings of the 10th ACM Conference on Web
Science.
-Emilio Ferrara, Wen-Qiang Wang, Onur Varol, Alessandro Flammini, and Aram Galstyan. 2016. Predicting online extremism, content adopters, and interaction reciprocity.
In International conference on social informatics.
-Chen, L., Weber, I., & Okulicz-Kozaryn, A. (2014, November). US religious landscape on Twitter. In International Conference on Social Informatics (pp. 544-560). Springer,
Cham.
Dataset
12. 12
● Dimensions to define the context:
○ Based on literature and our empirical study of the data,
three contextual dimensions are identified:
Religion, Ideology, Hate
● The distribution of prevalent terms (i.e., words, phrases,
concepts) in each dimension is different.
● Different dimensions needed to contextualize and
disambiguate common ‘diagnostic’ terms (e.g., jihad).
Contexts to study Extremist Content
13. 13
“Reportedly, a number of
apostates were killed in
the process. Just
because they like it I
guess.. #SpringJihad
#CountrysideCleanup”
“Kindness is a language
which the blind can see
and the deaf can hear
#MyJihad be kind
always”
“By the Lord of Muhammad (blessings and peace be upon
him) The nation of Jihad and martyrdom can never be
“Jihad” can appear in tweets with different meanings in different dimensions of
the context.
H
I
R
Example Tweets with “Jihad”
14. 14
● Same term can have different
meanings for each dimensions.
● Example:
“Meaning of Jihad” is different
for extremists and non-
extremists.
○ For extremists, meaning closer to
“awlaki”, “islamic state”,
“aqeedah”
○ For non-extremists, closer to
“muslims”, “quran”, “imams” ExtremistsNon-Extremists
Ambiguity of Diagnostic terms/phrases
15. ● Different Contextual Dimensions
incorporating:
○ Dimension-specific Corpora
○ Verified by Domain Expert
● Domain Specific Corpora creation:
Religion: Qur’an, Hadith
Ideology: Books, lectures of ideologues
Hate: Hate Speech Corpus (Davidson, 2017)
● Can be applied over many social problems.
15
W2V
Islamic
Corpus
Religious
Dimension
(R)
R
R
R
Contextual Dimension Modeling
is a one-time learning process
User
Contextual
Dimension based
Representation
W2V
Ideologic
al Corpus
W2V
Hate
Corpus
(...)
I
I
I
(...)
H
H
H
(...)
Davidson, T., Warmsley, D., Macy, M., & Weber, I. (2017, May). Automated hate speech detection and the problem of offensive language. In Eleventh
international aaai conference on web and social media.
Contextual Dimension Modeling
16. Capturing similarity (and resolving ambiguity):
● Learning word similarities from a large corpora.
● A solution via distributional similarity-based representations.
16(Hate)
User Representations
“You shall know a word by the company it keeps” (J. R. Firth 1957: 11)
17. ● For religion:
Extremist and non-extremist users are significantly similar to each other.
● For hate:
Extremist and non-extremist users do not show much similarity.
Religion Ideology
NonExtremists
Extremists
17
Religion Ideology Hate
User Similarity
18. ● For religion and hate, among extremists:
There seems to be a number of users that are significantly different from
each other.
● Possibility of outliers.
Extremists
Extremists
18
Religion Ideology Hate
User Similarity
19. ● A group of extremist users, form a cluster farther from other users for
Religion and Hate.
● Suggesting there might be outliers in the dataset.
19
User Visualization for Dimensions
20. ● Randomly selected 10 users and visualize for each dimension.
● Repeated this selection many times, every time same users formed a
separate cluster. In this case below, the users are D, A.
20
Random 10 Users
User Visualization for Dimensions
21. ● Identified 99 (18%), 48 (9%) and 141 (26%)
users in the extremist dataset, clustered as
likely outliers for religion, ideology and hate,
respectively.
● A random sample of 76 users (15% ) from the
extremist dataset, to validate the identified
potential likely outliers.
● Our domain expert annotated these users as
likely extremist, likely extremist and unclear.
Kappa Score = 82%
Separation of users within the extremist dataset
through clustering
Mann-Whitney U-test
Outlier Detection
22. ● Obtained the set of 49 outlier users in
the extremist dataset. Rest is labeled
as likely extremists
● Content of the outlier users contains
the following prevalent concepts:
marriage, Allah, bonded, silence, Islam
leaders, Berjaya hilarious, cake, miss
mit, kemaren, Quran, Khuda, prophet,
Muhammad, Ahmad.
Separation of users within the extremist dataset
through clustering
Outliers
23. ● Identified 148 users who had relatively sparse contextual content for at least
one of the three dimensions.
● Based on the topical similarity of user content.
● Training two LDA models, one for the extremist dataset and another for non-
extremist dataset.
● The ratio of intersection topics ( )over the union of the topics between
sparse and dense representations ( ) for each dimension ( ).
Imputation for Sparse Representations
24. 24
● Tri-dimension model performs best.
Imputation improves performance.
● Precision used as metric, to
emphasize reduction on
misclassification of non-extremist
content.
● Precision for RIH and Recall for RH.
● Implications in a large scale
application.
Results
25. ● Domain Specific Knowledge plays critical role and importance of ground
truth for such complex problems.
● False alarms: significantly reduced via incorporation of three domain
specific dimensions. It further reduces the likelihood of an unfair
mistreatment towards non-extremist individuals, in a potential real world
deployment.
● Misclassification of non-extremist users can have significant
implications in a large-scale application where non-extremists vastly
outnumber extremists.
● Higher precision reduces potential social discrimination. 25
Key Insights
26. ● Extremist users employ religion along with hate,
suggesting they employ different hate tactics for their
targets.
● Each dimension plays different roles in different levels of
radicalization, capturing nuances as well as linguistic and
semantic cues better throughout the radicalization
process.
26
Key Insights
27. 27
Questions?
@UgurKursuncu
Supporting Grants:
NSF Award#: CNS 1513721 --Context-Aware Harassment Detection on Social Media (wiki link) is
currently an interdisciplinary project at AI Institute at the University of South Carolina, formerly
at the Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis), the Department of
Psychology, and Center for Urban and Public Affairs (CUPA) at Wright State University.
Carlos Castillo was supported by La Caixa (LCF) project (LCF/PR/PR16/11110009)
D. Achilov was supported in part by the Universityof Notre Dame (UND) Global Religion Research
Initiative (GRRI) grant through Templeton ReligionTrust (Grant ID: TRT0118).
Thank You!
Editor's Notes
How the recruiters able to recruit others to join their extreme causes. What tools and tactics they are using.
What are the language, cultural, emotional characteristics, that enable them to recruit others.
Motivation slide.
Investing insuch efforts are expensive.
Social responsibility.
First amendment.
Though continue impact society.
Religion may play more role first, hate later
Cite Achilov
These implications may reduce trust in the system.
Sahwat: any sunni muslim that opposes the extremist group.
The surrounding words will represent the words in bold and italic.
Start motivating outlier detection from this slide.
Talk more about significance of outliers.
Give more insights from this slide. Implications related to these outliers.
Validation Kappa: 69 correct and 7 incorrect matches
non-parametric Mann-Whitney U-test for each contextual dimension.
This outcome suggests that the variance between the
content of the two clusters of users based on each dimension is high; hence,
the users in these two clusters are significantly different from each other.
Connect to social media companies. Why they are more passive than active since it ...
Validation Kappa: 69 correct and 7 incorrect matches
Why sparse. Connect to different stages of radicalization.
Why use precision? How 1% misclassification would translate into a big number of people being affected.