首页> 外文会议>IEEE European Symposium on Security and Privacy Workshops >#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives
【24h】

#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives

机译:#ISIS与#ActionCounters恐怖主义:对极端主义和反极端主义Twitter叙述的计算分析

获取原文

摘要

The rapid expansion of cyberspace has greatly facilitated the strategic shift of traditional crimes to online platforms. This has included malicious actors, such as extremist organisations, making use of online networks to disseminate propaganda and incite violence through radicalising individuals. In this article, we seek to advance current research by exploring how supporters of extremist organisations craft and disseminate their content, and how posts from counter-extremism agencies compare to them. In particular, this study will apply computational techniques to analyse the narratives of various pro-extremist and counter-extremist Twitter accounts, and investigate how the psychological motivation behind the messages compares between pro-ISIS and counter-extremism narratives. Our findings show that pro-extremist accounts often use different strategies to disseminate content (such as the types of hashtags used) when compared to counter-extremist accounts across different types of organisations, including accounts of governments and NGOs. Through this study, we provide unique insights into both extremist and counter-extremist narratives on social media platforms. Furthermore, we define several avenues for discussion regarding the extent to which counter-messaging may be effective at diminishing the online influence of extremist and other criminal organisations. Cybercrime, online radicalisation, counterextremism, social media analysis, Twitter, cyber-criminals.
机译:网络空间的迅速扩展极大地促进了传统犯罪向在线平台的战略转移。其中包括极端组织等恶意行为者,他们利用在线网络散布宣传并通过激进化个人来煽动暴力。在本文中,我们通过探索极端主义组织的支持者如何设计和传播其内容以及反极端主义机构的帖子如何与之进行比较,来推动当前的研究。特别是,这项研究将应用计算技术来分析各种极端主义和反极端主义Twitter叙述的叙事,并研究这些信息背后的心理动机如何将亲ISIS和反对极端主义的叙事进行比较。我们的研究结果表明,与跨政府组织(包括政府和非政府组织的账户)的反极端主义账户相比,极端主义账户经常使用不同的策略来传播内容(例如所使用的标签的类型)。通过这项研究,我们对社交媒体平台上的极端主义和反极端主义叙述提供了独特的见解。此外,我们定义了几种讨论方式,以探讨反信息在多大程度上可以有效减少极端主义组织和其他犯罪组织的在线影响。网络犯罪,在线激进,反极端主义,社交媒体分析,Twitter,网络犯罪分子。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号