#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist
and Counter-extremist Twitter Narratives
- URL: http://arxiv.org/abs/2008.11808v1
- Date: Wed, 26 Aug 2020 20:46:45 GMT
- Title: #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist
and Counter-extremist Twitter Narratives
- Authors: Fatima Zahrah, Jason R. C. Nurse, Michael Goldsmith
- Abstract summary: This study will apply computational techniques to analyse the narratives of various pro-extremist and counter-extremist Twitter accounts.
Our findings show that pro-extremist accounts often use different strategies to disseminate content when compared to counter-extremist accounts across different types of organisations.
- Score: 2.685668802278155
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The rapid expansion of cyberspace has greatly facilitated the strategic shift
of traditional crimes to online platforms. This has included malicious actors,
such as extremist organisations, making use of online networks to disseminate
propaganda and incite violence through radicalising individuals. In this
article, we seek to advance current research by exploring how supporters of
extremist organisations craft and disseminate their content, and how posts from
counter-extremism agencies compare to them. In particular, this study will
apply computational techniques to analyse the narratives of various
pro-extremist and counter-extremist Twitter accounts, and investigate how the
psychological motivation behind the messages compares between pro-ISIS and
counter-extremism narratives. Our findings show that pro-extremist accounts
often use different strategies to disseminate content (such as the types of
hashtags used) when compared to counter-extremist accounts across different
types of organisations, including accounts of governments and NGOs. Through
this study, we provide unique insights into both extremist and
counter-extremist narratives on social media platforms. Furthermore, we define
several avenues for discussion regarding the extent to which counter-messaging
may be effective at diminishing the online influence of extremist and other
criminal organisations.
Related papers
- PropaInsight: Toward Deeper Understanding of Propaganda in Terms of Techniques, Appeals, and Intent [71.20471076045916]
Propaganda plays a critical role in shaping public opinion and fueling disinformation.
Propainsight systematically dissects propaganda into techniques, arousal appeals, and underlying intent.
Propagaze combines human-annotated data with high-quality synthetic data.
arXiv Detail & Related papers (2024-09-19T06:28:18Z) - Dynamic Matrix of Extremisms and Terrorism (DMET): A Continuum Approach
Towards Identifying Different Degrees of Extremisms [0.0]
We propose to extend the current binary understanding of terrorism (versus non-terrorism) with a Dynamic Matrix of Extremisms and Terrorism (DMET)
DMET considers the whole ecosystem of content and actors that can contribute to a continuum of extremism.
It organizes levels of extremisms by varying degrees of ideological engagement and the presence of violence.
arXiv Detail & Related papers (2023-12-01T04:13:48Z) - Understanding writing style in social media with a supervised
contrastively pre-trained transformer [57.48690310135374]
Online Social Networks serve as fertile ground for harmful behavior, ranging from hate speech to the dissemination of disinformation.
We introduce the Style Transformer for Authorship Representations (STAR), trained on a large corpus derived from public sources of 4.5 x 106 authored texts.
Using a support base of 8 documents of 512 tokens, we can discern authors from sets of up to 1616 authors with at least 80% accuracy.
arXiv Detail & Related papers (2023-10-17T09:01:17Z) - Identification of Twitter Bots based on an Explainable ML Framework: the
US 2020 Elections Case Study [72.61531092316092]
This paper focuses on the design of a novel system for identifying Twitter bots based on labeled Twitter data.
Supervised machine learning (ML) framework is adopted using an Extreme Gradient Boosting (XGBoost) algorithm.
Our study also deploys Shapley Additive Explanations (SHAP) for explaining the ML model predictions.
arXiv Detail & Related papers (2021-12-08T14:12:24Z) - ExtremeBB: A Database for Large-Scale Research into Online Hate,
Harassment, the Manosphere and Extremism [12.647120939857635]
We introduce ExtremeBB, a textual database of over 53.5M posts made by 38.5k users on 12 extremist bulletin board forums promoting online hate, harassment, the manosphere and other forms of extremism.
It enables large-scale analyses of qualitative and quantitative historical trends going back two decades.
ExtremeBB comes with a robust ethical data-sharing regime that allows us to share data with academics worldwide.
arXiv Detail & Related papers (2021-11-08T13:15:25Z) - Fragments of the Past: Curating Peer Support with Perpetrators of
Domestic Violence [88.37416552778178]
We report on a ten-month study where we worked with six support workers and eighteen perpetrators in the design and deployment of Fragments of the Past.
We share how crafting digitally-augmented artefacts - 'fragments' - of experiences of desisting from violence can translate messages for motivation and rapport between peers.
These insights provide the basis for practical considerations for future network design with challenging populations.
arXiv Detail & Related papers (2021-07-09T22:57:43Z) - News consumption and social media regulations policy [70.31753171707005]
We analyze two social media that enforced opposite moderation methods, Twitter and Gab, to assess the interplay between news consumption and content regulation.
Our results show that the presence of moderation pursued by Twitter produces a significant reduction of questionable content.
The lack of clear regulation on Gab results in the tendency of the user to engage with both types of content, showing a slight preference for the questionable ones which may account for a dissing/endorsement behavior.
arXiv Detail & Related papers (2021-06-07T19:26:32Z) - Educators, Solicitors, Flamers, Motivators, Sympathizers: Characterizing
Roles in Online Extremist Movements [9.89901717499058]
We identify five roles surrounding extremist activism: educators, solicitors, flamers, motivators, sympathizers.
We find that roles core to the movement, educators and solicitors, are more stable, while flamers and motivators can transition to sympathizers with high probability.
arXiv Detail & Related papers (2021-05-18T20:55:11Z) - Is radicalization reinforced by social media censorship? [0.0]
Radicalized beliefs, such as those tied to QAnon, Russiagate, and other political conspiracy theories, can lead some individuals and groups to engage in violent behavior.
This article presents and agent-based model of a social media network that enables investigation of the effects of censorship on the amount of dissenting information.
arXiv Detail & Related papers (2021-03-23T21:07:34Z) - Echo Chambers on Social Media: A comparative analysis [64.2256216637683]
We introduce an operational definition of echo chambers and perform a massive comparative analysis on 1B pieces of contents produced by 1M users on four social media platforms.
We infer the leaning of users about controversial topics and reconstruct their interaction networks by analyzing different features.
We find support for the hypothesis that platforms implementing news feed algorithms like Facebook may elicit the emergence of echo-chambers.
arXiv Detail & Related papers (2020-04-20T20:00:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.