Dynamic Matrix of Extremisms and Terrorism (DMET): A Continuum Approach
Towards Identifying Different Degrees of Extremisms
- URL: http://arxiv.org/abs/2312.00337v1
- Date: Fri, 1 Dec 2023 04:13:48 GMT
- Title: Dynamic Matrix of Extremisms and Terrorism (DMET): A Continuum Approach
Towards Identifying Different Degrees of Extremisms
- Authors: Marten Risius, Kevin M. Blasiak, Susilo Wibisono, Rita Jabri-Markwell,
Winnifred Louis
- Abstract summary: We propose to extend the current binary understanding of terrorism (versus non-terrorism) with a Dynamic Matrix of Extremisms and Terrorism (DMET)
DMET considers the whole ecosystem of content and actors that can contribute to a continuum of extremism.
It organizes levels of extremisms by varying degrees of ideological engagement and the presence of violence.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: We propose to extend the current binary understanding of terrorism (versus
non-terrorism) with a Dynamic Matrix of Extremisms and Terrorism (DMET). DMET
considers the whole ecosystem of content and actors that can contribute to a
continuum of extremism (e.g., right-wing, left-wing, religious, separatist,
single-issue). It organizes levels of extremisms by varying degrees of
ideological engagement and the presence of violence identified (e.g., partisan,
fringe, violent extremism, terrorism) based on cognitive and behavioral cues
and group dynamics. DMET is globally applicable due to its comprehensive
conceptualization of the levels of extremisms. It is also dynamic, enabling
iterative mapping with the region- and time-specific classifications of
extremist actors. Once global actors recognize DMET types and their distinct
characteristics, they can comprehensively analyze the profiles of extremist
actors (e.g., individuals, groups, movements), track these respective actors
and their activities (e.g., social media content) over time, and launch
targeted counter activities (e.g. de-platforming, content moderation, or
redirects to targeted CVE narratives).
Related papers
- Large Language Models Reflect the Ideology of their Creators [73.25935570218375]
Large language models (LLMs) are trained on vast amounts of data to generate natural language.
We uncover notable diversity in the ideological stance exhibited across different LLMs and languages.
arXiv Detail & Related papers (2024-10-24T04:02:30Z) - Attacks in Adversarial Machine Learning: A Systematic Survey from the
Life-cycle Perspective [69.25513235556635]
Adversarial machine learning (AML) studies the adversarial phenomenon of machine learning, which may make inconsistent or unexpected predictions with humans.
Some paradigms have been recently developed to explore this adversarial phenomenon occurring at different stages of a machine learning system.
We propose a unified mathematical framework to covering existing attack paradigms.
arXiv Detail & Related papers (2023-02-19T02:12:21Z) - Countering Malicious Content Moderation Evasion in Online Social
Networks: Simulation and Detection of Word Camouflage [64.78260098263489]
Twisting and camouflaging keywords are among the most used techniques to evade platform content moderation systems.
This article contributes significantly to countering malicious information by developing multilingual tools to simulate and detect new methods of evasion of content.
arXiv Detail & Related papers (2022-12-27T16:08:49Z) - Physical Adversarial Attack meets Computer Vision: A Decade Survey [55.38113802311365]
This paper presents a comprehensive overview of physical adversarial attacks.
We take the first step to systematically evaluate the performance of physical adversarial attacks.
Our proposed evaluation metric, hiPAA, comprises six perspectives.
arXiv Detail & Related papers (2022-09-30T01:59:53Z) - DISARM: Detecting the Victims Targeted by Harmful Memes [49.12165815990115]
DISARM is a framework that uses named entity recognition and person identification to detect harmful memes.
We show that DISARM significantly outperforms ten unimodal and multimodal systems.
It can reduce the relative error rate for harmful target identification by up to 9 points absolute over several strong multimodal rivals.
arXiv Detail & Related papers (2022-05-11T19:14:26Z) - From Motor Control to Team Play in Simulated Humanoid Football [56.86144022071756]
We train teams of physically simulated humanoid avatars to play football in a realistic virtual environment.
In a sequence of stages, players first learn to control a fully articulated body to perform realistic, human-like movements.
They then acquire mid-level football skills such as dribbling and shooting.
Finally, they develop awareness of others and play as a team, bridging the gap between low-level motor control at a timescale of milliseconds.
arXiv Detail & Related papers (2021-05-25T20:17:10Z) - Educators, Solicitors, Flamers, Motivators, Sympathizers: Characterizing
Roles in Online Extremist Movements [9.89901717499058]
We identify five roles surrounding extremist activism: educators, solicitors, flamers, motivators, sympathizers.
We find that roles core to the movement, educators and solicitors, are more stable, while flamers and motivators can transition to sympathizers with high probability.
arXiv Detail & Related papers (2021-05-18T20:55:11Z) - Learning future terrorist targets through temporal meta-graphs [8.813290741555994]
We propose the use of temporal meta-graphs and deep learning to forecast future terrorist targets.
We derive 2-day-based time series that measure the centrality of each feature within each dimension over time.
Formulating the problem in the context of the strategic behavior of terrorist actors, these multivariate temporal sequences are then utilized to learn what target types are at the highest risk of being chosen.
arXiv Detail & Related papers (2021-04-21T08:09:57Z) - #ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist
and Counter-extremist Twitter Narratives [2.685668802278155]
This study will apply computational techniques to analyse the narratives of various pro-extremist and counter-extremist Twitter accounts.
Our findings show that pro-extremist accounts often use different strategies to disseminate content when compared to counter-extremist accounts across different types of organisations.
arXiv Detail & Related papers (2020-08-26T20:46:45Z) - A Bayesian decision support system for counteracting activities of
terrorist groups [0.0]
Terrorist groups present a serious threat to the security and well-being of the general public.
Such observable behaviour and communications data can be utilised by the authorities to estimate the threat posed by a terrorist group.
Here we develop a Bayesian integrating decision support system that can bring together information relating to each of the members of a terrorist group as well as the combined activities of the group.
arXiv Detail & Related papers (2020-07-08T20:23:25Z) - A Complex Networks Approach to Find Latent Clusters of Terrorist Groups [5.746505534720595]
We build a multi-partite network that includes terrorist groups and related information on tactics, weapons, targets, active regions.
We show that groups belonging to opposite ideologies can share very common behaviors and that Islamist/jihadist groups hold behavioral characteristics with respect to the others.
arXiv Detail & Related papers (2020-01-10T10:08:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.