2022
DOI: 10.3390/socsci11010023
|View full text |Cite
|
Sign up to set email alerts
|

An Application of Natural Language Processing to Classify What Terrorists Say They Want

Abstract: Knowing what perpetrators want can inform strategies to achieve safe, secure, and sustainable societies. To help advance the body of knowledge in counterterrorism, this research applied natural language processing and machine learning techniques to a comprehensive database of terrorism events. A specially designed empirical topic modeling technique provided a machine-aided human decision process to glean six categories of perpetrator aims from the motive text narrative. Subsequently, six different machine lear… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 48 publications
0
3
0
Order By: Relevance
“…GloVe was trained explicitly on Twitter data and all relevant tweet information. Bridgelall [28] used two AI approaches to determine perpetrators' motives from a massive database of terrorist acts globally. First, they categorize attackers' motivations into six categories using NLP and ML techniques: hate, protest, revenge, vulnerability, strength, and intimidation.…”
Section: A Machine Learning Approach For Enhancing Defense Against Gl...mentioning
confidence: 99%
See 1 more Smart Citation
“…GloVe was trained explicitly on Twitter data and all relevant tweet information. Bridgelall [28] used two AI approaches to determine perpetrators' motives from a massive database of terrorist acts globally. First, they categorize attackers' motivations into six categories using NLP and ML techniques: hate, protest, revenge, vulnerability, strength, and intimidation.…”
Section: A Machine Learning Approach For Enhancing Defense Against Gl...mentioning
confidence: 99%
“…Future studies should incorporate a more comprehensive analysis of the spatial-temporal aspects of terrorism by considering the neighboring pixel values within the raster datasets. [28] Descriptive Analysis: ML models used for topic modeling and text classification to identify the perpetrator's aim of the attacks Aims of the attacks are identified in six categories: Protest, retaliate, intimidate, weaken, force, and despise GTD Manual effort required for empirical topic modeling.…”
Section: Gtd Acled Icewsmentioning
confidence: 99%
“…One might assume that perpetrators consistently choose large cities with numerous targets such as public transportation, resulting in severe consequences. However, due to terrorism's adaptive nature and multifaceted motives (Bridgelall, 2022), targeted locations can vary widely. Applied intelligence to identify attributes more closely related to attacked locations can assist policymakers in prioritizing risk mitigation and countermeasure resources for locations at elevated risk.…”
Section: Introductionmentioning
confidence: 99%