2015 European Intelligence and Security Informatics Conference 2015
DOI: 10.1109/eisic.2015.27
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Jihadist Messages on Twitter

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
47
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 77 publications
(49 citation statements)
references
References 9 publications
1
47
0
Order By: Relevance
“…Many such datasets (e.g., [2,3,28]) were collected using sets of keywords, where users whose tweets contain those words would be regarded as in the "radicalised" set. However, we continue to observe that many who use radicalisation terminology in their tweets are simply reporting current events (e.g., "Islamic State hacks Swedish radio station', or sharing harmless religious rhetoric (e.g., "If you want to talk to Allah, pray.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Many such datasets (e.g., [2,3,28]) were collected using sets of keywords, where users whose tweets contain those words would be regarded as in the "radicalised" set. However, we continue to observe that many who use radicalisation terminology in their tweets are simply reporting current events (e.g., "Islamic State hacks Swedish radio station', or sharing harmless religious rhetoric (e.g., "If you want to talk to Allah, pray.…”
Section: Discussionmentioning
confidence: 99%
“…Regarding detection we can highlight the works of Berger [5,6], Agarwal [2], Ashcroft [3] and Saif [29].…”
Section: Computational Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…Their domain are Western Jihadists. In contrast, Ashcroft et al (2015) identify specific messages from Twitter. Similarly, Wei et al (2016) identify Jihadist-related conversations.…”
Section: Background and Related Workmentioning
confidence: 99%