Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2015
DOI: 10.25045/jpit.v06.i2.04
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Terrorism-Related Articles on the E-Government Using Text-Mining Techniques

Abstract: IntroductionModern criminal groups can commit malicious activities against the state and society not only in the real world, but also in a virtual environment (Internet, e-government). These activities usually have various purposes, including propaganda against the state and dissemination of information, which promote terrorism and shake the foundations of national and spiritual values. [1][2][3][4][5][6][7].The timely detection of this information in e-government is very important in ensuring the security of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 21 publications
(40 reference statements)
0
2
0
Order By: Relevance
“…A study conducted by the U.S. defense advanced research projects agency shows that their collaboration, modeling and analysis tools speeded analysis (Kylie, 2019), but these tools were not tailored to collecting and analyzing web information. Although a number of web mining technologies exist (Aliguliyev and Niftaliyeva, 2015), there has not been a comprehensive methodology yet to address problems of collecting and analyzing extremists' data on the web. Unfortunately, existing frameworks using data and text mining techniques (Benros et al, 2015) do not address issues specific to the dark web.…”
Section: Lack Of Extremists Rhetorical Researchmentioning
confidence: 99%
“…A study conducted by the U.S. defense advanced research projects agency shows that their collaboration, modeling and analysis tools speeded analysis (Kylie, 2019), but these tools were not tailored to collecting and analyzing web information. Although a number of web mining technologies exist (Aliguliyev and Niftaliyeva, 2015), there has not been a comprehensive methodology yet to address problems of collecting and analyzing extremists' data on the web. Unfortunately, existing frameworks using data and text mining techniques (Benros et al, 2015) do not address issues specific to the dark web.…”
Section: Lack Of Extremists Rhetorical Researchmentioning
confidence: 99%
“…Afterwards, studies in the following paradigm focused on context, management, and users of e-government (Geest & Vellemen, 2014). The primary driver behind this research direction is the increased pressure on governments and policymakers to achieve the MDGs (millennium development goals) (Anwaruddin, 2013;Kaur et al, 2014), counterattack terrorism (Aliguliyev & Niftaliyeva, 2015) and protect citizens from increasing cybersecurity crimes. The subsequent research paradigm concentrates on the properties of social media platforms that help e-governments better serve citizens (Linders, 2012).…”
Section: Theoretical Backgroundmentioning
confidence: 99%