2016 European Intelligence and Security Informatics Conference (EISIC) 2016
DOI: 10.1109/eisic.2016.029
|View full text |Cite
|
Sign up to set email alerts
|

Key Player Identification in Terrorism-Related Social Media Networks Using Centrality Measures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 18 publications
(20 citation statements)
references
References 19 publications
0
20
0
Order By: Relevance
“…Recent works have examined the use of social media platforms by terrorist groups and organizations (Chatfield et al 2015;Klausen 2015). Moreover, key player and key community identification in terrorism-related Twitter networks has been addressed through the use of different centrality measures and community detection algorithms (Gialampoukidis et al 2016(Gialampoukidis et al , 2017. Complementary to the aforementioned research efforts, our paper analyzes several textual, spatial, temporal and social network features which, when combined, are capable of characterizing the terrorism-related nature of Twitter accounts.…”
Section: Related Workmentioning
confidence: 99%
“…Recent works have examined the use of social media platforms by terrorist groups and organizations (Chatfield et al 2015;Klausen 2015). Moreover, key player and key community identification in terrorism-related Twitter networks has been addressed through the use of different centrality measures and community detection algorithms (Gialampoukidis et al 2016(Gialampoukidis et al , 2017. Complementary to the aforementioned research efforts, our paper analyzes several textual, spatial, temporal and social network features which, when combined, are capable of characterizing the terrorism-related nature of Twitter accounts.…”
Section: Related Workmentioning
confidence: 99%
“…In the resulting network of users, each user is represented by a node and a link between two users (i, k) exists if user n i mentions or is mentioned by user n k . We use entropy-based centralities to, first, identify key-players [10] and we then extend the method by associating key-players with their community.…”
Section: Key Terrorism Community Detection Frameworkmentioning
confidence: 99%
“…whereas Mapping Entropy Betweenness centrality [10] is defined as a function of betweenness centrality:…”
Section: Centrality-based Key Player Identificationmentioning
confidence: 99%
See 2 more Smart Citations