2019
DOI: 10.1145/3359253
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Islamist Extremist Communications on Social Media using Contextual Dimensions

Abstract: Terror attacks have been linked in part to online extremist content. Online conversations are cloaked in religious ambiguity, with deceptive intentions, often twisted from mainstream meaning to serve a malevolent ideology. Although tens of thousands of Islamist extremism supporters consume such content, they are a small fraction relative to peaceful Muslims. The efforts to contain the ever-evolving extremism on social media platforms have remained inadequate and mostly ineffective. Divergent extremist and main… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0
2

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(34 citation statements)
references
References 23 publications
0
29
0
2
Order By: Relevance
“…Efisiensi dan efektivitas media sosial juga menjadi pengaruh bagi pengguna untuk memanfaatkan platform media sosial (Mathew et al, 2019). Terutama selektif dari ujaran kebencian dan hal-hal negatif dari dampak penggunaan media sosial sebagai sumber belajar agama (Kursuncu et al, 2019 ;Miller, 2017;Yar, 2018). Proses selektif ini berfungsi menelusuri konten yang valid, sebagaimana ditemukan berbagai pelanggaran kasus terhadap ketidakabsahan konten keagamaan (Myers, 2018).…”
Section: Pembahasanunclassified
“…Efisiensi dan efektivitas media sosial juga menjadi pengaruh bagi pengguna untuk memanfaatkan platform media sosial (Mathew et al, 2019). Terutama selektif dari ujaran kebencian dan hal-hal negatif dari dampak penggunaan media sosial sebagai sumber belajar agama (Kursuncu et al, 2019 ;Miller, 2017;Yar, 2018). Proses selektif ini berfungsi menelusuri konten yang valid, sebagaimana ditemukan berbagai pelanggaran kasus terhadap ketidakabsahan konten keagamaan (Myers, 2018).…”
Section: Pembahasanunclassified
“…Other influence modeling examines security threats in Social Gaming Networks (SGN) [52], using influence modeling to identify why certain players are targeted by scams or cyber attacks. Influence modeling has also been employed to improve the detection of subtle and long-running radicalization of individuals [53]. These examples show that there are many forms of influence modeling and methods of defining a campaign.…”
Section: Influence Models and Modelingmentioning
confidence: 99%
“…For instance, in the context of Islamist extremism, the true meaning of "jihad" can be propagated as harming others in the name of religion; on the other hand, in the context of the religion of Islam, it can be self-struggle to become a better person or fight for self-defense. 13 Hence, distinguishing these semantic differences in the assessment of such narratives and incorporating prior knowledge in contemporary models is essential. It is unlikely that a language model built from a large corpus will provide a clear context as it would be possible by using a knowledge graph or ontology.…”
Section: Thick Data Modeling For Understanding Message Contentmentioning
confidence: 99%
“…Hence, we need to better understand how the message with the misinformation is adopted and/or propagated by an individual. For instance, recent studies 13 of online radicalization by ISIS via persuasive tactics and strategies demonstrated the need for such an approach. These studies have observed that neurolinguistic, cognitive, and behavior changes were largely contextualized by religious, hate, and ideological dimensions.…”
Section: Flow Of Harmful Information Trust and Provenancementioning
confidence: 99%
See 1 more Smart Citation