{"id":"https://openalex.org/W2141696017","doi":"https://doi.org/10.1109/isi.2008.4565037","title":"Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups","display_name":"Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups","publication_year":2008,"publication_date":"2008-06-01","ids":{"openalex":"https://openalex.org/W2141696017","doi":"https://doi.org/10.1109/isi.2008.4565037","mag":"2141696017"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2008.4565037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2008.4565037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101514503","display_name":"Hsinchun Chen","orcid":"https://orcid.org/0000-0001-9770-3762"},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Hsinchun Chen","raw_affiliation_strings":["Artificial Intelligence Laboratory, University of Arizona Tucson, USA","Artificial Intell. Lab., Arizona Univ., Tucson, AZ"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Laboratory, University of Arizona Tucson, USA","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"Artificial Intell. Lab., Arizona Univ., Tucson, AZ","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111950793","display_name":"Sven Thoms","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sven Thoms","raw_affiliation_strings":["Artificial Intelligence Laboratory, University of Arizona Tucson, USA","Artificial Intell. Lab., Arizona Univ., Tucson, AZ"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Laboratory, University of Arizona Tucson, USA","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"Artificial Intell. Lab., Arizona Univ., Tucson, AZ","institution_ids":["https://openalex.org/I138006243"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003811773","display_name":"Tianjun Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I138006243","display_name":"University of Arizona","ror":"https://ror.org/03m2x1q45","country_code":"US","type":"education","lineage":["https://openalex.org/I138006243"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tianjun Fu","raw_affiliation_strings":["Artificial Intelligence Laboratory, University of Arizona Tucson, USA","Artificial Intell. Lab., Arizona Univ., Tucson, AZ"],"affiliations":[{"raw_affiliation_string":"Artificial Intelligence Laboratory, University of Arizona Tucson, USA","institution_ids":["https://openalex.org/I138006243"]},{"raw_affiliation_string":"Artificial Intell. Lab., Arizona Univ., Tucson, AZ","institution_ids":["https://openalex.org/I138006243"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101514503"],"corresponding_institution_ids":["https://openalex.org/I138006243"],"apc_list":null,"apc_paid":null,"fwci":5.4963,"has_fulltext":false,"cited_by_count":40,"citation_normalized_percentile":{"value":0.9549708,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"98","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/exploratory-research","display_name":"Exploratory research","score":0.653296709060669},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5940605401992798},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5654398202896118},{"id":"https://openalex.org/keywords/web-application","display_name":"Web application","score":0.5172644257545471},{"id":"https://openalex.org/keywords/deep-web","display_name":"Deep Web","score":0.4587749242782593},{"id":"https://openalex.org/keywords/web-2.0","display_name":"Web 2.0","score":0.457304984331131},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.37551504373550415},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33805620670318604},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2775607705116272},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.21112078428268433},{"id":"https://openalex.org/keywords/social-science","display_name":"Social science","score":0.07214003801345825}],"concepts":[{"id":"https://openalex.org/C85973986","wikidata":"https://www.wikidata.org/wiki/Q1091731","display_name":"Exploratory research","level":2,"score":0.653296709060669},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5940605401992798},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5654398202896118},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.5172644257545471},{"id":"https://openalex.org/C46721378","wikidata":"https://www.wikidata.org/wiki/Q221989","display_name":"Deep Web","level":3,"score":0.4587749242782593},{"id":"https://openalex.org/C136699151","wikidata":"https://www.wikidata.org/wiki/Q131164","display_name":"Web 2.0","level":3,"score":0.457304984331131},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.37551504373550415},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33805620670318604},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2775607705116272},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.21112078428268433},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.07214003801345825}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2008.4565037","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2008.4565037","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2008 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5400000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1886337131","https://openalex.org/W2010490159","https://openalex.org/W2018886825","https://openalex.org/W2019755661","https://openalex.org/W2030894987","https://openalex.org/W2033615083","https://openalex.org/W2076447418","https://openalex.org/W2124834867","https://openalex.org/W2140265524","https://openalex.org/W2172034240","https://openalex.org/W2182015188","https://openalex.org/W3146248460","https://openalex.org/W6685642319"],"related_works":["https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2088352536","https://openalex.org/W2479912683","https://openalex.org/W3088449018","https://openalex.org/W2611716338","https://openalex.org/W2921679483","https://openalex.org/W1994490191","https://openalex.org/W174895088","https://openalex.org/W1968806268"],"abstract_inverted_index":{"As":[0],"part":[1],"of":[2,15,37,48,68],"the":[3,19,101,107],"NSF-funded":[4],"Dark":[5],"Web":[6,20,75],"research":[7],"project,":[8],"this":[9],"paper":[10],"presents":[11],"an":[12],"exploratory":[13],"study":[14],"cyber":[16],"extremism":[17],"on":[18],"2.0":[21,76],"media:":[22],"blogs,":[23],"YouTube,":[24],"and":[25,61,71,83,90],"Second":[26],"Life.":[27],"We":[28,40],"examine":[29],"international":[30],"Jihadist":[31],"extremist":[32],"groups":[33],"that":[34,42,98],"use":[35],"each":[36,64],"these":[38,43],"media.":[39],"observe":[41],"new,":[44],"interactive,":[45],"multimedia-rich":[46],"forms":[47],"communication":[49,91],"provide":[50],"effective":[51],"means":[52],"for":[53,74],"extremists":[54,105],"to":[55,85,96],"promote":[56],"their":[57],"ideas,":[58],"share":[59],"resources,":[60],"communicate":[62],"among":[63],"other.":[65],"The":[66],"development":[67],"automated":[69],"collection":[70],"analysis":[72],"tools":[73],"can":[77,99],"help":[78],"policy":[79],"makers,":[80],"intelligence":[81],"analysts,":[82],"researchers":[84],"better":[86],"understand":[87],"extremistspsila":[88],"ideas":[89],"patterns,":[92],"which":[93],"may":[94],"lead":[95],"strategies":[97],"counter":[100],"threats":[102],"posed":[103],"by":[104],"in":[106],"second-generation":[108],"Web.":[109]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":4},{"year":2015,"cited_by_count":6},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
