{"id":"https://openalex.org/W2945060553","doi":"https://doi.org/10.1109/isi.2019.8823548","title":"Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter","display_name":"Understanding the Radical Mind: Identifying Signals to Detect Extremist Content on Twitter","publication_year":2019,"publication_date":"2019-07-01","ids":{"openalex":"https://openalex.org/W2945060553","doi":"https://doi.org/10.1109/isi.2019.8823548","mag":"2945060553"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2019.8823548","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2019.8823548","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1905.08067","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Mariam Nouh","orcid":null},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Mariam Nouh","raw_affiliation_strings":["Department of Computer Science, University of Oxford, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, UK","institution_ids":["https://openalex.org/I40120149"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jason R.C. Nurse","orcid":null},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Jason R.C. Nurse","raw_affiliation_strings":["School of Computing, University of Kent, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computing, University of Kent, UK","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"last","author":{"id":null,"display_name":"Michael Goldsmith","orcid":null},"institutions":[{"id":"https://openalex.org/I40120149","display_name":"University of Oxford","ror":"https://ror.org/052gg0110","country_code":"GB","type":"education","lineage":["https://openalex.org/I40120149"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Michael Goldsmith","raw_affiliation_strings":["Department of Computer Science, University of Oxford, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Oxford, UK","institution_ids":["https://openalex.org/I40120149"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I40120149"],"apc_list":null,"apc_paid":null,"fwci":12.3045,"has_fulltext":true,"cited_by_count":52,"citation_normalized_percentile":{"value":0.98315299,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"98","last_page":"103"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/radicalization","display_name":"Radicalization","score":0.7390000224113464},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4586000144481659},{"id":"https://openalex.org/keywords/content","display_name":"Content (measure theory)","score":0.450300008058548},{"id":"https://openalex.org/keywords/terrorism","display_name":"Terrorism","score":0.4359000027179718},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.42969998717308044},{"id":"https://openalex.org/keywords/mode","display_name":"Mode (computer interface)","score":0.4034000039100647}],"concepts":[{"id":"https://openalex.org/C2777113924","wikidata":"https://www.wikidata.org/wiki/Q3416483","display_name":"Radicalization","level":3,"score":0.7390000224113464},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5921000242233276},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4586000144481659},{"id":"https://openalex.org/C2778152352","wikidata":"https://www.wikidata.org/wiki/Q5165061","display_name":"Content (measure theory)","level":2,"score":0.450300008058548},{"id":"https://openalex.org/C203133693","wikidata":"https://www.wikidata.org/wiki/Q7283","display_name":"Terrorism","level":2,"score":0.4359000027179718},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.42969998717308044},{"id":"https://openalex.org/C48677424","wikidata":"https://www.wikidata.org/wiki/Q6888088","display_name":"Mode (computer interface)","level":2,"score":0.4034000039100647},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40059998631477356},{"id":"https://openalex.org/C162446236","wikidata":"https://www.wikidata.org/wiki/Q653137","display_name":"Content analysis","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3840000033378601},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3549000024795532},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.321399986743927},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.31540000438690186},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.30820000171661377},{"id":"https://openalex.org/C66402592","wikidata":"https://www.wikidata.org/wiki/Q2271421","display_name":"Sentiment analysis","level":2,"score":0.29789999127388},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.28780001401901245},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2547999918460846}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/isi.2019.8823548","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2019.8823548","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},{"id":"pmh:oai:kar.kent.ac.uk:73926","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ISI.2019.8823548>)","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:arXiv.org:1905.08067","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1905.08067","pdf_url":"https://arxiv.org/pdf/1905.08067","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1905.08067","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1905.08067","pdf_url":"https://arxiv.org/pdf/1905.08067","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2402700","https://openalex.org/W1590495275","https://openalex.org/W1971279355","https://openalex.org/W2004624112","https://openalex.org/W2059844909","https://openalex.org/W2081879869","https://openalex.org/W2117130368","https://openalex.org/W2166688228","https://openalex.org/W2240448247","https://openalex.org/W2247201174","https://openalex.org/W2250463706","https://openalex.org/W2276407171","https://openalex.org/W2400402966","https://openalex.org/W2743020938","https://openalex.org/W2784238536","https://openalex.org/W2962740662","https://openalex.org/W2963780471","https://openalex.org/W6682691769","https://openalex.org/W6684773713","https://openalex.org/W6695131652","https://openalex.org/W6724901020","https://openalex.org/W6727474401","https://openalex.org/W6737903541","https://openalex.org/W7053126446"],"related_works":[],"abstract_inverted_index":{"The":[0],"Internet":[1],"and,":[2],"in":[3,85],"particular,":[4],"Online":[5],"Social":[6],"Networks":[7],"have":[8],"changed":[9],"the":[10,26,63,68,101,150,180,185,202],"way":[11],"that":[12,25,97,166,179,193],"terrorist":[13],"and":[14,19,65,95,119,140,174],"extremist":[15,40,69,117],"groups":[16,32,118],"can":[17,219],"influence":[18],"radicalise":[20],"individuals.":[21],"Recent":[22],"reports":[23],"show":[24,165,192],"mode":[27],"of":[28,30,67,103,125,133],"operation":[29],"these":[31,138,144],"starts":[33],"by":[34,116],"exposing":[35],"a":[36,121,131],"wide":[37],"audience":[38],"to":[39,46,61,77,80,148,152,157],"material":[41,114],"online,":[42],"before":[43],"migrating":[44],"them":[45],"less":[47],"open":[48],"online":[49,58,160,226],"platforms":[50],"for":[51,100,224],"further":[52],"radicalization.":[53],"Thus,":[54],"identifying":[55],"radical":[56,83,104,126,161,167],"content":[57,84],"is":[59,76,108,155],"crucial":[60],"limit":[62],"reach":[64],"spread":[66],"narrative.":[70],"In":[71],"this":[72],"paper,":[73],"our":[74,190,209],"aim":[75],"identify":[78,89,159],"measures":[79],"automatically":[81,158],"detect":[82],"social":[86],"media.":[87],"We":[88,177,207],"several":[90],"signals,":[91],"including":[92],"textual,":[93,172],"psychological":[94,134,181],"behavioural,":[96],"together":[98],"allow":[99],"classification":[102],"messages.":[105],"Our":[106,163,217],"contribution":[107],"threefold:":[109],"(1)":[110],"we":[111,129,142],"analyze":[112],"propaganda":[113],"published":[115],"create":[120],"contextual":[122],"text-based":[123],"model":[124,132],"content,":[127],"(2)":[128],"build":[130],"properties":[135,182],"inferred":[136],"from":[137],"material,":[139],"(3)":[141],"evaluate":[143],"models":[145,195],"on":[146,211],"Twitter":[147],"determine":[149],"extent":[151],"which":[153],"it":[154],"possible":[156],"tweets.":[162],"results":[164,191],"users":[168],"do":[169],"exhibit":[170],"distinguishable":[171],"psychological,":[173],"behavioural":[175],"properties.":[176],"find":[178],"are":[183],"among":[184],"most":[186],"distinguishing":[187],"features.":[188,206],"Additionally,":[189],"textual":[194],"using":[196],"vector":[197],"embedding":[198],"features":[199],"significantly":[200],"improves":[201],"detection":[203],"over":[204],"TF-IDF":[205],"validate":[208],"approach":[210],"two":[212],"experiments":[213],"achieving":[214],"high":[215],"accuracy.":[216],"findings":[218],"be":[220],"utilized":[221],"as":[222],"signals":[223],"detecting":[225],"radicalization":[227],"activities.":[228]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":12},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":1}],"updated_date":"2026-05-01T08:36:08.643496","created_date":"2019-05-29T00:00:00"}
