{"id":"https://openalex.org/W2168359436","doi":"https://doi.org/10.1186/s13388-014-0005-5","title":"Automatic detection of cyber-recruitment by violent extremists","display_name":"Automatic detection of cyber-recruitment by violent extremists","publication_year":2014,"publication_date":"2014-08-12","ids":{"openalex":"https://openalex.org/W2168359436","doi":"https://doi.org/10.1186/s13388-014-0005-5","mag":"2168359436"},"language":"en","primary_location":{"id":"doi:10.1186/s13388-014-0005-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0005-5","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-014-0005-5","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-014-0005-5","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112440600","display_name":"Jacob R. Scanlon","orcid":null},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jacob R Scanlon","raw_affiliation_strings":["Predictive Technology Laboratory, Department of Systems and Information Engineering, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Predictive Technology Laboratory, Department of Systems and Information Engineering, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034370354","display_name":"Matthew S. Gerber","orcid":"https://orcid.org/0000-0002-9069-4100"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Matthew S Gerber","raw_affiliation_strings":["Predictive Technology Laboratory, Department of Systems and Information Engineering, University of Virginia, Charlottesville, VA, USA"],"affiliations":[{"raw_affiliation_string":"Predictive Technology Laboratory, Department of Systems and Information Engineering, University of Virginia, Charlottesville, VA, USA","institution_ids":["https://openalex.org/I51556381"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5112440600"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":13.1879,"has_fulltext":true,"cited_by_count":90,"citation_normalized_percentile":{"value":0.98460849,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"3","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10994","display_name":"Terrorism, Counterterrorism, and Political Violence","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.993399977684021,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/naive-bayes-classifier","display_name":"Naive Bayes classifier","score":0.7762443423271179},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7228368520736694},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.6742649674415588},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6280494928359985},{"id":"https://openalex.org/keywords/classifier","display_name":"Classifier (UML)","score":0.5137556791305542},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5070791244506836},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5010418891906738},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.49416664242744446},{"id":"https://openalex.org/keywords/logistic-regression","display_name":"Logistic regression","score":0.47058597207069397},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4544466435909271},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.44456619024276733},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.36729687452316284}],"concepts":[{"id":"https://openalex.org/C52001869","wikidata":"https://www.wikidata.org/wiki/Q812530","display_name":"Naive Bayes classifier","level":3,"score":0.7762443423271179},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7228368520736694},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.6742649674415588},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6280494928359985},{"id":"https://openalex.org/C95623464","wikidata":"https://www.wikidata.org/wiki/Q1096149","display_name":"Classifier (UML)","level":2,"score":0.5137556791305542},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5070791244506836},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5010418891906738},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.49416664242744446},{"id":"https://openalex.org/C151956035","wikidata":"https://www.wikidata.org/wiki/Q1132755","display_name":"Logistic regression","level":2,"score":0.47058597207069397},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4544466435909271},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.44456619024276733},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.36729687452316284},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1186/s13388-014-0005-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0005-5","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-014-0005-5","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1186/s13388-014-0005-5","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13388-014-0005-5","pdf_url":"https://security-informatics.springeropen.com/counter/pdf/10.1186/s13388-014-0005-5","source":{"id":"https://openalex.org/S2492493267","display_name":"Security Informatics","issn_l":"2190-8532","issn":["2190-8532"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security Informatics","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332447","display_name":"U.S. Army","ror":"https://ror.org/00afsp483"},{"id":"https://openalex.org/F4320338295","display_name":"Army Research Laboratory","ror":"https://ror.org/011hc8f90"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2168359436.pdf","grobid_xml":"https://content.openalex.org/works/W2168359436.grobid-xml"},"referenced_works_count":57,"referenced_works":["https://openalex.org/W13287817","https://openalex.org/W29875285","https://openalex.org/W175619926","https://openalex.org/W1497132007","https://openalex.org/W1504746788","https://openalex.org/W1516171683","https://openalex.org/W1536816303","https://openalex.org/W1539903039","https://openalex.org/W1588331569","https://openalex.org/W1608320902","https://openalex.org/W1880262756","https://openalex.org/W1964409641","https://openalex.org/W1971020202","https://openalex.org/W1972478307","https://openalex.org/W1996188930","https://openalex.org/W2006291951","https://openalex.org/W2024046085","https://openalex.org/W2026937586","https://openalex.org/W2045651396","https://openalex.org/W2050333529","https://openalex.org/W2051265834","https://openalex.org/W2053154970","https://openalex.org/W2061809273","https://openalex.org/W2063358706","https://openalex.org/W2101287943","https://openalex.org/W2113046211","https://openalex.org/W2119547127","https://openalex.org/W2125800013","https://openalex.org/W2135136394","https://openalex.org/W2141696017","https://openalex.org/W2147152072","https://openalex.org/W2153183668","https://openalex.org/W2164777277","https://openalex.org/W2165611314","https://openalex.org/W2166688228","https://openalex.org/W2197641664","https://openalex.org/W2252180690","https://openalex.org/W2319098611","https://openalex.org/W2461364306","https://openalex.org/W2790927322","https://openalex.org/W2799061466","https://openalex.org/W3122478813","https://openalex.org/W3143303760","https://openalex.org/W3214876850","https://openalex.org/W4205687621","https://openalex.org/W4211042622","https://openalex.org/W4231807245","https://openalex.org/W4236259340","https://openalex.org/W4238568766","https://openalex.org/W4243302061","https://openalex.org/W4250473655","https://openalex.org/W4256224324","https://openalex.org/W4285719527","https://openalex.org/W4302441674","https://openalex.org/W4399531585","https://openalex.org/W4399570166","https://openalex.org/W4399576177"],"related_works":["https://openalex.org/W2090763504","https://openalex.org/W148178222","https://openalex.org/W2394466068","https://openalex.org/W1987683558","https://openalex.org/W2104657898","https://openalex.org/W1948992892","https://openalex.org/W4313459160","https://openalex.org/W4367331014","https://openalex.org/W3160122104","https://openalex.org/W4388681644"],"abstract_inverted_index":{"Growing":[0],"use":[1],"of":[2,9,16,31,54,67,92,121,132,162,240,253,256],"the":[3,14,28,64,89,108,119,151,160,179,199,206,226],"Internet":[4,32],"as":[5,140],"a":[6,50,130,202,245,251],"major":[7],"means":[8],"communication":[10],"has":[11],"led":[12],"to":[13,23,27,39,45,88,98,177],"formation":[15],"cyber-communities,":[17],"which":[18,115],"have":[19],"become":[20],"increasingly":[21],"appealing":[22],"terrorist":[24,242],"groups":[25,69],"due":[26],"unregulated":[29],"nature":[30],"communication.":[33],"Online":[34],"communities":[35],"enable":[36],"violent":[37,68,101],"extremists":[38],"increase":[40],"recruitment":[41,65,243,266],"by":[42,118,211],"allowing":[43],"them":[44],"build":[46],"personal":[47],"relationships":[48],"with":[49,183],"worldwide":[51],"audience":[52],"capable":[53],"accessing":[55],"uncensored":[56],"content.":[57],"This":[58],"article":[59],"presents":[60],"methods":[61,77],"for":[62],"identifying":[63,94],"activities":[66],"within":[70,81],"extremist":[71,102],"social":[72],"media":[73],"websites.":[74],"Specifically,":[75],"these":[76,133],"apply":[78],"known":[79],"techniques":[80],"supervised":[82],"learning":[83],"and":[84,172,233,263,268],"natural":[85],"language":[86],"processing":[87],"untested":[90],"task":[91],"automatically":[93],"forum":[95,180],"posts":[96,139,262,267],"intended":[97],"recruit":[99],"new":[100],"members.":[103],"We":[104,146,158,248],"used":[105],"data":[106],"from":[107],"western":[109],"jihadist":[110],"website":[111],"Ansar":[112],"AlJihad":[113],"Network,":[114],"was":[116],"compiled":[117],"University":[120],"Arizona\u2019s":[122],"Dark":[123],"Web":[124],"Project.":[125],"Multiple":[126],"judges":[127],"manually":[128],"annotated":[129],"sample":[131],"data,":[134],"marking":[135],"192":[136],"randomly":[137],"sampled":[138],"recruiting":[141],"(Yes)":[142],"or":[143],"non-recruiting":[144],"(No).":[145],"observed":[147],"significant":[148,203],"agreement":[149],"between":[150],"judges\u2019":[152],"labels;":[153],"Cohen\u2019s":[154],"\u03ba=(0.5,0.9)":[155],"at":[156,219],"p=0.01.":[157],"tested":[159],"feasibility":[161],"using":[163],"naive":[164,214],"Bayes":[165,215],"models,":[166],"logistic":[167],"regression,":[168],"classification":[169],"trees,":[170],"boosting,":[171],"support":[173],"vector":[174],"machines":[175],"(SVM)":[176],"classify":[178],"posts.":[181],"Evaluation":[182],"receiver":[184],"operating":[185],"characteristic":[186],"(ROC)":[187],"curves":[188],"shows":[189],"that":[190,237],"our":[191,212,222,234],"SVM":[192],"classifier":[193],"achieves":[194],"an":[195],"89%":[196],"area":[197],"under":[198],"curve":[200],"(AUC),":[201],"improvement":[204],"over":[205,274],"63%":[207],"AUC":[208],"performance":[209],"achieved":[210],"simplest":[213],"model":[216],"(Tukey\u2019s":[217],"test":[218],"p=0.05).":[220],"To":[221],"knowledge,":[223],"this":[224,231],"is":[225,244],"first":[227],"result":[228],"reported":[229],"on":[230],"task,":[232],"analysis":[235],"indicates":[236],"automatic":[238],"detection":[239],"online":[241],"feasible":[246],"task.":[247],"also":[249],"identify":[250],"number":[252],"important":[254],"areas":[255],"future":[257],"work":[258],"including":[259],"classifying":[260],"non-English":[261],"measuring":[264],"how":[265],"current":[269],"events":[270],"change":[271],"membership":[272],"numbers":[273],"time.":[275]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":12},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":16},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":2}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
