Extracting Radicalisation Behavioural Patterns from Social Network Data

Social networks (SNs) have become essential communication tools in recent years, generating a large amount of information about its users that can be analysed with data processing algorithms. Recently, a new type of SN user has emerged: jihadists that use SNs as a tool to recruit new militants and share their propaganda. In this paper, we study a set of indicators to assess the risk of radicalisation of a social network user. These radicalisation indicators help law-enforcement agencies, prosecutors and organizations devoted to fight terrorism to detect vulnerable targets even before the radicalisation process is completed. Moreover, these indicators are the first steps towards a software tool to gather, represent, pre-process and analyse behavioural indicators of radicalisation in terrorism.

[1]  Mark E. J. Newman,et al.  The Structure and Function of Complex Networks , 2003, SIAM Rev..

[2]  Derek Greene,et al.  Online social media in the Syria conflict: Encompassing the extremes and the in-betweens , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).

[3]  S. Borgatti,et al.  On Social Network Analysis in a Supply Chain Context , 2009 .

[4]  Pooja Wadhwa,et al.  Tracking on-line radicalization using investigative data mining , 2013, 2013 National Conference on Communications (NCC).

[5]  Kayo Fujimoto,et al.  Adolescent affiliations and adiposity: a social network analysis of friendships and obesity. , 2009, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[6]  David Camacho,et al.  Adaptive k-Means Algorithm for Overlapped Graph Clustering , 2012, Int. J. Neural Syst..

[7]  Tom A. B. Snijders,et al.  Social Network Analysis , 2011, International Encyclopedia of Statistical Science.

[8]  Ashish Sureka,et al.  Solutions to Detect and Analyze Online Radicalization : A Survey , 2013, ArXiv.

[9]  Jason J. Jung,et al.  ACO-based clustering for Ego Network analysis , 2017, Future Gener. Comput. Syst..

[10]  Ashish Sureka,et al.  Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter , 2015, ICDCIT.

[11]  Djamal Benslimane,et al.  Measuring the Radicalisation Risk in Social Networks , 2017, IEEE Access.

[12]  Robin Thompson,et al.  Radicalization and the Use of Social Media , 2011 .

[13]  Lisa Kaati,et al.  Detecting Multipliers of Jihadism on Twitter , 2015, 2015 IEEE International Conference on Data Mining Workshop (ICDMW).

[14]  Alessandro Flammini,et al.  Predicting online extremism, content adopters, and interaction reciprocity , 2016, SocInfo.

[15]  Daniel J. Brass,et al.  Network Analysis in the Social Sciences , 2009, Science.

[16]  Juan Julián Merelo Guervós,et al.  Where is evolutionary computation going? A temporal analysis of the EC community , 2007, Genetic Programming and Evolvable Machines.

[17]  A. Barabasi,et al.  Evolution of the social network of scientific collaborations , 2001, cond-mat/0104162.

[18]  Lisa Kaati,et al.  Detecting Jihadist Messages on Twitter , 2015, 2015 European Intelligence and Security Informatics Conference.

[19]  N. Christakis,et al.  Formation of raiding parties for intergroup violence is mediated by social network structure , 2016, Proceedings of the National Academy of Sciences.

[20]  Leo Egghe,et al.  Introduction to Informetrics: Quantitative Methods in Library, Documentation and Information Science , 1990 .

[21]  Carlos Cotta,et al.  An analysis of the structure and evolution of the scientific collaboration network of computer intelligence in games , 2014 .

[22]  Michalis Vazirgiannis,et al.  Clustering and Community Detection in Directed Networks: A Survey , 2013, ArXiv.

[23]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[24]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.