Filters








313 Hits in 5.9 sec

Mining YouTube to Discover Extremist Videos, Users and Hidden Communities [chapter]

Ashish Sureka, Ponnurangam Kumaraguru, Atul Goyal, Sidharth Chhabra
2010 Lecture Notes in Computer Science  
The focus of this work is on mining YouTube to discover hate videos, users and virtual hidden communities.  ...  We present a solution based on data mining and social network analysis (using a variety of relationships such as friends, subscriptions, favorites and related videos) to aid an analyst in discovering insightful  ...  The authors would like to thank all members of PreCog research group at IIIT-Delhi.  ... 
doi:10.1007/978-3-642-17187-1_2 fatcat:qieiqgkisbcc3kp4g7axr4jqwy

Solutions to Detect and Analyze Online Radicalization : A Survey [article]

Denzil Correa, Ashish Sureka
2013 arXiv   pre-print
Such platforms are being used to form hate groups, racist communities, spread extremist agenda, incite anger or violence, promote radicalization, recruit members and create virtual organi- zations and  ...  of message) such as YouTube (a popular video sharing website), Twitter (an online micro-blogging service), Facebook (a popular social networking website), online discussion forums and blogosphere are being  ...  For example, extremist videos on YouTube can be analyzed to determine users posting such extremist videos and the communities these users form.  ... 
arXiv:1301.4916v1 fatcat:kugqbke26bbztcq3npvvbhsdo4

Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats [article]

Swati Agarwal, Ashish Sureka
2015 arXiv   pre-print
Research shows that various social media platforms on Internet such as Twitter, Tumblr (micro-blogging websites), Facebook (a popular social networking website), YouTube (largest video sharing and hosting  ...  website), Blogs and discussion forums are being misused by extremist groups for spreading their beliefs and ideologies, promoting radicalization, recruiting members and creating online virtual communities  ...  As shown in Figure 12 , 50% of the articles uncover the hidden communities of hate and extremist users.  ... 
arXiv:1511.06858v1 fatcat:s3gpwc6ugbfrlj2wmqc6udhzhy

Approaches to Detect Online Radicalization: A Survey

Prof. S. D. Pingle
2016 International Journal Of Scientific Research And Education  
on the Internet such as video sharing website, micro-blogging services, social networking websites, online discussion forums and blogosphere are being heavily misused by radical or extremist groups and  ...  Research shows that, low barrier to publish content, allows anonymity, provides exposure to millions of users and a potential of a very quick and widespread diffusion of message, due to this, various platforms  ...  The focus of this work is to discover hate videos, users and virtual hidden communities on YouTube using data mining and social network analysis (using a variety of relationships such as friends, subscriptions  ... 
doi:10.18535/ijsre/v4i05.04 fatcat:3etakurrwbetfku6earq5bak2u

Analysis of Twitter and YouTube during USelections 2020 [article]

Alexander Shevtsov, Maria Oikonomidou, Despoina Antonakaki, Polyvios Pratikakis, Sotiris Ioannidis
2020 arXiv   pre-print
likes, dislikes and comments of the videos and conduct volume, sentiment and graph analysis on the communities formed.  ...  In this study, we obtain approximately 17.5M tweets containing 3M users, based on prevalent hashtags related to US election 2020, as well as the related YouTube links, contained in the Twitter dataset,  ...  YouTube analysis has been used to discover irrelevant and misleading metadata [ [6] ], to identify spam campaigns [ [42] ], to discover extremists videos and hidden communities [ [56] ], to propagate  ... 
arXiv:2010.08183v4 fatcat:scmoqvuenbegnnvgrngxdqgau4

"You Know What to Do": Proactive Detection of YouTube Videos Targeted by Coordinated Hate Attacks

Enrico Mariconti, Guillermo Suarez-Tangil, Jeremy Blackburn, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Jordi Luque Serrano, Gianluca Stringhini
2018 Zenodo  
Video sharing platforms like YouTube receive uploads from millions of users, covering a wide variety of topics and allowing others to comment and interact in response.  ...  Overall, our work paves the way for providing video platforms like YouTube with proactive systems to detect and mitigate coordinated hate attacks.  ...  This project has received funding from the European Union's Horizon 2020 Research and Innovation program under the Marie Skłodowska-Curie ENCASE project (GA No. 691025).  ... 
doi:10.5281/zenodo.1479939 fatcat:i6ojj6smgbdyhiqa3hv4aodgze

Angry by design: toxic communication and technical architectures

Luke Munn
2020 Humanities and Social Sciences Communications  
Hate speech and toxic communication online is on the rise.  ...  Across both platforms, design is central and influential, proving to be a productive lens for understanding toxic communication.  ...  and more extremist stance (Roose, 2019) .  ... 
doi:10.1057/s41599-020-00550-7 fatcat:bzryjuadgrc5rolus4aht222uy

Automated Identification and Reconstruction of YouTube Video Access

Jonathan Patterson, Christopher Hargreaves
2012 Journal of Digital Forensics, Security and Law  
YouTube is one of the most popular video-sharing websites on the Internet, allowing users to upload, view and share videos with other users all over the world.  ...  YouTube contains many different types of videos, from homemade sketches to instructional and educational tutorials, and therefore attracts a wide variety of users with different interests.  ...  Sureka et al [9] describes a semi-automated system that mines YouTube with the purpose of discovering both extremist videos and hidden communities.  ... 
doi:10.15394/jdfsl.2012.1118 fatcat:zkhakzyxnvcslb7pz5na5hiefa

Characterizing Abhorrent, Misinformative, and Mistargeted Content on YouTube [article]

Kostantinos Papadamou
2021 arXiv   pre-print
YouTube has revolutionized the way people discover and consume video.  ...  algorithm in the dissemination of misogynistic content, by focusing on the Involuntary Celibates (Incels) community; and 3) user exposure to pseudoscientific content on various parts of the platform and  ...  The immediate implication is that while the radicalization process and the spread of extremist content generalize (at least to some extent) across different online extremist communities, the specific mechanism  ... 
arXiv:2105.09819v1 fatcat:k2mdclt4orgunnlwb6hnnrka4i

Analysis of Weak Signals for Detecting Lone Wolf Terrorists

Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Martenson, Pontus Svenson
2012 2012 European Intelligence and Security Informatics Conference  
, in order to discover possible lone wolf terrorists.  ...  In this work we present an analysis method that can be used to analyze extremist forums to profile possible lone wolf terrorists.  ...  ACKNOWLEDGEMENTS This research was financially supported by Vinnova through the Vinnmer-programme, and by the the FOI research project Tools for information management and analysis, which is funded by  ... 
doi:10.1109/eisic.2012.20 dblp:conf/eisic/BrynielssonHJKMS12 fatcat:bvk36bgpffamhlv2qyjkgpywzm

An Analytical Study on Cerebral State Induced by Changes in Auditory Stimulation

Jeong-Hoon Shin
2017 International Journal of Advanced Science and Technology  
such as membership, motivation, and operational modalities, foreclosing sources of inspiration, funding and recruitment through analysis of social media such as youtube, twitter, istagram, facebook among  ...  Terrorism is one of the biggest threats to the peace and stability of Nigeria and has evidently threatened national security and socio-economic developments.  ...  , ideas, and pictures/videos.  ... 
doi:10.14257/ijast.2017.108.03 fatcat:xf32npzvk5fhzp2cjhhhxzbqxi

ExtremeBB: Enabling Large-Scale Research into Extremism, the Manosphere and Their Correlation by Online Forum Data [article]

Anh V. Vu, Lydia Wilson, Yi Ting Chua, Ilia Shumailov, Ross Anderson
2021 arXiv   pre-print
To illustrate a few potential uses, we apply statistical and data-mining techniques to analyse the online extremist landscape in a variety of ways, from posting patterns through topic modelling to toxicity  ...  and the membership overlap across different communities.  ...  ACKNOWLEDGMENTS We are grateful to Alice Hutchings, Ben Collier, Sergio Pastrana and our colleagues at the Cambridge Cybercrime Centre for their valuable feedback and insightful comments on the early draft  ... 
arXiv:2111.04479v1 fatcat:b7mommbgr5fq5l4p7giqie56mm

Analyzing Right-wing YouTube Channels

Raphael Ottoni, Evandro Cunha, Gabriel Magno, Pedro Bernardina, Wagner Meira Jr., Virgílio Almeida
2018 Proceedings of the 10th ACM Conference on Web Science - WebSci '18  
Our findings shed light not only into the collective conduct of the YouTube community promoting and consuming right-wing content, but also into the general behavior of YouTube users.  ...  We investigate similarities and differences between users' comments and video content in a selection of right-wing channels and compare it to a baseline set using a three-layered approach, in which we  ...  We would like to thank Nikki Bourassa, Ryan Budish, Amar Ashar and Robert Faris, from the Berkman Klein Center for Internet & Society at Harvard University, for their insightful discussions and suggestions  ... 
doi:10.1145/3201064.3201081 dblp:conf/websci/OttoniCMBMA18 fatcat:lrmq7tu7unay3h34iodt3g65xy

Harvesting and analysis of weak signals for detecting lone wolf terrorists

Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson
2013 Security Informatics  
analysis method in order to discover possible lone wolf terrorists.  ...  In this article we present an analysis method that can be used to analyze extremist forums to detect digital traces of possible lone wolf terrorists.  ...  Acknowledgements This research was financially supported by the Swedish Governmental Agency for Innovation Systems (VINNOVA) through the VINNMER program, and by the R&D program of the Swedish Armed Forces  ... 
doi:10.1186/2190-8532-2-11 fatcat:p3twoi2k6fgs7oambhlwtvbzs4

Artificial Intelligence in the Context of Psychological Security: Theoretical and Practical Implications

Alexey Averkin, Darya Bazarkina, Konstantin Pantserev, Evgeny Pashentsev
2019 Proceedings of the 2019 Conference of the International Fuzzy Systems Association and the European Society for Fuzzy Logic and Technology (EUSFLAT 2019)  
The main objective of the paper is to develop efective instruments to counter the destructive psychological impact on the individual, society, and the state.  ...  The academic community cannot ignore the growing opportunities offered by artificial intelligence.  ...  The more complex and educated a society, the more difficult to affect. To a greater or lesser extent, advertising and media communication carry a hidden burden on people.  ... 
doi:10.2991/eusflat-19.2019.16 dblp:conf/eusflat/AverkinBPP19 fatcat:ujwqi6ktyzf4pcqe6sgl5gkvw4
« Previous Showing results 1 — 15 out of 313 results