Analysis of social media based on terrorism—a review

PN Jain, AS Vaidya - Vietnam Journal of Computer Science, 2021 - World Scientific
With the ever-growing number of online social media platforms, the world has shrunk even
further with regards to communication and knowledge-sharing perspective. However …

A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter

M Cheong, VCS Lee - Information Systems Frontiers, 2011 - Springer
The study of terrorism informatics utilizing the Twitter microblogging service has not been
given apt attention in the past few years. Twitter has been identified as both a potential …

Detection and Prediction of Terrorist Activities and Threatening Events in Twitter-A Survey

ML Leenuse, DS Pankaj - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Twitter is one of the prominent social media applications which influence civilians due to its
fast information dissemination. Researchers have shown that the majority of the tweets …

Cyber Terrorism Through Social Media: A Categorical Based Preventive Approach

A Parlakkılıç - International Journal of Information Security Science, 2018 - dergipark.org.tr
This paper deals with the categorical cyber terrorism threats on social media and preventive
approach to minimize their issues. While dealing with the threat of cyber terrorism in social …

Analysis of text messages in social media to investigate cyberpsycho attack

P Gupta, MJ Nene - … Technology for Intelligent Systems (ICTIS 2017) …, 2018 - Springer
Social media proved to be a medium to document our daily lives. It is a virtual tool used by
an individual or organizations for various communications and information exchanges. Data …

[PDF][PDF] Survey on counter Web Terrorism

W Jeberson, L Sharma - Compusoft, 2015 - researchgate.net
Terrorist activities is a big issue for the whole humanity, and as the whole world is moving
rapidly by utilizing IT innovations, similarly terrorist groups are also using IT technologies as …

Cyberspace: A venue for terrorism

D Bieda, L Halawi - Issues in Information Systems, 2015 - commons.erau.edu
This paper discusses how cyberspace has become a venue for terrorists groups for
recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the …

Violence detection in social media-review

U Dikwatta, TGI Fernando - 2019 - dr.lib.sjp.ac.lk
Social media has become a vital part of humans' day to day life. Different users engage with
social media differently. With the increased usage of social media, many researchers have …

[图书][B] The State of the Art 2015: a literature review of social media intelligence capabilities for counter-terrorism

J Bartlett, L Reynolds - 2015 - preventviolentextremism.info
This paper is a review of how information and insight can be drawn from open social media
sources. It focuses on the specific research techniques that have emerged, the capabilities …

Social network behavior and public opinion manipulation

L Chen, J Chen, C Xia - Journal of Information Security and Applications, 2022 - Elsevier
The scope of cyberspace weapons is expanding from the physical network domain to the
cognitive information domain. Technologies such as network penetration, public opinion …