Skip to main content

Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs

  • Chapter
Terrorism Informatics

Part of the book series: Integrated Series In Information Systems ((ISIS,volume 18))

Blogs have become increasingly popular in recent years. Bloggers can express their opinions and emotions more freely and easily than before.Many communities have emerged in the blogosphere, including racist and hate groups that are trying to share their ideology, express their views, or recruit new group members. It is imperative to analyze these cyber communities in order to monitor for activities that are potentially harmful to society. Web mining and social network analysis techniques, which have been widely used to analyze the content and structure of Web sites of hate groups on the Internet, have not been applied to the study of hate groups in blogs. In this research, we present a framework, which consists of components of blog spider, information extraction, network analysis, and visualization, to address this problem (Chau & Xu, 2007). We applied this framework to identify and analyze a selected set of 28 anti-Blacks hate groups on Xanga, one of the most popular blog hosting sites. Our analysis results revealed some interesting demographical and topological characteristics in these groups, and identified at least two large communities on top of the smaller ones. We suggest that our framework can be generalized and applied to blog analysis in other domains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Albert, R. & Barabási, A.-L. (2002). Statistical Mechanics of Complex Networks. Reviews of Modern Physics 74(1), 47-97.

    Article  Google Scholar 

  • Albert, R., Jeong, H., Barabási, A.-L. (2000). Error and Attack Tolerance of Complex Networks. Nature 406, 378-382.

    Article  Google Scholar 

  • Alexa(2005).Top English Language Sites.[Online]Retrievedfrom http://www.alexa.com/site/ds/top_sites?ts_mode=lang&lang=en on October 7, 2005.

  • Anti-Defamation League (2001). Poisoning the Web: Hatred Online. [Online] Retrieved from http://www.adl.org/poisoning_web/poisoning_toc.asp on October 7, 2005.

  • Barabási, A.-L., Albert, R., & Jeong, H. (1999). Mean-Field Theory for Scale-Free Random Networks. Physica A 272, 173-187.

    Article  Google Scholar 

  • Blazak, R. (2001). White Boys to Terrorist Men: Target Recruitment of Nazi Skinheads. American Behavioral Scientist 44(6), 982-1000.

    Article  Google Scholar 

  • Blood, R. (2004). How Blogging Software Reshapes the Online Community. Communica-tions of the ACM 47(12), 53-55.

    Article  Google Scholar 

  • Bollobás, B. (1985). Random Graphs. London, Academic.

    Google Scholar 

  • Brin, S. & Page, L. (1998). The Anatomy of a Large-Scale Hypertextual Web Search Engine. Proceedings of the 7th WWW Conference, Brisbane, Australia, April 1998.

    Google Scholar 

  • Burris, V., Smith, E., & Strahm, A. (2000). White Supremacist Networks on the Internet. So-ciological Focus 33(2), 215-235.

    Google Scholar 

  • Chau, M. & Chen, H. (2003). Personalized and Focused Web Spiders, in N. Zhong, J. Liu, & Y. Yao (Eds), Web Intelligence, Springer-Verlag, 197-217.

    Google Scholar 

  • Chau, M., Shiu, B., Chan, I., & Chen, H. (2005). Automated Identification of Web Communi-ties for Business Intelligence Analysis, in Proceedings of the Fourth Workshop on E-Business (WEB 2005), Las Vegas, USA, December, 2005.

    Google Scholar 

  • Chau, M., Shiu, B., Chan, I., & Chen, H. (2007). Redips: Backlink Search and Analysis on the Web for Business Intelligence, Journal of the American Society for Information Science and Technology 58(3), 351-365.

    Article  Google Scholar 

  • Chau, M. & Xu, J. (2007). Mining Communities and Their Relationships in Blogs: A Study of Online Hate Groups, International Journal of Human-Computer Studies 65(1), 57-70.

    Article  Google Scholar 

  • Chen, H. and Chau, M. (2004). Web Mining: Machine Learning for Web Applications, Annual Review of Information Science and Technology 38, 289-329, 2004.

    Article  Google Scholar 

  • Chen, H., Chung, W., Xu. J., Wang, G., Qin, Y., & Chau, M. (2004). Crime Data Mining: A General Framework and Some Examples. IEEE Computer 37(4), 50-56.

    Google Scholar 

  • Cheong, F. C. (1996). Internet Agents: Spiders, Wanderers, Brokers, and Bots. Indianapolis, Indiana, USA: New Riders Publishing.

    Google Scholar 

  • CNN (1999). Hate Group Web Sites on the Rise, CNN News [Online] Retrieved from http://edition.cnn.com/US/9902/23/hate.group.report/index.html on October 7, 2005.

  • Crucitti, P., Latora, V., Marchiori, M., & Rapisarda A. (2003). Efficiency of Scale-Free Net-works: Error and Attack Tolerance. Physica A 320, 622-642.

    Article  Google Scholar 

  • Flake, G. W., Lawrence, S., & Giles, C. L. (2000). Efficient Identification of Web Communities. In Proceedings of the 6th International Conference on Knowledge Discovery and Data Mining (ACM SIGKDD 2000), Boston, MA.

    Google Scholar 

  • Flake, G. W., Lawrence, S., Giles, C. L., & Coetzee, F. M. (2002). Self-Organization and Identification of Web Communities. IEEE Computer 35(3), 66-71.

    Google Scholar 

  • Franklin,R. A.(2005).The Hate Directory[Online] Retrieved from http://www.bcpl.net/~rfrankli/hatedir.htm on October 7, 2005.

  • Freeman, L. C. (1979). Centrality in Social Networks: Conceptual Clarification. Social Networks 1, 215-240.

    Article  Google Scholar 

  • Freeman, L. C. (2000). Visualizing Social Networks. Journal of Social Structure 1(1).

    Google Scholar 

  • Fruchterman, T. M. J. & Reingold, E. M. (1991). Graph Drawing by Force-Directed Place-ment. Software-Practice & Experience 21(11), 1129-1164.

    Article  Google Scholar 

  • Gerstenfeld, P. B., Grant, D. R., & Chiang, C. P. (2003). Hate Online: A Content Analysis of Extremist Internet Sites. Analyses of Social Issues and Public Policy 3, 29-44.

    Article  Google Scholar 

  • Gibson, D., J. Kleinberg, & Raghavan, P. (1998). Inferring Web Communities from Link Topology. In Proceedings of the 9th ACM Conference on Hypertext and Hypermedia, Pitts-burgh, PA.

    Google Scholar 

  • Girvan, M. & Newman, M. E. J. (2002). Community Structure in Social and Biological Networks. Proceedings of the National Academy of Science of the United States of America 99, 7821-7826.

    Article  Google Scholar 

  • Glaser, J., Dixit, J., & Green, D. P. (2002). Studying Hate Crime with the Internet: What Makes Racists Advocate Racial Violence? Journal of Social Issues 58(1), 177-193.

    Article  Google Scholar 

  • Hof, R. (2005). Blogs on Ice: Signs of a Business Model? Business Week Online - The Tech Beat, June 2, 2005. [Online] Retrieved from http://www.businessweek.com/ the_thread/techbeat/archives/2005/06/ blogs_on_ice_si.html on October 7, 2005.

  • Kleinberg, J. (1998). Authoritative Sources in a Hyperlinked Environment, in Proceedings of the 9th ACM-SIAM Symposium on Discrete Algorithms, San Francisco, California, USA, Jan 1998, pp. 668-677.

    Google Scholar 

  • Kosala, R. & Blockeel, H. (2000). Web Mining Research: A Survey. ACM SIGKDD Explo-rations 2(1), 1-15.

    Article  Google Scholar 

  • Krebs, V. E. (2001). Mapping Networks of Terrorist Cells. Connections 24(3), 43-52.

    Google Scholar 

  • Krupka, G. R. & Hausman, K. (1998). IsoQuest Inc.: Description of the NetOwlTM extractor system as used for MUC-7, in Proceedings of the Seventh Message Understanding Conference, April 1998.

    Google Scholar 

  • Kruskal, J. B. & Wish, M. (1978). Multidimensional Scaling. Beverly Hills, CA, Sage Publications.

    Google Scholar 

  • Kumar, R., Raghavan, P., Rajagopalan, S., & Tomkins, A. (1999). Trawling the Web for Emerging Cyber-Communities. Computer Networks 31(11-16), 1481-1493.

    Article  Google Scholar 

  • Kumar, R., Raghavan, P., Rajagopalan, S., & Tomkins, A. (2002). The Web and Social Networks. IEEE Computer 35(11), 32-36.

    Google Scholar 

  • Lee, E., & Leets, L. (2002). Persuasive Storytelling by Hate Groups Online: Examining Its Effects on Adolescents. American Behavioral Scientist 45, 927-957.

    Article  Google Scholar 

  • Levin, J., & McDevitt, J. (1993). Hate crimes: The Rising Tide of Bigotry and Bloodshed. New York: Plenum.

    Google Scholar 

  • Nardi, B. A., Schiano, D. J., Gumbrecht, M., & Swartz, L. (2004). Why We Blog. Communi-cations of the ACM 47(12), 41-46

    Google Scholar 

  • Radicchi, F., Castellano, C., Cecconi, F., Loreto, V., & Parisi, D. (2004). Defining and Identi-fying Communities in Networks. Proceedings of the National Academy of Science of the United States of America, 101, 2658-2663.

    Article  Google Scholar 

  • Sparrow, M. K. (1991). The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects. Social Networks 13, 251-274.

    Article  Google Scholar 

  • Wasserman, S. & Faust, K. (1994). Social Network Analysis: Methods and Applications. Cambridge, Cambridge University Press.

    Google Scholar 

  • Watts, D. J. & Strogatz, S. H. (1998). Collective Dynamics of ‘Small-World’ Networks. Na-ture 393, 440-442.

    Google Scholar 

  • White, H. C., Boorman, S. A., & Breiger, R. L. (1976). Social Structure from Multiple Networks: I. Blockmodels of Roles and Positions. American Journal of Sociology 81, 730-780.

    Article  Google Scholar 

  • Xu, J. J. & Chen, H. (2004). Fighting Organized Crime: Using Shortest-Path Algorithms to Identify Associations in Criminal Networks. Decision Support Systems 38(3), 473-487.

    Article  Google Scholar 

  • Xu, J. J. & Chen, H. (2005). CrimeNet Explorer: A Framework for Criminal Network Knowl-edge Discovery. ACM Transactions on Information Systems 23(2), 201-226.

    Article  Google Scholar 

  • Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). US Domestic Extremist Groups on the Web: Link and Content Analysis. IEEE Intelligent Systems 20(5), 44-51.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Chau, M., Xu, J. (2008). Using Web Mining and Social Network Analysis to Study The Emergence of Cyber Communities In Blogs. In: Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds) Terrorism Informatics. Integrated Series In Information Systems, vol 18. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71613-8_22

Download citation

Publish with us

Policies and ethics