An Empirical Study on Collective Online Behaviors of Extremist Supporters

  • Jung-jae KimEmail author
  • Yong Liu
  • Wee Yong Lim
  • Vrizlynn L. L. Thing
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10604)


Online social media platforms such as Twitter have been found to be misused by extremist groups, including Islamic State of Iraq and Syria (ISIS), who attract and recruit social media users. To prevent their influence from expanding in the online social media platforms, it is required to understand the online behaviors of these extremist group users and their followers, for predicting and identifying potential security threats. We present an empirical study about ISIS followers’ online behaviors on Twitter, proposing to classify their tweets in terms of political and subjectivity polarities. We first develop a supervised classification model for the polarity classification, based on natural language processing and clustering methods. We then develop a statistical analysis of term-polarity correlations, which leads us to successfully observe ISIS followers’ online behaviors, which are in line with the reports of experts.


Extremist online behavior Social media analysis Polarity-based classification 



This material is based on research work supported by the Singapore National Research Foundation under NCR Award No. NRF2014NCR-NCR001-034.


  1. 1.
    Alhadi, A.C., Gottron, T., Staab, S.: Exploring user purpose writing single tweets. In: WebSci. ACM (2011)Google Scholar
  2. 2.
    Banerjee, N., Chakraborty, D., Joshi, A., Mittal, S., Rai, A., Ravindran, B.: Towards analyzing micro-blogs for detection and classification of real-time intentions. In: ICWSM (2012)Google Scholar
  3. 3.
    Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent Dirichlet allocation. J. Mach. Learn. Res. 3, 993–1022 (2003)zbMATHGoogle Scholar
  4. 4.
    Brooking, E.T., Singer, P.W.: War goes viral: how social media is being weaponized across the world. The Atlantic (2016).
  5. 5.
    Chae, J., Thom, D., Jang, Y., Kim, S., Ertl, T., Ebert, D.S.: Public behavior response analysis in disaster events utilizing visual analytics of microblog data. Comput. Graph. (Pergamon) 38(1), 51–60 (2014)CrossRefGoogle Scholar
  6. 6.
    Chen, D., Manning, C.D.: A fast and accurate dependency parser using neural networks. In: EMNLP, pp. 740–750 (2014)Google Scholar
  7. 7.
    Chen, T., Guestrin, C.: XGBoost : Reliable large-scale tree boosting system. In: SIGKDD Conference on Knowledge Discovery and Data Mining, pp. 785–794 (2016)Google Scholar
  8. 8.
    Chen, Z., Liu, B., Hsu, M., Castellanos, M., Ghosh, R.: Identifying intention posts in discussion forums. In: HLT-NAACL, pp. 1041–1050 (2013)Google Scholar
  9. 9.
    Cristianini, N., Shawe-Taylor, J.: An Introduction to Support Vector Machines and Other Kernel-Based Learning Methods. Cambridge University Press, Cambridge (2000)CrossRefzbMATHGoogle Scholar
  10. 10.
    Daszykowski, M., Walczak, B.: Density-based clustering methods. Compr. Chemometr. 2, 635–654 (2010)Google Scholar
  11. 11.
    Fisher, A.: Swarmcast: how Jihadist networks maintain a persistent online presence. Perspect. Terror. 9(3), 3–20 (2015)Google Scholar
  12. 12.
    Gómez-Adorno, H., Pinto, D., Montes, M., Sidorov, G., Alfaro, R.: Content and style features for automatic detection of users’ intentions in tweets. In: Ibero-American Conference on Artificial Intelligence, pp. 120–128 (2014)Google Scholar
  13. 13.
    Hamroun, M., Gouider, M.S., Said, L.B.: Customer intentions analysis of twitter based on semantic patterns. In: WISDOM (2015)Google Scholar
  14. 14.
    Iyyer, M., Enns, P., Boyd-Graber, J., Resnik, P.: Political ideology detection using recursive neural networks. In: ACL, pp. 1113–1122 (2014)Google Scholar
  15. 15.
    Klausen, J.: Tweeting the Jihad: social media networks of western foreign fighters in Syria and Iraq. Stud. Conflict Terror. 38(1), 1–22 (2015)CrossRefGoogle Scholar
  16. 16.
    Levy, O., Goldberg, Y.: Dependency-based word embeddings. In: ACL, pp. 302–308 (2014)Google Scholar
  17. 17.
    Liu, S., Wang, X., Chen, J., Zhu, J., Guo, B.: TopicPanorama: a full picture of relevant topics. In: IEEE Conference on Visual Analytics Science and Technology, pp. 183–192 (2014)Google Scholar
  18. 18.
    Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., Baldwin, T.: ISISisNotislam or DeportAllMuslims?: Predicting unspoken views. In: ACM Conference on Web Science, pp. 95–106 (2016)Google Scholar
  19. 19.
    Magdy, W., Darwish, K., Weber, I.: FailedRevolutions: using twitter to study the antecedents of ISIS support. First Monday 21(2), 1481–1492 (2016)CrossRefGoogle Scholar
  20. 20.
    Mikolov, T., Sutskever, I., Chen, K., Corrado, G., Dean, J.: Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, pp. 3111–3119 (2013)Google Scholar
  21. 21.
    Mohammad, S.M., Kiritchenko, S., Martin, J.: Identifying purpose behind electoral tweets. In: Proceedings of the Second International Workshop on Issues of Sentiment Discovery and Opinion Mining (2013)Google Scholar
  22. 22.
    Prentice, S., Taylor, P.J., Rayson, P., Hoskins, A., O’Loughlin, B.: Analyzing the semantic content and persuasive composition of extremist media: a case study of texts produced during the Gaza conflict. Inf. Syst. Front. 13(1), 61–73 (2011)CrossRefGoogle Scholar
  23. 23.
    Purohit, H., Dong, G., Shalin, V., Thirunarayan, K., Sheth, A.: Intent classification of short-text on social media. In: IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity), pp. 222–228 (2015)Google Scholar
  24. 24.
    Rowe, M., Saif, H.: Mining Pro-ISIS radicalisation signals from social media users. In: International Conference on Weblogs and Social Media, pp. 329–338 (2016)Google Scholar
  25. 25.
    Rudas, C., Surányi, O., Yasseri, T., Török, J.: Understanding and coping with extremism in an online collaborative environment: a data-driven modeling. PLoS ONE 12(3), e0173561 (2017)CrossRefGoogle Scholar
  26. 26.
    Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Secur. Inf. 3(1), 1–10 (2014)CrossRefGoogle Scholar
  27. 27.
    Scanlon, J.R., Gerber, M.S.: Forecasting violent extremist cyber recruitment. IEEE Trans. Inf. Forensics Secur. 10(11), 2461–2470 (2015)CrossRefGoogle Scholar
  28. 28.
    Sun, G., Wu, Y., Liu, S., Peng, T.Q., Zhu, J.J., Liang, R.: EvoRiver: visual analysis of topic coopetition on social media. IEEE Trans. Visual. Comput. Graph. 20(12), 1753–1762 (2014)CrossRefGoogle Scholar
  29. 29.
    Tang, J., Liu, H.: An unsupervised feature selection framework for social media data. IEEE Trans. Knowl. Data Eng. 26(12), 2914–2927 (2014)CrossRefGoogle Scholar
  30. 30.
    Wang, J., Cong, G., Zhao, W.X., Li, X.: Mining user intents in Twitter: a semi-supervised approach to inferring intent categories for tweets. In: AAAI, pp. 318–324 (2015)Google Scholar
  31. 31.
    Wang, X., Liu, Y., SUN, C., Wang, B., Wang, X.: Predicting polarities of tweets by composing word embeddings with long short-term memory. In: ACL/IJCNLP, pp. 1343–1353 (2015)Google Scholar
  32. 32.
    Yu, B., Kaufmann, S., Diermeier, D.: Classifying party affiliation from political speech. J. Inf. Technol. Pol. 5(1), 33–48 (2008)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Jung-jae Kim
    • 1
    Email author
  • Yong Liu
    • 1
  • Wee Yong Lim
    • 1
  • Vrizlynn L. L. Thing
    • 1
  1. 1.Institute for Infocomm ResearchSingaporeSingapore

Personalised recommendations