Skip to main content

Sentiment Analysis Combination in Terrorist Detection on Twitter: A Brief Survey of Approaches and Techniques

  • Conference paper
  • First Online:
Research in Intelligent and Computing in Engineering

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1254))

Abstract

Terrorism is a big concern for many governments and people, especially with using social media such as Twitter that uses new technologies. Terrorism uses many techniques to carry out their actions and plans. Technology can play an important role in providing accurate predictions of terrorist activities. Here, we tried to do so using sentiment analysis for terrorist-related of Twitter because the early detection of terrorist activity is very important to the recent attack and to combat the spread of global terrorist activity. This work studied the techniques of effective analysis of terrorist activity data on Twitter. It is based on 17 articles that used Twitter to study terrorism for different purposes, while highlighting the different techniques used, from this survey one can notice that the machine learning techniques were used the most for sentimental analysis with good accuracy depending on the data used such as AdaBoost, support vector machine, maximum entropy, Naive Bayes, decision tree algorithms. Few number of papers are analyzed tweets in Arabic language as compared to English version because of its complexity parsing beside the complexity in analyzing feelings in Arabic makes tasks more challenging.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Best S, Nocella A, Anthony J (2004) Defining terrorism. Anim Lib Philos Policy J 2(1):1–18

    Google Scholar 

  2. Bodine-baron E, Helmus TC, Magnuson M, Winkelman Z (2016) Examining ISIS support and opposition networks on Twitter

    Google Scholar 

  3. Oakley N, Chakrabati S (2015) What does Daesh mean? ISIS ‘threatens to cut out the tongues’ of anyone using this word. Mirror 2 (2015)

    Google Scholar 

  4. Wood G (2015) What ISIS really wants. The Atlantic 315(2):78–94

    Google Scholar 

  5. Badawy A, Ferrara E (2018) The rise of jihadist propaganda on social networks. J Comput Soc Sci 1(2):453–470

    Google Scholar 

  6. Java A, Song X, Finin T, Tseng B (2007) Why we twitter: understanding microblogging usage and communities. In: Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on web mining and social network analysis, pp 56–65

    Google Scholar 

  7. Beaumont C (2011) Twitter users send 50 million tweets per day–almost 600 tweets are sent every second through the microblogging site, according to its own metrics. Dly Telegr (London) 7

    Google Scholar 

  8. Garrett S (2010) Big goals, big game, big records. Twitter Blog (http//blog.twitter.com/2010/06/biggoals-big-game-big-records.html)

    Google Scholar 

  9. Lunden I (2012) Analyst: Twitter passed 500 m users in June 2012, 140 m of them in US; Jakarta ‘Biggest Tweeting’ city. TechCrunch RSS 30

    Google Scholar 

  10. I. Twitter (2018) Number of monthly active Twitter users worldwide from 1st quarter 2010 to 4th quarter 2017 (in millions). Technical report, Statista

    Google Scholar 

  11. Rosen A (2017) Tweeting made easier. Nov 2017

    Google Scholar 

  12. Cheong M, Lee VCS (2011) A microblogging-based approach to terrorism informatics: exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Inf Syst Front 13(1):45–59

    Article  Google Scholar 

  13. Liu B (2012) Sentiment analysis and opinion mining. Synth Lect Hum Lang Technol 5(1):1–167

    Article  Google Scholar 

  14. Liu B (2015) Opinions, sentiment, and emotion in text. Cambridge University Press, Cambridge

    Google Scholar 

  15. Medhat W, Hassan A, Korashy H (2014) Sentiment analysis algorithms and applications: a survey. Ain Shams Eng. J. 5(4):1093–1113

    Article  Google Scholar 

  16. Bolla R (2014) Crime pattern detection using online social media. Masters theses

    Google Scholar 

  17. Omer E (2015) Using machine learning to identify jihadist messages on Twitter. Examensarbete

    Google Scholar 

  18. Kaati L, Omer E, Prucha N, Shrestha A (2016) Detecting multipliers of Jihadism on Twitter. In: Proceedings of 15th IEEE international conferene on data minining work (ICDMW 2015), pp 954–960

    Google Scholar 

  19. Magdy W, Darwish k, Weber I (2016) #FailedRevolutions: using Twitter to study the antecedents of ISIS support. First Monday 21(2)

    Google Scholar 

  20. Ngoge LA (2016) Real–time sentiment analysis for detection of terrorist activities in Kenya. Strathmore University

    Google Scholar 

  21. Mutlu B, Mutlu M, Oztoprak K, Dogdu E (2016) Identifying trolls and determining terror awareness level in social networks using a scalable framework. In: Proceedings of 2016 IEEE international conference on big data, pp 1792–1798

    Google Scholar 

  22. Ali GA (2016) Identifying terrorist affiliations through social network analysis using data mining techniques

    Google Scholar 

  23. Mirani TB, Sasi S (2016) Sentiment analysis of ISIS related Tweets using absolute location. In: 2016 international conference on computational science and computational intelligence (CSCI), pp 1140–1145

    Google Scholar 

  24. Ferrara E, Wang WQ, Varol O, Flammini A, Galstyan A (2016) Predicting online extremism, content adopters, and interaction reciprocity. Lecturer notes in computer science (including subseries in lecture notes in artificial intelligence and lecturer notes in bioinformatics), vol 10047 LNCS, pp 22–39

    Google Scholar 

  25. Azrina Azizan S, Abdul Aziz I (2017) Terrorism detection based on sentiment analysis using machine learning. J Eng Appl Sci 12(3):691–698

    Google Scholar 

  26. Wang N, Varghese B, Donnelly PD (2017) A machine learning analysis of Twitter sentiment to the Sandy Hook shootings. In: Proceedings of 2016 IEEE 12th International Conference on e-Science, pp 303–312

    Google Scholar 

  27. Ahmed S, Qadoos M. Terrorism detection by tweet sentimental analysis

    Google Scholar 

  28. Ruhrberg SD, Kirstein G, Habermann T, Nikolic J, Stock WG (2018) #ISIS—a comparative analysis of country-specific sentiment on Twitter. Open J Soc Sci 06(06):142–158

    Google Scholar 

  29. De Smedt T, De Pauw G, Van Ostaeyen P (2018) Automatic detection of online jihadist hate speech, Feb 2018

    Google Scholar 

  30. Hernandez-Suarez A et al (2018 )Social sentiment sensor in Twitter for predicting cyber-attacks using â„“1 Regularization. Sensors (Basel) 18(5)

    Google Scholar 

  31. Alkhalisy M, Jehlol H (2018) Terrorist affiliations identifying through Twitter social media analysis using data mining and web mapping techniques, vol 13

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Esraa Najjar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Najjar, E., Al-augby, S. (2021). Sentiment Analysis Combination in Terrorist Detection on Twitter: A Brief Survey of Approaches and Techniques. In: Kumar, R., Quang, N.H., Kumar Solanki, V., Cardona, M., Pattnaik, P.K. (eds) Research in Intelligent and Computing in Engineering. Advances in Intelligent Systems and Computing, vol 1254. Springer, Singapore. https://doi.org/10.1007/978-981-15-7527-3_23

Download citation

Publish with us

Policies and ethics