Abstract
The backbone of the semantic web is ontology, dealing with the context of details associated with a specific domain. Domain ontology (DO) is an important source of information for knowledge-based systems. Nonetheless, developing DO is a time-consuming procedure that is heavily reliant on the developer's expertise. Here, a novel semi-automated technique for creating Ontologies in the terrorism domain is suggested. Terrorism actions provide critical information that can be used to improve a country's security system. To obtain the most up-to-date knowledge of the domain, online social network (OSN) data, specifically Twitter text data, is retrieved, and then concepts and associated relationships are recognized and mapped through formal concept analysis (FCA). The fluent editor tool (FET) displays a number of user-defined associations. Knowledge is also extracted using a query-based approach and a reasoner window in the FET. The created DO is broadcast on the web using an ontology web language (OWL) that may be used in a variety of other applications. The suggested work is notable because it creates broad-coverage DO for the terrorist domain using a tool called Fluent Editor (FE) instead of the typical tool (protégé), and semantic information is retrieved with 100% correctness, similar to a query-based search system (QBS).
Similar content being viewed by others
References
Tucker R, O’Brien DT, Ciomek A, Castro E, Wang Q, Phillips NE (2021) Who ‘Tweets’ where and when, and how does it help understand crime rates at places? Measuring the presence of tourists and commuters in ambient populations. J Quant Criminol 37(2):333–359
Bendaoud R, Hacene AMR, Toussaint Y, Delecroix B, Napoli A (2007) Text-based ontology construction using relational concept analysis. In: International workshop on ontology dynamics-IWOD 2007
Inyaem U, Meesad P, Haruechaiyasak C (2009) Named-entity techniques for terrorism event extraction and classification. In: 2009 eighth international symposium on natural language processing. IEEE, pp 175–179
Suhendra A, Winadwiastuti J, Darmayantie A, Farida N (2017) Terrorism domain corpus building using latent Dirichlet allocation (LDA) and its ontology relationship building using global similarity hierarchy learning (GSHL). In: 2017 11th international conference on information and communication technology and system (ICTS). IEEE, pp 253–258
Konys A (2018) Towards knowledge handling in ontology-based information extraction systems. Procedia Comput Sci 126:2208–2218
Jain S (2021) Semantics-based decision support for unconventional emergencies. Understanding semantics-based decision support. Chapman and Hall/CRC, London, pp 57–66
Rawat R, Mahor V, Garg B, Telang S, Pachlasiya K, Kumar A et al (2022) Analyzing newspaper articles for text-related data for finding vulnerable posts over the internet that are linked to terrorist activities. Int J Inf Secur Priv 16(1):1–14
Patel A, Sharma A, Jain S (2020) An intelligent resource manager over terrorism knowledge base. Recent Adv Comput Sci Commun 13(3):394–405
Jindal R, Seeja KR, Jain S (2020) Construction of domain ontology utilizing formal concept analysis and social media analytics. Int J Cogn Comput Eng 1:62–69
Weichbroth P (2019) Fluent editor and controlled natural language in ontology development. Int J Artif Intell Tools 28(04):1940007
Aghdam MH, Zanjani MD (2021) A novel regularized asymmetric non-negative matrix factorization for text clustering. Inf Process Manag 58(6):102694
Rawat R, Mahor V, Chirgaiya S, Shaw RN, Ghosh A (2021) Analysis of darknet traffic for criminal activities detection using TF-IDF and light gradient boosted machine learning algorithm. Innovations in electrical and electronic engineering. Springer, Singapore, pp 671–681
Mehri R, Haarslev V, Chinaei H (2021) A machine learning approach for optimizing heuristic decision-making in web ontology language reasoners. Comput Intell 37(1):273–314
Rajawat AS, Rawat R, Shaw RN, Ghosh A (2021) Cyber physical system fraud analysis by mobile robot. Machine learning for robotics applications. Springer, Singapore, pp 47–61
Kakad S, Dhage S (2021) Ontology construction from cross domain customer reviews using expectation maximization and semantic similarity. In: 2021 international conference on emerging smart computing and informatics (ESCI). IEEE, pp 19–23
Inyaem U, Meesad P, Haruechaiyasak C, Tran D (2010) Construction of fuzzy ontology-based terrorism event extraction. In: 2010 third international conference on knowledge discovery and data mining. IEEE, pp 391–394
Rawat R, Garg B, Mahor V, Telang S, Pachlasiya K, Chouhan M. Organ trafficking on the dark web—the data security and privacy concern in healthcare systems. Internet of Healthcare Things, 191
Rožanec JM, Zajec P, Kenda K, Novalija I, Fortuna B, Mladenić D (2021) XAI-KG: knowledge graph to support XAI and decision-making in manufacturing. In: International conference on advanced information systems engineering. Springer, Cham, pp 167–172
Rajawat AS, Rawat R, Barhanpurkar K, Shaw RN, Ghosh A (2021) Vulnerability analysis at industrial internet of things platform on dark web network using computational intelligence. In: Computationally intelligent systems and their applications, pp 39–51
Slowinski R, Vanderpooten D (2000) A generalized definition of rough approximations based on similarity. IEEE Trans Knowl Data Eng 12(2):331–336
Rajawat AS, Rawat R, Mahor V, Shaw RN, Ghosh A (2021) Suspicious big text data analysis for prediction—on darkweb user activity using computational intelligence model. Innovations in electrical and electronic engineering. Springer, Singapore, pp 735–751
Sikos LF (2021) AI in digital forensics: ontology engineering for cybercrime investigations. Wiley Interdiscipl Rev Forensic Sci 3(3):e1394
Rawat R, Mahor V, Rawat A, Garg B, Telang S (2021) Digital transformation of cyber crime for chip-enabled hacking. Handbook of research on advancing cybersecurity for digital transformation. IGI Global, Hershey, pp 227–243
Nehinbe JO (2021) Statistical methods for conducting the ontology and classifications of fake news on social media. Handbook of research on cyber crime and information privacy. IGI Global, Hershey, pp 632–651
Rawat R, Mahor V, Chirgaiya S, Shaw RN, Ghosh A (2021) Sentiment analysis at online social network for cyber-malicious post reviews using machine learning techniques. Comput Intell Syst Appl 113–130
Liebetrau T, Christensen KK (2021) The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces. Eur J Int Secur 6(1):25–43
Rawat R, Garg B, Pachlasiya K, Mahor V, Telang S, Chouhan M et al (2022) SCNTA: monitoring of network availability and activity for identification of anomalies using machine learning approaches. Int J Inf Technol Web Eng 17(1):1–19
Sandagiri C, Kumara BT, Kuhaneswaran B (2021) Deep neural network-based crime prediction using Twitter data. Int J Syst Serv-Oriented Eng (IJSSOE) 11(1):15–30
Karmakar S, Das S (2021) Understanding the rise of Twitter-based cyberbullying due to COVID-19 through comprehensive statistical evaluation. In: Proceedings of the 54th Hawaii international conference on system sciences
Koufakis A, Chatzakou D, Meditskos G, Tsikrika T, Vrochidis S, Kompatsiaris I (2020) Invited keynote on IOT4SAFE 2020: semantic web technologies in fighting crime and terrorism: The CONNEXIONs approach. In: IOT4SAFE@ ESWC
Mannes A, Golbeck J (2007) Ontology building: a terrorism specialist's perspective. In: 2007 IEEE aerospace conference. IEEE, pp 1–5
Tsikrika T, Andreadou K, Moumtzidou A, Schinas E, Papadopoulos S, Vrochidis S, Kompatsiaris I (2015) A unified model for socially interconnected multimedia-enriched objects. In: International conference on multimedia modeling. Springer, Cham, pp 372–384
Galjano P, Popovich V (2009) Theoretical investigation of terrorism. Ontology development. Information fusion and geographic information systems. Springer, Berlin, pp 227–239
Inyaem U, Meesad P, Haruechaiyasak C, Tran D (2009) Ontology-based terrorism event extraction. In: 2009 first international conference on information science and engineering. IEEE, pp 912–915
Rawat R, Rajawat AS, Mahor V, Shaw RN, Ghosh A (2021) Dark Web—onion hidden service discovery and crawling for profiling morphing, unstructured crime and vulnerabilities prediction. Innovations in electrical and electronic engineering. Springer, Singapore, pp 717–734
Sikos LF (2015) Semantic web development tools. Mastering structured data on the semantic web. Apress, Berkeley, pp 79–119
Rawat R, Mahor V, Chirgaiya S, Rathore AS (2021) Applications of social network analysis to managing the investigation of suspicious activities in social media platforms. In: Advances in cybersecurity management. Springer, Cham, pp 315–335
Gennari JH, Musen MA, Fergerson RW, Grosso WE, Crubézy M, Eriksson H, Tu SW et al (2003) The evolution of Protégé: an environment for knowledge-based systems development. Int J Hum Comput Stud 58(1):89–123
Funding
The author does not receive any financial support for this work.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rawat, R. Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation. Int. j. inf. tecnol. 15, 893–903 (2023). https://doi.org/10.1007/s41870-022-00934-9
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-022-00934-9