2015 IEEE International Conference on Data Mining Workshop (ICDMW) 2015
DOI: 10.1109/icdmw.2015.88
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Key-Players in Online Activist Groups on the Facebook Social Network

Abstract: Online social media applications have become an integral part of our everyday life. Not only are they being utilised by individuals and legitimate businesses, but also recently several organised groups, such as activists, hactivists, and cyber-criminals have adopted them to communicate and spread their ideas. This represents a new source for intelligence gathering for law enforcement for instance, as it allows them an inside look at the behaviour of these previously closed, secretive groups. One possible oppor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 32 publications
0
15
0
Order By: Relevance
“…After constructing the graph, we measure the degree of influence each user has over their network using different centrality measures, such as degree centrality, betweenness centrality, and HITS-Hub. Such properties have been adopted in the research literature to study properties of cyber-criminal networks and their behaviour [23], [24].…”
Section: A Feature Engineeringmentioning
confidence: 99%
“…After constructing the graph, we measure the degree of influence each user has over their network using different centrality measures, such as degree centrality, betweenness centrality, and HITS-Hub. Such properties have been adopted in the research literature to study properties of cyber-criminal networks and their behaviour [23], [24].…”
Section: A Feature Engineeringmentioning
confidence: 99%
“…To identify influential nodes in complex networks, some works have investigated some properties of complex networks such as rich-club [23] and directivity [24]. Besides, some works focus on identifying influential nodes using machine learning methods in their specific scenarios, such as identifying user influence on Facebook [25]. However, these works do not investigate the universal propagation scenario.…”
Section: Related Workmentioning
confidence: 99%
“…It is said that the Blackberry Messenger app played a crucial role in the organizing the riots [29] in enabling contagion and a group-mob mentality; Reicher [71] and Stott, Drury and Reicher [78] provide further insight into the psychology of crowd dynamics broadly, and in the London riots, respectively. Facebook has also been used by activists as a platform for action and engagement with increased online activity found to often correlate with offline group actions [62]. In 2010s Arab Spring, Facebook was used to spread the word of the revolution, and many believe that social media contributed to the liberation of those societies [29].…”
Section: Groups As Perpetrators and Victims Of Cybercrimementioning
confidence: 99%