Skip to main content
Top
Published in:

01-12-2023 | Original Article

Integrated content-network analysis to discover influential collectives for studying social cyber-threats from online social movements

Authors: Falah Amro, Hemant Purohit

Published in: Social Network Analysis and Mining | Issue 1/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The article discusses the integration of content-network analysis to identify influential collectives in online social movements, focusing on the 2022 Canadian Freedom Convoy as a case study. It highlights the methodology of combining natural language processing and social network analysis to monitor actor interactions and map emerging social identities. The research aims to provide first responder agencies with tools to detect, monitor, and prevent offline violent activities instigated by online social movements. The article also emphasizes the importance of understanding the collective action and behavior of influential actors to forecast potential escalations and inform strategic responses.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
go back to reference Angriman E, van der Grinten A, Hamann M, Meyerhenke H, Penschuck M (2023) Algorithms for large-scale network analysis and the NetworKit toolkit. Algorithms for big data: DFG priority program 1736. Springer Nature Switzerland, 2023. pp 3–20 Angriman E, van der Grinten A, Hamann M, Meyerhenke H, Penschuck M (2023) Algorithms for large-scale network analysis and the NetworKit toolkit. Algorithms for big data: DFG priority program 1736. Springer Nature Switzerland, 2023. pp 3–20
go back to reference Araque O, Iglesias CA (2020) An approach for radicalization detection based on emotion signals and semantic similarity. IEEE Access 8:17877–17891CrossRef Araque O, Iglesias CA (2020) An approach for radicalization detection based on emotion signals and semantic similarity. IEEE Access 8:17877–17891CrossRef
go back to reference Bondy JA (1976) U. S. R. Murty graph theory with applications. Elsevier Bondy JA (1976) U. S. R. Murty graph theory with applications. Elsevier
go back to reference Borgatti SP (2006) Identifying sets of key players in a social network. Comput Math Organ Theory 12(1):21–34CrossRef Borgatti SP (2006) Identifying sets of key players in a social network. Comput Math Organ Theory 12(1):21–34CrossRef
go back to reference Carley KM et al (2018) Social Cyber-Security. In: Bisgin H et al (eds) Social, cultural, and behavioral modeling: 11th international conference, SBPBRiMS 2018, Washington, DC, USA, July 10–13, 2018, proceedings. Springer, New York, pp 389–394CrossRef Carley KM et al (2018) Social Cyber-Security. In: Bisgin H et al (eds) Social, cultural, and behavioral modeling: 11th international conference, SBPBRiMS 2018, Washington, DC, USA, July 10–13, 2018, proceedings. Springer, New York, pp 389–394CrossRef
go back to reference Chan M (2010) The impact of email on collective action: a field application of the SIDE model. New Media Soc 12(8):1313–1330CrossRef Chan M (2010) The impact of email on collective action: a field application of the SIDE model. New Media Soc 12(8):1313–1330CrossRef
go back to reference Chen H (2008) Sentiment and affect analysis of dark web forums: measuring radicalization on the internet [Paper presentation]. In: Proceedings of the 2008 IEEE international conference on intelligence and security informatics, Taipei, Taiwan, Province of China. https://doi.org/10.1109/ISI.2008.4565038 Chen H (2008) Sentiment and affect analysis of dark web forums: measuring radicalization on the internet [Paper presentation]. In: Proceedings of the 2008 IEEE international conference on intelligence and security informatics, Taipei, Taiwan, Province of China. https://​doi.​org/​10.​1109/​ISI.​2008.​4565038
go back to reference Everett MG, Borgatti SP (2005) Extending centrality. In: Carrington PJ, Scott J, Wasserman S (eds) Models and methods in social network analysis. Campbridge University Press, pp 57–76CrossRef Everett MG, Borgatti SP (2005) Extending centrality. In: Carrington PJ, Scott J, Wasserman S (eds) Models and methods in social network analysis. Campbridge University Press, pp 57–76CrossRef
go back to reference Grover T, Mark G (2019) Detecting potential warning behaviors of ideological radicalization in an alt-right subreddit. In: Proceedings of the international AAAI conference on web and social media 13(1): 193–204 Grover T, Mark G (2019) Detecting potential warning behaviors of ideological radicalization in an alt-right subreddit. In: Proceedings of the international AAAI conference on web and social media 13(1): 193–204
go back to reference Gupta A, Joshi A, Kumaraguru P (2012) Identifying and characterizing user communities on twitter during crisis events. In: DUBMMSM '12: Proceedings of the 2012 workshop on data-driven user behavioral modelling and mining from social media, pp 23–26. https://doi.org/10.1145/2390131.2390142 Gupta A, Joshi A, Kumaraguru P (2012) Identifying and characterizing user communities on twitter during crisis events. In: DUBMMSM '12: Proceedings of the 2012 workshop on data-driven user behavioral modelling and mining from social media, pp 23–26. https://​doi.​org/​10.​1145/​2390131.​2390142
go back to reference Haidt J (2012) The righteous mind: why good people are divided by politics and religion. Penguin Haidt J (2012) The righteous mind: why good people are divided by politics and religion. Penguin
go back to reference Hutto CJ, Gilbert EE (2014) VADER: a parsimonious rule-based model for sentiment analysis of social media text. In: Eighth international conference on weblogs and social media (ICWSM-14). Ann Arbor, MI, June 2014 Hutto CJ, Gilbert EE (2014) VADER: a parsimonious rule-based model for sentiment analysis of social media text. In: Eighth international conference on weblogs and social media (ICWSM-14). Ann Arbor, MI, June 2014
go back to reference Iqbal F, Fung BC, Debbabi M, Batool R, Marrington A (2019) Wordnet-based criminal networks mining for cybercrime investigation. IEEE Access 7:22740–22755CrossRef Iqbal F, Fung BC, Debbabi M, Batool R, Marrington A (2019) Wordnet-based criminal networks mining for cybercrime investigation. IEEE Access 7:22740–22755CrossRef
go back to reference Kelshall C (2019) Violent transnational social movements and their impact on contemporary social conflict. J Intell Conf Warfare 1(3):20–35CrossRef Kelshall C (2019) Violent transnational social movements and their impact on contemporary social conflict. J Intell Conf Warfare 1(3):20–35CrossRef
go back to reference Khandpur RP, Ji T, Jan S, Wang G, Lu CT, Ramakrishnan N (2017) November). Crowdsourcing cybersecurity: cyber-attack detection using social media [Paper presentation]. In: Proceedings of the 2017 ACM on conference on information and knowledge management. New York, NY, USA. https://doi.org/10.1145/3132847.3132866 Khandpur RP, Ji T, Jan S, Wang G, Lu CT, Ramakrishnan N (2017) November). Crowdsourcing cybersecurity: cyber-attack detection using social media [Paper presentation]. In: Proceedings of the 2017 ACM on conference on information and knowledge management. New York, NY, USA. https://​doi.​org/​10.​1145/​3132847.​3132866
go back to reference Kursuncu U, Gaur M, Castillo C, Alambo A, Thirunarayan K, Shalin V, Achilov Dilshod Arpinar IB, Sheth A (2019) Modeling Islamist extremist communications on social media using contextual dimensions: religion, ideology, and hate. In: Proceedings of the ACM on human-computer interaction, 3(CSCW), 1–22. https://doi.org/10.1145/3359253 Kursuncu U, Gaur M, Castillo C, Alambo A, Thirunarayan K, Shalin V, Achilov Dilshod Arpinar IB, Sheth A (2019) Modeling Islamist extremist communications on social media using contextual dimensions: religion, ideology, and hate. In: Proceedings of the ACM on human-computer interaction, 3(CSCW), 1–22. https://​doi.​org/​10.​1145/​3359253
go back to reference Lance Bennett W, Segerberg A (2012) The logic of connective action. Inform Commun Soc 15(5):739–768CrossRef Lance Bennett W, Segerberg A (2012) The logic of connective action. Inform Commun Soc 15(5):739–768CrossRef
go back to reference Maćkiewicz A, Ratajczak W (1993) Principal components analysis (pca). Comput Geosci 19(3):303–342CrossRef Maćkiewicz A, Ratajczak W (1993) Principal components analysis (pca). Comput Geosci 19(3):303–342CrossRef
go back to reference McNerney H, Spann B, Mead E, Kready J, Marcoux T, Agarwal N (2022) Assessing the influence and reach of digital activity amongst far-right actors: a comparative evaluation of mainstream and ‘free speech’ social media platforms. For(e)dialogue 4(1) McNerney H, Spann B, Mead E, Kready J, Marcoux T, Agarwal N (2022) Assessing the influence and reach of digital activity amongst far-right actors: a comparative evaluation of mainstream and ‘free speech’ social media platforms. For(e)dialogue 4(1)
go back to reference Newman, M (2010) Networks: an introduction (pp 168–234, Chapter 7: Measures and Metrics)., Oxford University Press, 2010 Newman, M (2010) Networks: an introduction (pp 168–234, Chapter 7: Measures and Metrics)., Oxford University Press, 2010
go back to reference Pastrana S, Hutchings A, Caines A, Buttery P (2018) Characterizing eve: analyzing cybercrime actors in a large underground forum. In: Bailey M, Holz T, Stamatogiannakis M, Ioannidis S (eds) Research in attacks, intrusions, and defenses: 21st international symposium, RAID 2018, proceedings 21. Springer International Publishing, pp 207–227CrossRef Pastrana S, Hutchings A, Caines A, Buttery P (2018) Characterizing eve: analyzing cybercrime actors in a large underground forum. In: Bailey M, Holz T, Stamatogiannakis M, Ioannidis S (eds) Research in attacks, intrusions, and defenses: 21st international symposium, RAID 2018, proceedings 21. Springer International Publishing, pp 207–227CrossRef
go back to reference Postmes T, Brunsting S (2002) Collective action in the age of the internet. Soc Sci Comput Rev 20(3):290–301CrossRef Postmes T, Brunsting S (2002) Collective action in the age of the internet. Soc Sci Comput Rev 20(3):290–301CrossRef
go back to reference Postmes T, Spears R, Lea M (1998) Breaching or building social boundaries? Commun Res 25(6):689–715CrossRef Postmes T, Spears R, Lea M (1998) Breaching or building social boundaries? Commun Res 25(6):689–715CrossRef
go back to reference Prochaska S, Duskin K, Kharazian Z, Minow C, Blucker S, Venuto S, West J D, Starbird K (2023) Mobilizing manufactured reality: how participatory disinformation shaped deep stories to catalyze action during the 2020 U.S. Presidential election. Proceedings of the ACM on human-computer interaction, 7(CSCW1), Article 140, 39 pages. https://doi.org/10.1145/3579616 Prochaska S, Duskin K, Kharazian Z, Minow C, Blucker S, Venuto S, West J D, Starbird K (2023) Mobilizing manufactured reality: how participatory disinformation shaped deep stories to catalyze action during the 2020 U.S. Presidential election. Proceedings of the ACM on human-computer interaction, 7(CSCW1), Article 140, 39 pages. https://​doi.​org/​10.​1145/​3579616
go back to reference Rezapour R, Dinh L, Diesner J (2021) Incorporating the measurement of moral foundations theory into analyzing stances on controversial topics. In: Proceedings of the 32nd ACM conference on hypertext and social media Rezapour R, Dinh L, Diesner J (2021) Incorporating the measurement of moral foundations theory into analyzing stances on controversial topics. In: Proceedings of the 32nd ACM conference on hypertext and social media
go back to reference Spears R, Postmes T (2015) Group identity, social influence, and collective action online. The Handbook of the psychology of communication technology, pp 23–46 Spears R, Postmes T (2015) Group identity, social influence, and collective action online. The Handbook of the psychology of communication technology, pp 23–46
go back to reference Woodworth McNerney H, Spann B, Mead EL, Kready J, Marcoux T, Agarwal N (2022) Assessing the influence and reach of digital activity amongst far-right actors: a comparative evaluation of mainstream and ‘free speech’ social media platforms. For(e)Dialogue https://doi.org/10.21428/e3990ae6.60c47409 Woodworth McNerney H, Spann B, Mead EL, Kready J, Marcoux T, Agarwal N (2022) Assessing the influence and reach of digital activity amongst far-right actors: a comparative evaluation of mainstream and ‘free speech’ social media platforms. For(e)Dialogue https://​doi.​org/​10.​21428/​e3990ae6.​60c47409
Metadata
Title
Integrated content-network analysis to discover influential collectives for studying social cyber-threats from online social movements
Authors
Falah Amro
Hemant Purohit
Publication date
01-12-2023
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2023
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-023-01124-6

Premium Partner