Computational mining of social media to curb terrorism
Document Type
Article
Publication Date
9-30-2020
Abstract
In the ever-connected social networking era, terrorists exploit social media platforms via sophisticated approaches. To curb these activities, a rich collection of computational methods was developed. This article surveys the use of social media by terrorists, followed by a temporal classification framework that overviews computational countermeasures at four major stages, including inception of an attack, immediately before an attack, onset of an attack, and after an attack. The literature surveyed was organized around the four temporal stages. The resulting survey is summarized in a table with the main technology used in each stage based on the time of the attack.
Identifier
85072400606 (Scopus)
Publication Title
ACM Computing Surveys
External Full Text Location
https://doi.org/10.1145/3342101
e-ISSN
15577341
ISSN
03600300
Issue
5
Volume
52
Fund Ref
U.S. Department of Defense
Recommended Citation
Almoqbel, Mashael and Xu, Songhua, "Computational mining of social media to curb terrorism" (2020). Faculty Publications. 4995.
https://digitalcommons.njit.edu/fac_pubs/4995