Title
Computational Mining of Social Media to Curb Terrorism
Abstract
In the ever-connected social networking era, terrorists exploit social media platforms via sophisticated approaches. To curb these activities, a rich collection of computational methods was developed. This article surveys the use of social media by terrorists, followed by a temporal classification framework that overviews computational countermeasures at four major stages, including inception of an attack, immediately before an attack, onset of an attack, and after an attack. The literature surveyed was organized around the four temporal stages. The resulting survey is summarized in a table with the main technology used in each stage based on the time of the attack.
Year
DOI
Venue
2019
10.1145/3342101
ACM Computing Surveys (CSUR)
Keywords
Field
DocType
Terrorism, computational analytics, counterterrorism, social media mining
Data science,Data mining,Social media,Social media mining,Computer science,Terrorism
Journal
Volume
Issue
ISSN
52
5
0360-0300
Citations 
PageRank 
References 
1
0.35
0
Authors
2
Name
Order
Citations
PageRank
Mashael Almoqbel110.35
Songhua Xu265.51