Skip to main content

Identifying Key-Players in Online Activist Groups on Facebook Social Network

Nouh, Mariam, Nurse, Jason R. C., Goldsmith, Michael (2015) Identifying Key-Players in Online Activist Groups on Facebook Social Network. In: 2015 IEEE International Conference on Data Mining Workshop (ICDMW), 14-17 November 2015, Atlantic City, NJ, USA. (doi:10.1109/ICDMW.2015.88)

PDF - Publisher pdf
Download (1MB) Preview
[img]
Preview
PDF - Author's Accepted Manuscript
Download (499kB) Preview
[img]
Preview
Official URL
10.1109/ICDMW.2015.88

Abstract

Online social media applications have become an integral part of our everyday life. Not only are they being utilised by individuals and legitimate businesses, but also recently several organised groups, such as activists, hactivists, and cyber-criminals have adopted them to communicate and spread their ideas. This represents a new source for intelligence gathering for law enforcement for instance, as it allows them an inside look at the behaviour of these previously closed, secretive groups. One possible opportunity with this online data source is to utilise the public exchange of social-media messages to identify key users in such groups. This is particularly important for law enforcement that wants to monitor or interrogate influential people in suspicious groups. In this paper, we utilise Social Network Analysis (SNA) techniques to understand the dynamics of the interaction between users in a Facebook-based activist group. Additionally, we aim to identify the most influential users in the group and infer their relationship strength. We incorporate sentiment analysis to identify users with clear positive and negative influences on the group; this could aid in facilitating a better understanding of the group.We also perform a temporal analysis to correlate online activities with relevant real-life events. Our results show that applying such data analysis techniques on users online behaviour is a powerful tool to predict levels of influence and relationship strength between group members. Finally, we validated our results against the ground truth and found that our approach is very promising at achieving its aims.

Item Type: Conference or workshop item (Paper)
DOI/Identification number: 10.1109/ICDMW.2015.88
Subjects: Q Science
T Technology
Divisions: Faculties > Sciences > School of Computing
Faculties > Sciences > School of Computing > Security Group
Depositing User: Jason Nurse
Date Deposited: 03 Jul 2018 12:55 UTC
Last Modified: 01 Aug 2019 10:43 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/67500 (The current URI for this page, for reference purposes)
Nurse, Jason R. C.: https://orcid.org/0000-0003-4118-1680
  • Depositors only (login required):

Downloads

Downloads per month over past year