Abstract
Twitter, one of the important social media also acts as substrate to mix enzymes of actions and reactions of public sentiments including terrorist activities, either implicitly or explicitly. The identification of terrorist or crime related texts from Twitter is difficult because of the presence of such implicit and implied code-mixed hints that are solely shared among different users within a few groups. In the present task, we have developed a framework that deals with Twitter data and provides varieties of dataset useful for tracking various terrorist activities. The system also identifies the terrorist indices of different users as well as their groups. Compared to the available citation indices (e.g., h-index or i10-index), this newly proposed index takes into account the normalized parameters of citation and seed as well as code words related to crime from vulnerability lexicon. Finally, this index is used for ranking the Twitter users and groups and it is observed that our proposed ranking algorithms have performed reasonably better when the algorithms encapsulate the roles of citation and vulnerability parameters together.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
- 2.
- 3.
- 4.
- 5.
- 6.
- 7.
- 8.
- 9.
- 10.
- 11.
- 12.
- 13.
References
Cambria, E., Rajagopal, D., Olsher, D., Das, D.: Big social data analysis. In: Akerkar, R., (ed.) Big Data Computing, Chap. 13, pp. 401–414. Taylor & Francis Group/CRC, Boca Raton (2015). Hardback: 978-1-46-657837-1, eBook: 978-1-46-657838-8.2013
Gupta, A., Kumaraguru, P.: Credibility ranking of tweets during high impact events. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, 17 April 2012, p. 2. ACM (2012)
Ravikumar, S., Balakrishnan, R., Kambhampati, S.: Ranking tweets considering trust and relevance. In: Proceedings of the Ninth International Workshop on Information Integration on the Web, 20 May 2012, p. 4. ACM (2012)
Huang, H., Zubiaga, A., Ji, H., Deng, H., Wang, D., Le, H.K., Abdelzaher, T.F., Han, J., Leung, A., Hancock, J.P., Voss, C.R.: Tweet ranking based on heterogeneous networks. In: COLING 2012, pp. 1239–1256 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Debnath, S., Das, D., Das, B. (2017). Identifying Terrorist Index (T+) for Ranking Homogeneous Twitter Users and Groups by Employing Citation Parameters and Vulnerability Lexicon. In: Ghosh, A., Pal, R., Prasath, R. (eds) Mining Intelligence and Knowledge Exploration. MIKE 2017. Lecture Notes in Computer Science(), vol 10682. Springer, Cham. https://doi.org/10.1007/978-3-319-71928-3_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-71928-3_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-71927-6
Online ISBN: 978-3-319-71928-3
eBook Packages: Computer ScienceComputer Science (R0)