This HTML5 document contains 33 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
dctermshttp://purl.org/dc/terms/
n2https://kar.kent.ac.uk/id/eprint/
wdrshttp://www.w3.org/2007/05/powder-s#
dchttp://purl.org/dc/elements/1.1/
n16http://purl.org/ontology/bibo/status/
rdfshttp://www.w3.org/2000/01/rdf-schema#
n12https://kar.kent.ac.uk/id/subject/
n10doi:10.1109/
n21https://kar.kent.ac.uk/81140/
n7https://demo.openlinksw.com/about/id/entity/https/raw.githubusercontent.com/annajordanous/CO644Files/main/
n3http://eprints.org/ontology/
n14https://kar.kent.ac.uk/id/event/
bibohttp://purl.org/ontology/bibo/
n19https://kar.kent.ac.uk/id/org/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
owlhttp://www.w3.org/2002/07/owl#
n15https://kar.kent.ac.uk/id/eprint/81140#
n4https://kar.kent.ac.uk/id/document/
n18https://kar.kent.ac.uk/id/
xsdhhttp://www.w3.org/2001/XMLSchema#
n8https://demo.openlinksw.com/about/id/entity/https/www.cs.kent.ac.uk/people/staff/akj22/materials/CO644/
n13https://kar.kent.ac.uk/id/person/

Statements

Subject Item
n2:81140
rdf:type
bibo:Article bibo:AcademicArticle n3:ConferenceItemEPrint n3:EPrint
rdfs:seeAlso
n21:
owl:sameAs
n10:EuroSPW51379.2020.00065
n3:hasAccepted
n4:3207773
n3:hasDocument
n4:3207773 n4:3207774 n4:3207803 n4:3207804 n4:3207805 n4:3207806
dc:hasVersion
n4:3207773
dcterms:title
#ISIS vs #ActionCountersTerrorism: A Computational Analysis of Extremist and Counter-extremist Twitter Narratives
wdrs:describedby
n7:export_kar_RDFN3.n3 n8:export_kar_RDFN3.n3
dcterms:date
2020-10-22
dcterms:creator
n13:ext-6406b437d6032022069f6b065c1ccf6a n13:ext-49167c7576dc2f2111408262e113e4d2 n13:ext-j.r.c.nurse@kent.ac.uk
bibo:status
n16:peerReviewed n16:published
dcterms:publisher
n19:ext-af0a9a5baed87c407844a3f5db44597c
bibo:abstract
The rapid expansion of cyberspace has greatly facilitated the strategic shift of traditional crimes to online platforms. This has included malicious actors, such as extremist organisations, making use of online networks to disseminate propaganda and incite violence through radicalising individuals. In this article, we seek to advance current research by exploring how supporters of extremist organisations craft and disseminate their content, and how posts from counter-extremism agencies compare to them. In particular, this study will apply computational techniques to analyse the narratives of various pro-extremist and counter-extremist Twitter accounts, and investigate how the psychological motivation behind the messages compares between pro-ISIS and counter-extremism narratives. Our findings show that pro-extremist accounts often use different strategies to disseminate content (such as the types of hashtags used) when compared to counter-extremist accounts across different types of organisations, including accounts of governments and NGOs. Through this study, we provide unique insights into both extremist and counter-extremist narratives on social media platforms. Furthermore, we define several avenues for discussion regarding the extent to which counter-messaging may be effective at diminishing the online influence of extremist and other criminal organisations.
dcterms:isPartOf
n18:repository
dcterms:subject
n12:J n12:QA n12:QA76 n12:H n12:T
bibo:authorList
n15:authors
bibo:presentedAt
n14:ext-5a1a00320cf1e94563f16b8a87ba85f5