IDEAS home Printed from https://ideas.repec.org/a/spr/comaot/v24y2018i2d10.1007_s10588-017-9255-3.html
   My bibliography  Save this article

Mining online communities to inform strategic messaging: practical methods to identify community-level insights

Author

Listed:
  • Matthew Benigni

    (Carnegie Mellon University)

  • Kenneth Joseph

    (Northeastern University
    Carnegie Mellon University)

  • Kathleen M. Carley

    (Carnegie Mellon University)

Abstract

The ability of OSNs to propagate civil unrest has been powerfully observed through the rise of the ISIS and the ongoing conflict in Crimea. As a result, the ability to understand and in some cases mitigate the effects of user communities promoting civil unrest online has become an important area of research. Although methods to detect large online extremist communities have emerged in literature, the ability to summarize community content in meaningful ways remains an open research question. We introduce novel applications of the following methods: ideological user clustering with bipartite spectral graph partitioning, narrative mining with hash tag co-occurrence graph clustering, and identifying radicalization with directed URL sharing networks. In each case we describe how the method can be applied to social media. We subsequently apply them to online Twitter communities interested in the Syrian revolution and ongoing Crimean conflict.

Suggested Citation

  • Matthew Benigni & Kenneth Joseph & Kathleen M. Carley, 2018. "Mining online communities to inform strategic messaging: practical methods to identify community-level insights," Computational and Mathematical Organization Theory, Springer, vol. 24(2), pages 224-242, June.
  • Handle: RePEc:spr:comaot:v:24:y:2018:i:2:d:10.1007_s10588-017-9255-3
    DOI: 10.1007/s10588-017-9255-3
    as

    Download full text from publisher

    File URL: http://link.springer.com/10.1007/s10588-017-9255-3
    File Function: Abstract
    Download Restriction: Access to the full text of the articles in this series is restricted.

    File URL: https://libkey.io/10.1007/s10588-017-9255-3?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Matthew C Benigni & Kenneth Joseph & Kathleen M Carley, 2017. "Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter," PLOS ONE, Public Library of Science, vol. 12(12), pages 1-23, December.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Joshua Uyheng & Thomas Magelinski & Ramon Villa-Cox & Christine Sowa & Kathleen M. Carley, 2020. "Interoperable pipelines for social cyber-security: assessing Twitter information operations during NATO Trident Juncture 2018," Computational and Mathematical Organization Theory, Springer, vol. 26(4), pages 465-483, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Jose N. Paredes & Gerardo I. Simari & Maria Vanina Martinez & Marcelo A. Falappa, 2021. "NetDER: An Architecture for Reasoning About Malicious Behavior," Information Systems Frontiers, Springer, vol. 23(1), pages 185-201, February.
    2. Moradi, Mehdi & Parsa, Saeed, 2019. "An evolutionary method for community detection using a novel local search strategy," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 523(C), pages 457-475.
    3. Ozan Candogan & Nicole Immorlica & Bar Light & Jerry Anunrojwong, 2022. "Social Learning under Platform Influence: Consensus and Persistent Disagreement," Papers 2202.12453, arXiv.org, revised Oct 2023.
    4. Kathleen M. Carley, 2020. "Social cybersecurity: an emerging science," Computational and Mathematical Organization Theory, Springer, vol. 26(4), pages 365-381, December.
    5. Rahma Sugihartati & Bagong Suyanto & Mun’im Sirry, 2020. "The Shift from Consumers to Prosumers: Susceptibility of Young Adults to Radicalization," Social Sciences, MDPI, vol. 9(4), pages 1-15, April.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:comaot:v:24:y:2018:i:2:d:10.1007_s10588-017-9255-3. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.