{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T12:15:47Z","timestamp":1765196147238,"version":"3.46.0"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031948541"},{"type":"electronic","value":"9783031948558"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-94855-8_1","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T05:51:25Z","timestamp":1749793885000},"page":"3-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Automated Home Secretary: Evaluating the\u00a0Ability of\u00a0Large Language Models to\u00a0Understand Extremist Conversations"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-0224-0097","authenticated-orcid":false,"given":"James","family":"Stevenson","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9247-944X","authenticated-orcid":false,"given":"Luke","family":"Gassmann","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8099-0646","authenticated-orcid":false,"given":"Matthew","family":"Edwards","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","first-page":"106363","DOI":"10.1109\/ACCESS.2021.3100435","volume":"9","author":"HS Alatawi","year":"2021","unstructured":"Alatawi, H.S., Alhothali, A.M., Moria, K.M.: Detecting white supremacist hate speech using domain specific word embedding with deep learning and BERT. IEEE Access 9, 106363\u2013106375 (2021)","journal-title":"IEEE Access"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Bailard, C.S., Tromble, R., Zhong, W., Bianchi, F., Hosseini, P., Broniatowski, D.: \u201cKeep your heads held high boys!\u201d: examining the relationship between the proud boys\u2019 online discourse and offline activities. Am. Polit. Sci. Rev., 1\u201318 (2024)","DOI":"10.1017\/S0003055423001478"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Baumgartner, J., Zannettou, S., Squire, M., Blackburn, J.: The Pushshift Telegram dataset. In: Proceedings of the International AAAI Conference on Web and Social Media, vol.\u00a014, pp. 840\u2013849 (2020)","DOI":"10.1609\/icwsm.v14i1.7348"},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"48364","DOI":"10.1109\/ACCESS.2021.3068313","volume":"9","author":"M Gaikwad","year":"2021","unstructured":"Gaikwad, M., Ahirrao, S., Phansalkar, S., Kotecha, K.: Online extremism detection: a systematic literature review with emphasis on datasets, classification techniques, validation methods, and tools. IEEE Access 9, 48364\u201348387 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3068313","journal-title":"IEEE Access"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Gassmann, L., McConville, R., Edwards, M.: Predicting interpersonal influence from conversational features. In: 2023 10th International Conference on Behavioural and Social Computing (BESC) (2023)","DOI":"10.1109\/BESC59560.2023.10386510"},{"key":"1_CR6","unstructured":"Gassmann, L., Campbell, J., Edwards, M.: Influence reasoning capabilities of large language models in social environments. In: Proceedings of the AAAI Symposium on AI Trustworthiness and Risk Assessment for Challenging Contexts (ATRACC). AAAI Press, United States (2024). https:\/\/sites.google.com\/view\/aaai-atracc. aI Trustworthiness and Risk Assessment for Challenged Contexts : AAAI 2024 Fall Symposium, ATRACC ; Conference date: 07-11-2024 Through 09-11-2024"},{"key":"1_CR7","unstructured":"IBM Corporation: IBM WatsonX API (2024). https:\/\/www.ibm.com\/docs\/en\/watsonx\/saas?topic=started-watsonx-apis. Accessed 23 Nov 2024"},{"key":"1_CR8","doi-asserted-by":"publisher","unstructured":"Micallef, N., He, B., Kumar, S., Ahamad, M., Memon, N.: The role of the crowd in countering misinformation: a case study of the COVID-19 infodemic. In: 2020 IEEE International Conference on Big Data (Big Data), pp. 748\u2013757 (2020). https:\/\/doi.org\/10.1109\/BigData50022.2020.9377956","DOI":"10.1109\/BigData50022.2020.9377956"},{"key":"1_CR9","unstructured":"Ministry of Housing, Communities and Local Government: New definition of extremism (2024). https:\/\/www.gov.uk\/government\/publications\/new-definition-of-extremism-2024\/new-definition-of-extremism-2024. Accessed 28 Oct 2024"},{"issue":"1","key":"1_CR10","doi-asserted-by":"publisher","first-page":"e5692","DOI":"10.1002\/cpe.5692","volume":"33","author":"W Oueslati","year":"2021","unstructured":"Oueslati, W., Arrami, S., Dhouioui, Z., Massaabi, M.: Opinion leaders\u2019 detection in dynamic social networks. Concurr. Comput.: Pract. Experience 33(1), e5692 (2021)","journal-title":"Concurr. Comput.: Pract. Experience"},{"key":"1_CR11","doi-asserted-by":"publisher","unstructured":"Oueslati, W., Mejri, S., Al-Otaibi, S., Ayouni, S.: Recognition of opinion leaders in social networks using text posts\u2019 trajectory scoring and users\u2019 comments sentiment analysis. IEEE Access 11, 123589\u2013123609 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3329049","DOI":"10.1109\/ACCESS.2023.3329049"},{"key":"1_CR12","unstructured":"Parthasarathy, V.B., Zafar, A., Khan, A., Shahid, A.: The ultimate guide to fine-tuning LLMS from basics to breakthroughs: an exhaustive review of technologies, research, best practices, applied research challenges and opportunities. Technical report, CeADAR: Ireland\u2019s Centre for AI, University College Dublin, Belfield, Dublin, Ireland (2024)"},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Piao, S., Whittle, J.: A feasibility study on extracting Twitter users\u2019 interests using NLP tools for serendipitous connections. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp. 910\u2013915 (2011). https:\/\/doi.org\/10.1109\/PASSAT\/SocialCom.2011.164","DOI":"10.1109\/PASSAT\/SocialCom.2011.164"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1075\/ijcl.17.2.05pre","volume":"17","author":"S Prentice","year":"2012","unstructured":"Prentice, S., Rayson, P., Taylor, P.J.: The language of Islamic extremism: towards an automated identification of beliefs, motivations and justifications. Int. J. Corpus Linguist. 17(2), 183\u2013204 (2012)","journal-title":"Int. J. Corpus Linguist."},{"issue":"1","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13388-014-0005-5","volume":"3","author":"JR Scanlon","year":"2014","unstructured":"Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Secur. Inf. 3(1), 1\u201310 (2014). https:\/\/doi.org\/10.1186\/s13388-014-0005-5","journal-title":"Secur. Inf."},{"key":"1_CR16","unstructured":"Secretary of State for the Home Department: Prevent Strategy. The Stationery Office, London (2011). https:\/\/www.official-documents.gov.uk. presented to Parliament by the Secretary of State for the Home Department by Command of Her Majesty"},{"issue":"3","key":"1_CR17","doi-asserted-by":"publisher","first-page":"496","DOI":"10.1037\/pspa0000338","volume":"125","author":"LG Smith","year":"2023","unstructured":"Smith, L.G., Piwek, L., Hinds, J., Brown, O., Chen, C., Joinson, A.: Digital traces of offline mobilization: a study of far-right extremist groups. J. Pers. Soc. Psychol. 125(3), 496\u2013518 (2023)","journal-title":"J. Pers. Soc. Psychol."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Stevenson, J., Edwards, M., Rashid, A.: Analysing the activities of far-right extremists on the Parler social network. In: 2023 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 392\u2013399. IEEE\/ACM (2023)","DOI":"10.1145\/3625007.3627733"},{"key":"1_CR19","doi-asserted-by":"publisher","unstructured":"Teutle, A.R.M.: Twitter: network properties analysis. In: 2010 20th International Conference on Electronics Communications and Computers (CONIELECOMP), pp. 180\u2013186 (2010). https:\/\/doi.org\/10.1109\/CONIELECOMP.2010.5440773","DOI":"10.1109\/CONIELECOMP.2010.5440773"},{"key":"1_CR20","unstructured":"user1342: Extremism classification LLM prompt (2025). https:\/\/gist.github.com\/user1342\/71c51bc82fcb5be0013b77a1e3eb89e6. Accessed 22 Mar 2025"}],"container-title":["Communications in Computer and Information Science","Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94855-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T12:13:38Z","timestamp":1765196018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94855-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031948541","9783031948558"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94855-8_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EICC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Interdisciplinary Cybersecurity Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rennes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eicc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.fvv.um.si\/eicc2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}