{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T06:16:07Z","timestamp":1767852967909,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T00:00:00Z","timestamp":1522713600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Soc Sc"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s42001-018-0015-z","type":"journal-article","created":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T13:37:22Z","timestamp":1522762642000},"page":"453-470","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["The rise of Jihadist propaganda on social networks"],"prefix":"10.1007","volume":"1","author":[{"given":"Adam","family":"Badawy","sequence":"first","affiliation":[]},{"given":"Emilio","family":"Ferrara","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,3]]},"reference":[{"key":"15_CR1","unstructured":"Abdelaziz, S. (2014). Death and desecration in Syria: Jihadist group \u2018crucifies\u2019 bodies to send message. CNN, 2 May 2014."},{"issue":"8","key":"15_CR2","first-page":"8","volume":"46","author":"A Alajmi","year":"2012","unstructured":"Alajmi, A., Saad, E., & Darwish, R. (2012). Toward an arabic stop-words list generation. International Journal of Computer Applications, 46(8), 8\u201313.","journal-title":"International Journal of Computer Applications"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Allendorfer, W. H. & Herring, S. C. (2015). ISIS vs. the US government: A war of online video propaganda. First Monday, 20(12).","DOI":"10.5210\/fm.v20i12.6336"},{"issue":"20","key":"15_CR4","first-page":"1","volume":"3","author":"JM Berger","year":"2015","unstructured":"Berger, J. M., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on US Relations with the Islamic World, 3(20), 1\u201365.","journal-title":"The Brookings Project on US Relations with the Islamic World"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Bermingham, A., Conway, M., McInerney, L., O\u2019Hare, N., & Smeaton, A. F. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In International conference on advances in social network analysis and mining, 2009. ASONAM\u201909 (pp. 231\u2013236). IEEE.","DOI":"10.1109\/ASONAM.2009.31"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Bodine-Baron, E., Helmus, T. C., Magnuson, M., & Winkelman, Z. (2016). Examining ISIS support and opposition networks on twitter. Technical report, RAND Corporation Santa Monica United States.","DOI":"10.7249\/RR1328"},{"issue":"3","key":"15_CR7","doi-asserted-by":"publisher","first-page":"39","DOI":"10.4018\/ijcwt.2012070104","volume":"2","author":"R Cohen-Almagor","year":"2013","unstructured":"Cohen-Almagor, R. (2013). In internet\u2019s way: Radical, terrorist Islamists on the free highway. International Journal of Cyber Warfare and Terrorism, 2(3), 39\u201358.","journal-title":"International Journal of Cyber Warfare and Terrorism"},{"issue":"5","key":"15_CR8","doi-asserted-by":"publisher","first-page":"e64679","DOI":"10.1371\/journal.pone.0064679","volume":"8","author":"MD Conover","year":"2013","unstructured":"Conover, M. D., Ferrara, E., Menczer, F., & Flammini, A. (2013). The digital evolution of occupy wall street. PLoS ONE, 8(5), e64679.","journal-title":"PLoS ONE"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"e87","DOI":"10.7717\/peerj-cs.87","volume":"2","author":"CA Davis","year":"2016","unstructured":"Davis, C. A., Ciampaglia, G. L., Aiello, L. M., Chung, K., Conover, M. D., Ferrara, E., et al. (2016). OSoMe: The IUNI observatory on social media. PeerJ Computer Science, 2, e87.","journal-title":"PeerJ Computer Science"},{"issue":"5","key":"15_CR10","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/03071847.2013.847714","volume":"158","author":"C Edwards","year":"2013","unstructured":"Edwards, C., & Gribbon, L. (2013). Pathways to violent extremism in the digital era. The RUSI Journal, 158(5), 40\u201347.","journal-title":"The RUSI Journal"},{"issue":"6","key":"15_CR11","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1080\/00396338.2014.985436","volume":"56","author":"JP Farwell","year":"2014","unstructured":"Farwell, J. P. (2014). The media strategy of ISIS. Survival, 56(6), 49\u201355.","journal-title":"Survival"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ins.2017.07.030","volume":"418\u2013419","author":"E Ferrara","year":"2017","unstructured":"Ferrara, E. (2017). Contagion dynamics of extremist propaganda in social networks. Information Sciences, 418\u2013419, 1\u201312.","journal-title":"Information Sciences"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Ferrara, E., Wang, W.-Q., Varol, O., Flammini, A., & Galstyan, A. (2016). Predicting online extremism, content adopters, and interaction reciprocity. In International conference on social informatics (pp. 22\u201339). Berlin: Springer.","DOI":"10.1007\/978-3-319-47874-6_3"},{"issue":"3","key":"15_CR14","first-page":"3","volume":"9","author":"A Fisher","year":"2015","unstructured":"Fisher, A. (2015). How jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3\u201320.","journal-title":"Perspectives on Terrorism"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Halverson, J. R., Goodall, Jr., H., & Corman, S. R. (2011). In Master narratives of Islamist extremism (pp. 137\u2013148). Berlin: Springer.","DOI":"10.1007\/978-0-230-11723-5_12"},{"issue":"1","key":"15_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/1057610X.2014.974948","volume":"38","author":"J Klausen","year":"2015","unstructured":"Klausen, J. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1\u201322.","journal-title":"Studies in Conflict & Terrorism"},{"issue":"6","key":"15_CR17","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1177\/0002764202045006003","volume":"45","author":"E Lee","year":"2002","unstructured":"Lee, E., & Leets, L. (2002). Persuasive storytelling by hate groups online: Examining its effects on adolescents. American Behavioral Scientist, 45(6), 927\u2013957.","journal-title":"American Behavioral Scientist"},{"issue":"2","key":"15_CR18","first-page":"42","volume":"3","author":"C Leuprecht","year":"2010","unstructured":"Leuprecht, C., Hataley, T., Moskalenko, S., & McCauley, C. (2010). Winning the battle but losing the war? Narrative and counter-narratives strategy. Perspectives on Terrorism, 3(2), 42\u201357.","journal-title":"Perspectives on Terrorism"},{"key":"15_CR19","unstructured":"Magdy, W., Darwish, K., & Weber, I. (2016). #FailedRevolutions: Using Twitter to study the antecedents of ISIS support. First Monday, 21(2). ISSN 13960466. \n                    http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/view\/6372\n                    \n                  ."},{"key":"15_CR20","unstructured":"Morstatter, F., Pfeffer, J., Liu, H., & Carley, K. M. (2013). Is the sample good enough? Comparing data from twitter\u2019s streaming API with Twitter\u2019s Firehose. In International Conference on Weblogs and Social Media (ICWSM) (pp. 400\u2013408)."},{"issue":"2","key":"15_CR21","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1080\/10576100802627738","volume":"32","author":"K Payne","year":"2009","unstructured":"Payne, K. (2009). Winning the battle of ideas: Propaganda, ideology, and terror. Studies in Conflict & Terrorism, 32(2), 109\u2013128.","journal-title":"Studies in Conflict & Terrorism"},{"issue":"3","key":"15_CR22","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1111\/j.1468-2478.2008.00511.x","volume":"52","author":"JA Piazza","year":"2008","unstructured":"Piazza, J. A. (2008). Incubators of terror: Do failed and failing states promote transnational terrorism? International Studies Quarterly, 52(3), 469\u2013488.","journal-title":"International Studies Quarterly"},{"key":"15_CR23","volume-title":"Ma\u2019alim fi-l-tariq (milestones)","author":"S Qutb","year":"1964","unstructured":"Qutb, S. (1964). Ma\u2019alim fi-l-tariq (milestones). Cairo: Dar al-Shuruq."},{"key":"15_CR24","unstructured":"Rowe, M., & Saif, H. (2016). Mining pro-ISIS radicalisation signals from social media users. In International Conference on Weblogs and Social Media (ICWSM) (pp. 329\u2013338)."},{"key":"15_CR25","doi-asserted-by":"publisher","unstructured":"Saad, S., Chamoun, M., & Bazan, S. B. (2015). Infowar on the web: When the caliphate goes online. In Proceedings of the ACM web science conference (Art ID. 53). ACM. \n                    https:\/\/doi.org\/10.1145\/2786451.2786487\n                    \n                  .","DOI":"10.1145\/2786451.2786487"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Saif, H., Dickinson, T., Kastler, L., Fernandez, M., & Alani, H. (2017). A semantic graph-based approach for radicalisation detection on social media. In European semantic web conference (pp. 571\u2013587). Berlin: Springer.","DOI":"10.1007\/978-3-319-58068-5_35"},{"key":"15_CR27","unstructured":"Shane, S., & Hubbard, B. (2014). ISIS displaying a deft command of varied media. The New York Times, 30, 30 Aug 2014."},{"issue":"2","key":"15_CR28","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1080\/17467580802590449","volume":"1","author":"AG Smith","year":"2008","unstructured":"Smith, A. G., Suedfeld, P., Conway, L. G., III, & Winter, D. G. (2008). The language of violence: Distinguishing terrorist from nonterrorist groups by thematic content analysis. Dynamics of Asymmetric Conflict, 1(2), 142\u2013163.","journal-title":"Dynamics of Asymmetric Conflict"},{"key":"15_CR29","volume-title":"ISIS: The state of terror","author":"J Stern","year":"2015","unstructured":"Stern, J., & Berger, J. M. (2015). ISIS: The state of terror. New York: HarperCollins."},{"key":"15_CR30","doi-asserted-by":"crossref","unstructured":"Taghva, K., Elkhoury, R., & Coombs, J. (2005). Arabic stemming without a root dictionary. In International conference on information technology: Coding and computing, 2005. ITCC 2005 (Vol. 1, pp. 152\u2013157). IEEE.","DOI":"10.1109\/ITCC.2005.90"},{"issue":"1","key":"15_CR31","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1186\/2190-8532-2-6","volume":"2","author":"R Torok","year":"2013","unstructured":"Torok, R. (2013). Developing an explanatory model for the process of online radicalisation and terrorism. Security Informatics, 2(1), 6.","journal-title":"Security Informatics"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Varol, O., Ferrara, E., Ogan, C. L., Menczer, F., & Flammini, A. (2014). Evolution of online user behavior during a social upheaval. In Proceedings of the 2014 ACM conference on Web science (pp. 81\u201390). New York: ACM.","DOI":"10.1145\/2615569.2615699"},{"key":"15_CR33","unstructured":"Weber, I., Garimella, V. R. K., & Batayneh, A. (2013). Secular vs. Islamist polarization in Egypt on Twitter. In Proceedings of the 2013 IEEE\/ACM international conference on advances in social networks analysis and mining (pp. 290\u2013297). New York: ACM."},{"key":"15_CR34","first-page":"1","volume":"33","author":"C Winter","year":"2015","unstructured":"Winter, C. (2015). Documenting the virtual \u2018caliphate\u2019. Quilliam Foundation, 33, 1\u201350.","journal-title":"Quilliam Foundation"}],"container-title":["Journal of Computational Social Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s42001-018-0015-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-018-0015-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s42001-018-0015-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,3]],"date-time":"2019-04-03T22:17:04Z","timestamp":1554329824000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s42001-018-0015-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,3]]},"references-count":34,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["15"],"URL":"https:\/\/doi.org\/10.1007\/s42001-018-0015-z","relation":{},"ISSN":["2432-2717","2432-2725"],"issn-type":[{"value":"2432-2717","type":"print"},{"value":"2432-2725","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,3]]},"assertion":[{"value":"23 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}