{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T23:28:19Z","timestamp":1775086099027,"version":"3.50.1"},"reference-count":165,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Research Support Fund of Symbiosis International"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3068313","type":"journal-article","created":{"date-parts":[[2021,3,23]],"date-time":"2021-03-23T20:20:07Z","timestamp":1616530807000},"page":"48364-48404","source":"Crossref","is-referenced-by-count":56,"title":["Online Extremism Detection: A Systematic Literature Review With Emphasis on Datasets, Classification Techniques, Validation Methods, and Tools"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5399-2619","authenticated-orcid":false,"given":"Mayur","family":"Gaikwad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8554-2129","authenticated-orcid":false,"given":"Swati","family":"Ahirrao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3356-0368","authenticated-orcid":false,"given":"Shraddha","family":"Phansalkar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2653-3780","authenticated-orcid":false,"given":"Ketan","family":"Kotecha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.08.009"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v6i2.834"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/09546550802073367"},{"key":"ref32","author":"ali","year":"2015","journal-title":"Isis and Propaganda How Isis Exploits Women"},{"key":"ref31","first-page":"18","article-title":"Techniques of online propaganda: A case study of western sahara conflict","volume":"3","author":"hamdani","year":"2017","journal-title":"Int J Media J Mass Commun"},{"key":"ref30","year":"1999","journal-title":"Propoganda Encyclopedia Britannica"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.sapharm.2012.04.004"},{"key":"ref36","author":"dornbierer","year":"2011","journal-title":"How Al-Qaeda recruits online"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1177\/02685809030183008"},{"key":"ref34","year":"2018","journal-title":"Awareness Brief? Online Radicalization to Violent Extremism"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.2307\/587800"},{"key":"ref27","year":"2020","journal-title":"Extremism Definition"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2019.02560"},{"key":"ref20","author":"berger","year":"2019","journal-title":"The dangerous spread of extremist manifestos"},{"key":"ref22","article-title":"The path to terrorism: The islamic state and its recruitment strategies","author":"turner","year":"2018"},{"key":"ref21","author":"coaston","year":"2019","journal-title":"The New Zealand Shooter&#x2019;s Manifesto Shows How White Nationalist Rhetoric Spreads"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5121\/acij.2011.2615"},{"key":"ref23","article-title":"Right-wing German hate speech on Twitter: Analysis and automatic detection","author":"jaki","year":"2019","journal-title":"arXiv 1910 07518"},{"key":"ref101","author":"agerholm","year":"2016","journal-title":"ISIS using Whatsapp and Telegram to sell sex slaves"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/B0-08-044854-2\/00722-7"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2017.1339695"},{"key":"ref25","year":"2020","journal-title":"Ideology"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3078897.3080534"},{"key":"ref51","year":"2015","journal-title":"Lucky Troll Club Archive"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.07.018"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.07.006"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"ref155","year":"2020","journal-title":"Amazon Mechnical Turk"},{"key":"ref150","year":"2017","journal-title":"ISIS religious texts"},{"key":"ref152","year":"2020","journal-title":"Incels me"},{"key":"ref151","author":"ruttig","year":"2018","journal-title":"Kunduz Madrassa Attack Al Jazeera"},{"key":"ref146","year":"2014","journal-title":"Vkontakte social network"},{"key":"ref147","author":"willsher","year":"2020","journal-title":"Charlie Hebdo attack"},{"key":"ref148","author":"farid","year":"2017","journal-title":"Sinai attack"},{"key":"ref149","year":"2016","journal-title":"ISIS Related Dataset"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2009.11.010"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956784"},{"key":"ref57","author":"rita","year":"2020","journal-title":"Louvain Algorithm Towards Data Science"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_67"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5077"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCT.2019.8711254"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58068-5_35"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3359253"},{"key":"ref40","article-title":"Artificial intelligence and online extremism: Challenges and opportunities","author":"fernandez","year":"2020","journal-title":"Predictive Policing and Artificial Intelligence"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1198\/016214506000000302"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258358"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11688.001.0001"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2018.1520703"},{"key":"ref161","author":"schroepfer","year":"2019","journal-title":"Community standards report Facebook"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2015.1099995"},{"key":"ref4","author":"milton","year":"2016","journal-title":"Communication breakdown Unraveling the islamic state&#x2019;s media efforts"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2014.985436"},{"key":"ref6","author":"berger","year":"2018","journal-title":"The Alt-Right Twitter Census Defining and Describing the Audience for Alt-Right Content on Twitter"},{"key":"ref5","year":"2019","journal-title":"Domestic Terrorism Prevention Act of 2019"},{"key":"ref159","year":"2019","journal-title":"Open Source Intelligence"},{"key":"ref8","author":"baele","year":"2018","journal-title":"ISIS online propaganda CREST Research"},{"key":"ref49","article-title":"Detecting radical text over online media using deep learning","author":"kaur","year":"2019","journal-title":"arXiv 1907 12368"},{"key":"ref7","author":"timberg","year":"2019","journal-title":"How social media&#x2019;s business model helped the New Zealand massacre go viral"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2018.09.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.3726\/b15002"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7403-6_52"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967219"},{"key":"ref48","article-title":"Detection and classification of social media-based extremist affiliations using sentiment analysis techniques","volume":"9","author":"ahmad","year":"2019","journal-title":"Hum -Centric Comput Inf Sci"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52246-9_45"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.5121\/csit.2019.90208"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3232676"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"ref43","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1080\/17467586.2018.1517943"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2018.1719"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.3390\/app9183723"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2019.1599192"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9863-7_242"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181405"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.012770"},{"key":"ref71","article-title":"Automatic detection of online Jihadist hate speech","author":"de smedt","year":"2018","journal-title":"arXiv 1803 04596"},{"key":"ref128","first-page":"691","article-title":"Terrorism detection based on sentiment analysis using machine learning.pdf","volume":"12","author":"azizan","year":"2017","journal-title":"J Eng Appl Sci"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823548"},{"key":"ref76","author":"shung","year":"2018","journal-title":"Accuracy Precision Recall or F1? Towards Data Science"},{"key":"ref130","author":"fernandez","year":"2018","journal-title":"Contextual Semantics for Radicalisation Detection on Twitter"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9863-7_255"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9863-7_209"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-9863-7_256"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01081-2_15"},{"key":"ref134","year":"2020","journal-title":"ARY News"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1134\/S0361768819030058"},{"key":"ref78","article-title":"Deep learning based text classification: A comprehensive review","author":"minaee","year":"2020","journal-title":"arXiv 2004 03705"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.08.336"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8320316"},{"key":"ref136","year":"2020","journal-title":"Dawn Newspaper"},{"key":"ref135","year":"2020","journal-title":"PTV News"},{"key":"ref138","year":"2020","journal-title":"Samaa News"},{"key":"ref137","year":"2020","journal-title":"The News Pakistan"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2993191"},{"key":"ref139","year":"2020","journal-title":"Express News"},{"key":"ref62","first-page":"29","article-title":"Using TF-IDF to determine word relevance in document queries","author":"ramos","year":"2003","journal-title":"Proc 1st Inst Conf Mach Learn"},{"key":"ref61","first-page":"546","article-title":"More than bag-of-words: Sentence-based document representation for sentiment analysis","author":"paltoglou","year":"2013","journal-title":"Proc RANLP"},{"key":"ref63","article-title":"Distributed representations of words and phrases and their compositionality","author":"mikolov","year":"2013","journal-title":"arXiv 1310 4546"},{"key":"ref64","year":"2018","journal-title":"Word Vectors in NLP"},{"key":"ref140","year":"2020","journal-title":"Dunya News"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2015.0202"},{"key":"ref141","year":"2020","journal-title":"Geo News"},{"key":"ref66","first-page":"1","article-title":"Visualizing data using t-SNE","volume":"9","author":"van der maaten","year":"2008","journal-title":"J Mach Learn Res"},{"key":"ref142","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1609\/icwsm.v13i01.3209","article-title":"A large-scale study of ISIS social media strategy: Community size, collective influence, and behavioral impact","author":"alfifi","year":"2019","journal-title":"Proc Int AAAI Conf Web Social Media"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14977-6_47"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03496-2_4"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ECACE.2019.8679430"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12024"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2009.31"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2015.27"},{"key":"ref145","year":"2020","journal-title":"TextRazor Semantic Annotator"},{"key":"ref1","author":"schultz","year":"2019","journal-title":"How Much Data is Created on Internet Each Day? Micro Focus Blog"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2017.1385457"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.4018\/IJCWT.2016100102"},{"key":"ref108","year":"2016","journal-title":"Women and Violent Radicalization in Jordan"},{"key":"ref94","article-title":"Detection and analysis of online extremist communities","author":"benigni","year":"2017"},{"key":"ref107","first-page":"1","article-title":"Social big data mining framework for extremist content detection in social networks","author":"mouhssine","year":"2019","journal-title":"Proc Int Symp Adv Elect Commun Technol"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1080\/19434472.2020.1775675"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.13052\/jcsm2245-1439.922"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.10.046"},{"key":"ref105","article-title":"Multilingual cross-domain perspectives on online hate speech","volume":"8","author":"de smedt","year":"2018"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2706018"},{"key":"ref104","first-page":"3","article-title":"Studying Jihadists on social media: A critique of data collection methodologies","volume":"12","author":"parekh","year":"2018","journal-title":"Perspectives on Terrorism"},{"key":"ref90","article-title":"Nazis vs. ISIS on Twitter: A comparative study of white nationalist and ISIS online social media networks","author":"berger","year":"2016"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/1238780"},{"key":"ref102","year":"2015"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16313-0_10"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/s42001-018-0015-z"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2018.8317386"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31764-5_10"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/3292522.3326050"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840895"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.9"},{"key":"ref10","author":"cavendish","year":"2011","journal-title":"Al-Qa&#x2019;ida glossy advises women to cover up and marry a martyr"},{"key":"ref11","year":"2020","journal-title":"Stormfront"},{"key":"ref12","author":"wilson","year":"2019","journal-title":"Leak from neo-Nazi site could identify hundreds of extremists worldwide"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/1177083X.2019.1698623"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.05.026"},{"key":"ref15","year":"2020","journal-title":"Hate speech"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59569-6_40"},{"key":"ref16","year":"2020","journal-title":"Updating Our Rules Against Hateful Conduct"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/s13244-018-0639-9"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-47874-6_3"},{"key":"ref17","author":"von behr","year":"2013","journal-title":"Radicalisation in the Digital Era"},{"key":"ref81","first-page":"338","article-title":"Long short-term memory recurrent neural network architectures for large scale acoustic modeling","author":"sak","year":"2014","journal-title":"Proc INTERSPEECH"},{"key":"ref18","article-title":"The ISIS Twitter census","author":"berger","year":"2015"},{"key":"ref84","author":"biney","year":"2018","journal-title":"Sentiment Analysis Using 1D-CNN in Keras"},{"key":"ref119","first-page":"1","article-title":"Identification of markers and artificial intelligence-based classification of radical Twitter data","volume":"16","author":"fraiwan","year":"2020","journal-title":"Appl Comput Inform"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2014.849948"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"ref114","author":"rowe","year":"2016","journal-title":"Mining Pro-ISIS Radicalisation Signals From Social Media Users"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3201064.3201082"},{"key":"ref116","article-title":"(Main)streaming hate: Analyzing white supremacist content and framing devices on YouTube","author":"charles","year":"2020"},{"key":"ref80","author":"brownlee","year":"2020","journal-title":"What is Deep Learning? Machine Learning Mastery"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2020.101345"},{"key":"ref120","first-page":"743","article-title":"Detection of extremist ideation on social media using machine learning techniques","author":"mussiraliyeva","year":"2020","journal-title":"Proc Int Conf Comput Collective Intell"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/2757401.2757408"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1080\/19434472.2019.1651751"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1177\/0974928419874548"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2019.1568008"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5102"},{"key":"ref86","article-title":"Detecting white supremacist hate speech using domain specific word embedding with deep learning and BERT","author":"alatawi","year":"2020","journal-title":"arXiv 2010 00357"},{"key":"ref87","year":"2020","journal-title":"Embedding Layer Tensorflow"},{"key":"ref88","year":"2020","journal-title":"Embedding Layer PyTorch"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09383220.pdf?arnumber=9383220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T07:39:40Z","timestamp":1671694780000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9383220\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":165,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3068313","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}