{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:23:46Z","timestamp":1740101026671,"version":"3.37.3"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T00:00:00Z","timestamp":1662595200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T00:00:00Z","timestamp":1662595200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100012365","name":"Howard University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100012365","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,8]]},"DOI":"10.1109\/ghtc55712.2022.9910986","type":"proceedings-article","created":{"date-parts":[[2022,10,11]],"date-time":"2022-10-11T19:33:23Z","timestamp":1665516803000},"page":"277-282","source":"Crossref","is-referenced-by-count":1,"title":["Terrorism Detection and Approaches to Fairness: A Brief Literature Review"],"prefix":"10.1109","author":[{"given":"Cesa","family":"Salaam","sequence":"first","affiliation":[{"name":"Howard University,DoD Center of Excellence in Artificial Intelligence &#x0026; Machine Learning (CoE-AIML),Department of Electrical Engineering &#x0026; Computer Science (EECS),Washington,DC,USA,20059"}]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[{"name":"Howard University,DoD Center of Excellence in Artificial Intelligence &#x0026; Machine Learning (CoE-AIML),Department of Electrical Engineering &#x0026; Computer Science (EECS),Washington,DC,USA,20059"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5102"},{"key":"ref38","first-page":"1","article-title":"Detection and classification of social media-based extremist affiliations using sentiment analysis techniques","volume":"9","author":"ahmad","year":"2019","journal-title":"Journal of Humancentric Computing and Information Sciences"},{"journal-title":"New research report The alt-right twitter census by jm berger - vox - pol","year":"2019","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3100435"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14977-6_47"},{"key":"ref30","article-title":"#failedrevolutions: Using twitter to study the antecedents of ISIS support","volume":"abs 1503 2401","author":"magdy","year":"2015","journal-title":"CoRR"},{"key":"ref37","article-title":"Detecting radical text over online media using deep learning","author":"kaur","year":"2019","journal-title":"arXiv preprint arXiv 1907 11634"},{"journal-title":"Nazis vs isis on twitter A comparative study of white nationalist and isis online social media networks","year":"2016","author":"berger","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2015.27"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967219"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03496-2_3"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/W18-5102"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/widm.1356"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278729"},{"key":"ref13","first-page":"197","article-title":"Brown hands aren&#x2019;t terrorists: Challenges in image classification of violent extremist content","author":"hall","year":"2021","journal-title":"International conference on human-computer interaction"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3232676"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2811403"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064178"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3068313"},{"journal-title":"Counter-terrorism module 4 key issues Defining terrorism","year":"0","author":"kkienerm","key":"ref18"},{"journal-title":"Solutions to detect and Analyze Online Radicalization A Survey","year":"2013","author":"correa","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/1527476420982230"},{"journal-title":"Weapons of Math Destruction How Big Data Increases Inequality and Threatens Democracy","year":"2016","author":"o\u2019neil","key":"ref27"},{"journal-title":"Introduction to Natural Language Processing","year":"2019","author":"eisenstein","key":"ref3"},{"key":"ref6","article-title":"The use of internet by daesh","volume":"13","author":"kirazolu?u","year":"2020","journal-title":"Defence Against Terrorism Review"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2015.27"},{"key":"ref5","first-page":"191","article-title":"The dark side of social media: review of online terrorism","volume":"3","author":"dean","year":"2012","journal-title":"Pakistan Journal of Criminology"},{"journal-title":"Contextual Semantics for Radicalisation Detection on Twitter","year":"2018","author":"fernandez","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2016.06.008"},{"year":"0","key":"ref2"},{"journal-title":"Complex project to develop real tools for identifying and countering terrorism real-time early detection and alert system for online terrorist content based on natural language processing social network analysis artificial intelligence and complex event processing","year":"2019","author":"florea","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-800743-3.00016-5"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2757401.2757408"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/1057610X.2014.974948","article-title":"Tweeting the jihad: Social media networks of western for-eign fighters in syria and iraq","volume":"38","author":"klausen","year":"2015","journal-title":"Studies in Conflict &amp; Terrorism"},{"key":"ref21","article-title":"greenbirds: Measuring importance and influence in syrian foreign fighter networks","author":"a carter","year":"2014","journal-title":"the International Centre for the Study of Radicalisation and Political Violence"},{"journal-title":"Lipstick on a Pig Debiasing Methods Cover up Systematic Gender Biases in Word Embeddings But do not Remove Them","year":"2019","author":"gonen","key":"ref42"},{"key":"ref24","first-page":"7","article-title":"The evolution of the isis&#x2019; language: A quantitative analysis of the language of the first year of dabiq magazine","volume":"2","author":"vergani","year":"2015","journal-title":"Sicurezza Terrorismo e societal"},{"key":"ref41","article-title":"Right-wing german hate speech on twitter: Analysis and automatic detection","author":"jaki","year":"2019","journal-title":"arXiv preprint arXiv 1910 06458"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1609\/icwsm.v10i1.14716","article-title":"Mining pro-isis radicalisation signals from social media users","volume":"10","author":"rowe","year":"2021","journal-title":"Proceedings of the International AAAI Conference on Web and Social Media"},{"key":"ref26","volume":"9","author":"mckendrick","year":"2019","journal-title":"Artificial intelligence prediction and counterterrorism"},{"journal-title":"Bias vs fairness vs explainability in ai","year":"2021","key":"ref25"}],"event":{"name":"2022 IEEE Global Humanitarian Technology Conference (GHTC)","start":{"date-parts":[[2022,9,8]]},"location":"Santa Clara, CA, USA","end":{"date-parts":[[2022,9,11]]}},"container-title":["2022 IEEE Global Humanitarian Technology Conference (GHTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9910962\/9910605\/09910986.pdf?arnumber=9910986","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,7]],"date-time":"2023-03-07T22:34:53Z","timestamp":1678228493000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9910986\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,8]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ghtc55712.2022.9910986","relation":{},"subject":[],"published":{"date-parts":[[2022,9,8]]}}}