{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T08:54:19Z","timestamp":1771923259041,"version":"3.50.1"},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.1109\/snams67467.2025.11391032","type":"proceedings-article","created":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T20:45:45Z","timestamp":1771879545000},"page":"44-49","source":"Crossref","is-referenced-by-count":0,"title":["Review of Artificial Intelligence Techniques to Combat Social Media Extremism in Youth"],"prefix":"10.1109","author":[{"given":"Rahemeen","family":"Yusuf","sequence":"first","affiliation":[{"name":"United Arab Emirates University,Emirates Center for Happiness Research Center,Al Ain,UAE"}]},{"given":"Abdulaziz","family":"Altawil","sequence":"additional","affiliation":[{"name":"UAEU,Media &#x0026; Creative industries Dep.,Al Ain,UAE"}]},{"given":"Khalaf","family":"Tahat","sequence":"additional","affiliation":[{"name":"United Arab Emirates University, UAEU &#x0026; Journalism Dep, Yarmouk University,Media &#x0026; Creative Industries Dep,Irbid,Jordan"}]},{"given":"Dina","family":"Tahat","sequence":"additional","affiliation":[{"name":"College of Education, Al Ain University,Applied Sociology Dep.,Al Ain,UAE"}]}],"member":"263","reference":[{"key":"ref1","article-title":"MEGA: Multilingual Evaluation of Generative AI","author":"Ahuja","year":"2023","journal-title":"arXiv"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3064178"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-39158-3_75"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/ijcwt.2016100102"},{"issue":"5","key":"ref5","doi-asserted-by":"crossref","DOI":"10.1016\/j.heliyon.2021.e07121","article-title":"Countering violent extremism using social media and preventing implementable strategies forBangladesh","volume":"7","author":"Amit","year":"2021","journal-title":"Heliyon"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-09691-4_7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.5206\/fpq\/2022.3\/4.14295"},{"issue":"20","key":"ref8","first-page":"1","article-title":"The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter","volume":"3","author":"Berger","year":"2015","journal-title":"The Brookings Project on U.S. Relations with the Islamic World Analysis Paper"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/msec.2023.3345568"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.36543\/kauiibfd.2024.025"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5038\/1944-0472.4.4.1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.eurpsy.2018.03.001"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10567-016-0205-2"},{"key":"ref14","article-title":"Preventing and countering violent extremism: Localization in Kenya, Kosovo, and the Philippines","volume-title":"Workshop in Public Affairs.","author":"Cleveland"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3224603"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.5121\/ijaia.2015.6102"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.4324\/9780429265365-7"},{"key":"ref18","article-title":"AI\u2019s Dual Role in Driving Online Terrorist Content and Counter Strategies","author":"Fishman","year":"2024"},{"key":"ref19","first-page":"183","article-title":"The concept of countering violent extremism","author":"Frazer","year":"2015","journal-title":"CSS Analyses in Security Policy"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106549"},{"key":"ref21","first-page":"101","article-title":"Evaluating countering violent extremism","author":"Gielen","year":"2017","journal-title":"Deradicalisation: Scientific insights for policy"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s40894-019-00108-y"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/1057610x.2021.2016558"},{"issue":"IV","key":"ref24","article-title":"Unleashing Transformative Potential of Artificial Intelligence (AI) in Countering Terrorism, Online Radicalisation, Extremism, and Possible Recruitment","volume":"VIII","author":"Irfan","year":"2023","journal-title":"Global Strategic & Security Studies Review"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3336811"},{"key":"ref26","article-title":"How tech companies are successfully disrupting terrorist social media activity","author":"Macdonald","year":"2018","journal-title":"The Conversation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1080\/17482798.2016.1234736"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICOEI51242.2021.9452882"},{"issue":"2","key":"ref29","article-title":"Using Artificial Intelligence to Combat Extremism","volume":"5","author":"Rashid","year":"2023","journal-title":"Pakistan Journal of Terrorism Research"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.19165\/2013.1.02"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s10610-022-09505-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3572348"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.24294\/jipd.v8i8.6632"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/su152115280"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-39158-3_14"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2022.858392"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2020.012770"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/1057610x.2025.2475850"},{"key":"ref39","article-title":"Violent extremism and artificial intelligence: a double-edged sword in the context of ASEAN","author":"Wan Rosli","year":"2024"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/1282"},{"key":"ref41","first-page":"1","article-title":"Online extremism: research trends in internet activism, radicalization, and counter-strategies","volume-title":"International Journal of Conflict and Violence (IJCV)","volume":"14","author":"Winter"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.52922\/ti77024"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1080\/01292986.2012.701317"}],"event":{"name":"2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Vienna, Austria","start":{"date-parts":[[2025,11,25]]},"end":{"date-parts":[[2025,11,28]]}},"container-title":["2025 12th International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11390733\/11390881\/11391032.pdf?arnumber=11391032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T07:49:40Z","timestamp":1771919380000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391032\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/snams67467.2025.11391032","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}