{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T18:29:40Z","timestamp":1772216980145,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T00:00:00Z","timestamp":1629849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,8,25]]},"DOI":"10.1145\/3465336.3475095","type":"proceedings-article","created":{"date-parts":[[2021,8,25]],"date-time":"2021-08-25T21:11:41Z","timestamp":1629925901000},"page":"237-243","source":"Crossref","is-referenced-by-count":10,"title":["Regularity Versus Novelty of Users' Multimodal Comment Patterns and Dynamics as Markers of Social Media Radicalization"],"prefix":"10.1145","author":[{"given":"Aaron","family":"Necaise","sequence":"first","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Aneka","family":"Williams","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]},{"given":"Hana","family":"Vrzakova","sequence":"additional","affiliation":[{"name":"University of Eastern Finland, Joensuu, Finland"}]},{"given":"Mary Jean","family":"Amon","sequence":"additional","affiliation":[{"name":"University of Central Florida, Orlando, FL, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,8,29]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 25th ACM conference on Hypertext and social media (HT '14)","author":"Agarwal Swati","year":"2014"},{"key":"e_1_3_2_2_2_1","volume-title":"Distributed Computing and Internet Technology (Lecture Notes in Computer Science)","author":"Agarwal Swati"},{"key":"e_1_3_2_2_3_1","volume-title":"November","author":"Agarwal Swati","year":"2015"},{"key":"e_1_3_2_2_4_1","volume-title":"Forum Of Nearly 800,000 Trump Fans, Over Abusive Posts.","author":"Allyn Bobby","year":"2020"},{"key":"e_1_3_2_2_5_1","article-title":"Terrorism, the Internet and the Social Media Advantage: Exploring how terrorist organizations exploit aspects of the internet, social media and how these same platforms could be used to counter-violent extremism","volume":"7","author":"Bertram Luke","year":"2016","journal-title":"J. Deradicalization"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"crossref","unstructured":"Moreno Coco and Rick Dale. 2014. Cross-recurrence quantification analysis of categorical and continuous time series: an R package. Front. Psychol. 5 (2014) 510. DOI:https:\/\/doi.org\/10.3389\/fpsyg.2014.00510  Moreno Coco and Rick Dale. 2014. Cross-recurrence quantification analysis of categorical and continuous time series: an R package. Front. Psychol. 5 (2014) 510. DOI:https:\/\/doi.org\/10.3389\/fpsyg.2014.00510","DOI":"10.3389\/fpsyg.2014.00510"},{"key":"e_1_3_2_2_7_1","volume-title":"United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs.","author":"Collins Susan"},{"key":"e_1_3_2_2_8_1","volume-title":"Advances in Information Retrieval (Lecture Notes in Computer Science)","author":"Dadvar Maral"},{"key":"e_1_3_2_2_9_1","unstructured":"Geoff Dean. 2019. Framing the Challenges of Online Violent Extremism: ?Policing-Public-Policies-Politics\" Framework. In Violent Extremism: Breakthroughs in Research and Practice. IGI Global 226--259. DOI:https:\/\/doi.org\/10.4018\/978--1--5225--7119--3.ch017  Geoff Dean. 2019. Framing the Challenges of Online Violent Extremism: ?Policing-Public-Policies-Politics\" Framework. In Violent Extremism: Breakthroughs in Research and Practice. IGI Global 226--259. DOI:https:\/\/doi.org\/10.4018\/978--1--5225--7119--3.ch017"},{"key":"e_1_3_2_2_10_1","article-title":"Pathways to Violent Extremism in the Digital Era","volume":"158","author":"Edwards Charlie","year":"2013","journal-title":"RUSI J."},{"key":"e_1_3_2_2_11_1","article-title":"Radicalisation Influence in Social Media","volume":"6","author":"Fernandez Miriam","year":"2019","journal-title":"J. Web Sci."},{"key":"e_1_3_2_2_12_1","volume-title":"Comput. Hum. Behav.","author":"Fox Jesse","year":"2015"},{"key":"e_1_3_2_2_13_1","volume-title":"Emilio Ferrara, Yeol Ahn, Alessandro Flammini, Filippo Menczer, Bryce Lewis, and Kehontas Rowe.","author":"Fulper Rachael","year":"2014"},{"key":"e_1_3_2_2_14_1","volume-title":"Cogn. Sci. 40","author":"Fusaroli Riccardo","year":"2016"},{"key":"e_1_3_2_2_15_1","article-title":"Comparing Theories of Radicalisation with Countering Violent Extremism Policy","volume":"15","author":"Hardy Keiran","year":"2018","journal-title":"J. Deradicalization"},{"key":"e_1_3_2_2_16_1","article-title":"A Simple Sequentially Rejective Multiple Test","volume":"6","author":"Holm Sture","year":"1979","journal-title":"Procedure. Scand. J. Stat."},{"key":"e_1_3_2_2_17_1","article-title":"Rhetorics of","volume":"84","author":"Karell Daniel","year":"2019","journal-title":"Radicalism. Am. Sociol. Rev."},{"key":"e_1_3_2_2_18_1","volume-title":"Center for Research and Evidence on Security Threats. Retrieved","author":"Knott Kim","year":"2018"},{"key":"e_1_3_2_2_19_1","article-title":"The Radical Online: Individual Radicalization Processes and the Role of the Internet","author":"Koehler Daniel","year":"2014","journal-title":"J. Deradicalization, 1"},{"key":"e_1_3_2_2_20_1","unstructured":"Annette Markham and Elizabeth Buchanan. 2012. Recommendations from the AoIR Ethics Working Committee. Retrieved from https:\/\/aoir.org\/reports\/ethics2.pdf  Annette Markham and Elizabeth Buchanan. 2012. Recommendations from the AoIR Ethics Working Committee. Retrieved from https:\/\/aoir.org\/reports\/ethics2.pdf"},{"key":"e_1_3_2_2_21_1","first-page":"161","article-title":"The Staircase to Terrorism","volume":"60","author":"Moghaddam Fathali","year":"2005","journal-title":"A Psychological Exploration. Am. Psychol."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 28th ACM Conference on Hypertext and Social Media (HT '17)","author":"Mondal Mainack","year":"2017"},{"key":"e_1_3_2_2_23_1","first-page":"3","article-title":"Cyber terrorism challenges: The need for a global response to a multi-jurisdictional crime","volume":"29","author":"Tehrani Pardis Moslemzadeh","year":"2013","journal-title":"Comput. Law Secur. Rev."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1037\/0033-2909.83.4.602","article-title":"The Group Polarization","volume":"83","author":"Myers David","year":"1976","journal-title":"Phenomenon. Psychol. Bull."},{"key":"e_1_3_2_2_25_1","volume-title":"Computational Collective Intelligence (Lecture Notes in Computer Science)","author":"Rekik Amal"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1002\/wcs.1200","article-title":"Dynamics of cognition","volume":"3","author":"Riley Michael","year":"2012","journal-title":"WIREs Cogn. Sci."},{"key":"e_1_3_2_2_27_1","unstructured":"Hannah Rogan. 2006. Jihadism online - A study of how al-Qaida and radical Islamist groups use the Internet for terrorist purposes. Norwegian Defence Research Establishment. Retrieved from https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.107.9729&rep=rep1&type=pdf  Hannah Rogan. 2006. Jihadism online - A study of how al-Qaida and radical Islamist groups use the Internet for terrorist purposes. Norwegian Defence Research Establishment. Retrieved from https:\/\/citeseerx.ist.psu.edu\/viewdoc\/download?doi=10.1.1.107.9729&rep=rep1&type=pdf"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 51st Hawaii International Conference on System Sciences","author":"Rychwalska Agnieszka","year":"2018"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1111\/j.1745-6924.2009.01123.x","article-title":"Patterns of Thinking in Militant Extremism","volume":"4","author":"Saucier Gerard","year":"2009","journal-title":"Perspect. Psychol. Sci. J. Assoc. Psychol. Sci."},{"key":"e_1_3_2_2_30_1","first-page":"26","article-title":"Research on Radicalisation","volume":"10","author":"Schmid Alex P","year":"2016","journal-title":"Topics and Themes. Perspect. Terror."},{"key":"e_1_3_2_2_31_1","volume-title":"Retrieved","author":"Sharifirad Sima","year":"2019"},{"key":"e_1_3_2_2_32_1","unstructured":"Cass Sunstein. 2007. Republic.com 2.0. Princeton: Princeton University Press. Retrieved from http:\/\/www.jstor.org\/stable\/10.2307\/j.ctt7tbsw  Cass Sunstein. 2007. Republic.com 2.0. Princeton: Princeton University Press. Retrieved from http:\/\/www.jstor.org\/stable\/10.2307\/j.ctt7tbsw"},{"key":"e_1_3_2_2_33_1","volume-title":"Radicalisation in the digital era: The use of the internet in 15 cases of terrorism and extremism. RAND Europe","author":"Behr Ines Von"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"crossref","unstructured":"Sebastian Wallot Andreas Roepstorff and Dan M\u00f8nster. 2016. Multidimensional Recurrence Quantification Analysis (MdRQA) for the Analysis of Multidimensional Time-Series: A Software Implementation in MATLAB and Its Application to Group-Level Data in Joint Action. Front. Psychol. 7 (2016). DOI:https:\/\/doi.org\/10.3389\/fpsyg.2016.01835  Sebastian Wallot Andreas Roepstorff and Dan M\u00f8nster. 2016. Multidimensional Recurrence Quantification Analysis (MdRQA) for the Analysis of Multidimensional Time-Series: A Software Implementation in MATLAB and Its Application to Group-Level Data in Joint Action. Front. Psychol. 7 (2016). DOI:https:\/\/doi.org\/10.3389\/fpsyg.2016.01835","DOI":"10.3389\/fpsyg.2016.01835"},{"key":"e_1_3_2_2_35_1","volume-title":"Awareness brief. Community Oriented Policing (COPS)","author":"Online","year":"2018"}],"event":{"name":"HT '21: 32nd ACM Conference on Hypertext and Social Media","location":"Virtual Event USA","acronym":"HT '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 32st ACM Conference on Hypertext and Social Media"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475095","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:12Z","timestamp":1750191432000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3465336.3475095"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,25]]},"references-count":35,"alternative-id":["10.1145\/3465336.3475095","10.1145\/3465336"],"URL":"https:\/\/doi.org\/10.1145\/3465336.3475095","relation":{},"subject":[],"published":{"date-parts":[[2021,8,25]]}}}