{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T04:40:37Z","timestamp":1777696837047,"version":"3.51.4"},"reference-count":54,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T00:00:00Z","timestamp":1744934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Data Analysis: An International Journal"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:p>Social media platforms have become an integral part of people's lives, generating a huge amount of data. Threatening speech detection has gained serious attention in recent years. To control the dissemination of such content on social media, the design of an artificial intelligence-based pipeline is an active area of research. The majority of prior studies handled under-resourced languages for detecting threatening speech and very limited research is observed on the English language. Furthermore, there is no work on the explainability of prediction inference for the said task. This study proposes an inherently interpretable threatening speech detection framework for the Twitter platform. The strengths of Pattern Structures and Abstract Meaning Representations graphs are explored first time to support classification and explainability tasks for threatening speech detection. The proposed system automatically mines the context of threatening speech and provides intermediate and final explanations for the prediction inference. A new English corpus is built for the experimental evaluation of the proposed framework for the Twitter platform. The experimental evaluation demonstrates that the proposed framework outperformed the standard baselines and obtained benchmark performance with an accuracy of 73.15% stably on the newly built corpus. In addition, the intermediate and final interpretations offered by the inherently explainable proposed framework provide meaningful and trustworthy prediction inference. The findings of this study have several implications for regulating social media and future research.<\/jats:p>","DOI":"10.1177\/1088467x251330977","type":"journal-article","created":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T06:41:24Z","timestamp":1745044884000},"page":"1501-1519","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":0,"title":["Explainable threatening tweets identification using abstract meaning representation graph and pattern structure approaches"],"prefix":"10.1177","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8396-3344","authenticated-orcid":false,"given":"Muhammad Shahid Iqbal","family":"Malik","sequence":"first","affiliation":[{"name":"Department of Computer Science, HITEC University Museum Road, Taxila, Pakistan"},{"name":"Department of Computer Science, National Research University Higher School of Economics, Moscow, Russian Federation"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-0837-6490","authenticated-orcid":false,"given":"Anna","family":"Nazarova","sequence":"additional","affiliation":[{"name":"Department of Computer Science, National Research University Higher School of Economics, Moscow, Russian Federation"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9149-2810","authenticated-orcid":false,"given":"Mona Mamdouh","family":"Jamjoom","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia"}]}],"member":"179","published-online":{"date-parts":[[2025,4,18]]},"reference":[{"key":"e_1_3_4_2_2","volume-title":"Anonymous communication and its importance in social networking16th international conference on advanced communication technology","author":"Hoang NP","unstructured":"Hoang NP, Pishva D. Anonymous communication and its importance in social networking. In: 16th international conference on advanced communication technology, IEEE, 2014."},{"key":"e_1_3_4_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.02.043"},{"key":"e_1_3_4_4_2","volume-title":"Challenges and frontiers in abusive content detectionProceedings of the third workshop on abusive language online","author":"Vidgen B","unstructured":"Vidgen B, Harris A, Nguyen D, et al. Challenges and frontiers in abusive content detection. In: Proceedings of the third workshop on abusive language online, Association for Computational Linguistics, 2019."},{"key":"e_1_3_4_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2023.103270"},{"key":"e_1_3_4_6_2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1859"},{"key":"e_1_3_4_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-020-04767-1"},{"key":"e_1_3_4_8_2","first-page":"234","article-title":"Review helpfulness as a function of Linguistic Indicators","volume":"18","author":"Malik M","year":"2018","unstructured":"Malik M, Iqbal K. Review helpfulness as a function of Linguistic Indicators. Int J Comput Sci Netw Secur 2018; 18: 234\u2013240.","journal-title":"Int J Comput Sci Netw Secur"},{"key":"e_1_3_4_9_2","doi-asserted-by":"publisher","DOI":"10.1214\/21-SS133"},{"key":"e_1_3_4_10_2","volume-title":"Interpretability beyond feature attribution: Quantitative testing with concept activation vectors (tcav)International conference on machine learning","author":"Kim B","unstructured":"Kim B, Wattenberg M, Gilmer J, et al. Interpretability beyond feature attribution: Quantitative testing with concept activation vectors (tcav). In: International conference on machine learning, PMLR, 2018."},{"key":"e_1_3_4_11_2","volume-title":"Abstract meaning representation for sembankingProceedings of the 7th linguistic annotation workshop and interoperability with discourse","author":"Banarescu L","unstructured":"Banarescu L, Bonial C, Cai S, et al. Abstract meaning representation for sembanking. In: Proceedings of the 7th linguistic annotation workshop and interoperability with discourse, 2013."},{"key":"e_1_3_4_12_2","volume-title":"Pattern structures and concept lattices for data mining and knowledge processingMachine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2015, Porto, Portugal, September 7-11, 2015, Proceedings, Part III 15","author":"Kaytoue M","unstructured":"Kaytoue M, Codocedo V, Buzmakov A, et al. Pattern structures and concept lattices for data mining and knowledge processing. In: Machine Learning and Knowledge Discovery in Databases: European Conference, ECML PKDD 2015, Porto, Portugal, September 7-11, 2015, Proceedings, Part III 15, Springer, 2015."},{"key":"e_1_3_4_13_2","unstructured":"Kalraa S Agrawala M Sharmaa Y. Detection of Threat Records by Analyzing the Tweets in Urdu Language Exploring Deep Learning Transformer-Based Models. 2021."},{"key":"e_1_3_4_14_2","unstructured":"Das M Banerjee S Saha P. Abusive and threatening language detection in urdu using boosting based and bert based models: A comparative approach. arXiv preprint arXiv:2111.14830 2021."},{"key":"e_1_3_4_15_2","unstructured":"Sigurbergsson GI Derczynski L. Offensive language and hate speech detection for Danish. arXiv preprint arXiv:1908.04531 2019."},{"key":"e_1_3_4_16_2","volume-title":"A Turkish hate speech dataset and detection systemProceedings of the Thirteenth Language Resources and Evaluation Conference","author":"Beyhan F","unstructured":"Beyhan F, \u00c7ar\u0131k B, Ar\u0131n I, et al. A Turkish hate speech dataset and detection system. In: Proceedings of the Thirteenth Language Resources and Evaluation Conference, 2022."},{"key":"e_1_3_4_17_2","volume-title":"Individual vs. group violent threats classification in online discussionsCompanion Proceedings of the Web Conference 2020","author":"Ashraf N","unstructured":"Ashraf N, Mustafa R, Sidorov G, et al. Individual vs. group violent threats classification in online discussions. In: Companion Proceedings of the Web Conference 2020, 2020."},{"key":"e_1_3_4_18_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-021-09476-x"},{"key":"e_1_3_4_19_2","first-page":"86","article-title":"Transformer-Based classi\ufb01cation of user queries for medical consultancy","volume":"3","author":"Lyutkin D","year":"2024","unstructured":"Lyutkin D, Pozdnyakov DV, Soloviev AA, et al. Transformer-Based classi\ufb01cation of user queries for medical consultancy. Avtomatika i telemehanika 2024; 3: 86\u2013100.","journal-title":"Avtomatika i telemehanika"},{"key":"e_1_3_4_20_2","doi-asserted-by":"publisher","DOI":"10.1080\/02560054.2011.545568"},{"key":"e_1_3_4_21_2","unstructured":"Jennifer Schlesinger AD. https:\/\/www.cnbc.com\/2018\/01\/22\/growing-blackmail-scam-demands-payment-in-bitcoin.html. 2018."},{"key":"e_1_3_4_22_2","first-page":"150","article-title":"Threatening speech: the thin line between implicit threats, solicitation, and advocacy of crime","volume":"13","author":"Rohr M","year":"2015","unstructured":"Rohr M. Threatening speech: the thin line between implicit threats, solicitation, and advocacy of crime. Rutgers JL Pub Pol'y 2015; 13: 150.","journal-title":"Rutgers JL Pub Pol'y"},{"key":"e_1_3_4_23_2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1169"},{"key":"e_1_3_4_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-022-13595-4"},{"key":"e_1_3_4_25_2","doi-asserted-by":"publisher","DOI":"10.3390\/app9183723"},{"key":"e_1_3_4_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3112500"},{"key":"e_1_3_4_27_2","unstructured":"Amjad M Zhila A Sidorov G et al. Overview of abusive and threatening language detection in urdu at fire 2021. arXiv preprint arXiv:2207.06710 2022."},{"key":"e_1_3_4_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101606"},{"key":"e_1_3_4_29_2","doi-asserted-by":"publisher","DOI":"10.1177\/17470218231169952"},{"key":"e_1_3_4_30_2","doi-asserted-by":"publisher","DOI":"10.3389\/frsps.2024.1383152"},{"key":"e_1_3_4_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123174"},{"key":"e_1_3_4_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3444188"},{"key":"e_1_3_4_33_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0290915"},{"key":"e_1_3_4_34_2","volume-title":"Threat: A large annotated corpus for detection of violent threats2019 International Conference on Content-Based Multimedia Indexing (CBMI)","author":"Hammer HL","unstructured":"Hammer HL, Riegler MA, \u00d8vrelid L, et al. Threat: A large annotated corpus for detection of violent threats. In: 2019 International Conference on Content-Based Multimedia Indexing (CBMI), IEEE, 2019."},{"key":"e_1_3_4_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9662-y"},{"key":"e_1_3_4_36_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04998-2"},{"key":"e_1_3_4_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-014-1455-8"},{"key":"e_1_3_4_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-021-09495-8"},{"key":"e_1_3_4_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.053"},{"key":"e_1_3_4_40_2","doi-asserted-by":"publisher","DOI":"10.1134\/S105466182470072X"},{"key":"e_1_3_4_41_2","volume-title":"Threatening Expression and Target Identification in Under-Resource Languages Using NLP TechniquesInternational Conference on Analysis of Images, Social Networks and Texts","author":"Malik MSI","unstructured":"Malik MSI. Threatening Expression and Target Identification in Under-Resource Languages Using NLP Techniques. In: International Conference on Analysis of Images, Social Networks and Texts, Springer, 2023."},{"key":"e_1_3_4_42_2","first-page":"1","article-title":"Deepthreatexplainer: a united explainable predictor for threat comments identification on Twitter","volume":"14","author":"Nazarova A","year":"2024","unstructured":"Nazarova A, Malik MSI, Ignatov DI, et al. Deepthreatexplainer: a united explainable predictor for threat comments identification on Twitter. Social Network Anal Min 2024; 14: 1\u201325.","journal-title":"Social Network Anal Min"},{"key":"e_1_3_4_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.120236"},{"key":"e_1_3_4_44_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2023.101736"},{"key":"e_1_3_4_45_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3320062"},{"key":"e_1_3_4_46_2","unstructured":"Mikolov T Sutskever I Chen K et al. Distributed Representations of Words and Phrases and their Compositionality October 2013. arXiv preprint arXiv:1310.4546 2023."},{"key":"e_1_3_4_47_2","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.1248"},{"key":"e_1_3_4_48_2","first-page":"1","article-title":"Effectiveness of ELMo embeddings, and semantic models in predicting review helpfulness","author":"Malik MSI","year":"2023","unstructured":"Malik MSI, Nawaz A, Jamjoom MM, et al. Effectiveness of ELMo embeddings, and semantic models in predicting review helpfulness. Intell Data Anal 2023; Preprint: 1\u201321.","journal-title":"Intell Data Anal"},{"key":"e_1_3_4_49_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2017.09.004"},{"key":"e_1_3_4_50_2","first-page":"193","article-title":"Ensemble learning with linguistic, summary language and psychological features for location prediction","volume":"16","author":"Malik MSI","year":"2024","unstructured":"Malik MSI, Rehman F, Ignatov DI. Ensemble learning with linguistic, summary language and psychological features for location prediction. Int J Inf Technol 2024; 16: 193\u2013205.","journal-title":"Int J Inf Technol"},{"key":"e_1_3_4_51_2","first-page":"1","article-title":"Learning certifiably optimal rule lists for categorical data","volume":"18","author":"Angelino E","year":"2018","unstructured":"Angelino E, Larus-Stone N, Alabi D, et al. Learning certifiably optimal rule lists for categorical data. J Mach Learn Res 2018; 18: 1\u201378.","journal-title":"J Mach Learn Res"},{"key":"e_1_3_4_52_2","volume-title":"Interpretable convolutional neural networksProceedings of the IEEE conference on computer vision and pattern recognition","author":"Zhang Q","unstructured":"Zhang Q, Wu YN, Zhu S-C. Interpretable convolutional neural networks. In: Proceedings of the IEEE conference on computer vision and pattern recognition, 2018."},{"key":"e_1_3_4_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.10.010"},{"key":"e_1_3_4_54_2","volume-title":"\u201cWhy should i trust you?\u201d Explaining the predictions of any classifierProceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining","author":"Ribeiro MT","unstructured":"Ribeiro MT, Singh S, Guestrin C. \u201cWhy should i trust you?\u201d Explaining the predictions of any classifier. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, 2016."},{"key":"e_1_3_4_55_2","first-page":"30","article-title":"A unified approach to interpreting model predictions","author":"Lundberg SM","year":"2017","unstructured":"Lundberg SM, Lee S-I. A unified approach to interpreting model predictions. Adv Neural Inf Process Syst 2017: 30.","journal-title":"Adv Neural Inf Process Syst"}],"container-title":["Intelligent Data Analysis: An International Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1088467X251330977","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1088467X251330977","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1088467X251330977","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:21:05Z","timestamp":1777454465000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1088467X251330977"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,18]]},"references-count":54,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1177\/1088467X251330977"],"URL":"https:\/\/doi.org\/10.1177\/1088467x251330977","relation":{},"ISSN":["1088-467X","1571-4128"],"issn-type":[{"value":"1088-467X","type":"print"},{"value":"1571-4128","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,18]]}}}