{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T22:09:08Z","timestamp":1775254148168,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T00:00:00Z","timestamp":1407888000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1186\/s13388-014-0005-5","type":"journal-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T14:50:34Z","timestamp":1407855034000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":58,"title":["Automatic detection of cyber-recruitment by violent extremists"],"prefix":"10.1186","volume":"3","author":[{"given":"Jacob R","family":"Scanlon","sequence":"first","affiliation":[]},{"given":"Matthew S","family":"Gerber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,13]]},"reference":[{"key":"5_CR1","first-page":"179","volume-title":"Intelligence and Security Informatics (ISI)","author":"LA Overbey","year":"2010","unstructured":"Overbey LA, McKoy G, Gordon J, McKitrick S: Automated sensing and social network analysis in virtual worlds. In Intelligence and Security Informatics (ISI) . IEEE, Vancouver, BC, Canada; 2010:179\u2013184."},{"key":"5_CR2","first-page":"54","volume-title":"Australian Counter Terrorism Conference","author":"R Torok","year":"2010","unstructured":"Torok R: \u201cMake A Bomb In Your Mums Kitchen\u201d: Cyber Recruiting And Socialisation of \u2018White Moors\u2019 and Home Grown Jihadists. In Australian Counter Terrorism Conference . School of Computer and Infomation Science, Edith Cowan University, Perth, Western Australia; 2010:54\u201361."},{"key":"5_CR3","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1002\/9780470713600.ch4","volume-title":"Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences","author":"M Rogers","year":"2003","unstructured":"Rogers M: Chapter 4: The Psychology of Cyber-Terrorism. In Terrorists, Victims and Society: Psychological Perspectives on Terrorism and its Consequences . Edited by: Silke A. John Wiley & Sons, Chichester, West Sussex, England; 2003:77\u201392."},{"key":"5_CR4","first-page":"29","volume-title":"8th Australian Information Warfare and Security Conference","author":"S O\u2019Rourke","year":"2007","unstructured":"O\u2019Rourke S: Virtual radicalisation: Challenges for police. In 8th Australian Information Warfare and Security Conference . School of Computer and Infomation Science, Edith Cowan University, Perth, Western Australia; 2007:29\u201335."},{"key":"5_CR5","first-page":"498","volume-title":"IEEE Conference on Technologies for Homeland Security","author":"S Mandal","year":"2008","unstructured":"Mandal S, Lim E-P: Second life: Limits of creativity or cyber threat. In IEEE Conference on Technologies for Homeland Security . IEEE, Waltham, MA; 2008:498\u2013503."},{"key":"5_CR6","volume-title":"Final report of the William H.Webster Commission on the Federal Bureau of Investigation, counterterrorism intelligence, and the events at Fort Hood","author":"WH Webster","year":"2012","unstructured":"WH Webster, DE Winter, L Adrian, J Steel, WM Baker, RJ Bruemmer, KL Wainstein, Final report of the William H.Webster Commission on the Federal Bureau of Investigation, counterterrorism intelligence, and the events at Fort Hood, Texas on November 5, 2009. Technical report, Federal Bureau of Investigation (2012)."},{"issue":"1","key":"5_CR7","first-page":"16","volume":"34","author":"RR Tomes","year":"2004","unstructured":"Tomes RR: Waging war on terror relearning counterinsurgency warfare. Parameters 2004, 34(1):16\u201328.","journal-title":"Parameters"},{"key":"5_CR8","series-title":"Recruitment in a civil war: a preliminary discussion of the colombian case","volume-title":"Santa Fe Institute, Mimeo","author":"F Guti\u00e9rrez","year":"2006","unstructured":"F Guti\u00e9rrez, in Santa Fe Institute, Mimeo. Recruitment in a civil war: a preliminary discussion of the colombian case, (2006)."},{"issue":"2","key":"5_CR9","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1111\/j.1540-5907.2008.00322.x","volume":"52","author":"M Humphreys","year":"2008","unstructured":"Humphreys M, Weinstein JM: Who fights? the determinants of participation in civil war. Am. J. Pol. Sci 2008, 52(2):436\u2013455. 10.1111\/j.1540-5907.2008.00322.x","journal-title":"Am. J. Pol. Sci"},{"key":"5_CR10","volume-title":"The Rebel\u2019s Dilemma","author":"MI Lichbach","year":"1998","unstructured":"Lichbach MI: The Rebel\u2019s Dilemma . University of Michigan Press, Ann Arbor; 1998."},{"issue":"02","key":"5_CR11","doi-asserted-by":"publisher","first-page":"183","DOI":"10.2307\/1161278","volume":"68","author":"K Peters","year":"1998","unstructured":"Peters K, Richards P: \u2018Why we fight\u2019: Voices of youth combatants in Sierra Leone. Africa 1998, 68(02):183\u2013210. 10.2307\/1161278","journal-title":"Africa"},{"key":"5_CR12","volume-title":"Inside Rebellion: The Politics of Insurgent Violence","author":"JM Weinstein","year":"2007","unstructured":"Weinstein JM: Inside Rebellion: The Politics of Insurgent Violence . Cambridge University Press, New York; 2007."},{"key":"5_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511612725","volume-title":"Resistance and Rebellion: Lessons from Eastern Europe","author":"RD Petersen","year":"2001","unstructured":"Petersen RD: Resistance and Rebellion: Lessons from Eastern Europe . Cambridge University Press, New York; 2001."},{"issue":"3","key":"5_CR14","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/BF00158397","volume":"9","author":"S Popkin","year":"1980","unstructured":"Popkin S: The rational peasant. Theory Soc 1980, 9(3):411\u2013471. 10.1007\/BF00158397","journal-title":"Theory Soc"},{"key":"5_CR15","volume-title":"The Moral Economy of the Peasant: Rebellion and Subsistence in Southeast Asia","author":"JC Scott","year":"1976","unstructured":"Scott JC: The Moral Economy of the Peasant: Rebellion and Subsistence in Southeast Asia . Yale University Press, New Haven & London; 1976."},{"key":"5_CR16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808685","volume-title":"Insurgent Collective Action and Civil War in El Salvador","author":"EJ Wood","year":"2003","unstructured":"Wood EJ: Insurgent Collective Action and Civil War in El Salvador . Cambridge University Press, New York; 2003."},{"key":"5_CR17","volume-title":"Deadly Deceits: My 25 Years in the CIA","author":"RW McGehee","year":"1983","unstructured":"McGehee RW: Deadly Deceits: My 25 Years in the CIA . Sheridan Square Publications, Inc., New York; 1983."},{"issue":"2","key":"5_CR18","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1093\/pa\/gsl009","volume":"59","author":"M Conway","year":"2006","unstructured":"Conway M: Terrorism and the internet: new media\u2013new threat? Parliamentary Aff 2006, 59(2):283\u2013298. 10.1093\/pa\/gsl009","journal-title":"Parliamentary Aff"},{"issue":"1","key":"5_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2190-8532-2-1","volume":"2","author":"R Torok","year":"2013","unstructured":"Torok R: Developing an explanatory model for the process of online radicalisation and terrorism. Secur. Informatics 2013, 2(1):1\u201310. 10.1186\/2190-8532-2-1","journal-title":"Secur. Informatics"},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2190-8532-2-1","volume":"2","author":"L Bowman-Grieve","year":"2013","unstructured":"Bowman-Grieve L: A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment. Secur. Informatics 2013, 2(1):1\u20135. 10.1186\/2190-8532-2-1","journal-title":"Secur. Informatics"},{"issue":"2","key":"5_CR21","first-page":"8","volume":"1","author":"EF Kohlmann","year":"2008","unstructured":"Kohlmann EF: Al-Qaida\u2019s MySpace: terrorist recruitment on the internet. CTC Sentinel 2008, 1(2):8\u20139.","journal-title":"CTC Sentinel"},{"key":"5_CR22","volume-title":"Virtual DNA: Investigating cyber-behaviors in virtual worldsL","author":"LA Overbey","year":"2009","unstructured":"LA Overbey, G McKoy, J Gordon, S McKitrick, Jr MH, L Buhler, L Casassa, S Yaryan, Virtual DNA: Investigating cyber-behaviors in virtual worldsL. Technical Report 33\u201309 E, Space and Naval Warfare System Center Atlantic Charleston, SC (2009)."},{"key":"5_CR23","first-page":"789","volume":"39","author":"GS McNeal","year":"2008","unstructured":"McNeal GS: Cyber embargo: Countering the internet jihad. Case West. Reserv. Univ. J. Int. Law 2008, 39: 789\u2013826.","journal-title":"Case West. Reserv. Univ. J. Int. Law"},{"key":"5_CR24","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-69209-6","volume-title":"IEEE International Conference on Intelligence and Security Informatics (ISI)","author":"H Chen","year":"2008","unstructured":"Chen H, Thoms S, Fu T: Cyber extremism in web 2.0: An exploratory study of international jihadist groups. In IEEE International Conference on Intelligence and Security Informatics (ISI) . IEEE, Taipei; 2008:98\u2013103."},{"issue":"2","key":"5_CR25","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1002\/asi.21673","volume":"63","author":"M Yang","year":"2012","unstructured":"Yang M, Kiang M, Chen H, Li Y: Artificial immune system for illicit content identification in social media. J. Am. Soc. Inf. Sci. Technol 2012, 63(2):256\u2013269. 10.1002\/asi.21673","journal-title":"J. Am. Soc. Inf. Sci. Technol"},{"key":"5_CR26","first-page":"26","volume-title":"North American Association for Computational Social and Organizational Science (NAACSOS) Conference","author":"A Basu","year":"2005","unstructured":"Basu A: Social network analysis of terrorist organizations in India. In North American Association for Computational Social and Organizational Science (NAACSOS) Conference . NAACSOS, Notre Dame, Indiana; 2005:26\u201328."},{"issue":"1","key":"5_CR27","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s10588-006-7083-y","volume":"12","author":"KM Carley","year":"2006","unstructured":"Carley KM: Destabilization of covert networks. Comput. Math. Organ. Theory 2006, 12(1):51\u201366. 10.1007\/s10588-006-7083-y","journal-title":"Comput. Math. Organ. Theory"},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1007\/978-0-387-71613-8_22","volume-title":"Terrorism Informatics","author":"M Chau","year":"2008","unstructured":"Chau M, Xu J: Using web mining and social network analysis to study the emergence of cyber communities in blogs. In Terrorism Informatics . Springer, New York; 2008:473\u2013494."},{"key":"5_CR29","volume-title":"Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference","author":"J Diesner","year":"2004","unstructured":"Diesner J, Carley KM: Using network text analysis to detect the organizational structure of covert networks. In Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference . NAACSOS, Pittsburgh; 2004."},{"key":"5_CR30","first-page":"1041","volume-title":"Proceedings of NAACL-HLT","author":"Z Chen","year":"2013","unstructured":"Chen Z, Liu B, Hsu M, Castellanos M, Ghosh R: Identifying intention posts in discussion forums. In Proceedings of NAACL-HLT . Association for Computational Linguistics, Atlanta, Georgia; 2013:1041\u20131050."},{"issue":"8","key":"5_CR31","doi-asserted-by":"publisher","first-page":"1347","DOI":"10.1002\/asi.20838","volume":"59","author":"H Chen","year":"2008","unstructured":"Chen H, Chung W, Qin J, Reid E, Sageman M, Weimann G: Uncovering the dark web: A case study of jihad on the web. J. Am. Soc. Inf. Sci. Technol 2008, 59(8):1347\u20131359. 10.1002\/asi.20838","journal-title":"J. Am. Soc. Inf. Sci. Technol"},{"issue":"6","key":"5_CR32","doi-asserted-by":"crossref","first-page":"1213","DOI":"10.1002\/asi.21323","volume":"61","author":"T Fu","year":"2010","unstructured":"Fu T, Abbasi A, Chen H: A focused crawler for dark web forums. J. Am. Soc. Inf. Sci. Technol 2010, 61(6):1213\u20131231.","journal-title":"J. Am. Soc. Inf. Sci. Technol"},{"key":"5_CR33","unstructured":"Google Inc., Google Translate (2014). . http:\/\/translate.google.com\/ Google Inc., Google Translate (2014). ."},{"key":"5_CR34","unstructured":"Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security . Springer, New York; 2008."},{"key":"5_CR35","unstructured":"Artificial Intelligence Laboratory, University Of Arizona, Dark Web Forum Portal: Ansar AlJihad Network English Website (2014). http:\/\/cri-portal.dyndns.org"},{"issue":"1","key":"5_CR36","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1177\/001316446002000104","volume":"20","author":"J Cohen","year":"1960","unstructured":"Cohen J: A coefficient of agreement for nominal scales. Educ. Psychol. Meas 1960, 20(1):37\u201346. 10.1177\/001316446002000104","journal-title":"Educ. Psychol. Meas"},{"issue":"1","key":"5_CR37","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis JR, Koch GG: The measurement of observer agreement for categorical data. Biometrics 1977, 33(1):159\u2013174. 10.2307\/2529310","journal-title":"Biometrics"},{"key":"5_CR38","first-page":"212","volume":"2","author":"JL Fleiss","year":"1981","unstructured":"Fleiss JL, Levin B, Paik MC: The measurement of interrater agreement. Stat. Methods Rates Proportions 1981, 2: 212\u2013236.","journal-title":"Stat. Methods Rates Proportions"},{"key":"5_CR39","unstructured":"I Feinerer, K Hornik, Tm: Text Mining Package. (R Foundation for Statistical Computing, 2014). R package version 0.5\u201310. http:\/\/CRAN.R-project.org\/package=tm"},{"key":"5_CR40","volume-title":"RTextTools: Automatic Text Classification Via Supervised Learning","author":"TP Jurka","year":"2014","unstructured":"TP Jurka, L Collingwood, AE Boydstun, E Grossman, W van Atteveldt, RTextTools: Automatic Text Classification Via Supervised Learning (2014). R package version 1.4.2. http:\/\/CRAN.R-project.org\/package=RTextTools"},{"key":"5_CR41","volume-title":"New Models in Probabilistic Information Retrieval (British Library Research and Development Dept","author":"CJ Van Rijsbergen","year":"1980","unstructured":"CJ Van Rijsbergen, SE Robertson, MF Porter, New Models in Probabilistic Information Retrieval (British Library Research and Development Dept, 1980)."},{"key":"5_CR42","first-page":"269","volume-title":"Overview of the Third Text Retrieval Conference","author":"W Cavnar","year":"1995","unstructured":"Cavnar W: Using an n-gram-based document representation with a vector processing retrieval model. In Overview of the Third Text Retrieval Conference . Edited by: Harman DK. Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD; 1995:269\u2013277."},{"key":"5_CR43","volume-title":"Pattern Classification","author":"RO Duda","year":"2001","unstructured":"Duda RO, Hart PE, Stork DG: Pattern Classification . John Wiley & Sons, Inc, New York; 2001."},{"key":"5_CR44","unstructured":"D Meyer, E Dimitriadou, K Hornik, A Weingessel, F Leisch, E1071: Misc Functions of the Department of Statistics (e1071), TU Wien (2014). R package version 1.6\u20132. . http:\/\/CRAN.R-project.org\/package=e1071 D Meyer, E Dimitriadou, K Hornik, A Weingessel, F Leisch, E1071: Misc Functions of the Department of Statistics (e1071), TU Wien (2014). R package version 1.6-2. ."},{"key":"5_CR45","first-page":"627","volume":"9","author":"C-J Lin","year":"2008","unstructured":"Lin C-J, Weng RC, Keerthi SS: Trust region newton method for logistic regression. J. Mach. Learn. Res 2008, 9: 627\u2013650.","journal-title":"J. Mach. Learn. Res"},{"key":"5_CR46","volume-title":"LiblineaR: Linear Predictive Models Based On The Liblinear C\/C++ Library","author":"T Helleputte","year":"2013","unstructured":"T Helleputte, LiblineaR: Linear Predictive Models Based On The Liblinear C\/C++ Library (2013). R package version 1.80\u20137. http:\/\/CRAN.R-project.org\/web\/packages\/LiblineaR"},{"key":"5_CR47","volume-title":"Tree: Classification and Regression Trees","author":"B Ripley","year":"2014","unstructured":"B Ripley, Tree: Classification and Regression Trees (2014). R package version 1.0\u201335. http:\/\/CRAN.R-project.org\/package=tree"},{"key":"5_CR48","volume-title":"caTools: ROC AUC Tools, Moving Window Statistics","author":"J Tuszynski","year":"2013","unstructured":"J Tuszynski, caTools: ROC AUC Tools, Moving Window Statistics (2013). R package version 1.16. http:\/\/CRAN.R-project.org\/package=caTools"},{"issue":"2","key":"5_CR49","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1214\/aos\/1016218223","volume":"28","author":"J Friedman","year":"2000","unstructured":"Friedman J, Hastie T, Tibshirani R: Additive logistic regression: a statistical view of boosting. Ann. Stat 2000, 28(2):337\u2013407. 10.1214\/aos\/1016218223","journal-title":"Ann. Stat"},{"issue":"368","key":"5_CR50","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1080\/01621459.1979.10481048","volume":"74","author":"AP Fenech","year":"1979","unstructured":"Fenech AP: Tukey\u2019s method of multiple comparison in the randomized blocks model. J. Am. Stat. Assoc 1979, 74(368):881\u2013884. 10.1080\/01621459.1979.10481048","journal-title":"J. Am. Stat. Assoc"},{"issue":"6","key":"5_CR51","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S Deerwester","year":"1990","unstructured":"Deerwester S, Dumais ST, Furnas GW, Landauer TK, Harshman R: Indexing by latent semantic analysis. J. Am. Soc. Inf. Sci 1990, 41(6):391\u2013407. 10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","journal-title":"J. Am. Soc. Inf. Sci"},{"key":"5_CR52","first-page":"993","volume":"3","author":"DM Blei","year":"2003","unstructured":"Blei DM, Ng AY, Jordan MI: Latent dirichlet allocation. J. Mach. Learn. Res 2003, 3: 993\u20131022.","journal-title":"J. Mach. Learn. Res"},{"key":"5_CR53","volume-title":"NSA Collecting Phone Records of Millions of Verizon Customers Daily","author":"G Greenwald","year":"2013","unstructured":"G Greenwald, NSA Collecting Phone Records of Millions of Verizon Customers Daily (2013). http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13388-014-0005-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0005-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0005-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13388-014-0005-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T06:47:17Z","timestamp":1717224437000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/s13388-014-0005-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,13]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["5"],"URL":"https:\/\/doi.org\/10.1186\/s13388-014-0005-5","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,13]]},"assertion":[{"value":"16 January 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2014","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2014","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"5"}}