{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:12:47Z","timestamp":1760058767117,"version":"build-2065373602"},"reference-count":25,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T00:00:00Z","timestamp":1745452800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"ECU-Maldives National Defence Force-The Maldives National University Scholarship","award":["G1003964"],"award-info":[{"award-number":["G1003964"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Early detection of online radical content is important for intelligence services to combat radicalisation and terrorism. The motivation for this research was the lack of language tools in the detection of radicalisation in the Maldivian language, Dhivehi. This research applied Machine Learning and Natural Language Processing (NLP) to detect online radicalisation content in Dhivehi, with the incorporation of domain-specific knowledge. The research used Machine Learning to evaluate the most effective technique for detection of radicalisation text in Dhivehi and used interviews with Subject Matter Experts and self-deradicalised individuals to validate the results, add contextual information and improve recognition accuracy. The contributions of this research to the existing body of knowledge include datasets in the form of labelled radical\/non-radical text, sentiment corpus of radical words and primary interview data of self-deradicalised individuals and a technique for detection of radicalisation text in Dhivehi for the first time using Machine Learning. We found that the Na\u00efve Bayes algorithm worked best for the detection of radicalisation text in Dhivehi with an Accuracy of 87.67%, Precision of 85.35%, Recall of 92.52% and an F2 score of 91%. Inclusion of the radical words identified through the interviews with SMEs as a count feature improved the performance of ML algorithms and Na\u00efve Bayes by 9.57%.<\/jats:p>","DOI":"10.3390\/info16050342","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T06:18:02Z","timestamp":1745475482000},"page":"342","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using Natural Language Processing and Machine Learning to Detect Online Radicalisation in the Maldivian Language, Dhivehi"],"prefix":"10.3390","volume":"16","author":[{"given":"Hussain","family":"Ibrahim","sequence":"first","affiliation":[{"name":"Maldivian National Defence Force, Mal\u00e9 20126, Maldives"},{"name":"School of Science, Edith Cowan University, Joondalup 6027, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4760-3533","authenticated-orcid":false,"given":"Ahmed","family":"Ibrahim","sequence":"additional","affiliation":[{"name":"School of Science, Edith Cowan University, Joondalup 6027, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7192-7098","authenticated-orcid":false,"given":"Michael N.","family":"Johnstone","sequence":"additional","affiliation":[{"name":"School of Science, Edith Cowan University, Joondalup 6027, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,24]]},"reference":[{"key":"ref_1","unstructured":"von Behr, I., Reding, A., Edwards, C., and Gribbon, L. (2013). Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism, Rand."},{"key":"ref_2","unstructured":"National Counter Terrorism Centre (2021, June 10). Harukashi Fikuru Maanakurun, Available online: https:\/\/nctc.gov.mv\/announcement\/anncmnt4.pdf."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1080\/03071840701472331","article-title":"Radicalization on the Internet?","volume":"152","author":"Awan","year":"2007","journal-title":"RUSI J."},{"key":"ref_4","unstructured":"Aly, A. (2010, January 30). The Internet as Ideological Battleground. Proceedings of the 1st Australian Counter Terrorism Conference, Perth, WA, Australia."},{"key":"ref_5","unstructured":"Correa, D., and Sureka, A. (2013). Solutions to detect and analyze online radicalization: A survey. arXiv."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Wadhwa, P., and Bhatia, M.P.S. (2013, January 15\u201317). Tracking on-line radicalization using investigative data mining. Proceedings of the IEEE International Conference on Communications, New Delhi, India.","DOI":"10.1109\/NCC.2013.6488046"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Gunton, K. (2022). The Impact of the Internet and Social Media Platforms on Radicalisation to Terrorism and Violent Extremism. Privacy, Security and Forensics in the Internet of Things (IoT), Springer.","DOI":"10.1007\/978-3-030-91218-5_8"},{"key":"ref_8","unstructured":"American Foreign Policy Council (2021, June 10). Quick Facts, Maldives. Available online: https:\/\/almanac.afpc.org\/uploads\/documents\/Maldives%202020%20Website.pdf."},{"key":"ref_9","unstructured":"Sharuhan, M. (2021, July 30). Police: IS Sympathizers Behind Attempt on Ex-Maldives Leader. Associated Press. Available online: https:\/\/apnews.com\/article\/government-and-politics-religion-islamic-state-group-maldives-0b491f40f6a5a72ad31b82b193af0322."},{"key":"ref_10","unstructured":"Aiham, A. (The Edition, 2019). Murder commission pushes for charges against culprits behind Yameen, Rilwan, Afrasheem\u2019s murders, The Edition."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1458","DOI":"10.1080\/09546553.2018.1482214","article-title":"What explains the flow of foreign fighters to ISIS?","volume":"32","author":"Benmelech","year":"2020","journal-title":"Terror. Political Violence"},{"key":"ref_12","unstructured":"(2021, June 10). ITU. Available online: https:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Pages\/stat\/default.aspx."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10462-009-9151-4","article-title":"Natural language processing: A prolog perspective","volume":"33","author":"Bitter","year":"2010","journal-title":"Artif. Intell. Rev."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"167","DOI":"10.5038\/1944-0472.4.4.8","article-title":"Radicalization and the Use of Social Media","volume":"4","author":"Thompson","year":"2011","journal-title":"J. Strateg. Secur."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1126\/science.aaa8685","article-title":"Advances in natural language processing","volume":"349","author":"Hirschberg","year":"2015","journal-title":"Science"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"012029","DOI":"10.1088\/1757-899X\/1071\/1\/012029","article-title":"Systematics review on the application of social media analytics for detecting radical and extremist group","volume":"1071","author":"Adek","year":"2021","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"42384","DOI":"10.1109\/ACCESS.2021.3064178","article-title":"Online extremism detection in textual content: A systematic literature review","volume":"9","author":"Aldera","year":"2021","journal-title":"IEEE Access"},{"key":"ref_18","unstructured":"Agarwal, S., and Sureka, A. (2015). Applying social media intelligence for predicting and identifying on-line radicalization and civil unrest oriented threats. arXiv."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2479","DOI":"10.1016\/j.asej.2017.04.007","article-title":"Sentiment analysis in Arabic: A review of the literature","volume":"9","author":"Boudad","year":"2018","journal-title":"Ain Shams Eng. J."},{"key":"ref_20","unstructured":"Naseem, A., and Mushfique, M. (2021, June 10). Maldives: The Long Road from Islam to Islamism, A Short History. Dhivehi Sitee. Available online: https:\/\/www.dhivehisitee.com\/religion\/islamism-maldives\/."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Al-Rubaiee, H., Qiu, R., and Li, D. (2016, January 13\u201315). Identifying Mubasher software products through sentiment analysis of Arabic tweets. Proceedings of the 2016 International Conference on Industrial Informatics and Computer Systems (CIICS), Sharjah, United Arab Emirates.","DOI":"10.1109\/ICCSII.2016.7462396"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Albadi, N., Kurdi, M., and Mishra, S. (2018, January 28\u201331). Are they Our Brothers? Analysis and Detection of Religious Hate Speech in the Arabic Twittersphere. Proceedings of the 2018 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), Barcelona, Spain.","DOI":"10.1109\/ASONAM.2018.8508247"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Hung, B.W.K., Muramudalige, S.R., Jayasumana, A.P., Klausen, J., and Moloney, E. (2019, January 5\u20136). Recognizing Radicalization Indicators in Text Documents Using Human-in-the-Loop Information Extraction and NLP Techniques. Proceedings of the 2019 IEEE International Symposium on Technologies for Homeland Security (HST), Woburn, MA, USA.","DOI":"10.1109\/HST47167.2019.9032956"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Zerrouki, K., and Benblidia, N. (2024). Multilingual Text Preprocessing and Classification for the Detection of Extremism and Radicalization in Social Networks. Res. Sq.","DOI":"10.21203\/rs.3.rs-4218788\/v1"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"93","DOI":"10.26735\/VNVR2791","article-title":"Safeguarding Online Communications using DistilRoBERTa for Detection of Terrorism and Offensive Chats","volume":"7","author":"Shah","year":"2024","journal-title":"JISCR"}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/5\/342\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:20:36Z","timestamp":1760030436000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/5\/342"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,24]]},"references-count":25,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["info16050342"],"URL":"https:\/\/doi.org\/10.3390\/info16050342","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2025,4,24]]}}}