Multimode co-clustering for analyzing terrorist networks
Author
Abstract
Suggested Citation
DOI: 10.1007/s10796-016-9712-4
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
References listed on IDEAS
- Marc Cheong & Vincent C. S. Lee, 2011. "A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter," Information Systems Frontiers, Springer, vol. 13(1), pages 45-59, March.
- Onook Oh & Manish Agrawal & H. Raghav Rao, 2011. "Information control and terrorism: Tracking the Mumbai terrorist attack through twitter," Information Systems Frontiers, Springer, vol. 13(1), pages 33-43, March.
- Jiexun Li & G. Alan Wang & Hsinchun Chen, 2011. "Identity matching using personal and social identity features," Information Systems Frontiers, Springer, vol. 13(1), pages 101-113, March.
Citations
Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
Cited by:
- Raj Bridgelall, 2022. "Applying unsupervised machine learning to counterterrorism," Journal of Computational Social Science, Springer, vol. 5(2), pages 1099-1128, November.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Hsinchun Chen & Yilu Zhou & Edna F. Reid & Catherine A. Larson, 2011. "Introduction to special issue on terrorism informatics," Information Systems Frontiers, Springer, vol. 13(1), pages 1-3, March.
- Chulhwan Chris Bang, 2015. "Information systems frontiers: Keyword analysis and classification," Information Systems Frontiers, Springer, vol. 17(1), pages 217-237, February.
- Yanxin Wang & Jian Li & Xi Zhao & Gengzhong Feng & Xin (Robert) Luo, 2020. "Using Mobile Phone Data for Emergency Management: a Systematic Literature Review," Information Systems Frontiers, Springer, vol. 22(6), pages 1539-1559, December.
- Fang Liu & Dongming Xu, 2018. "Social Roles and Consequences in Using Social Media in Disasters: a Structurational Perspective," Information Systems Frontiers, Springer, vol. 20(4), pages 693-711, August.
- Ahmed Aleroud & Aryya Gangopadhyay, 0. "Multimode co-clustering for analyzing terrorist networks," Information Systems Frontiers, Springer, vol. 0, pages 1-22.
- Jengchung Victor Chen & I-Han Lu & David C. Yen & Andree E. Widjaja, 2017. "Factors affecting the performance of internal control task team in high-tech firms," Information Systems Frontiers, Springer, vol. 19(4), pages 787-802, August.
- Irina Wedel & Michael Palk & Stefan Voß, 2022. "A Bilingual Comparison of Sentiment and Topics for a Product Event on Twitter," Information Systems Frontiers, Springer, vol. 24(5), pages 1635-1646, October.
- Shabir Hussain & Farrukh Shahzad & Adam Saud, 2021. "Analyzing the State of Digital Information Warfare Between India and Pakistan on Twittersphere," SAGE Open, , vol. 11(3), pages 21582440211, July.
- Ruochen Liao & Shenaz Balasinorwala & H. Raghav Rao, 2017. "Computer assisted frauds: An examination of offender and offense characteristics in relation to arrests," Information Systems Frontiers, Springer, vol. 19(3), pages 443-455, June.
- Bairong Wang & Jun Zhuang, 2018. "Rumor response, debunking response, and decision makings of misinformed Twitter users during disasters," Natural Hazards: Journal of the International Society for the Prevention and Mitigation of Natural Hazards, Springer;International Society for the Prevention and Mitigation of Natural Hazards, vol. 93(3), pages 1145-1162, September.
- Zhan, Yuanzhu & Xiong, Yu & Xing, Xinjie, 2023. "A conceptual model and case study of blockchain-enabled social media platform," Technovation, Elsevier, vol. 119(C).
- Stefan Stieglitz & Christian Meske & Björn Ross & Milad Mirbabaie, 2020. "Going Back in Time to Predict the Future - The Complex Role of the Data Collection Period in Social Media Analytics," Information Systems Frontiers, Springer, vol. 22(2), pages 395-409, April.
- Jengchung Victor Chen & I-Han Lu & David C. Yen & Andree E. Widjaja, 0. "Factors affecting the performance of internal control task team in high-tech firms," Information Systems Frontiers, Springer, vol. 0, pages 1-16.
- Avinash Samuel & Dilip Kumar Sharma, 2018. "A Novel Framework for Sentiment and Emoticon-Based Clustering and Indexing of Tweets," Journal of Information & Knowledge Management (JIKM), World Scientific Publishing Co. Pte. Ltd., vol. 17(02), pages 1-18, June.
- Agarwal, Puneet & Aziz, Ridwan Al & Zhuang, Jun, 2022. "Interplay of rumor propagation and clarification on social media during crisis events - A game-theoretic approach," European Journal of Operational Research, Elsevier, vol. 298(2), pages 714-733.
- Reimer, Thomas, 2023. "Environmental factors to maximize social media engagement: A comprehensive framework," Journal of Retailing and Consumer Services, Elsevier, vol. 75(C).
- Anat Hovav, 2014. "Using scenarios to understand the frontiers of IS: Fifteen years later (a postscript)," Information Systems Frontiers, Springer, vol. 16(3), pages 347-352, July.
- Paras Bhatt & Naga Vemprala & Rohit Valecha & Govind Hariharan & H. Raghav Rao, 2023. "User Privacy, Surveillance and Public Health during COVID-19 – An Examination of Twitterverse," Information Systems Frontiers, Springer, vol. 25(5), pages 1667-1682, October.
- Helen Roberts & Bernd Resch & Jon Sadler & Lee Chapman & Andreas Petutschnig & Stefan Zimmer, 2018. "Investigating the Emotional Responses of Individuals to Urban Green Space Using Twitter Data: A Critical Comparison of Three Different Methods of Sentiment Analysis," Urban Planning, Cogitatio Press, vol. 3(1), pages 21-33.
- Jyoti Prakash Singh & Abhinav Kumar & Nripendra P. Rana & Yogesh K. Dwivedi, 2022. "Attention-Based LSTM Network for Rumor Veracity Estimation of Tweets," Information Systems Frontiers, Springer, vol. 24(2), pages 459-474, April.
More about this item
Keywords
Multimode clustering; Terrorist networks; Singular value decomposition; k-means; Social network analysis;All these keywords.
Statistics
Access and download statisticsCorrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:spr:infosf:v:20:y:2018:i:5:d:10.1007_s10796-016-9712-4. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sonal Shukla or Springer Nature Abstracting and Indexing (email available below). General contact details of provider: http://www.springer.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.