CyberDD 2017 will include two research tracks
- Detecting and Mining Terrorist Online Content
- Advances in Data Science for Cyber Security and Risk on the Web
Detecting and Mining Terrorist Online Content
This track welcomes original research on detection, search, and mining methods that focus on the particularly challenging and idiosyncratic terrorist and violent extremist content on the Web (including the social media and the dark Web). Such content appears in multiple languages and media (e.g. text, images, video, and audio), it is highly volatile, often with short longevity, and it may be covert, even when it is publicly available. The proposed methods and techniques will allow for the development of effective and efficient systems and tools that are of particular interest to major search engines and social media platforms in their efforts to detect terrorist and violent extremist online content that may appear on their services, whilst striving to protect though fundamental citizens rights.
The topics include, but are not limited to, the following areas:
- Discovery and detection of terrorist online content: crawling the Web, social media, and darknets
- Data, entity, and relationship extraction from terrorism-related multimedia content
- Machine learning and multimedia data mining for intelligence purposes
- Classification and clustering of Web terrorist content
- Geolocation analysis of terrorist-related Web data
- Attribution of discovered terrorist content
- Semantic multimedia analysis for terrorism-related content understanding
- Multimedia forensics for detecting manipulations on online content
- Multilingual search and mining for terrorism-related Web information
- User profiling, persona modelling, and activity mining
- Social network analysis for terrorism communities detection and key player identification
- Pattern recognition in online terrorism-related activities
- Search interaction log analysis for terrorism detection
- Search and mining of multimedia Web resources about terrorism-related topics (e.g. homemade explosives recipes)
- Experiments and evaluation in Web search and data mining of terrorist online content
- Credibility of discovered terrorism-related online information
- Predictive modelling and early warning for terrorist threats
- Sentiment analysis in discovered Web content for predicting terrorist threats
- Summarisation of terrorist Web content and activity
- Web data visualisation (including the social and the dark Web)
- Privacy, security, and civil liberties implications
- Ethical and legal issues in detecting and analysing terrorism-related online content
Our main goals are: (i) presenting the most recent Web search and data mining methods for the detection, extraction, and analysis of Web content related to terrorism and violent extremism, (ii) bringing together researchers from the WSDM and security informatics communities, as well as industry representatives from search engines and social media platforms, to share ideas and experiences in designing and implementing search and mining techniques and tools to address terrorist online content, while also providing the opportunity to interact with representatives of law enforcement agencies, who will provide their perspectives on what constitutes terrorist and violent extremist content and also their insights on their efforts to prevent, investigate, and mitigate terrorism on the Web, (iii) evaluating the effectiveness, efficiency, and maturity of the Web search and data mining techniques for applications in real problems of terrorism detection, (iv) raising awareness of the privacy, legal, and ethical implications of the proposed methods, techniques, and overall efforts to fight terrorism and extremist violence.
Submission deadline: November 11, 2016
Notification of acceptance: December 5, 2016
Workshop date: February 10, 2017
Papers must be submitted in PDF format according to ACM guidelines and style files to fit within 8 pages (long papers) or 4 pages (short papers) including any diagrams, references, and appendices. PDF files must have all non-standard fonts embedded. Submissions must be self-contained and in English. After uploading your submission, please check the copy stored on the site. Submissions that do not follow these guidelines, or do not view or print properly, may be rejected without review.
The submitted papers must be anonymised: the submitted document should not include author or affiliation information, and should not include citations or discussion of related work that would make the authorship obvious.
Submissions to the workshop will be subject to a double-blind peer review process, with each submission reviewed by at least three Programme Committee members. Accepted papers will be given either an oral or poster presentation slot, and published online in the workshop proceedings. Authors of selected papers will be invited to submit an extended and improved version to a special issue published in a high impact data mining or information retrieval journal.
- Babak Akhgar, Centre of Excellence in Terrorism, Resilience, Intelligence & Organised Crime Research (CENTRIC), UK
- Pete Burnap, Cardiff University, UK (Advances in Data Science for Cyber Security and Risk on the Web Research Track Chair)
- Vasilis Katos, Bournemouth University, UK
- Theodora Tsikrika, Centre for Research and Technology Hellas (CERTH), Greece (Detecting and Mining Terrorist Online Content Research Track Chair)
- Stefanos Vrochidis, Centre for Research and Technology Hellas (CERTH), Greece
- Matthew Williams, Cardiff University, UK
For more information click "Further official information" below.