BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/Phoenix
BEGIN:STANDARD
DTSTART:19671029T010000
TZOFFSETFROM:-0600
TZOFFSETTO:-0700
TZNAME:MST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20240819T192226Z
UID:C89285E3-C01C-4BA7-964C-BCBD9C038A0D
DTSTART;TZID=America/Phoenix:20240814T120000
DTEND;TZID=America/Phoenix:20240814T140000
DESCRIPTION:From its early years as a global information infrastructure\, t
 he Internet\, originally designed by and for the US Department of Defense\
 , has been efficiently and effectively misused by various hate groups who 
 often consider the US government their worst enemy.  For example\, it turn
 ed out that WWW played a critical role in the preparation of the 9/11 atta
 cks both as a source of inspirational information and as a safe means of c
 overt communication between the plotters.  Shortly after the tragic events
  of 2001\, our binational team of US and Israeli researchers started to ex
 plore the online activities of various hate groups.  Initially\, we develo
 ped a prototype of a monitoring system aimed at detecting the frequent vis
 itors of terrorist websites\, which may become influenced by terrorist pro
 paganda and eventually develop into what we call today “the lone wolf at
 tackers”. Shortly after\, we focused on another\, closely related questi
 on: what makes terrorist-generated propaganda content in various languages
  different from unbiased news reports discussing similar topics? Over the 
 years\, we developed prototypes of several additional text analysis tools 
 such as text summarization algorithms\, which can automatically summarize 
 large amounts of untranslated content in any language\, as well as AI tool
 s for automated detection of metaphoric language. After presenting the mot
 ivational and ethical foundations of our research\, I plan to describe som
 e of our methods and finally\, discuss past and future challenges in this 
 important and fascinating domain.\n\nSpeaker(s): Prof. Mark Last\, \n\nVir
 tual: https://events.vtools.ieee.org/m/422750
LOCATION:Virtual: https://events.vtools.ieee.org/m/422750
ORGANIZER:askidmore@computer.org
SEQUENCE:32
SUMMARY:20 Years of Analyzing Multilingual Propaganda Content on the Web
URL;VALUE=URI:https://events.vtools.ieee.org/m/422750
X-ALT-DESC:Description: &lt;br /&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 12
 .0pt\; line-height: 200%\;&quot;&gt;&lt;span style=&quot;mso-ansi-language: EN-US\;&quot;&gt;F&lt;/sp
 an&gt;&lt;span style=&quot;mso-ansi-language: EN-US\;&quot;&gt;rom its early years as a globa
 l information infrastructure\, the Internet\, originally designed by and f
 or the US Department of Defense\, has been efficiently and effectively mis
 used by various hate groups who often consider the US government their wor
 st enemy. &lt;span style=&quot;mso-spacerun: yes\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;For example\, it
  turned out that WWW played a critical role in the preparation of the 9/11
  attacks both as a source of inspirational information and as a safe means
  of covert communication between the plotters. &lt;span style=&quot;mso-spacerun: 
 yes\;&quot;&gt;&amp;nbsp\;&lt;/span&gt;Shortly after the tragic events of 2001\, our binatio
 nal team of US and Israeli researchers started to explore the online activ
 ities of various hate groups. &lt;span style=&quot;mso-spacerun: yes\;&quot;&gt;&amp;nbsp\;&lt;/s
 pan&gt;Initially\, we developed a prototype of a monitoring system aimed at d
 etecting the frequent visitors of terrorist websites\, which may become in
 fluenced by terrorist propaganda and eventually develop into what we call 
 today &amp;ldquo\;the lone wolf attackers&amp;rdquo\;.&lt;span style=&quot;mso-spacerun: y
 es\;&quot;&gt;&amp;nbsp\; &lt;/span&gt;Shortly after\, we focused on another\, closely relat
 ed question: what makes terrorist-generated propaganda content in various 
 languages different from unbiased news reports discussing similar topics?&lt;
 span style=&quot;mso-spacerun: yes\;&quot;&gt;&amp;nbsp\; &lt;/span&gt;Over the years\, we develo
 ped prototypes of several additional text analysis tools such as text summ
 arization algorithms\, which can automatically summarize large amounts of 
 untranslated content in any language\, as well as AI tools for automated d
 etection of metaphoric language. After presenting the motivational and eth
 ical foundations of our research\, I plan to describe some of our methods 
 and finally\, discuss past and future challenges in this important and fas
 cinating domain. &lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

