OpenAlex Citation Counts

OpenAlex Citations Logo

OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!

If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.

Requested Article:

Detecting Linguistic Markers for Radical Violence in Social Media
Katie Cohen, Fredrik Johansson, Lisa Kaati, et al.
Terrorism and Political Violence (2013) Vol. 26, Iss. 1, pp. 246-256
Closed Access | Times Cited: 153

Showing 1-25 of 153 citing articles:

The four dimensions of social network analysis: An overview of research methods, applications, and software tools
David Camacho, Ángel Panizo-LLedot, Gema Bello-Orgaz, et al.
Information Fusion (2020) Vol. 63, pp. 88-120
Open Access | Times Cited: 253

Improved lexicon-based sentiment analysis for social media analytics
Anna Jurek, Maurice Mulvenna, Yaxin Bi
Security Informatics (2015) Vol. 4, Iss. 1
Open Access | Times Cited: 156

The lone-actor terrorist and the TRAP-18.
J. Reid Meloy, Paul Gill
Journal of Threat Assessment and Management (2016) Vol. 3, Iss. 1, pp. 37-52
Open Access | Times Cited: 122

Collective sense-making in times of crisis: Connecting terror management theory with Twitter user reactions to the Berlin terrorist attack
Diana Fischer-Preßler, Carsten Schwemmer, Kai Fischbach
Computers in Human Behavior (2019) Vol. 100, pp. 138-151
Open Access | Times Cited: 121

The Internet and Racial Hate Crimes: Offline Spillovers from Online Access
Jason Chan, Anindya Ghose, Robert Seamans
MIS Quarterly (2016) Vol. 40, Iss. 2, pp. 381-403
Closed Access | Times Cited: 107

Tweeting propaganda, radicalization and recruitment
Akemi Takeoka Chatfield, Christopher G. Reddick, Uuf Brajawidagda
(2015), pp. 239-249
Closed Access | Times Cited: 101

Defining Second Generation Open Source Intelligence (OSINT) for the Defense Enterprise
Heather Williams, Ilana Blum
RAND Corporation eBooks (2018)
Closed Access | Times Cited: 84

Detecting Potential Warning Behaviors of Ideological Radicalization in an Alt-Right Subreddit
Ted Grover, Gloria Mark
Proceedings of the International AAAI Conference on Web and Social Media (2019) Vol. 13, pp. 193-204
Open Access | Times Cited: 79

Detecting White Supremacist Hate Speech Using Domain Specific Word Embedding With Deep Learning and BERT
Hind Saleh Alatawi, Areej Alhothali, Kawthar Moria
IEEE Access (2021) Vol. 9, pp. 106363-106374
Open Access | Times Cited: 76

Harvesting and analysis of weak signals for detecting lone wolf terrorists
Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, et al.
Security Informatics (2013) Vol. 2, Iss. 1
Open Access | Times Cited: 94

Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors
Ryan Scrivens, Garth Davies, Richard Frank
Behavioral Sciences of Terrorism and Political Aggression (2017) Vol. 10, Iss. 1, pp. 39-59
Closed Access | Times Cited: 71

Online Extremism Detection: A Systematic Literature Review With Emphasis on Datasets, Classification Techniques, Validation Methods, and Tools
Mayur Gaikwad, Swati Ahirrao, Shraddha Phansalkar, et al.
IEEE Access (2021) Vol. 9, pp. 48364-48404
Open Access | Times Cited: 54

Investigating the individual terrorist in Europe.
J. Reid Meloy, Karoline Roshdi, Justine Glaz-Ocik, et al.
Journal of Threat Assessment and Management (2015) Vol. 2, Iss. 3-4, pp. 140-152
Closed Access | Times Cited: 58

A survey on extremism analysis using natural language processing: definitions, literature review, trends and challenges
Javier Torregrosa, Gema Bello-Orgaz, Eugenio Martínez‐Cámara, et al.
Journal of Ambient Intelligence and Humanized Computing (2022) Vol. 14, Iss. 8, pp. 9869-9905
Open Access | Times Cited: 24

Machine Learning and Deep Learning Techniques in Countering Cyberterrorism
Reza Montasari
Advanced sciences and technologies for security applications (2024), pp. 135-158
Closed Access | Times Cited: 6

Distinct patterns of incidental exposure to and active selection of radicalizing information indicate varying levels of support for violent extremism
Sandy Schumann, Caitlin Clemmow, Bettina Rottweiler, et al.
PLoS ONE (2024) Vol. 19, Iss. 2, pp. e0293810-e0293810
Open Access | Times Cited: 5

The Concept of Identification in Threat Assessment
J. Reid Meloy, Kris Mohandie, James L. Knoll, et al.
Behavioral Sciences & the Law (2015) Vol. 33, Iss. 2-3, pp. 213-237
Open Access | Times Cited: 42

Linguistic analysis of lone offender manifestos
Lisa Kaati, Amendra Shrestha, Katie Cohen
(2016), pp. 1-8
Closed Access | Times Cited: 42

Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels
Manoel Horta Ribeiro, Shagun Jhaver, Savvas Zannettou, et al.
Proceedings of the ACM on Human-Computer Interaction (2021) Vol. 5, Iss. CSCW2, pp. 1-24
Open Access | Times Cited: 30

The digital augmentation of extremism: Reviewing and guiding online extremism research from a sociotechnical perspective
Marten Risius, Kevin M. Blasiak, Susilo Wibisono, et al.
Information Systems Journal (2023) Vol. 34, Iss. 3, pp. 931-963
Open Access | Times Cited: 11

The Frankfurt airport attack: A case study on the radicalization of a lone-actor terrorist.
Nils Böckler, Jens Hoffmann, Andreas Zick
Journal of Threat Assessment and Management (2015) Vol. 2, Iss. 3-4, pp. 153-163
Closed Access | Times Cited: 38

Indicators of terrorist intent and capability: Tools for threat assessment
Bart Schuurman, Quirine Eijkman
Dynamics of Asymmetric Conflict (2015) Vol. 8, Iss. 3, pp. 215-231
Closed Access | Times Cited: 37

Understanding the Language of ISIS: An Empirical Approach to Detect Radical Content on Twitter Using Machine Learning
Zia Ul Rehman, Sagheer Abbas, Muhammad Adnan Khan, et al.
Computers, materials & continua/Computers, materials & continua (Print) (2020) Vol. 66, Iss. 2, pp. 1075-1090
Open Access | Times Cited: 31

Exploring the evolution of posting behavior and language use in a racially and ethnically motivated extremist forum
Sydney Litterer, Ryan Scrivens, Thomas Wojciechowski, et al.
Behavioral Sciences of Terrorism and Political Aggression (2025), pp. 1-20
Open Access

Page 1 - Next Page

Scroll to top