Lisa Kaati
Gästforskare vid Institutionen för informationsteknologi; Datorteknik
- Mobiltelefon:
- 070-482 25 73
- E-post:
- Lisa.Kaati@it.uu.se
- Besöksadress:
- Hus 10, Lägerhyddsvägen 1
- Postadress:
- Box 337
751 05 UPPSALA
Ladda ned kontaktuppgifter för Lisa Kaati vid Institutionen för informationsteknologi; Datorteknik
Mer information visas för dig som medarbetare om du loggar in.
Kort presentation
Min forskning fokuserar på att analysera data från internet. Jag är både intresserad av att utveckla nya tekniker för att analysera data och att göra faktiska analyser som baseras på riktig data. Jag har kommit att rikta in min forskning på att analysera förekomsten och innehållet i våldsbejakande extremistiska budskap i digitala miljöer, att utveckla teknik och metod för att göra hot- och riskbedömningar i digitala miljöer samt att upptäcka hat och hot.
Nyckelord
- author profiling
- data science
- digital hate
- intelligence
- social media analysis
- violent extremism
Biografi
Denna text finns inte på svenska, därför visas den engelska versionen.
Dr. Lisa Kaati achieved a PhD in computer science from Uppsala University in 2008. Her principal research interests are in the area of terrorism and the Internet, and in particular how computer science, psychology and statistics can be used to study different behaviors. She is the author of over 40 academic articles and chapters and several reports.
Dr. Kaati has presented her findings before the Swedish Government, The Finish Government, The Commission of the European Union, and elsewhere. She is a member of the Academic Advisory Board of Europol’s Counter-terrorism Center and the Radicalisation Awareness Network (RAN) Advisory Board of Researchers. She is an associate editor of the journal Social Network Analysis and Mining.
Between 2008-2022 Dr. Kaati was working at the Swedish Defence Research Agency (FOI) where she was the head of the interdisciplinary Data science group. For 6 years, Dr. Kaati was working on a commission from the Swedish government to study violent extremist propaganda and hate speech online.
Publikationer
Urval av publikationer
- Detecting jihadist messages on twitter (2015)
- A step towards detecting online grooming (2015)
- Timeprints for identifying social media users with multiple aliases (2015)
- Detecting multipliers of jihadism on twitter (2015)
- Activity profiles in online social media (2014)
- Time profiles for identifying users in online environments (2014)
- Analysis and mining of tags, (micro)blogs, and virtual communities (2014)
- Detecting multiple aliases in social media (2013)
- Author recognition in discussion boards (2013)
- Analyzing the security in the GSM radio network using attack jungles (2010)
- Composed bisimulation for tree automata (2009)
- A uniform (bi-)simulation-based framework for reducing tree automata (2009)
- Computing Simulations over Tree Automata (2008)
- Composed Bisimulation for Tree Automata (2008)
- Reduction Techniques for Finite (Tree) Automata (2008)
- Bisimulation minimization of tree automata (2007)
- Minimization of Non-deterministic Automata with Large Alphabets (2006)
Senaste publikationer
- Words of Suicide (2021)
- Introducing Digital-7 Threat Assessment of Individuals in Digital Environments (2020)
- Extreme adopters in digital communities. (2020)
- PRAT (2019)
- Assessment of risk in written communication (2018)
Alla publikationer
Artiklar
- Extreme adopters in digital communities. (2020)
- Timeprints for identifying social media users with multiple aliases (2015)
- Composed bisimulation for tree automata (2009)
- A uniform (bi-)simulation-based framework for reducing tree automata (2009)
- Bisimulation minimization of tree automata (2007)
Böcker
Kapitel
- Countering lone actor terrorism (2016)
- Analysis and mining of tags, (micro)blogs, and virtual communities (2014)
Konferenser
- Words of Suicide (2021)
- Introducing Digital-7 Threat Assessment of Individuals in Digital Environments (2020)
- PRAT (2019)
- Linguistic markers of a radicalized mind-set among extreme adopters (2017)
- IoT Data Profiles (2017)
- Gender Classification with Data Independent Features in Multiple Languages (2017)
- A Machine Learning Approach Towards Detecting Extreme Adopters in Digital Communities (2017)
- Multi-domain alias matching using machine learning (2016)
- Measuring online affects in a white supremacy forum (2016)
- Semantic technologies for detecting names of new drugs on darknets (2016)
- Linguistic analysis of lone offender manifestos (2016)
- Automatic detection of xenophobic narratives (2016)
- Identifying Warning Behaviors of Violent Lone Offenders in Written Communication (2016)
- Identifying warning behaviors of violent lone offenders in written communication (2016)
- Detecting jihadist messages on twitter (2015)
- A step towards detecting online grooming (2015)
- Are You Really a Child? (2015)
- Internet of Things and Future Threats Towards our Society (2015)
- Detecting multipliers of jihadism on twitter (2015)
- Activity profiles in online social media (2014)
- Time profiles for identifying users in online environments (2014)
- Detecting multiple aliases in social media (2013)
- Author recognition in discussion boards (2013)
- Analyzing the security in the GSM radio network using attack jungles (2010)
- Computing Simulations over Tree Automata (2008)
- Composed Bisimulation for Tree Automata (2008)
- Minimization of Non-deterministic Automata with Large Alphabets (2006)
- Bisimulation Minimization of Tree Automata (2006)