Lisa Kaati
Visiting researcher at Institutionen för informationsteknologi; Datorteknik
- Mobile phone:
- +46 70 482 25 73
- E-mail:
- Lisa.Kaati@it.uu.se
- Visiting address:
- Hus 10, Lägerhyddsvägen 1
- Postal address:
- Box 337
751 05 UPPSALA
Download contact information for Lisa Kaati at Institutionen för informationsteknologi; Datorteknik
More information is available to staff who log in.
Short presentation
My research interests are in the area of terrorism and the Internet, and in particular how computer science, psychology, and statistics can be used to study different behaviors. My research is interdisciplinary and includes studies on digital hate and violent extremism in online environments.
Keywords
- author profiling
- data science
- digital hate
- intelligence
- social media analysis
- violent extremism
Biography
Dr. Lisa Kaati achieved a PhD in computer science from Uppsala University in 2008. Her principal research interests are in the area of terrorism and the Internet, and in particular how computer science, psychology and statistics can be used to study different behaviors. She is the author of over 40 academic articles and chapters and several reports.
Dr. Kaati has presented her findings before the Swedish Government, The Finish Government, The Commission of the European Union, and elsewhere. She is a member of the Academic Advisory Board of Europol’s Counter-terrorism Center and the Radicalisation Awareness Network (RAN) Advisory Board of Researchers. She is an associate editor of the journal Social Network Analysis and Mining.
Between 2008-2022 Dr. Kaati was working at the Swedish Defence Research Agency (FOI) where she was the head of the interdisciplinary Data science group. For 6 years, Dr. Kaati was working on a commission from the Swedish government to study violent extremist propaganda and hate speech online.
Publications
Selection of publications
- Detecting jihadist messages on twitter (2015)
- A step towards detecting online grooming (2015)
- Timeprints for identifying social media users with multiple aliases (2015)
- Detecting multipliers of jihadism on twitter (2015)
- Activity profiles in online social media (2014)
- Time profiles for identifying users in online environments (2014)
- Analysis and mining of tags, (micro)blogs, and virtual communities (2014)
- Detecting multiple aliases in social media (2013)
- Author recognition in discussion boards (2013)
- Analyzing the security in the GSM radio network using attack jungles (2010)
- Composed bisimulation for tree automata (2009)
- A uniform (bi-)simulation-based framework for reducing tree automata (2009)
- Computing Simulations over Tree Automata (2008)
- Composed Bisimulation for Tree Automata (2008)
- Reduction Techniques for Finite (Tree) Automata (2008)
- Bisimulation minimization of tree automata (2007)
- Minimization of Non-deterministic Automata with Large Alphabets (2006)
Recent publications
- Words of Suicide (2021)
- Introducing Digital-7 Threat Assessment of Individuals in Digital Environments (2020)
- Extreme adopters in digital communities. (2020)
- PRAT (2019)
- Assessment of risk in written communication (2018)
All publications
Articles
- Extreme adopters in digital communities. (2020)
- Timeprints for identifying social media users with multiple aliases (2015)
- Composed bisimulation for tree automata (2009)
- A uniform (bi-)simulation-based framework for reducing tree automata (2009)
- Bisimulation minimization of tree automata (2007)
Books
Chapters
- Countering lone actor terrorism (2016)
- Analysis and mining of tags, (micro)blogs, and virtual communities (2014)
Conferences
- Words of Suicide (2021)
- Introducing Digital-7 Threat Assessment of Individuals in Digital Environments (2020)
- PRAT (2019)
- Linguistic markers of a radicalized mind-set among extreme adopters (2017)
- IoT Data Profiles (2017)
- Gender Classification with Data Independent Features in Multiple Languages (2017)
- A Machine Learning Approach Towards Detecting Extreme Adopters in Digital Communities (2017)
- Multi-domain alias matching using machine learning (2016)
- Measuring online affects in a white supremacy forum (2016)
- Semantic technologies for detecting names of new drugs on darknets (2016)
- Linguistic analysis of lone offender manifestos (2016)
- Automatic detection of xenophobic narratives (2016)
- Identifying Warning Behaviors of Violent Lone Offenders in Written Communication (2016)
- Identifying warning behaviors of violent lone offenders in written communication (2016)
- Detecting jihadist messages on twitter (2015)
- A step towards detecting online grooming (2015)
- Are You Really a Child? (2015)
- Internet of Things and Future Threats Towards our Society (2015)
- Detecting multipliers of jihadism on twitter (2015)
- Activity profiles in online social media (2014)
- Time profiles for identifying users in online environments (2014)
- Detecting multiple aliases in social media (2013)
- Author recognition in discussion boards (2013)
- Analyzing the security in the GSM radio network using attack jungles (2010)
- Computing Simulations over Tree Automata (2008)
- Composed Bisimulation for Tree Automata (2008)
- Minimization of Non-deterministic Automata with Large Alphabets (2006)
- Bisimulation Minimization of Tree Automata (2006)