Publications by authors named "Elvira Restrepo"

We introduce a generalized form of gelation theory that incorporates individual heterogeneity and show that it can explain the asynchronous, sudden appearance and growth of online extremist groups supporting ISIS (so-called Islamic State) that emerged globally post-2014. The theory predicts how heterogeneity impacts their onset times and growth profiles and suggests that online extremist groups present a broad distribution of heterogeneity-dependent aggregation mechanisms centered around homophily. The good agreement between the theory and empirical data suggests that existing strategies aiming to defeat online extremism under the assumption that it is driven by a few "bad apples" are misguided.

View Article and Find Full Text PDF

There is enormous interest in inferring features of human behavior in the real world from potential digital footprints created online - particularly at the collective level, where the sheer volume of online activity may indicate some changing mood within the population regarding a particular topic. Civil unrest is a prime example, involving the spontaneous appearance of large crowds of otherwise unrelated people on the street on a certain day. While indicators of brewing protests might be gleaned from individual online communications or account content (e.

View Article and Find Full Text PDF

A popular stereotype is that women will play more minor roles than men as environments become more dangerous and aggressive. Our analysis of new longitudinal data sets from offline and online operational networks [for example, ISIS (Islamic State)] shows that although men dominate numerically, women emerge with superior network connectivity that can benefit the underlying system's robustness and survival. Our observations suggest new female-centric approaches that could be used to affect such networks.

View Article and Find Full Text PDF

Many high-profile societal problems involve an individual or group repeatedly attacking another - from child-parent disputes, sexual violence against women, civil unrest, violent conflicts and acts of terror, to current cyber-attacks on national infrastructure and ultrafast cyber-trades attacking stockholders. There is an urgent need to quantify the likely severity and timing of such future acts, shed light on likely perpetrators, and identify intervention strategies. Here we present a combined analysis of multiple datasets across all these domains which account for >100,000 events, and show that a simple mathematical law can benchmark them all.

View Article and Find Full Text PDF