Identifying distinct types of internet use that predict the likelihood of planning or committing a terrorist attack: Findings from an analysis of individuals convicted on terrorism(-related) charges in England and Wales
April 24, 2025
Previous research has documented that the internet plays an increasingly important role in facilitating involvement in terrorism. However, the level of specificity of this literature is low. Advancing current insights, we examined how three concrete examples of active (i.e., generate/disseminate terrorist propaganda; interact with co-ideologues) and two examples of passive (i.e., learn about terrorist ideologies/actors; ...
PROTOCOL: Effectiveness of Educational Programmes to Prevent and Counter Online Violent Extremist Propaganda in English, French, Spanish, Portuguese, German and Scandinavian Language Studies: A Systematic Review
April 24, 2025
This protocol outlines a systematic review that aims to understand the effectiveness of educational programmes, delivered both online and offline, designed to prevent and counter the effects of online violent extremist propaganda in multiple languages. The primary objective is to assess the impact of interventions on reducing violent extremist attitudes, beliefs and behaviours. A secondary ...
Spatial dynamics in collective identity: Proximity and homophily in antifascist hyperlink-networks
April 24, 2025
Internet Communication Technologies (ICTs) have become increasingly popular for social movements of all kinds. Social movement organizations (SMOs) use them to interact and mobilize also across borders. Previous research has highlighted the opportunities for transnational networking and the resulting reduction in the importance of local dependency for SMOs. One movement that combines local direct action ...
Right- and left-wing violent extremist abuse of digital technologies in South America, Africa and Asia
April 14, 2025
The abuse of digital technologies by violent extremists is keeping pace with the exponential growth of new technologies, and poses multifaceted challenges to national and global security. Cyber-enabled threats manifest for example in terrorist-operated websites, the shift to alternative or fringe social media platforms, the use of the decentralised web, the exploitation of gaming and ...
Uncovering Salafi jihadist terror activity through advanced technological tools
March 25, 2025
This study investigates the evolving challenges intelligence and law enforcement agencies face in countering Salafi jihadist terrorist activities across digital platforms, focusing on integrating artificial intelligence (AI) and data fusion technologies in open-source intelligence (OSINT) methodologies. Through an analysis of case studies involving ISIS and other non-state actors, the study examines how terrorist organisations adapt ...
Islam, New Media and Young Muslims Radicalization
March 25, 2025
The aim of the article is to present the phenomenon of radicalization of young Muslims from both Muslim countries and Western Europe, which takes place using new media. The paper uses the method of critical analysis of sources because it allows the interpretation of facts and relating them to the motives of conduct and the ...
Teenage Terrorists and the Digital Ecosystem of the Islamic State
March 25, 2025
The author seeks to highlight just how central this unofficial Islamic State ecosystem is to audiences inspired by the group and how the interplay between this ecosystem and youth requires reframing the challenge rather than doubling down on the same playbooks. This article will first present the connection between these young peoples’ use of social ...
Perceptions of Individuals Radicalised Online: Examining the Victim-Perpetrator Nexus
March 25, 2025
This study explored the victim-perpetrator nexus in the context of cognitive online radicalisation. Specifically, we examined if a person’s age and whether they were exposed to extremist content/users incidentally or following active search shape perceptions of victimhood. We further assessed whether and how perceptions of victimhood shape support for distinct criminal justice responses. ...
Threat Surfaces in Games: Challenges and Best Practices
March 25, 2025
Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...
2024 Resource List: Violent Extremism, Radicalization, and Gaming
March 25, 2025
Gaming Community of Practice: The Gaming Community of Practice (GCoP) was formed to foster collaboration, knowledge sharing, and innovation among practitioners in the gaming industry alongside global experts. The group aimed to inform the development of best practices and guidance to prevent terrorists and violent extremists (TVE) from exploiting games, gaming-adjacent services, and the gaming community. ...