Us and them: identifying cyber hate on Twitter across multiple protected characteristics
September 18, 2023
Hateful and antagonistic content published and propagated via the World Wide Web has the potential to cause harm and suffering on an individual basis, and lead to social tension and disorder beyond cyber space. Despite new legislation aimed at prosecuting those who misuse new forms of communication to post threatening, harassing, or grossly offensive language ...
Cyberhate on Social Media in the aftermath of Woolwich: A Case Study in Computational Criminology and Big Data
September 18, 2023
This paper presents the first criminological analysis of an online social reaction to a crime event of national significance, in particular the detection and propagation of cyberhate on social media following a terrorist attack. We take the Woolwich, London terrorist attack in 2013 as our event of interest and draw on Cohen’s process of warning, ...
Terrorist Migration to the Dark Web
September 18, 2023
The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. The deepest layers of the Deep Web, a segment known as the Dark Web, contain content that has been intentionally concealed including illegal and anti-social information. The ...
Cheering on the Jihad: An Exploration of Women’s Participation in Online Pro-jihadist Networks
September 18, 2023
With the rise of the Islamic State (IS), a great deal of attention has recently been drawn to two issues that have come to be seen as intricately linked: the role of women within pro-jihadist networks (Lahoud 2014; Hoyle, Bradford and Frenett 2015; Saltman and Smith 2015) and the use of social media as an ...
Virtual Jihadist Media: Function, Legitimacy, and Radicalising Efficacy.
September 18, 2023
Within the last 10 years, the internet has become the principal platform for the dissemination and mediation of the culture and ideology of jihadism. The exponential growth of jihadist fora, with their increasingly ‘high-end’ production values, sophisticated critiques of prevailing narratives and ostensive attempts at impartiality, do not occur in a vacuum. To a great ...
A Brief History of Propaganda During Conflict: Lessons for Counter-Terrorism Strategic Communications
September 18, 2023
There is a tendency in scholarly and strategic-policy fields to see the propaganda produced by groups like Islamic State and Al-Qaeda as historically unheralded. As evidence, slickly produced communiques and a penchant for using social media are typically highlighted. This narrow perspective, in placing the current phenomenon into an historical and thematic vacuum, infers that ...
The Counter-Narrative Handbook
September 18, 2023
Given the proliferation of violent extremist content online in recent years, developing effective counter-narratives – messages that offer a positive alternative to extremist propaganda, or deconstruct or delegitimise extremist narratives and challenge extremist ideologies – is an increasingly necessary alternative to online censorship. This Handbook, funded by Public Safety Canada through the Kanishka Project, was ...
Literature Review: The Impact of Digital Communications Technology on Radicalisation and Recruitment
September 18, 2023
This literature review seeks to reorient the discourse on radicalization to consider the connection between communication technology and violent extremism. By interrogating three central questions vexing policy-makers, law enforcement officials and academics, this review moves away from a monolithic understanding of the internet and showcases the opportunities afforded by different communications technologies within the context ...
Women’s Connectivity in Extreme Networks
September 18, 2023
A popular stereotype is that women will play more minor roles than men as environments become more dangerous and aggressive. Our analysis of new longitudinal data sets from offline and online operational networks [for example, ISIS (Islamic State)] shows that although men dominate numerically, women emerge with superior network connectivity that can benefit the underlying ...