Post Type Description
Defining Online Hate And Its Public Lives: What Is The Place For Extreme Speech?
September 18, 2023Following Sahana Udupa and Matti Pohjonen’s (2019) invitation to move the debate beyond a normative understanding of hate speech, this article seeks to build a foundation for conceptual and empirical inquiry of speech commonly considered deviant and disturbing. It develops in three stages. It first maps the public lives of terms that refer to online ...
Men Are Scum: Self-Regulation, Hate Speech, And Gender-Based Censorship On Facebook
September 18, 2023Because social media sites are self-regulating, each site has developed its own community standards, which serve as regulatory tools. However, the processes of content moderation are often unclear, subjective, and discriminatory. Drawing from a series of interviews with individuals in the “Men Are Scum” movement, this article describes the experiences of women who have been ...
Digital Discourse, Online Repression, And Cyberterrorism: Information Communication Technologies In Russia’s North Caucasus Republics
September 18, 2023Is the cyber-utopian versus cyber-repression argument the most effective way to frame the political uses of new technologies? Contemporary discourse on social media fails to highlight political dynamics in authoritarian regimes with weak state control, where independent groups can capitalize on the use of coercive force. In this thesis, I will explore the various methods ...
Cyberterrorism: A Postmodern View Of Networks Of Terror And How Computer Security Experts And Law Enforcement Officials Fight Them
September 18, 2023The purpose of this study is to investigate how cyberterrorists create networks in order to engage in malicious activities against the Internet and computers. The purpose of the study is also to understand how computer security labs (i.e., in universities) and various agencies (that is, law enforcement agencies such as police departments and the FBI) ...
Information Age Terrorism: Toward Cyberterror
September 18, 2023The growing ubiquity of computers and their associated networks are propelling the world into the information age. Computers may revolutionize terrorism in the same manner that they have revolutionized everyday life. Terrorism in the information age will consist of conventional terrorism, in which classic weapons (explosives, guns, etc.) will be used to destroy property and ...
Detection And Monitoring Of Improvised Explosive Device Education Networks Through The World Wide Web
September 18, 2023As the information age comes to fruition, terrorist networks have moved mainstream by promoting their causes via the World Wide Web. In addition to their standard rhetoric, these organizations provide anyone with an Internet connection the ability to access dangerous information involving the creation and implementation of Improvised Explosive Devices (IEDs). Unfortunately for governments combating ...
Understanding The Collective Identity Of The Radical Right Online: A Mixed-Methods Approach
September 18, 2023Criminologists have generally agreed that the Internet is not only a tool or resource for right-wing extremists to disseminate ideas and products, but also a site of important identity work, accomplished interactively through the exchange of radical ideas. Online discussion forums, amongst other interactive corners of the Web, have become an essential conduit for the ...
Automatic Detection And Forecasting Of Violent Extremist Cyber-Recruitment
September 18, 2023The growing use of the Internet as a major means of communication has led to the formation of cyber-communities, which have become increasingly appealing to violent extremists due to the unregulated nature of Internet communication. Online communities enable violent extremists to increase recruitment by allowing them to build personal relationships with a worldwide audience capable ...
Application Of Recurrent Neural Networks In Toxic Comment Classification
September 18, 2023Moderators of online discussion forums often struggle with controlling extremist comments on their platforms. To help provide an efficient and accurate tool to detect online toxicity, we apply word2vec’s Skip-Gram embedding vectors, Recurrent Neural Network models like Bidirectional Long Short-term Memory to tackle a toxic comment classification problem with a labeled dataset from Wikipedia Talk ...
Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web
September 18, 2023The ever-increasing use of the internet by terrorist groups as a platform for the dissemination of radical, violent ideologies is well documented. The internet has, in this way, become a breeding ground for potential lone-wolf terrorists; that is, individuals who commit acts of terror inspired by the ideological rhetoric emitted by terrorist organizations. These individuals ...