‘questions about dawlah. dm me, plz.’ the sock puppet problem in online terrorism research
April 29, 2025
This paper explores the problem of deception in online terrorism research. While conducting research into the growing phenomenon of female migration to Islamic State-held territory by Western females, we began following a Twitter account exhibiting suspicious activity. The account owner–believed to be a Canadian teenage female–indicated interest in learning more about joining the IS. We ...
Youth, Counter Violent Extremism and (Social) Media: A Case of Pakistan
April 29, 2025
The paper explores the role of social media on positive youth development and engagement towards peacebuilding in Pakistan. In particular, it recognizes the role of youth within the liberal peace process, hence, sustainably aiding peacebuilding efforts. The paper argues that within developing democracies, media and youth can create an environment to promote dialogue and collaborative ...
Extremism and Gender-Based Violence Online
April 29, 2025
The previous chapter makes it clear that the Internet and communications technology have become important frontiers in the struggle against gender-based violence. Discussing, in particular, the everyday lived experience of violence against women online, it illustrated the extent to which online gender-based violence has been normalized as well as the direct linkages between online violence, offline harms, ...
Ontology-Based Information Extraction for Labeling Radical Online Content Using Distant Supervision
April 29, 2025
Radical, terroristic organizations pose threats to business, government, and society. The ubiquity of the modern Web and its participatory architecture have enabled such groups to become full-blown online propaganda machines. Today, radicalization that eventually leads to acts of terror occurs predominantly on the Web. Radical ideologies can be spread, in many cases unchecked, by malicious ...
A feminist theorisation of cybersecurity to identify and tackle online extremism
April 29, 2025
Online abuse and extremism disproportionately target marginalised populations, particularly people of colour, women and transgender and non‑binary people. The core argument of this report focuses on the intersecting failure of Preventing and Counter Violent Extremism (P/CVE) policies and cybersecurity policies to centre the experiences and needs of victims and survivors of online extremism and abuse. ...
Understanding the Trauma-Related Effects of Terrorist Propaganda on Researchers
April 29, 2025
Researchers who study online terrorism and political violence face a broad spectrum of risks to their safety and wellbeing. Awareness of the challenges researchers face in this subdiscipline has remained relatively low for years. Since the launch of Islamic State’s propaganda campaign on the internet, which skilfully deployed scenes of death and dying to influence ...
The Online Gaming Ecosystem: Assessing Digital Socialisation, Extremism Risks and Harms Mitigation Efforts
April 29, 2025
This report provides a review of the research on the exploitation of gaming and gaming‑adjacent platforms by violent extremists and the policies seeking to mitigate the impact of that exploitation. There is increasing interest in the nexus of online gaming and (violent) extremism. This report builds on the work of the Extremism and Gaming Research ...
Developing a Responsive Regulatory Approach to Online Terrorist Content on Tech Platforms
April 29, 2025
Tech platforms have been through several regulatory phases concerning the countering of terrorist content on their platforms: from a lack of regulation, to the government demands of self-regulation, to the present day where regulation has been implemented across the world. Much of this regulation, however, has been heavily criticised. After consideration of these criticisms, and ...
A Web of Extremism: How Anti-Government Extremists Survive Online Censorship
April 29, 2025
This thesis explores how extremism manages to survive in moderated online spaces. This work follows the attempts of the Instagram platform to minimize the presence of the right-wing extremist groups, specifically the Boogaloo movement, as a means of understanding how such groups survive and proselytize in the face of censorship. Addressing this question is done ...
Using Website Referrals to Identify Unreliable Content Rabbit Holes
April 29, 2025
Does the URL referral structure of websites lead users into ‘rabbit holes’ of unreliable content? Past work suggests algorithmic recommender systems on sites like YouTube lead users to view more unreliable content. However, websites without algorithmic recommender systems have financial and political motivations to influence the movement of users, potentially creating browsing rabbit holes. We ...