Post Type Description
New Metrics for Dynamic Analysis of Online Radicalization
September 18, 2023The increasing use of online social networks (OSNs) by extremists for the spread of radicalization have been a great concern for law enforcement agencies across the world. Today, they are being increasingly used by radical groups for spreading ideologies, recruitment, influencing and planning their activities. However, many of such groups remain hidden within the social ...
ISIS in Cyberspace: Findings from Social Media Research
September 18, 2023The Syrian conflict led to a resurrection of ISIS in terms of recruitment, financing, propaganda, and enlisting itself as an actor in the Middle East. ISIS’s ability to use both social media and other traditional methods of recruitment requires countries like Turkey to adopt multi-faceted approaches in order to be more effective. Cyberspace, and particularly ...
The Islamic State of Tumblr – Recruiting Western Women
September 18, 2023The research discusses ISIS’s Media Strategy towards western women by examining the Tumblr blog UMM LAYTH. Written by a young woman from Scotland who traveled to the Islamic State, the blog speaks about daily life under ISIS. The paper gives a background on the author, the content and the blog’s style. ...
“Real Men Don’t Hate Women”: Twitter Rape Threats and Group Identity
September 18, 2023On 24th July 2013, feminist campaigner Caroline Criado-Perez’s petition to the Bank of England to have Elizabeth Fry’s image on the UK’s £5 note replaced with the image of another woman was successful. The petition challenged the Bank of England’s original plan to replace Fry with Winston Churchill, which would have meant that no woman ...
UNDP Global Meeting on PVE: Session 3 – The Role of Youth
September 18, 2023Session 3 – Understanding and Supporting the Role of Youth in the Prevention of Violent Extremism: This session place young people at the centre of the discussion, focusing on understanding the positive contribution of young women and men in preventing violent extremism in different contexts. We explore the linkages between youth radicalization and political violence, ...
Towards a Framework Understanding of Online Programs for Countering Violent Extremism
September 18, 2023There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means by which to address the effects of these narratives. Countering violent extremism (CVE) is a broad umbrella phrase that covers a wide array of approaches that ...
A Systematic Examination of Terrorist Use of the Internet
September 18, 2023The design of the Internet has made it an especially useful tool to terrorist groups. Using the Internet, terrorist groups have been especially successful in recruiting new members and exciting them into action. Previous works have provided comprehensive accounts of ways that terrorists use the Internet. This article expands on the understanding of this phenomenon ...
Fighting, on the Battlefield and Online
September 18, 2023Is the U.S. making headway in the fight against the Islamic State group? Judy Woodruff talks to retired Col. Derek Harvey, a former Army intelligence officer, and Brendan Koerner of Wired Magazine about the military offensive against ISIS, including the killing of a senior leader, and the resiliency of the group on social media. ...
Daesh and the Terrorist Threat: from the Middle East to Europe
September 18, 2023It is an undeniable fact that the issue of terrorism, both as a theoretical area of analysis and as a practical phenomenon, has grown exponentially in significance over the past few decades. Indeed, terrorism has for some time stopped being a term solely discussed in academic settings and in strategic documents, but has recently been ...
The Islamic State’s Global Propaganda Strategy
September 18, 2023This Research Paper aims to analyse in depth the global propaganda strategy of the so-called “Islamic State” (IS) by looking at the methods through which this grand strategy is carried out as well as the objectives that IS wants to achieve through it. The authors first discuss IS’ growth model, explaining why global expansion and ...