Extremism and Gender-Based Violence Online
April 29, 2025
The previous chapter makes it clear that the Internet and communications technology have become important frontiers in the struggle against gender-based violence. Discussing, in particular, the everyday lived experience of violence against women online, it illustrated the extent to which online gender-based violence has been normalized as well as the direct linkages between online violence, offline harms, ...
Ontology-Based Information Extraction for Labeling Radical Online Content Using Distant Supervision
April 29, 2025
Radical, terroristic organizations pose threats to business, government, and society. The ubiquity of the modern Web and its participatory architecture have enabled such groups to become full-blown online propaganda machines. Today, radicalization that eventually leads to acts of terror occurs predominantly on the Web. Radical ideologies can be spread, in many cases unchecked, by malicious ...
A feminist theorisation of cybersecurity to identify and tackle online extremism
April 29, 2025
Online abuse and extremism disproportionately target marginalised populations, particularly people of colour, women and transgender and non‑binary people. The core argument of this report focuses on the intersecting failure of Preventing and Counter Violent Extremism (P/CVE) policies and cybersecurity policies to centre the experiences and needs of victims and survivors of online extremism and abuse. ...
Understanding the Trauma-Related Effects of Terrorist Propaganda on Researchers
April 29, 2025
Researchers who study online terrorism and political violence face a broad spectrum of risks to their safety and wellbeing. Awareness of the challenges researchers face in this subdiscipline has remained relatively low for years. Since the launch of Islamic State’s propaganda campaign on the internet, which skilfully deployed scenes of death and dying to influence ...
The Online Gaming Ecosystem: Assessing Digital Socialisation, Extremism Risks and Harms Mitigation Efforts
April 29, 2025
This report provides a review of the research on the exploitation of gaming and gaming‑adjacent platforms by violent extremists and the policies seeking to mitigate the impact of that exploitation. There is increasing interest in the nexus of online gaming and (violent) extremism. This report builds on the work of the Extremism and Gaming Research ...
Developing a Responsive Regulatory Approach to Online Terrorist Content on Tech Platforms
April 29, 2025
Tech platforms have been through several regulatory phases concerning the countering of terrorist content on their platforms: from a lack of regulation, to the government demands of self-regulation, to the present day where regulation has been implemented across the world. Much of this regulation, however, has been heavily criticised. After consideration of these criticisms, and ...
A Web of Extremism: How Anti-Government Extremists Survive Online Censorship
April 29, 2025
This thesis explores how extremism manages to survive in moderated online spaces. This work follows the attempts of the Instagram platform to minimize the presence of the right-wing extremist groups, specifically the Boogaloo movement, as a means of understanding how such groups survive and proselytize in the face of censorship. Addressing this question is done ...
Using Website Referrals to Identify Unreliable Content Rabbit Holes
April 29, 2025
Does the URL referral structure of websites lead users into ‘rabbit holes’ of unreliable content? Past work suggests algorithmic recommender systems on sites like YouTube lead users to view more unreliable content. However, websites without algorithmic recommender systems have financial and political motivations to influence the movement of users, potentially creating browsing rabbit holes. We ...
THE DIFFERENTIATED FEEDBACK FRAMEWORK: AN AUTOETHNOGRAPHICANALYSIS OF ONLINE ENGAGEMENT AND CREATING COMMUNITY
April 29, 2025
Realizing that after the COVID-19 pandemic learner and faculty engagement is even more critical to learning—as evidenced by ongoing declines in post-pandemic post-secondary enrollment—this paper presents a series of reflections and experiences from the perspective of a student and faculty member. These experiences are understood through an autoethnography, resulting in the creation of a feedback ...
The evolving nexus of cybercrime and terrorism: A systematic review of convergence and policy implications
April 29, 2025
This systematic review unveils significant convergence between cybercriminals and terrorists over the past decade, characterized by substantial overlap in tactics, capabilities, and infrastructure exploitation. Key findings illuminate the adoption of cybercriminal methods by terrorist organizations, the engagement of cybercriminal groups in terrorist activities, the proliferation of enabling technologies such as cryptocurrencies and the dark web, ...