Chapter
The Challenges and Limitations of Online Counter-Narratives in the Fight against ISIS Recruitment in Europe and North America
September 18, 2023The rise of the Islamic State has contributed to both an increased terrorism threat in Western nations and an unprecedented number of citizens joining the group of so-called foreign fighters. IS has used the internet as a way to both disseminate propaganda and radicalize and recruit supporters. This article will begin by analyzing some of ...
The Role of Internet Intermediaries in Tackling Terrorism online
September 18, 2023Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such ...
Neue technologische Mittel des neuen Terrorismus
September 18, 2023Seit Beginn des 21. Jahrhunderts besteht innerhalb der sozialwissenschaftlichen Forschung der Konsens, dass die technologischen Möglichkeiten des Internets von vitaler Bedeutung für den islamistischen Terrorismus sind (Corman 2011; Cornish& Lindley-French&Yorke 2011; Fink&Barclay 2013). Verschiedene Studien bewerten die Existenz des Internets gar als Voraussetzung dafür, dass eine terroristische Organisation wie Al Qaida bereits länger als 20 ...
Countering and Understanding Terrorism, Extremism, and Radicalisation in a Big Data Age
September 18, 2023Anno Bunnik explores the ramifications of Big Data for countering terrorism, extremism, and radicalisation. With the recent rise of jihadists and other extremists groups in the Middle East and Europe, how do state agencies respond through the use of Big Data? This chapter critically engages with questions such as the extent to which Big Data ...
Wie Cyberterrorismus stattfindet – und warum wir ihn nicht sehen
September 18, 2023Verschwörungstheorien von im Untergrund herrschenden „Echsenmenschen“ oder einer „flachen Erde“ mögen in den Augen eines aufgeklärten Menschen abwegig und bizarr erscheinen, doch tatsächlich erfahren diese Narrative dank dem Internet erhöhte Beachtung. Schon lange sind Ufos, die „false-flag-Anschläge“ von 9/11 und die gefälschte Mondlandung Teil eines virtuellen Erklärungsangebots an Menschen, die grundsätzliches Misstrauen gegenüber traditionellen Medien ...
Countering and Understanding Terrorism Extremism and Radicalisation in a Big Data Age
September 18, 2023Anno Bunnik explores the ramifications of Big Data for countering terrorism, extremism, and radicalisation. With the recent rise of jihadists and other extremists groups in the Middle East and Europe, how do state agencies respond through the use of Big Data? This chapter critically engages with questions such as the extent to which Big Data ...
Golden Dawn, Austerity and Young People: The Rise of Fascist Extremism among Young People in Contemporary Greek Society
September 18, 2023The contemporary rise of popular support for fascism is investigated in this article through an examination of Golden Dawn’s remarkable appeal to a section of Greek youth. This leads to the problematization of mainstream explanatory and interpretive discourses that attribute Golden Dawn’s electoral and political attractiveness almost exclusively to anger and a will to punish ...
The Emerging Role of Social Media in the Recruitment of Foreign Fighters
September 18, 2023Without recruitment terrorism can not prevail, survive and develop. Recruitment provides the killers, the suicide bombers, the kidnappers, the executioners, the engineers, the soldiers and the armies of future terrorism. The internet has become a useful instrument for modern terrorists’ recruitment and especially of foreign fighters. Online platforms and particularly the new social media (e.g., ...
Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet
September 18, 2023Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility ...