Chapter
Social Media and Situation Awareness during Terrorist Attacks: Recommendations for Crisis Communication
September 18, 2023This chapter summarises the findings of a case study on social media activity during the 22 July 2011 terrorist attacks in Norway. Based on these findings and on theories and previous research on the role of social media in situation awareness (SA) configuration during crisis situations, the chapter offers seven recommendations for key communicators in ...
Victims’ Use of Social Media during and after the Utøya Terror Attack: Fear, Resilience, Sorrow and Solidarity
September 18, 2023This chapter examines how those directly affected by the terror attack on Utøya in Norway on 22 July 2011 used social media to cope with the trauma. Through interviews with eight survivors and a study of their Facebook walls during the first month after the shooting, the chapter sets out to answer how they tell ...
Tweeting Terror: An Analysis of the Norwegian Twitter-sphere during and in the Aftermath of the 22 July 2011 Terrorist Attack
September 18, 2023This chapter analyses the Norwegian Twitter-sphere during and in the aftermath of the terrorist attack in Norway on 22 July 2011. Based on a collection of 2.2 million tweets representing the Twitter-sphere during the period 20 July–28 August 2011, the chapter seeks answers to how the micro-blogging services aided in creating situation awareness (SA) related ...
Online Jihadi Instructional Content: The Role of Magazines
September 18, 2023This chapter focuses on the instructional content, both text and images, published in 26 issues of three jihadi magazines: Al-Qaeda in the Arabian Peninsula’s Inspire, Inspire’s forerunner Jihad Recollections, and Somali Al-Shabab’s Gaidi M’taani. Instruction was found to be a core component of Inspire as distinct from the varying types and levels of instruction appearing ...
Internet Censorship in the United Kingdom: National Schemes and European Norms
September 18, 2023The United Kingdom (UK) has been at the vanguard of online censorship in democracies from the beginning of the modern internet. Since the mid-1990s the government has developed distinctive patterns of regulation – targeting intermediaries, using the bully pulpit to promote ‘voluntary’ self-regulation, and promoting automated censorship tools such as web blocking – which have ...
The Challenges and Limitations of Online Counter-Narratives in the Fight against ISIS Recruitment in Europe and North America
September 18, 2023The rise of the Islamic State has contributed to both an increased terrorism threat in Western nations and an unprecedented number of citizens joining the group of so-called foreign fighters. IS has used the internet as a way to both disseminate propaganda and radicalize and recruit supporters. This article will begin by analyzing some of ...
The Role of Internet Intermediaries in Tackling Terrorism online
September 18, 2023Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such ...
Neue technologische Mittel des neuen Terrorismus
September 18, 2023Seit Beginn des 21. Jahrhunderts besteht innerhalb der sozialwissenschaftlichen Forschung der Konsens, dass die technologischen Möglichkeiten des Internets von vitaler Bedeutung für den islamistischen Terrorismus sind (Corman 2011; Cornish& Lindley-French&Yorke 2011; Fink&Barclay 2013). Verschiedene Studien bewerten die Existenz des Internets gar als Voraussetzung dafür, dass eine terroristische Organisation wie Al Qaida bereits länger als 20 ...
Countering and Understanding Terrorism, Extremism, and Radicalisation in a Big Data Age
September 18, 2023Anno Bunnik explores the ramifications of Big Data for countering terrorism, extremism, and radicalisation. With the recent rise of jihadists and other extremists groups in the Middle East and Europe, how do state agencies respond through the use of Big Data? This chapter critically engages with questions such as the extent to which Big Data ...
Wie Cyberterrorismus stattfindet – und warum wir ihn nicht sehen
September 18, 2023Verschwörungstheorien von im Untergrund herrschenden „Echsenmenschen“ oder einer „flachen Erde“ mögen in den Augen eines aufgeklärten Menschen abwegig und bizarr erscheinen, doch tatsächlich erfahren diese Narrative dank dem Internet erhöhte Beachtung. Schon lange sind Ufos, die „false-flag-Anschläge“ von 9/11 und die gefälschte Mondlandung Teil eines virtuellen Erklärungsangebots an Menschen, die grundsätzliches Misstrauen gegenüber traditionellen Medien ...