Chapter
Countering and Understanding Terrorism Extremism and Radicalisation in a Big Data Age
September 18, 2023Anno Bunnik explores the ramifications of Big Data for countering terrorism, extremism, and radicalisation. With the recent rise of jihadists and other extremists groups in the Middle East and Europe, how do state agencies respond through the use of Big Data? This chapter critically engages with questions such as the extent to which Big Data ...
Golden Dawn, Austerity and Young People: The Rise of Fascist Extremism among Young People in Contemporary Greek Society
September 18, 2023The contemporary rise of popular support for fascism is investigated in this article through an examination of Golden Dawn’s remarkable appeal to a section of Greek youth. This leads to the problematization of mainstream explanatory and interpretive discourses that attribute Golden Dawn’s electoral and political attractiveness almost exclusively to anger and a will to punish ...
The Emerging Role of Social Media in the Recruitment of Foreign Fighters
September 18, 2023Without recruitment terrorism can not prevail, survive and develop. Recruitment provides the killers, the suicide bombers, the kidnappers, the executioners, the engineers, the soldiers and the armies of future terrorism. The internet has become a useful instrument for modern terrorists’ recruitment and especially of foreign fighters. Online platforms and particularly the new social media (e.g., ...
Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet
September 18, 2023Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility ...
Terrorist Web Sites: Their Contents, Functioning, and Effectiveness
September 18, 2023This extract is taken from the author’s original manuscript and has not been edited. The definitive version of this piece may be found in New Media and the New Middle East by Philip Seib which can be purchased from www.palgrave.com ...
Interpersonal Trust on Jihadi Internet Forums
September 18, 2023This chapter explores the effects of the trust problem on jihadi internet discussion forums. The scarcity of non-verbal cues in digital communication facilitates deceptive mimicry, which undermines the inter- personal trust required for sensitive transactions. Open-source data from Arabic-language jihadi forums between 2006 and 2011 indicate that distrust there was high and direct recruitment rare. ...
Gender and Power in Online Communication
September 18, 2023New communication technologies are often invested with users’ hopes for change in the social order. Thus the Internet is said to be inherently democratic, levelling traditional distinctions of social status, and creating opportunities for less powerful individuals and groups to participate on a par with members of more powerful groups. Specifically, the Internet has been ...
Modified Frequency-Based Term Weighting Scheme for Accurate Dark Web Content Classification
September 18, 2023Security informatics and intelligence computation plays a vital role in detecting and classifying terrorism contents in the web. Accurate web content classification using the computational intelligence and security informatics will increase the opportunities of the early detection of the potential terrorist activities. In this paper, we propose a modified frequency-based term weighting scheme for accurate ...
Von al-Zarqawi bis al-Awlaki: Das Internet als neue Form des radikalen Milieus.
September 18, 2023Chapter in Stefan Malthaner and Peter Waldmann (eds.) Radikale Milieus: Das soziale Umfeld terroristischer Gruppen. ...