Journal Article
The platform governance triangle: conceptualising the informal regulation of online content
September 18, 2023From the new Facebook ‘Oversight Body’ for content moderation to the ‘Christchurch Call to eliminate terrorism and violent extremism online,’ a growing number of voluntary and non-binding informal governance initiatives have recently been proposed as attractive ways to rein in Facebook, Google, and other platform companies hosting user-generated content. Drawing on the literature on transnational ...
Branding the Islamic State of Iraq and Syria
September 18, 2023This article will explore three crucial parameters that have been taken into consideration to attract millennials towards the Islamic State or Islamic State of Iraq and Syria (ISIS) brand: the first parameter is story creation around the historical significance of Islamic prophecies justifying the ISIS brand. Second is the symbolisms attached to the ISIS brand ...
From Inspire to Rumiyah: does instructional content in online jihadist magazines lead to attacks?
September 18, 2023Considerable time has been spent examining how groups like AQAP and ISIS used their online magazines to reach and radicalize individuals in Western democratic states. This paper continues this investigation but shifts its analysis to focus on the ‘how-to’ or instructional content of these publications, an understudied part of the literature. One of the stated ...
Explaining the Emergence of Political Fragmentation on Social Media: The Role of Ideology and Extremism
September 18, 2023This article is a systematic large-scale study of the reasons driving political fragmentation on social media. Making use of a comparative dataset of the Twitter discussion activities of 115 political groups in 26 countries, it shows that groups that are further apart in ideological terms interact less, and that groups that sit at the extremes ...
Intersections of ISIS media leader loss and media campaign strategy A visual framing analysis
September 18, 2023The decision to target leaders of groups like ISIS to hamper their effectiveness has served as a longstanding principle of counterterrorism efforts. Yet, previous research suggests that any results may simply be temporary. Using insights from confiscated ISIS documents from Afghanistan to define the media leader roles that qualified for each level of the cascade, ...
Reviewing the Role of the Internet in Radicalization Processes
September 18, 2023This review presents the existing research on the role of the Internet in radicalization processes. Using a systematic literature search strategy, our paper yields 88 studies on the role of the Internet in a) right-wing extremism and b) radical jihadism. Available studies display a predominant interest in the characteristics of radical websites and a remarkable ...
Many Faced Hate: A Cross Platform Study of Content Framing and Information Sharing by Online Hate Groups
September 18, 2023Hate groups are increasingly using multiple social media platforms to promote extremist ideologies. Yet we know little about their communication practices across platforms. How do hate groups (or “in-groups”), frame their hateful agenda against the targeted group or the “out-group?” How do they share information? Utilizing “framing” theory from social movement research and analyzing domains ...
Interactive Search and Exploration in Discussion Forums Using Multimodal Embeddings
September 18, 2023In this paper we present a novel interactive multimodal learning system, which facilitates search and exploration in large networks of social multimedia users. It allows the analyst to identify and select users of interest, and to find similar users in an interactive learning setting. Our approach is based on novel multimodal representations of users, words ...
Countering Extremists on Social Media: Challenges for Strategic Communication and Content Moderation
September 18, 2023Extremist exploitation of social media platforms is an important regulatory question for civil society, government, and the private sector. Extremists exploit social media for a range of reasons—from spreading hateful narratives and propaganda to financing, recruitment, and sharing operational information. Policy responses to this question fit under two headings, strategic communication and content moderation. At ...
Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors
September 18, 2023The online space is a haven for extremists of all kinds. Although efforts to remove violent and extremist content are increasing, there is a widely accepted need to also contest extremist messages with counter messages designed to undermine and disrupt extremist narratives. While the majority of academic focus has been on large and well‐funded efforts ...