Journal Article
Embodying The Nordic Race: Imaginaries Of Viking Heritage In The Online Communications Of The Nordic Resistance Movement
September 18, 2023Kølvraa’s article focuses on the cultural imaginary of the Scandinavian extreme right by analysing the online presence of the so-called Nordic Resistance Movement. He seeks to show how the cultural imaginaries of this National Socialist organization make use of the Scandinavian Viking heritage in three distinct ways. First, to produce a distinctly Nordic form of ...
Computer support to analyze IS propaganda
September 18, 2023This paper discusses the use of computer support to analyze IS propaganda. We focus on thematic analysis of the textual content of various types of online propaganda, and investigate two different ways to identify themes in the data. One approach is theory-driven and builds on previous analysis of IS propaganda, and the other approach is data-driven and ...
Cyberhate: A review and content analysis of intervention strategies
September 18, 2023This paper presents a review of intervention programmes against cyberhate. Over the last decade, the preoccupation over the use of electronic means of communication as a tool to convey hate, racist and xenophobic contents rose tremendously. NGOs, legal professionals, private companies, and civil society have developed interventions but little is known about their impact. For ...
Communications Technology and Terrorism
September 18, 2023By facilitating the flow of information in society, communications technology (CT; e.g., newspapers, radio, television, the Internet) can help terrorists to (i) spread their message, (ii) recruit followers, and (iii) coordinate among group members. However, CT also facilitates monitoring and arresting terrorists. This article formulates the hypothesis that a society’s level of CT is systematically ...
Towards the “olive trees of Rome”: exploitation of propaganda devices in the Islamic State’s flagship magazine “Rumiyah”
September 18, 2023This paper aims to contribute to understanding how the last flagship magazine of the Islamic State – “Rumiyah” – attempted to influence and manipulate Internet users. Its primary objective is to analyze the propaganda methods exploited in all thirteen issues of this magazine. In order to do so this paper utilises content analysis to investigate ...
Artificial or Human: A New Era of Counterterrorism Intelligence?
September 18, 2023A new revolution has begun in counterterrorism—the Artificial Intelligence (AI) revolution. The AI revolution has had a significant impact on many areas of security and intelligence. The use of AI and big data in general, and in the field of intelligence and counterterrorism in particular, has led to intense debates between supporters of the continuation ...
On the Origins of Memes by Means of Fringe Web Communities
September 18, 2023Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of ...
Shifts in the Visual Media Campaigns of AQAP and ISIS After High Death and High Publicity Attacks
September 18, 2023Extreme militant groups use their media campaigns to share information, recruit and radicalize followers, share worldviews, and seek public diplomacy ends. While previous research documents that various on-the-ground events correspond to changes in the groups’ messaging strategies, studies of how competing militant groups influence one another’s media campaigns are nascent. This study helps fill that ...
Halting Boko Haram / Islamic State’s West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies
September 18, 2023Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities in cyberspace. Using routine activity theory, this article assessed the effectiveness of technological approaches to ...
A Comparative Analysis Of Right-wing Radical And Islamist Communities’ Strategies For Survival In Social Networks: Evidence From The Russian Social Network Vkontakte
September 18, 2023This article presents a comparative analysis of online communities of right-wing radicals and Islamists, who are considered to be numerous and dangerous extremist groups in Russian society. The online communities were selected based on the content posted on the largest Russian social networking site VKontakte. The goal of this article is to determine the strategy and ...