“Talk About Terror in Our Back Gardens”: an Analysis of Online Comments about British Foreign Fighters in Syria
September 18, 2023
The phenomenon of foreign fighters has become a central issue to the ongoing conflict in Syria. This article explores how members of the public answer the question ‘Why do British citizens join the conflict in Syria’ on social media sites and in response to online news articles. Building upon research on everyday narratives of security ...
Interpreting Text and Image Relations in Violent Extremist Discourse: A Mixed Methods Approach for Big Data Analytics
September 18, 2023
This article presents a mixed methods approach for analysing text and image relations in violent extremist discourse. The approach involves integrating multimodal discourse analysis with data mining and information visualisation, resulting in theoretically informed empirical techniques for automated analysis of text and image relations in large datasets. The approach is illustrated by a study which ...
Terror Won’t Kill the Privacy Star – Tackling Terrorism Propaganda Online in a Data Protection Compliant Manner
September 18, 2023
Reacting to a series of terrorist attacks, the European Union has tasked Europol to establish an Internet Referral Unit (EU IRU) to counter terrorist propaganda. The political statement entailed a clear commitment to fundamental rights including data protection. This paper analyses the present and future applicable legal bases and elaborates on challenges connected to the ...
Understanding Online Radicalisation Using Data Science
September 18, 2023
What characterises social media radicals? And why some people become attracted to radicalisation? To explore answers to these questions, a number of tweets posted by a group of suspected radicals tweeting in Arabic were analysed using social network analysis and machine learning. The study revealed that these suspected radicals’ networks showed significant interaction with others; ...
Virtual Jihadist Media: Function, Legitimacy, and Radicalising Efficacy.
September 18, 2023
Within the last 10 years, the internet has become the principal platform for the dissemination and mediation of the culture and ideology of jihadism. The exponential growth of jihadist fora, with their increasingly ‘high-end’ production values, sophisticated critiques of prevailing narratives and ostensive attempts at impartiality, do not occur in a vacuum. To a great ...
Terrorist Migration to the Dark Web
September 18, 2023
The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. The deepest layers of the Deep Web, a segment known as the Dark Web, contain content that has been intentionally concealed including illegal and anti-social information. The ...
Cyberhate on Social Media in the aftermath of Woolwich: A Case Study in Computational Criminology and Big Data
September 18, 2023
This paper presents the first criminological analysis of an online social reaction to a crime event of national significance, in particular the detection and propagation of cyberhate on social media following a terrorist attack. We take the Woolwich, London terrorist attack in 2013 as our event of interest and draw on Cohen’s process of warning, ...
Us and them: identifying cyber hate on Twitter across multiple protected characteristics
September 18, 2023
Hateful and antagonistic content published and propagated via the World Wide Web has the potential to cause harm and suffering on an individual basis, and lead to social tension and disorder beyond cyber space. Despite new legislation aimed at prosecuting those who misuse new forms of communication to post threatening, harassing, or grossly offensive language ...
Utilization of Cyberspace by Terrorist Groups and the Applicability of the Malaysian Law on Terrorism
September 18, 2023
It is an obvious and undeniable fact, that the cyberspace is become a powerful method which is increasingly and quickly utilized by terrorist organizations to achieve their gruesome and nefarious goals by hitting innocent individuals. This paper has conducted a critical and comprehensive study on the literature review aiming to answer several inquiries about utilization ...
Ten “Rs” of Social Reaction: Using Social Media to Analyse the “Post-Event” Impacts of the Murder of Lee Rigby
September 18, 2023
This article provides a case study analysis of social reactions to the murder of Fusilier Lee Rigby in 2013. Informed by empirical data collected by systematic monitoring of social media platforms, the analysis identifies a number of online behaviours with offline effects—labeled the ten “Rs”—that collectively constitute the process of social reaction to the crime. ...