Network Analysis
An Analysis of Interactions Within and Between Extreme Right Communities in Social Media
September 18, 2023Many extreme right groups have had an online presence for some time through the use of dedicated websites. This has been accompanied by increased activity in social media websites in recent years, which may enable the dissemination of extreme right content to a wider audience. In this paper, we present exploratory analysis of the activity ...
Countering the Appeal of Extremism Online
September 18, 2023This Policy Briefing was commissioned by the Danish government and addresses various methods for tackling online extremism. It draws on discussions which took place at a Policy Planners Network (PPN) meeting held with a range of relevant stakeholders that took place in Copenhagen in June 2013. ...
Radicalization: The Role of the Internet
September 18, 2023This paper provides a broad summary of our current understanding of the role of the Internet in relation to extremist and terrorist networks. It covers the role of the Internet in radicalisation; the use of new technologies by extremists looking to organize and/or use violence, whether in a group or alone (including how this is ...
Detecting Linguistic Markers for Radical Violence in Social Media
September 18, 2023Lone-wolf terrorism is a threat to the security of modern society, as was tragically shown in Norway on July 22, 2011, when Anders Behring Breivik carried out two terrorist attacks that resulted in a total of 77 deaths. Since lone wolves are acting on their own, information about them cannot be collected using traditional police ...
Examining ISIS Support and Opposition Networks on Twitter
September 18, 2023The Islamic State in Iraq and Syria (ISIS), like no other terrorist organization before, has used Twitter and other social media channels to broadcast its message, inspire followers, and recruit new fighters. Though much less heralded, ISIS opponents have also taken to Twitter to castigate the ISIS message. This report draws on publicly available Twitter ...
Uncovering the Wider Structure of Extreme Right Communities Spanning Popular Online Networks
September 18, 2023Recent years have seen increased interest in the online presence of extreme right groups. Although originally composed of dedicated websites, the online extreme right milieu now spans multiple networks, including popular social media platforms such as Twitter, Facebook and YouTube. Ideally therefore, any contemporary analysis of online extreme right activity requires the consideration of multiple ...
Mining Communities and Their Relationships in Blogs: A Study of Online Hate Groups
September 18, 2023Blogs, often treated as the equivalence of online personal diaries, have become one of the fastest growing types of Web-based media. Everyone is free to express their opinions and emotions very easily through blogs. In the blogosphere, many communities have emerged, which include hate groups and racists that are trying to share their ideology, express ...
New Approaches to the Analysis of Jihadism: Online and Offline
September 18, 2023This volume is a result of a research project at the University of Vienna (Austria). The project “Jihadism online” aims at a multi-dimensional analysis of online presence of the transnational tendency often called Jihadism. ...
Developing an Explanatory Model for the Process of Online Radicalisation and Terrorism
September 18, 2023While the use of the internet and social media as a tool for extremists and terrorists has been well documented, understanding the mechanisms at work has been much more elusive. This paper begins with a grounded theory approach guided by a new theoretical approach to power that utilises both terrorism cases and extremist social media ...
Network Technologies for Networked Terrorists: Assessing the Value of Information and Communication Technologies to Modern Terrorist Organizations
September 18, 2023This report analyzes terrorist groups’ use of advanced information and communication technologies in efforts to plan, coordinate, and command their operations. It is one component of a larger study that examines terrorists’ use of technology, a critical arena in the war against terrorism. The goal of the investigation reported here is to identify which network ...