Youth and Violent Extremism on Social Media: Mapping the Research
September 18, 2023
Does social media lead vulnerable individuals to resort to violence? Many people believe it does. And they respond with online censorship, surveillance and counter-speech. But what do we really know about the Internet as a cause, and what do we know about the impact of these reactions? All over the world, governments and Internet companies ...
Tackling Illegal Content Online
September 18, 2023
Today, the Commission presents guidelines and principles to increase the proactive prevention, detection and removal of illegal content inciting hatred, violence and terrorism online. The increasing availability and spreading of terrorist material and content that incites violence and hatred online is a serious threat to the security and safety of EU citizens. ...
Violence and Political Myth: Radicalizing Believers in the Pages of Inspire Magazine
September 18, 2023
Violent Jihadist movements have increasingly produced online English language magazines in order to encourage young Muslims into terrorism. This article argues that sociological approaches to the study of these magazines should engage with theories of political myth, understood as the collective “work” on dramatic and figurative narratives which provide significance to the political conditions of ...
Fishermen or Swarm Dynamics? Should we Understand Jihadist Online-Radicalization as a Top-Down or Bottom-Up Process?
September 18, 2023
The internet has profoundly changed the way we communicate, including how jihadist groups seek to reach Western audiences with their propaganda strategies. Cases of believed online-radicalization call for a re-evaluation of radicalization processes, previously thought to depend on face-to-face interactions. Based on the Hoffman-Sageman debate on whether top-down or bottom-up processes drive terrorism, this essay ...
Statistical Analysis of Risk Assessment Factors and Metrics to Evaluate Radicalisation in Twitter
September 18, 2023
Nowadays, Social Networks have become an essential communication tools producing a large amount of information about their users and their interactions, which can be analysed with Data Mining methods. In the last years, Social Networks are being used to radicalise people. In this paper, we study the performance of a set of indicators and their ...
Toward a Framework Understanding of Online Programs for Countering Violent Extremism
September 18, 2023
There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means by which to address the effects of these narratives. Countering violent extremism (CVE) is a broad umbrella phrase that covers a wide array of approaches that ...
“To My Brothers in the West . . .”: A Thematic Analysis of Videos Produced by the Islamic State’s al-Hayat Media Center
September 18, 2023
This study examines videos produced by the al-Hayat Media Center, a branch of the Islamic State’s (IS) larger media campaign aimed more specifically at Western audiences. Using a thematic analysis approach, recurring themes of 10 al-Hayat videos were identified with conclusions made regarding the specificities of the message and the target audience. It was found ...
The Evolution of Online Extremism in Malaysia
September 18, 2023
The apocalyptic narrative of the Syrian civil war promoted by the Islamic State (IS) terrorist group in 2014 had galvanised around a hundred radicals in Malaysia who subsequently migrated to Iraq and Syria. At least forty-five of them propagated their jihadist cause online resulting in the mushrooming of online extremism in the country. The growth ...
Countering and Understanding Terrorism, Extremism, and Radicalisation in a Big Data Age
September 18, 2023
Anno Bunnik explores the ramifications of Big Data for countering terrorism, extremism, and radicalisation. With the recent rise of jihadists and other extremists groups in the Middle East and Europe, how do state agencies respond through the use of Big Data? This chapter critically engages with questions such as the extent to which Big Data ...
A Blueprint for Bypassing Extremism
September 18, 2023
The Redirect Method​ uses Adwords targeting tools and curated YouTube videos uploaded by people all around the world to confront online radicalization. It focuses on the slice of ISIS’ audience that is most susceptible to its messaging, and redirects them towards curated YouTube videos debunking ISIS recruiting themes. This open methodology was developed from interviews ...