Social Media
The Impact of the Internet and Social Media Platforms on Radicalisation to Terrorism and Violent Extremism
September 18, 2023This chapter critically discusses the evidence suggesting that the Internet and SMPs affect radicalisation to violent extremism. The chapter specifically focuses on arguments surrounding echo chambers, opportunities for women to remain anonymous and the role of identity construction for the youth. The study also critically discusses the evidence negating the notion that the Internet and ...
The Use of the Internet and the Internet of Things in Modern Terrorism and Violent Extremism
September 18, 2023This chapter will examine the role of the Internet and associated technology such as the Internet of Things (IoT) and cloud computing (CC) in the process of radicalisation to terrorism and violent extremism. Particular emphasis will be placed upon the role of online environments in facilitating communication and the spread of extremist ideology, as opposed ...
The Online Extremist Ecosystem: Its Evolution and a Framework for Separating Extreme from Mainstream
September 18, 2023In this Perspective, the authors introduce a framework for internet users to categorize the virtual platforms they use and to understand the likelihood that they may encounter extreme content online. The authors first provide a landscape of the online extremist “ecosystem,” describing how the proliferation of messaging forums, social media networks, and other virtual community ...
A survey on extremism analysis using natural language processing: definitions, literature review, trends and challenges
September 18, 2023Extremism has grown as a global problem for society in recent years, especially after the apparition of movements such as jihadism. This and other extremist groups have taken advantage of different approaches, such as the use of Social Media, to spread their ideology, promote their acts and recruit followers. The extremist discourse, therefore, is reflected ...
Manipulating Access To Communication Technology: Government Repression or Counterterrorism?
September 18, 2023This report offers a preliminary analysis of the effectiveness of network disruptions in achieving one specific outcome: tackling terrorist violence. It analyses the relationship between network disruptions and deaths and injuries from terrorist attacks to determine whether there is support for the commonly made argument that network disruptions are an important counterterrorism tactic. Using a ...
Regulating terrorist content on social media: automation and the rule of law
September 18, 2023Social-media companies make extensive use of artificial intelligence in their efforts to remove and block terrorist content from their platforms. This paper begins by arguing that, since such efforts amount to an attempt to channel human conduct, they should be regarded as a form of regulation that is subject to rule-of-law principles. The paper then ...
From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries
September 18, 2023This article aims for revisiting the terrorism studies from different perspective. The terror attacks itself cannot be hundred percent zero but it just fluctuated trend. More specifically, terrorism always adaptive in following trends. While terror attacks still to target innocent civilians, the perpetrators could be closest relatives and neighbors. The way terror attack to reach ...
“We are Generation Terror!”: Youth‑on‑youth Radicalisation in Extreme‑right Youth Groups
September 18, 2023Young people – politicised, active and highly connected – are no longer just passive consumers of online terrorist content by adult groomers but are themselves propaganda creators, group organisers, peer recruiters, extremist financers and terrorist convicts. This process, called “youth‑on‑youth radicalisation”, emphasises the agency that young people have in a digital era in which the ...
Linguistic Patterns for Code Word Resilient Hate Speech Identification
September 18, 2023The permanent transition to online activity has brought with it a surge in hate speech discourse. This has prompted increased calls for automatic detection methods, most of which currently rely on a dictionary of hate speech words, and supervised classification. This approach often falls short when dealing with newer words and phrases produced by online ...
For God, for Tsar and for the Nation: Authenticity in the Russian Imperial Movement’s Propaganda
September 18, 2023This paper will examine how extremist organizations manage to present themselves as credible actors in the eyes of potential supporters on social media. This paper will address this question by exploring the role of authenticity in strategic narratives, which is believed to help these groups achieve this purpose. Apart from introducing this new theoretical concept, ...