Social Media
Borderless World, Boundless Threat: Online Jihadists and Modern Terrorism
September 18, 2023This study profiles 20 recent cases of online jihadists who have made the transition to real-world terrorism along a number of characteristics: age, ethnicity, immigration status, education, religious upbringing, socio-economic class, openness about beliefs, suicidal tendencies, rhetoric focus, location, target, terrorist action, offline and online activity, and social isolation or the presence of an identity ...
Beyond The “Big Three”: Alternative Platforms For Online Hate Speech
September 18, 2023In recent years, most international studies on hate speech online have focused on the three platforms traditionally considered the most influential: Facebook, YouTube and Twitter. However, their predominance as the biggest international social networks is no longer uncontested. Other networks are on the rise and young users especially lose interest in the ‘old’ platforms. In ...
Do Internet Searches for Islamist Propaganda Precede or Follow Islamist Terrorist Attacks?
September 18, 2023Using a Vector-Autoregressive (VAR) model, this paper analyzes the relationship between Islamist terrorist attacks and Internet searches for the phrases such as “join Jihad” or “join ISIS.” It was found that Internet searches for “join Jihad” and “taghut” (Arabic word meaning “to rebel”) preceded the Islamist terrorist attacks by three weeks over the period January ...
Report of the Special Rapporteur on contemporary forms of racism, racial discrimination, xenophobia and related intolerance
September 18, 2023The unprecedented, rapid development of new communication and information technologies, such as the Internet and social media, has enabled wider dissemination of racist and xenophobic content that incites racial hatred and violence. In response, States, international and regional organizations, civil society and the private sector have undertaken a variety of legal and policy initiatives. In ...
Platform Surveillance
September 18, 2023This special responsive issue on “Platform Surveillance” critically assesses the surveillance dimensions and politics of large-scale digital platforms. The issue includes an editorial introduction to the topic and its implications, dozens of articles on specific platforms or platform trends, three book reviews of Shoshana Zuboff’s The Age of Surveillance Capitalism, and an interview with Zuboff ...
On the Origins of Memes by Means of Fringe Web Communities
September 18, 2023Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of ...
Feature extraction and selection for automatic hate speech detection on Twitter
September 18, 2023In recent decades, information technology went through an explosive evolution, revolutionizing the way communication takes place, on the one hand enabling the rapid, easy and almost costless digital interaction, but, on the other, easing the adoption of more aggressive communication styles. It is crucial to regulate and attenuate these behaviors, especially in the digital context, ...
Techniques for analyzing digital environments from a security perspective
September 18, 2023The development of the Internet and social media has exploded in the last couple of years. Digital environments such as social media and discussion forums provide an effective method of communication and are used by various groups in our societies. For example, violent extremist groups use social media platforms for recruiting, training, and communicating with ...
Halting Boko Haram / Islamic State’s West Africa Province Propaganda In Cyberspace With Cybersecurity Technologies
September 18, 2023Terrorists use cyberspace and social media technology to create fear and spread violent ideologies, which pose a significant threat to public security. Researchers have documented the importance of the application of law and regulation in dealing with the criminal activities in cyberspace. Using routine activity theory, this article assessed the effectiveness of technological approaches to ...
A Comparative Analysis Of Right-wing Radical And Islamist Communities’ Strategies For Survival In Social Networks: Evidence From The Russian Social Network Vkontakte
September 18, 2023This article presents a comparative analysis of online communities of right-wing radicals and Islamists, who are considered to be numerous and dangerous extremist groups in Russian society. The online communities were selected based on the content posted on the largest Russian social networking site VKontakte. The goal of this article is to determine the strategy and ...