Participant Recruitment through Social Media: Lessons Learned from a Qualitative Radicalization Study Using Facebook
September 18, 2023
Social media are useful facilitators when recruiting hidden populations for research. In our research on youth and radicalization, we were able to find and contact young people with extreme ideals through Facebook. In this article, we discuss our experiences using Facebook as a tool for finding respondents who do not trust researchers. Facebook helped us ...
Cyberspace, Terrorism and International Law
September 18, 2023
Governments have long worried about terrorists using the Internet to launch cyberattacks, spread propaganda, recruit and radicalise individuals and raise funds. However, the Islamic State’s exploitation of social media has caused a crisis and generated questions about international law’s role in addressing terrorism in cyberspace. This article analyzes international law in connection with potential terrorist ...
Countering Daesh Propaganda: Action-Oriented Research for Practical Policy Outcomes
September 18, 2023
This report contains articles presented at the Countering Daesh Experts Workshop convened by The Carter Center Feb. 22–24, 2016, in Atlanta, Ga. The workshop brought together 21 leading scholars and practitioners from 10 different countries to discuss Daesh recruitment strategies and its use of social media technologies to appeal to alienated youth. In addition to ...
Cheering on the Jihad: An Exploration of Women’s Participation in Online Pro-jihadist Networks
September 18, 2023
With the rise of the Islamic State (IS), a great deal of attention has recently been drawn to two issues that have come to be seen as intricately linked: the role of women within pro-jihadist networks (Lahoud 2014; Hoyle, Bradford and Frenett 2015; Saltman and Smith 2015) and the use of social media as an ...
Cyberhate on Social Media in the aftermath of Woolwich: A Case Study in Computational Criminology and Big Data
September 18, 2023
This paper presents the first criminological analysis of an online social reaction to a crime event of national significance, in particular the detection and propagation of cyberhate on social media following a terrorist attack. We take the Woolwich, London terrorist attack in 2013 as our event of interest and draw on Cohen’s process of warning, ...
Us and them: identifying cyber hate on Twitter across multiple protected characteristics
September 18, 2023
Hateful and antagonistic content published and propagated via the World Wide Web has the potential to cause harm and suffering on an individual basis, and lead to social tension and disorder beyond cyber space. Despite new legislation aimed at prosecuting those who misuse new forms of communication to post threatening, harassing, or grossly offensive language ...
Isis and the Internet
September 18, 2023
Documentary: Isis and The Internet premieres Friday April 1st at 10pm ET on MSNBC. ...
Ten “Rs” of Social Reaction: Using Social Media to Analyse the “Post-Event” Impacts of the Murder of Lee Rigby
September 18, 2023
This article provides a case study analysis of social reactions to the murder of Fusilier Lee Rigby in 2013. Informed by empirical data collected by systematic monitoring of social media platforms, the analysis identifies a number of online behaviours with offline effects—labeled the ten “Rs”—that collectively constitute the process of social reaction to the crime. ...
Video Games, Terrorism, and ISIS’s Jihad 3.0
September 18, 2023
This study discusses different media strategies followed by the Islamic State in Iraq and Syria (ISIS). In particular, the study attempts to understand the way ISIS’s video game that is called “Salil al-Sawarem” (The Clanging of the Swords) has been received by the online Arab public. The article argues that the goal behind making and ...
Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-Betweens
September 18, 2023
The Syria conflict has been described as the most socially mediated in history, with online social media playing a particularly important role. At the same time, the everchanging landscape of the conflict leads to difficulties in applying analytical approaches taken by other studies of online political activism. Therefore, in this paper, we use an approach ...