Journal Article |
Mobilization and Radicalization Through Persuasion: Manipulative Techniques in ISIS’ Propaganda
View Abstract
This paper explores the recent findings of some empirical research concerning Islamic State of Iraq and al-Sham’s (ISIS’) communication and tries to synthesize them under the theoretical frame of propaganda’s concept and practices. Many authors demonstrated how ISIS propaganda campaigns, in particular those deployed on cyberspace, proved to be effective in recruiting new members in both western and Muslim countries. However, while most of the researches focused on ISIS’s communication contents and narratives, few works considered other methods and techniques used for actually delivering them. This is a regrettable missing point given the fact that communication’s and neurosciences’ studies demonstrate that not only what is communicated but also the techniques adopted bear important consequences on the receiver’s perceptions and behavior. Therefore, this article analyzes in particular the findings of researches carried out by communication scholars, social psychologists, and neuro-cognitive scientists on ISIS’ persuasive communication techniques and demonstrates their importance for security studies’ analysis of ISIS’ propaganda. It argues that ISIS’ success in mobilizing people and make them prone to violent action relies on—among other factors—its knowledge and exploitation of sophisticated methods of perceptions’ manipulation and behavior’s influence. This, in turn, demonstrates ISIS’ possession of state-like soft power capabilities effectively deployed in propaganda campaigns and therefore calls for a more complex understanding of its agency.
|
2018 |
Rocca, N.M. |
View
Publisher
|
Journal Article |
Mobilizing against Islam on social media: hyperlink networking among European far-right extra-parliamentary Facebook groups
View Abstract
The far right is notoriously effective in its use of digital media to mobilize people and to build a sense of collective identity around oppositional cultures. Yet, while research has begun to explore far-right groups’ social media hyperlinking activities, relatively little is known about the purposes and communicative functions of this form of communication. By combining social network analysis and qualitative content analysis on Facebook data obtained from 17 PEGIDA and Generation Identity Facebook pages in the period around the so-called ‘refugee crisis’ (2015–2017), this exploratory study investigates the linked source types and their purposes. We find that the groups predominantly link to mainstream media, far-right media and far-right non-institutional groups. While there are great overlaps in the communicative functions and purposes of the links for the two networks, the PEGIDA groups mainly focus on the promotion of political issues, especially around the opposition to third-country (Muslim) immigration, while the GI groups use them for self-promotional purposes. These differences are largely explainable by the groups’ adverse (online) mobilization aims.
|
2022 |
Törnberg, A. and Nissen, A. |
View
Publisher
|
Journal Article |
Mobilizing extremism online: comparing Australian and Canadian right-wing extremist groups on Facebook
View Abstract
Right-wing extremist groups harness popular social media platforms to accrue and mobilize followers. In recent years, researchers have examined the various themes and narratives espoused by extremist groups in the United States and Europe, and how these themes and narratives are employed to mobilize their followings on social media. Little, however, is comparatively known about how such efforts unfold within and between right-wing extremist groups in Australia and Canada. In this study, we conducted a cross-national comparative analysis of over eight years of online content found on 59 Australian and Canadian right-wing group pages on Facebook. Here we assessed the level of active and passive user engagement with posts and identified certain themes and narratives that generated the most user engagement. Overall, a number of ideological and behavioral commonalities and differences emerged in regard to patterns of active and passive user engagement, and the character of three prevailing themes: methods of violence, and references to national and racial identities. The results highlight the influence of both the national and transnational context in negotiating which themes and narratives resonate with Australian and Canadian right-wing online communities, and the multi-dimensional nature of right-wing user engagement and social mobilization on social media.
|
2021 |
Hutchinson, J., Amarasingam, A., Scrivens, R. and Ballsun-Stanton, B. |
View
Publisher
|
Journal Article |
Modeling Islamist Extremist Communications on Social Media using Contextual Dimensions: Religion, Ideology, and Hate
View Abstract
Terror attacks have been linked in part to online extremist content. Although tens of thousands of Islamist extremism supporters consume such content, they are a small fraction relative to peaceful Muslims. The efforts to contain the ever-evolving extremism on social media platforms have remained inadequate and mostly ineffective. Divergent extremist and mainstream contexts challenge machine interpretation, with a particular threat to the precision of classification algorithms. Our context-aware computational approach to the analysis of extremist content on Twitter breaks down this persuasion process into building blocks that acknowledge inherent ambiguity and sparsity that likely challenge both manual and automated classification. We model this process using a combination of three contextual dimensions — religion, ideology, and hate — each elucidating a degree of radicalization and highlighting independent features to render them computationally accessible. We utilize domain-specific knowledge resources for each of these contextual dimensions such as Qur’an for religion, the books of extremist ideologues and preachers for political ideology and a social media hate speech corpus for hate. Our study makes three contributions to reliable analysis: (i) Development of a computational approach rooted in the contextual dimensions of religion, ideology, and hate that reflects strategies employed by online Islamist extremist groups, (ii) An in-depth analysis of relevant tweet datasets with respect to these dimensions to exclude likely mislabeled users, and (iii) A framework for understanding online radicalization as a process to assist counter-programming. Given the potentially significant social impact, we evaluate the performance of our algorithms to minimize mislabeling, where our approach outperforms a competitive baseline by 10.2% in precision.
|
2019 |
Kursuncu, U., Gaur, M., Castillo, C., Alambo, A. Thirunarayan, K., Shalin, V., Achilov, D., Budak Arpinar, I. and Sheth, A. |
View
Publisher
|
Journal Article |
Moderating borderline content while respecting fundamental values
View Abstract
As efforts to identify and remove online terrorist and violent extremist content have intensified, concern has also grown about so‐called lawful but awful content. Various options have been touted for reducing the visibility of this borderline content, including removing it from search and recommendation algorithms, downranking it and redirecting those who search for it. This article contributes to this discussion by considering the moderation of such content, in terms of three sets of values. First, definitional clarity. This is necessary to provide users with fair warning of what content is liable to moderation and to place limits on the discretion of content moderators. Yet, at present, definitions of borderline content are vague and imprecise. Second, necessity and proportionality. While downranking and removal from search and recommender algorithms should be distinguished from deplatforming, tech companies’ efforts to deamplify borderline content give rise to many of the same concerns as content removal and account shutdowns. Third, transparency. While a number of platforms now publish their content moderation policies and transparency data reports, these largely focus on violative, not borderline content. Moreover, there remain questions around access to data for independent researchers and transparency at the level of the individual user.
|
2023 |
Macdonald, S. and Vaughan, K. |
View
Publisher
|
Report |
MODERATING EXTREMISM: THE STATE OF ONLINE TERRORIST CONTENT REMOVAL POLICY IN THE UNITED STATES
View Abstract
By reviewing studies of how today’s terrorist and extremist groups operate on social media in conjunction with an overview of U.S. government regulation of terrorist content online, this report finds that stricter U.S. regulation of social media providers may not be the most effective method of combating online terrorist and extremist content.
|
2021 |
Clifford, B. |
View
Publisher
|