Journal Article |
Social media and radicalisation of university students in Bangladesh
View Abstract
While there is growing research on radicalisation and its countermeasures, in the context of Bangladesh, there is a paucity of academic studies on the role of social media in the radicalisation of university students. This research addresses the gap by using survey data to examine the online behaviour and social media use of the university-going youth in Bangladesh. The study finds that there is very little distinction between accurate Islamic theological understandings and radical interpretations of Islam among university-going youth, and there is a proliferation of social media content that tell tales of subjugation of Muslims since the inception of Islam. Many (geopolitical) conflicts are seen by the youth as a continuation of the narrative of Western imperialism. The research identifies the core of the dissonance and argues that the idea of Muslim subjugation stems from sociocultural influences and is exacerbated by social media use.
|
2020 |
Amit, S., Rahman, I. and Mannan, S. |
View
Publisher
|
Journal Article |
Social Media and Radicalization: An Affordance Approach for Cross-Platform Comparison
View Abstract
To accentuate which platform characteristics particularly foster radicalization and extremist dynamics, this contribution investigates the affordances of social media as delineated in contemporary literature, conducting a platform comparison encompassing Telegram, WhatsApp, and X (formerly Twitter). Based on a scoping review, 17 affordances identified from studies researching radicalization dynamics on social media were extracted and categorized. The most frequently mentioned affordances—anonymity, visibility, and collectivity—were then further analyzed concerning their contribution to radicalization and the radicalization potential of these specific platforms. The platform-comparative affordance discussion shows that, although, in principle each of the three compared platforms can foster an environment conducive to radicalization depending on user intention and usage context, the specific characteristics of each platform necessitate a nuanced consideration. On one hand, it is imperative to discern affordances differentially along various dimensions when assessing their implications (e.g., internal vs. external visibility). On the other hand, it is beneficial to consider which affordances emerge from the actualization of other affordances. For instance, collectivity can result from the interplay of several affordances, such as interactivity and anonymity, and can be referred to as a meta-affordance. Furthermore, the analysis shows that platform branding and self-presentation not only affect platform architecture and affordances but also shape users’ perceptions of the platform, thereby influencing the actualization of affordances. This was particularly noted in the literature for Telegram and increasingly for X. Specific assertions, nevertheless, are hindered by the conceptual diffusion of the affordance approach and a lack of empirical analyses directly and systematically examining platform affordances in conjunction with radicalization dynamics.
|
2024 |
Schulze, H., Greipl, S., Hohner, J. and Rieger, D. |
View
Publisher
|
Chapter |
Social Media and Situation Awareness during Terrorist Attacks: Recommendations for Crisis Communication
View Abstract
This chapter summarises the findings of a case study on social media activity during the 22 July 2011 terrorist attacks in Norway. Based on these findings and on theories and previous research on the role of social media in situation awareness (SA) configuration during crisis situations, the chapter offers seven recommendations for key communicators in official crisis management and response institutions, journalistic institutions, NGOs and others: (1) acknowledge social media as important and master monitoring and management of features across social media; (2) synchronise communication and establish a standard operating procedure (SOP); (3) establish and make known a joint social media emergency account; (4) participate, interact and take the lead; (5) be aware of non-hashtagged content; (6) implement verification tools and practices and (7) engage with and learn from celebrities. Book edited by Harald Hornmoen and Klas Backholm
|
2018 |
Steensen S., Frey E., Hornmoen H., Ottosen R., Konow-Lund T. M., |
View
Publisher
|
Journal Article |
Social media and terrorism discourse: the Islamic State’s (IS) social media discursive content and practices
View Abstract
The paper maintains the complementary nature of technological practice and discursive content in the process of meaning-making in digital jihadist discourse. The study shows that digital practices of strategic sharing, distribution and campaigns to re-upload textual materials are made possible by exploiting SMC communicative affordances. As for the analysis of discursive content, the paper focuses on YouTube and highlights strategic patterns and covert references in an IS-produced flagship video. It illustrates how IS discourse constructs its envisaged in-group/outgroup by (re-)symbolising current events within historical, political and ideological conflict scenarios, i.e. the incessant resistance and legitimacy of forces of virtue vs evil. By foregrounding symbolic references to military outgroup actors, IS legitimises its own violence and projects a powerful self-identity against a (perceived) global hegemony. The paper shows how the combination of a technologically savvy operation and a resistant, anti-hegemonic narrative, embedded in a strategically framed symbolism of Islam, may resonate with global (quasi)-diasporic digital consumers.
|
2020 |
KhosraviNik, M. and Amer, M. |
View
Publisher
|
Chapter |
Social Media and Terrorist Financing
View Abstract
Social media and terrorist financing (SMTF) refers to how terror organisations (TO), sometimes called violent extremist organisations (VEOs), have exploited free social media platforms to raise money for terrorism/fighting/jihad, to recruit, train, equip, and transport fighters, to support extremist religious proto-states (e.g., Islamic State of Iraq and Syria [ISIS]), to market/brand an organisation including to disseminate its ideologies, and/or to amass wealth. This chapter considers the scope of SMTF and legal/policy responses to its ever-evolving practices, discusses how it is practised and by whom, and considers the challenges of fighting SMTF. SMTF is part of the larger concept of cyberterrorism where terrorists target computer systems maliciously and use digital technology to facilitate terror attacks, though some argue that these two actions are completely different phenomena. The chapter concludes by summarising the key points of the discussion, offering suggestions for future study of this phenomenon, and reflecting on the societal impacts of SMTF.
|
2024 |
Alley-Young, G. |
View
Publisher
|
Report |
Social Media and Terrorist Financing: What are the Vulnerabilities and How Could Public and Private Sectors Collaborate Better?
View Abstract
• Social media companies should recognise the political importance of counterterrorist financing (CTF) by explicitly reflecting the priorities of the UN Security Council and the Financial Action Task Force (FATF) in their policies, strategies and transparency reports.
• Furthermore, social media companies identified as being at high risk of exploitation should update their terms of service and community standards to explicitly reference and outlaw terrorist financing (consistent with universally applicable international law and standards such as those of the FATF) and actions that contravene related UN Security Council resolutions and sanctions.
• Social media companies should clearly demonstrate that they understand and apply appropriate sanctions designations; at the same time, policymakers should ensure that sanctions designations include, where possible, information such as email addresses, IP addresses and social media handles that can support sanctions implementation by social media companies. The more granular the information provided by governments on designated entities, the more efficiently the private sector can comply with sanctions designations.
• Social media companies should more tightly control functionality to ensure that raising terrorist funding through social media videos, such as big-brand advertising and Super Chat payments, is disabled.
• Researchers and policymakers should avoid generalisations and make a clear distinction between forms of social media and the various terrorist-financing vulnerabilities that they pose, recognising the different types of platforms available, and the varied ways in which terrorist financiers could abuse them.
• Policymakers should encourage both inter-agency and cross-border collaboration on the threat of using social media for terrorist financing, ensuring that agencies involved are equipped with necessary social media investigative capabilities.
• International law enforcement agencies such as Interpol and Europol should facilitate the development of new investigation and prosecution standard operating procedures for engaging with operators of servers and cloud services based in overseas jurisdictions to ensure that necessary evidence can be gathered in a timely fashion. This would also encourage an internationally harmonised approach to using social media as financial intelligence.
• Policymakers should encourage the building of new, and leveraging of existing, public–private partnerships to ensure social media company CTF efforts are informed and effective.
|
2019 |
Keatinge, T. and Keen, F. |
View
Publisher
|