Report |
Hate Crime and Bullying in the Age of Social Media
View Abstract
The All Wales Hate Crime Project (Williams & Tregidga 2013, 2014)
highlighted the emerging problem of cyberhate and cyber bulling via social media
through interviews with victims. Opportunities for online engagement have
increased exponentially over the past two decades. In 1999 only 10 per cent of UK
households had access to the Internet. The number had grown to 53 percent in
2005 and to 85 per cent in 2015 (ONS 2015). Estimates put global social media
membership at approximately 2.5 billion non-unique users, with Facebook, Google+
and Twitter accounting for over half of these (Sloan et al. 2015, 2015, Williams et al.
2016). Open and widely accessible social media technologies, such as Twitter and
Facebook, are increasingly being used by citizens on a global scale to publish online
content. The diffusion of information in these networks can manifest itself in a
number of ways, ranging from the positive, such as support of social resilience
through calls for assistance and advice (Morell et al. 2011), to the negative, through
the production and contagion of misinformation and antagonistic and prejudiced
commentary (Burnap et al. 2013, 2014, Williams et al. 2013).
Hate Crime and its commission online is now recognised as a priority by the
UK Government. The sending of menacing messages via the Internet is now
punishable by up to 2 years imprisonment (Malicious Communications Act 1998 as
amended by the Criminal Justice and Courts Bill 2015). The Welsh Government
continues to implement ‘Tackling Hate Crimes and Incidents: A Framework for
Action’ and the fast paced evolution of social media is providing significant
challenges for partners and agencies. Despite this recognition, practitioners can
remain in the dark about the nature, prevalence and resources available to tackle
cyberhate and bulling on social media.
This conference aimed to address this knowledge gap via a series of keynote
presentations from high-profile leaders in the field and via hands on workshops.
This report outlines conference attendee experiences in relation to the current barriers and potential solutions in the area of cyberhate and cyber bullying and puts
forward national recommendations.
|
2016 |
Williams, M. and Pearson, O. |
View
Publisher
|
Journal |
Cyberhate on Social Media in the aftermath of Woolwich: A Case Study in Computational Criminology and Big Data
View Abstract
This paper presents the first criminological analysis of an online social reaction to a crime event of national significance, in particular the detection and propagation of cyberhate on social media following a terrorist attack. We take the Woolwich, London terrorist attack in 2013 as our event of interest and draw on Cohen’s process of warning, impact, inventory and reaction to delineate a sequence of incidents that come to constitute a series of deviant responses following the attack. This paper adds to contemporary debates in criminology and the study of hate crime in three ways: (1) it provides the first analysis of the escalation, duration, diffusion and de-escalation of cyberhate in social media following a terrorist event; (2) it applies Cohen’s work on action, reaction and amplification and the role of the traditional media to the online context and (3) it introduces and provides a case study in ‘computational criminology’.
|
2016 |
Williams, M.L. and Burnap, P. |
View
Publisher
|
Journal Article |
Hate in the Machine: Anti-Black and Anti-Muslim Social Media Posts as Predictors of Offline Racially and Religiously Aggravated Crime
View Abstract
National governments now recognize online hate speech as a pernicious social problem. In the wake of political votes and terror attacks, hate incidents online and offline are known to peak in tandem. This article examines whether an association exists between both forms of hate, independent of ‘trigger’ events. Using Computational Criminology that draws on data science methods, we link police crime, census and Twitter data to establish a temporal and spatial association between online hate speech that targets race and religion, and offline racially and religiously aggravated crimes in London over an eight-month period. The findings renew our understanding of hate crime as a process, rather than as a discrete event, for the digital age.
|
2020 |
Williams, M.L., Burnap, P., Javed, A., Liu, H. and Ozalp, S. |
View
Publisher
|
Journal |
Fractured Narratives And Popup Diaspora
View Abstract
The problem of terrorism is both an immediate threat and a long-term issue of safety
and social cohesion, locally and globally. An immediate threat requires relatively
straightforward interventions. Our public debates seem to be focusing too much on “fire-
fighting” crisis management, and congratulating ourselves on instant emotional displays
of solidarity, without paying enough attention to the substantial challenges of developing
a broader social consensus, and a culture of mutual respect. More specifically, we need to
find new ways to understand how local and global issues intersect, and why the global
hegemony of one or two superpowers no longer seems to deliver stability and security
(even for themselves). This is particularly true in a world where national borders have
less and less relevance for the homogeneity of populations, cultures or values, and where
whole communities, for instance, continue practices with impunity which are completely
unacceptable to others – as well as being illegal, e.g. female genital mutilation. This
paper explores some key theoretical issues which might help us to understand some of the
underlying longer-term issues: the articulation of identity, culture, and power, and impact
of micro-practices on global cohesion and security. The new globally connected social
media have a central role to play in this analysis.
|
2015 |
Williams, R. |
View
Publisher
|
Journal Article |
How does language influence the radicalisation process? A systematic review of research exploring online extremist communication and discussion
View Abstract
Contemporary research has highlighted the steady rise of individuals becoming radicalised via exposure to extremist discussion on the internet, with the ease of communication with other users that the internet provides playing a major role in the radicalisation process of these individuals. The aim of the present systematic review was to explore recent research into the utilisation of language in extremist cyberspaces and how it may influence the radicalisation process. The findings suggest that there are five prominent linguistical behaviours adopted by extremists online: Algorithmic, Conflict, Hate, Positive, and Recruitment. The results demonstrate that the main purpose of extremist language online is to shape the perceptions of users to see their associated group in positive regard, while simultaneously negatively framing outgroup opposition. This is then followed by encouraging conflict against the promoted ideologies’ perceived enemies. Limitations, future research, and implications are discussed in detail.
|
2022 |
Williams, T.J.V. and Tzani, C. |
View
Publisher
|
Journal Article |
The 60 Days of PVE Campaign: Lessons on Organizing an Online, Peer-to-Peer, Counter-radicalization Program
View Abstract
Combatting violent extremism can involve organizing Peer-to-Peer (P2P)
preventing violent extremism (PVE) programs and social media campaigns. While
hundreds of PVE campaigns have been launched around the world in recent
months and years, very few of these campaigns have actually been reviewed,
analyzed, or assessed in any systematic way. Metrics of success and failure have
yet to be fully developed, and very little is publically known as to what might
differentiate a great and successful P2P campaign from a mediocre one. This
article will provide first-hand insight on orchestrating a publically funded,
university-based, online, peer-to-peer PVE campaign – 60 Days of PVE – based
on the experience of a group of Canadian graduate students. The article provides
an account of the group’s approach to PVE. It highlights the entirety of the
group’s campaign, from theory and conceptualization to branding, media strategy,
and evaluation, and describes the campaign’s core objectives and implementation.
The article also analyzes the campaign’s digital footprint and reach using data
gleamed from social media. Finally, the article discusses the challenges and
difficulties the group faced in running their campaign, lessons that are pertinent
for others contemplating a similar endeavour.
|
2017 |
Wilner, A., and Rigato, B. |
View
Publisher
|