Journal Article |
Online Activities and Extremist Attitudes in Adolescence: An Empirical Analysis with a Gender Differentiation
View Abstract
Radicalization research is dedicated to analyzing factors related to radicalization processes, which in turn can lead to extremism. One factor is frequently discussed: the role of the Internet. This paper examines the relationship between active and passive online activities, including consumption, networking, and posting, and extremist attitudes in the field of Islamism and right-wing extremism among adolescents. Data from a school survey (N = 6,715) show that right-wing attitudes are particularly correlated with consumption of political websites, though this effect is weaker among females. However, posting shows only a small effect and networking shows no effect at all. Islamist attitudes, on the other hand, are related to the extent to which one consumes violent Islamist videos, meets other Muslims online, and posts Islamic content.
Die Radikalisierungsforschung untersucht Faktoren und Bedingungen von Prozessen, die hin zu Extremismus führen können. Ein häufig genannter Faktor ist das Internet. Diese Arbeit untersucht den Zusammenhang zwischen verschiedenen passiven und aktiven Internetaktivitäten, wie das Konsumieren, Vernetzen und Posten mit extremistischen Einstellungen im Bereich Islamismus und Rechtsextremismus bei Jugendlichen. Daten einer Schüler*innenbefragung (N = 6,715) zeigen, dass rechtsextreme Einstellungen insbesondere bei Jungen mit dem Konsum politischer Websites einhergehen, während Posting nur geringe und das Netzwerken keine Zusammenhänge mit rechtsextremen Einstellungen zeigen. Bei islamistischen Einstellungen zeigen sich dagegen Zusammenhänge mit dem Konsum von islamistischen Gewaltvideos, dem Vernetzen mit anderen Muslim*innen und dem Posten islamischer Inhalte.
|
2022 |
Goede, L.R., Schröder, C.P., Lehmann, L. and Bliesener, T. |
View
Publisher
|
Journal Article |
The virtual “Caliphate” strikes back? Mapping the Islamic State’s information ecosystem on the surface web
View Abstract
This study maps the surface web information ecosystem exploited by the Islamic State (IS) and its followers between December 2020 and June 2021. Open-source intelligence investigation allowed a massive online presence of Daesh, manifested by hundreds of communication channels, to be detected. Its propaganda dissemination was founded mainly on one “central” Arabic domain, linked to a constellation of auxiliary standalone websites, blogs, encrypted messaging apps, as well as file-sharing and streaming services. Aside from it, the Islamic State utilised other surface web environments, including numerous Internet Archive profiles and a network of communication channels established by Afaaq Electronic Foundation. This study also shows that URLs banned by law enforcement in 2020 and 2021 were usually quickly restored by the IS’s media offices.
|
2022 |
Lakomy, M. |
View
Publisher
|
Journal Article |
Terror Through The Looking Glass Information Orientations And The Lens Of Web Search Engines
View Abstract
Researchers and pundits alike regularly describe terrorism as being a theatrical performance that depends on publicity to build recognition, garner attention and command legitimation. Clearly, the mechanical contours of the information environment matter when it comes to determining the opportunities and challenges for both terrorist and counterterrorist success. This article addresses arguably the most singularly significant intermediary for information access in modern society: web search engines. These information gatekeepers play a crucial role in guiding both government and non-state approaches to terror. That said, these tools are associated with bias and malperformance on a number of fronts. This study examines the degree to which different search engine usage might present a differential view of terrorism to different users. I turn to agent-based digital infrastructure as a basis for studying divergent information experiences with a major terrorist incident, specifically the suicide bombing and subsequent small arms attacks on the Hamid Karzai International Airport in Kabul, Afghanistan on August 26, 2021. The results are striking, confirming that there is substantial and clear variation in the outputs based around a host of factors—variable queries and query styles, information orientations and subsequent personalization, geographic location and, of course, search engine choice.
|
2022 |
Whyte, C. |
View
Publisher
|
VOX-Pol Publication |
Online Extremism and Terrorism Researchers’ Security, Safety, and Resilience: Findings from the Field
View Abstract
VOX-Pol’s new report presents findings from the REASSURE (Researcher, Security, Safety, and Resilience) project’s in-depth interviews with 39 online extremism and terrorism researchers. Based at universities, research institutes, and think tanks in Europe and North America, the interviewees studied mainly, albeit not exclusively, far-right and violent jihadist online activity. The report catalogues for the first time the range of harms they have experienced, the lack of formalised systems of care or training, and their reliance therefore on informal support networks to mitigate those harms.
|
2023 |
Pearson, E., Whittaker, J., Baaken, T., Zeiger, S., Atamuradova, F. and Conway, M. |
View
Publisher
|
Journal Article |
The effects of social media on domestic terrorism
View Abstract
Much qualitative research has drawn an association between social media and domestic terrorism, with the studies reaching different conclusions. However, few empirical studies have evaluated whether the surge in social media participation affects domestic terrorist events. Controlling for common explanations in the literature, we conduct a cross-national, time-series analysis of up to 151 countries from 2000 to 2019 to assess the impact of social media penetration on domestic terrorism. We find that greater social media penetration increases the likelihood of domestic terrorism in countries as it supports extremists’ ability to recruit, mobilize, and train terrorists. Using mediation analysis, we also find that greater social media penetration amplifies online and political polarization, increasing the likelihood of domestic terrorism events. Our work indicates the possible mechanisms linking social media and domestic terrorism and the need to develop and apply appropriate counterterrorism strategies to mitigate terrorist operations.
|
2023 |
Hunter, L.Y., Biglaiser, G., McGauvran, R.J. and Collins, L. |
View
Publisher
|
Chapter |
The Use of Counter Narratives to Combat Violent Extremism Online
View Abstract
Due to recent rises in extremism across the globe (Dean et al. in J Polic Intell Count Terror 11:121–142, 2016; Le Roux in Responding to the rise in violent extremism in the Sahel. Africa Center For Strategic Studies, 2019, p. 26) and (Jones in Int Secur 32:7–40, 2008), governments and law enforcement organisations, such as the police, have looked to new strategies to counter violent extremism (Russell and Theodosiou in Counter-extremism: a decade on from 7/7. Quilliam Foundation, 2015). Specifically, there has been an expanse of the field now widely known as Countering Violent Extremism (CVE). CVE is a highly contested area; however, upon conducting a literature review, Inserra (Revisiting efforts to counter violent extremism: leadership needed. The Heritage Foundation, 2015, p. 2) helpfully reduced the term CVE down to descriptions of interventions intended to “stop individuals from radicalizing”. LaFree and Freilich (Annu Rev Criminol 2:383–404, 2019) distinguish counter-terrorism from CVE, they describe counter-terrorism as military responses (‘hard’) as opposed to non-military responses (‘soft’), referred to as countering violent extremism strategies. This chapter contends that, although counter narratives tend to lack academic standing, there does appear to be a widespread acceptance that narratives influence individuals’ beliefs. Therefore, in the absence of other more effective methods of CVE online, it is argued that counter-narratives (CN) should be used in informed ways by organisations such as the police (Monaghan in Crime Media Cult 18(1):21–39, 2020). This chapter will compare academic understandings of narrative and communication alongside examples of counter narratives issued against them. It will then assess the impact of such strategies and potential alternatives for CN.
|
2023 |
Rees, J. and Montasari, R. |
View
Publisher
|