Journal Article |
A Longitudinal Measurement Study of 4chan’s Politically Incorrect Forum and its Effect on the Web
View Abstract
Although it has been a part of the dark underbelly of the Internet since its inception, recent events have brought the discussion board site 4chan to the forefront of the world’s collective mind. In particular, /pol/, 4chan’s “Politically Incorrect” board has become a central figure in the outlandish 2016 Presidential election. Even though 4chan has long been viewed as the “final boss of the Internet,” it remains relatively unstudied in the academic literature. In this paper we analyze /pol/ along several axes using a dataset of over 8M posts. We first perform a general characterization that reveals how active posters are, as well as how some unique features of 4chan affect the flow of discussion. We then analyze the content posted to /pol/ with a focus on determining topics of interest and types of media shared, as well as the usage of hate speech and differences in poster demographics. We additionally provide quantitative evidence of /pol/’s collective attacks on other social media platforms. We perform a quantitative case study of /pol/’s attempt to poison anti-trolling machine learning technology by altering the
language of hate on social media. Then, via analysis of comments from the 10s of thousands of YouTube videos linked on /pol/, we provide a mechanism for detecting attacks from /pol/ threads on 3rd party social media services.
|
2016 |
Hine, G.E., Onaolapo, J., De Cristofaro, E., Kourtellis, N., Leontadis, I., Samaras, R., Stringhini, G. and Blackburn, J. |
View
Publisher
|
Journal |
“Talk About Terror in Our Back Gardens”: an Analysis of Online Comments about British Foreign Fighters in Syria
View Abstract
The phenomenon of foreign fighters has become a central issue to the ongoing conflict in Syria. This article explores how members of the public answer the question ‘Why do British citizens join the conflict in Syria’ on social media sites and in response to online news articles. Building upon research on everyday narratives of security and terrorism, we analyse 807 comments, and in doing so, we argue that online comments are important in producing the discursive environment for making sense of British foreign fighters and what should be done in response to them. We find that there is a tendency to view British foreign fighters as being purely motivated by religion, and there is also a belief that British foreign fighters should be responded to through exceptional measures. We discuss the implications of such perceptions, and we highlight how problematic misconceptions about Islam and Muslims are not just disseminated through elite and media discourse, but through everyday narratives published by members of the public online.
|
2016 |
da Silvaa, R. and Crilley, R. |
View
Publisher
|
Report |
The Kremlin and DAESH Information Activities
View Abstract
This paper summarizes discussions held on 24 May 2016 in Riga, Latvia, which focused on exploring the Kremlin and DAESH information activities in order to improve our understanding of the nature of these communications and their effect on Western societies. The questions discussed were:
How are the communications and messages of DAESH and the Kremlin constructed and disseminated?
Are their methods changing?
Why do such messages appeal to youth, even if they are familiar with Western Values and consumerism?
What are the weakest aspects of our information environment and what can we do to improve?
|
2016 |
Sillanpaa, A., Simons, G., Reynolds, A., and Curika, L. |
View
Publisher
|
Journal |
Interpreting Text and Image Relations in Violent Extremist Discourse: A Mixed Methods Approach for Big Data Analytics
View Abstract
This article presents a mixed methods approach for analysing text and image relations in violent extremist discourse. The approach involves integrating multimodal discourse analysis with data mining and information visualisation, resulting in theoretically informed empirical techniques for automated analysis of text and image relations in large datasets. The approach is illustrated by a study which aims to analyse how violent extremist groups use language and images to legitimise their views, incite violence, and influence recruits in online propaganda materials, and how the images from these materials are re-used in different media platforms in ways that support and resist violent extremism. The approach developed in this article contributes to what promises to be one of the key areas of research in the coming decades: namely the interdisciplinary study of big (digital) datasets of human discourse, and the implications of this for terrorism analysis and research.
|
2016 |
O’Halloran, K.L., Tan, S., Wignell, P., Bateman, J.A., Pham, D., Grossman, M. and Moere, A.V. |
View
Publisher
|
Report |
Reception and Perception of Radical Messages
View Abstract
This report represents a first contribution by the Samir Kassir Foundation (SKF) to the ongoing and growing debate on the role of communication in the radicalisation process and the mechanisms to prevent or counter violent extremism (CVE). The primary focus of this research is communication by and about the Islamic State and did not include communication by and about militant Islamist organisations from other ideological and sectarian backgrounds. It is based on qualitative opinion and media consumption research conducted in February and March 2016 with Lebanese audiences in Tripoli, North Lebanon, West Bekaa and among Syrian refugees with the support of the Ministry of Foreign Affairs of the Netherlands under contract No. 28141. The project was implemented by a steering committee led by academic and policy consultant Drew Mikhael and comprised of SKF Executive Director Ayman Mhanna, SKF Programs Coordinator Nassim AbiGhanem, academic and senior researcher Nidal Ayoub and social media communication specialist Marie-Thérèse Corbani. The contents of this report are the sole responsibility of the Samir Kassir Foundation and can in no way be taken to reflect the views of the Ministry of Foreign Affairs of the Netherlands
|
2016 |
Mikhael, D., Mhanna, A., Ayoub, N., AbiGhanem, N., and Corbani, M |
View
Publisher
|
Journal Article |
Where are All the Cyber Terrorists? From Waiting for Cyber Attack to Understanding Audiences
View Abstract
This paper presents a review of recent academic scholarship and debates on cyber terrorism, and more broadly of what is known about terrorist’s direct use of the Internet as weapon and, less directly, as a communication device. It presents an overview of a field of discourse that has, since its inception, provided a number of foreboding and even doomsday warnings about the future of cyber terrorism, which in the main have failed to come to realization. First, it surveys why these gloomy warnings regarding future proliferation of cyber terrorism have not been born out in practice, and explains that rather than looking for instances of the Internet being used directly as a weapon by terrorists, current debates in academic and policy circles have shifted to trying to measure and ascertain the role that the Internet plays in spreading and supporting extremist discourse to ever wider audiences. It continues by posing a series of questions regarding online audiences that are in need of future research if we are to better understand the role of the Internet in spreading and supporting violent extremist discourse and cultivating terrorism, most importantly the role of audiences as autonomous agents in navigating, reacting and responding to online violent extremist materials.
|
2016 |
Droogan, J. and Waldek, L. |
View
Publisher
|