Chapter |
The Role of the Internet in Facilitating Violent Extremism and Terrorism: Suggestions for Progressing Research
View Abstract
Many researchers, practitioners, and policy-makers continue to raise questions about the role of the Internet in facilitating violent extremism and terrorism. A surge in research on this issue notwithstanding, relatively few empirically grounded analyses are yet available. This chapter provides researchers with five key suggestions for progressing knowledge on the role of the Internet in facilitating violent extremism and terrorism so that we may be better placed to determine the significance of online content and activity in the latter going forward. These five suggestions relate to (1) collecting primary data across multiple types of populations; (2) making archives of violent extremist online content accessible for use by researchers and on user-friendly platforms; (3) outreaching beyond terrorism studies to become acquainted with, for example, the Internet studies literature and engaging in interdisciplinary research with, for example, computer scientists; (4) including former extremists in research projects, either as study participants or project collaborators; and (5) drawing connections between the on- and offline worlds of violent extremists.
|
2019 |
Scrivens, R., Gill, P. and Conway, M. |
View
Publisher
|
Journal Article |
The temporal evolution of a far-right forum
View Abstract
The increased threat of right-wing extremist violence necessitates a better understanding of online extremism. Radical message boards, small-scale social media platforms, and other internet fringes have been reported to fuel hatred. The current paper examines data from the right-wing forum Stormfront between 2001 and 2015. We specifically aim to understand the development of user activity and the use of extremist language. Various time-series models depict posting frequency and the prevalence and intensity of extremist language. Individual user analyses examine whether some super users dominate the forum. The results suggest that structural break models capture the forum evolution better than stationary or linear change models. We observed an increase of forum engagement followed by a decrease towards the end of the time range. However, the proportion of extremist language on the forum increased in a step-wise matter until the early summer of 2011, followed by a decrease. This temporal development suggests that forum rhetoric did not necessarily become more extreme over time. Individual user analysis revealed that super forum users accounted for the vast majority of posts and of extremist language. These users differed from normal users in their evolution of forum engagement.
|
2020 |
Kleinberg, B., van der Vegt, I. and Gill, P. |
View
Publisher
|
Journal Article |
Tiered Governance and Demonetization: The Shifting Terms of Labor and Compensation in the Platform Economy
View Abstract
Social media platforms have profoundly transformed cultural production, in part by restructuring the terms by which culture is distributed and paid for. In this article, we examine the YouTube Partner Program and the controversies around the “demonetization” of videos, to understand these arrangements and what happens when they shift beneath creators’ feet. We use the testimony of YouTubers, provided in their own videos, to understand how creators square the contradiction between YouTube’s increasingly cautious rules regarding “advertiser-friendly” content, its shifting financial and algorithmic incentive structure, and its stated values as an open platform of expression. We examine YouTube’s tiered governance strategy, in which different users are offered different sets of rules, different material resources, and different procedural protections when content is demonetized. And we examine how, especially when the details of that tiered governance are ambiguous or poorly conveyed, creators develop their own theories for why their content has been demonetized—which can provide some creators a tactical opportunity to advance politically motivated accusations of bias against the platform.
|
2020 |
Caplan, R. and Gillespie, T. |
View
Publisher
|
VOX-Pol Publication |
What are the Roles of the Internet In Terrorism? Measuring Online Behaviors of Convicted UK Terrorists
View Abstract
Using a unique dataset of 227 convicted UK-based terrorists, this report fills a large gap in the existing literature. Using descriptive statistics, we first outline the degree to which various online activities related to radicalisation were present within the sample. The results illustrate the variance in behaviours often attributed to ‘online radicalisation’. Second, we conducted a smallest-space analysis to illustrate two clusters of commonly co-occurring behaviours that delineate behaviours from those directly associated with attack planning. Third, we conduct a series of bivariate and multivariate analyses to question whether those who interact virtually with like-minded individuals or learn online, exhibit markedly different experiences (e.g. radicalisation, event preparation, attack outcomes) than those who do not.
|
2015 |
Gill, P., Corner, E., Thornton, A. and Conway, M. |
View
Publisher
|
Journal Article |
What Do Closed Source Data Tell Us About Lone Actor Terrorist Behavior? A Research Note
View Abstract
This article contributes to the growing body of knowledge on loneactor terrorism with the incorporation of closed-source data. The analyses presented investigate the antecedent behaviors of U.K.- based lone-actor terrorists leading up to their planning or conducting a terrorist event. The results suggest that prior to their attack or arrest the vast majority of lone-actor terrorists each demonstrated elements concerning (a) their grievance, (b) an escalation in their intent to act, (c) gaining capability—both psychologically and technically and (d) attack planning. The results also disaggregate our understanding of lone-actor terrorists in two ways. First, we compare the behaviors of the jihadist actors to those of the extreme-right. Second, we visualize Borum’s (2012) continuums of loneness, direction, and motivation. Collectively the results provide insight into the threat assessment and management of potential lone actors
|
2019 |
Gill, P., Corner, E., McKeeb, A., Hitchen, P. and Betley, P. |
View
Publisher
|
Journal Article |
Women’s Connectivity in Extreme Networks
View Abstract
A popular stereotype is that women will play more minor roles than men as environments become more dangerous and aggressive. Our analysis of new longitudinal data sets from offline and online operational networks [for example, ISIS (Islamic State)] shows that although men dominate numerically, women emerge with superior network connectivity that can benefit the underlying system’s robustness and survival. Our observations suggest new female-centric approaches that could be used to affect such networks. They also raise questions about how individual contributions in high-pressure systems are evaluated.
|
2016 |
Manritque, P., Cao, Z., Gabriel, A., Horgan, J., Gill, P., Qi, H., Restrepo, E.M., Johnson, D., Wuchty, S., Song, C. and Johnson, N. |
View
Publisher
|