Journal Article |
Distinct patterns of incidental exposure to and active selection of radicalizing information indicate varying levels of support for violent extremism
View Abstract
Exposure to radicalizing information has been associated with support for violent extremism. It is, however, unclear whether specific information use behavior, namely, a distinct pattern of incidental exposure (IE) to and active selection (AS) of radicalizing content, indicates stronger violent extremist attitudes and radical action intentions. Drawing on a representative general population sample (N = 1509) and applying latent class analysis, we addressed this gap in the literature. Results highlighted six types of information use behavior. The largest group of participants reported a near to zero probability of both IE to and AS of radicalizing material. Two groups of participants were characterized by high or moderate probabilities of incidental exposure as well as a low probability of active selection of radicalizing content. The remaining groups displayed either low, moderate, or high probabilities of both IE and AS. Importantly, we showed between-group differences regarding violent extremist attitudes and radical behavioral intentions. Individuals reporting near zero or high probabilities for both IE to and AS of radicalizing information expressed the lowest and strongest violent extremist attitudes and willingness to use violence respectively. Groups defined by even moderate probabilities of AS endorsed violent extremism more strongly than those for which the probability for incidental exposure was moderate or high but AS of radicalizing content was unlikely.
|
2024 |
Schumann, S., Clemmow, C., Rottweiler, B. and Gill, P. |
View
Publisher
|
VOX-Pol Publication |
Online Extremism and Terrorism Researchers’ Security, Safety, and Resilience: Findings from the Field
View Abstract
VOX-Pol’s new report presents findings from the REASSURE (Researcher, Security, Safety, and Resilience) project’s in-depth interviews with 39 online extremism and terrorism researchers. Based at universities, research institutes, and think tanks in Europe and North America, the interviewees studied mainly, albeit not exclusively, far-right and violent jihadist online activity. The report catalogues for the first time the range of harms they have experienced, the lack of formalised systems of care or training, and their reliance therefore on informal support networks to mitigate those harms.
|
2023 |
Pearson, E., Whittaker, J., Baaken, T., Zeiger, S., Atamuradova, F. and Conway, M. |
View
Publisher
|
Journal Article |
The effects of social media on domestic terrorism
View Abstract
Much qualitative research has drawn an association between social media and domestic terrorism, with the studies reaching different conclusions. However, few empirical studies have evaluated whether the surge in social media participation affects domestic terrorist events. Controlling for common explanations in the literature, we conduct a cross-national, time-series analysis of up to 151 countries from 2000 to 2019 to assess the impact of social media penetration on domestic terrorism. We find that greater social media penetration increases the likelihood of domestic terrorism in countries as it supports extremists’ ability to recruit, mobilize, and train terrorists. Using mediation analysis, we also find that greater social media penetration amplifies online and political polarization, increasing the likelihood of domestic terrorism events. Our work indicates the possible mechanisms linking social media and domestic terrorism and the need to develop and apply appropriate counterterrorism strategies to mitigate terrorist operations.
|
2023 |
Hunter, L.Y., Biglaiser, G., McGauvran, R.J. and Collins, L. |
View
Publisher
|
Chapter |
The Use of Counter Narratives to Combat Violent Extremism Online
View Abstract
Due to recent rises in extremism across the globe (Dean et al. in J Polic Intell Count Terror 11:121–142, 2016; Le Roux in Responding to the rise in violent extremism in the Sahel. Africa Center For Strategic Studies, 2019, p. 26) and (Jones in Int Secur 32:7–40, 2008), governments and law enforcement organisations, such as the police, have looked to new strategies to counter violent extremism (Russell and Theodosiou in Counter-extremism: a decade on from 7/7. Quilliam Foundation, 2015). Specifically, there has been an expanse of the field now widely known as Countering Violent Extremism (CVE). CVE is a highly contested area; however, upon conducting a literature review, Inserra (Revisiting efforts to counter violent extremism: leadership needed. The Heritage Foundation, 2015, p. 2) helpfully reduced the term CVE down to descriptions of interventions intended to “stop individuals from radicalizing”. LaFree and Freilich (Annu Rev Criminol 2:383–404, 2019) distinguish counter-terrorism from CVE, they describe counter-terrorism as military responses (‘hard’) as opposed to non-military responses (‘soft’), referred to as countering violent extremism strategies. This chapter contends that, although counter narratives tend to lack academic standing, there does appear to be a widespread acceptance that narratives influence individuals’ beliefs. Therefore, in the absence of other more effective methods of CVE online, it is argued that counter-narratives (CN) should be used in informed ways by organisations such as the police (Monaghan in Crime Media Cult 18(1):21–39, 2020). This chapter will compare academic understandings of narrative and communication alongside examples of counter narratives issued against them. It will then assess the impact of such strategies and potential alternatives for CN.
|
2023 |
Rees, J. and Montasari, R. |
View
Publisher
|
Chapter |
The Role of the Internet in Radicalisation to Violent Extremism
View Abstract
This chapter critically examines the role that the Internet and the Internet of Things (IoT) play in violent extremism. The chapter specifically focuses on arguments surrounding radicalisation as a pathway to terrorism and how individuals become radicalised due to different radicalisation processes and theories. Based on this critical analysis, the chapter argues that the Internet plays a key role in radicalisation to violent extremism due to several approaches. Issues highlighted in this chapter mainly focusses on the struggles of social media (SM) moderation and regulations. Furthermore, the chapter discusses how the IoT can aid SM regulation to reduce online radicalisation to violent extremism through artificial intelligence (AI) and machine learning (ML) technology. It will be argued how AI and ML could be deployed to reduce terrorist content online, making social media platforms (SMPs) a safer cyber space for individuals to operate within.
|
2023 |
Bamsey, O. and Montasari, R. |
View
Publisher
|
Chapter |
Exploring the Extent to Which Extremism and Terrorism Have Changed Since the Advent of the Internet
View Abstract
This review will examine the academic literature over which role the internet has in the evolution of extremism and terrorism since its advent. It will compare two different approaches. The first claims that the internet is a major factor that facilitates ideas and narratives, which can lead to the rise of extremism and terrorism. The second, which in its turn contradicts this approach, argues that prior the advent of the internet extremists and terrorists where more successful into achieving their goals. For that reason, the review will be split into 3 sections. The first section will be examining some needed key definitions of what constitutes terrorism and extremism. Afterwards the essay will shift its approach towards the main debate of whether the internet has a causal link with extremism and terrorism or not. Therefore Sect. 2 brings forth the ways, in which the internet has helped terrorism to advance its goals. Moving on to the third section, this piece of work will discuss the approach in which the internet does not assist extremist narratives but, in the contrary helps the advancement of better research around it and its prevention. Lastly, the review will sum up over the literature that has been discussed and conclude that there is always space for future research.
|
2023 |
Locaj, K. |
View
Publisher
|