Journal Article |
On the Origins of Memes by Means of Fringe Web Communities
View Abstract
Internet memes are increasingly used to sway and manipulate public opinion. This prompts the need to study their propagation, evolution, and influence across the Web. In this paper, we detect and measure the propagation of memes across multiple Web communities, using a processing pipeline based on perceptual hashing and clustering techniques, and a dataset of 160M images from 2.6B posts gathered from Twitter, Reddit, 4chan’s Politically Incorrect board (/pol/), and Gab, over the course of 13 months. We group the images posted on fringe Web communities (/pol/, Gab, and The_Donald subreddit) into clusters, annotate them using meme metadata obtained from Know Your Meme, and also map images from mainstream communities (Twitter and Reddit) to the clusters. Our analysis provides an assessment of the popularity and diversity of memes in the context of each community, showing, e.g., that racist memes are extremely common in fringe Web communities. We also find a substantial number of politics-related memes on both mainstream and fringe Web communities, supporting media reports that memes might be used to enhance or harm politicians. Finally, we use Hawkes processes to model the interplay between Web communities and quantify their reciprocal influence, finding that /pol/ substantially influences the meme ecosystem with the number of memes it produces, while td has a higher success rate in pushing them to other communities.
|
2018 |
Zannettou, S., Caulfield, T., Blackburn, J., De Cristofaro, E., Sirivianos, M., Stringhini, G. and Suarez-Tangil, G. |
View
Publisher
|
Journal Article |
Countering terrorism or criminalizing curiosity? The troubled history of UK responses to right-wing and other extremism
View Abstract
The growth of right-wing extremism, especially where it segues into hate crime and terrorism, poses new challenges for governments, not least because its perpetrators are typically lone actors, often radicalized online. The United Kingdom has struggled to define, tackle or legitimate against extremism, though it already has an extensive array of terrorism-related offences that target expression, encouragement, publication and possession of terrorist material. In 2019, the United Kingdom went further to make viewing terrorist-related material online on a single occasion a crime carrying a 15-year maximum sentence. This article considers whether UK responses to extremism, particularly those that target non-violent extremism, are necessary, proportionate, effective and compliant with fundamental rights. It explores whether criminalizing the curiosity of those who explore radical political ideas constitutes legitimate criminalization or overextends state power and risks chilling effects on freedom of speech, association, academic freedom, journalistic enquiry and informed public debate—all of which are the lifeblood of a liberal democracy.
|
2021 |
Zedner, L. |
View
Publisher
|
Report |
Countering Violent Extremism: Developing an evidence-base for policy and practice
View Abstract
This volume reports on the range of papers presented at the Annual Countering Violent Extremism (CVE) Research Conference 2014 from 7-8 December 2014 in Abu Dhabi, United Arab Emirates. The Conference was organized and hosted by Hedayah (the International Center of Excellence for Countering Violent Extremism), Curtin University, People Against Violent Extremism (PaVE), and the Australian Government, Department of Foreign Affairs and Trade (DFAT). The Conference was also sponsored in part by the European Commission and the United States Department of State. The event was attended by approximately 100 academics, practitioners and policymakers from over 25 countries. The 2014 CVE Research Conference follows from the inaugural CVE Symposium hosted by Curtin University, PaVE, Macquarie University and Hedayah in Perth, Australia in 2013. As the first of its kind in the region, the 2013 Symposium brought together national and international scholars, practitioners, policymakers and former extremists to discuss and debate the current state and future directions for CVE. The intention for the CVE Research Conference is to be an annual event at which the yearly highlights of cutting-edge CVE research and innovation can be presented to academics, researchers, practitioners and policymakers on a global scale.
|
2015 |
Zeiger, S. and Aly, A. |
View
Publisher
|
Journal Article |
From Inspire to Rumiyah: does instructional content in online jihadist magazines lead to attacks?
View Abstract
Considerable time has been spent examining how groups like AQAP and ISIS used their online magazines to reach and radicalize individuals in Western democratic states. This paper continues this investigation but shifts its analysis to focus on the ‘how-to’ or instructional content of these publications, an understudied part of the literature. One of the stated goals of these magazines was to provide tactical know-how and assist supporters conducting terror plots in their home states. The question: did the tactics outlined in the magazines materialize in actual plots/attacks and how quickly were they put into practice? The paper examines this question by creating an overview of the tactics which appear in these publications and cross referencing them with a dataset of 166 Islamist-inspired homegrown terror plots/attacks in 14 Western democratic states to determine if, and when, they first appeared in relation to their publication date. It concluded that while some of the suggested strategies did appear following their publication, often it occurred after considerable time had elapsed. This suggests the instructional content did not resonate with readers in real time.
|
2020 |
Zekulin, M. |
View
Publisher
|
Journal Article |
Shades of hatred online: 4chan duplicate circulation surge during hybrid media events
View Abstract
The 4chan /pol/ platform is a controversial online space on which a surge in hate speech has been observed. While recent research indicates that events may lead to more hate speech, empirical evidence on the phenomenon remains limited. This study analyzes 4chan /pol/ user activity during the mass shootings in Christchurch and Pittsburgh and compares the frequency and nature of user activity prior to these events. We find not only a surge in the use of hate speech and anti-Semitism but also increased circulation of duplicate messages, links, and images and an overall increase in messages from users who self-identify as “white supremacist” or “fascist” primarily voiced from English-speaking IP-based locations: the U.S., Canada, Australia, and Great Britain. Finally, we show how these hybrid media events share the arena with other prominent events involving different agendas, such as the U.S. midterm elections. The significant increase in duplicates during the hybrid media events in this study is interpreted beyond their memetic logic. This increase can be interpreted through what we refer to as activism of hate. Our findings indicate that there is either a group of dedicated users who are compelled to support the causes for which shooting took place and/or that users use automated means to achieve duplication.
|
2020 |
Zelenkauskaite, A., Toivanen, P., Huhtamäki, J. and Valaskivi, K. |
View
Publisher
|
Journal Article |
The Case of Jihadology and the Securitization of Academia
View Abstract
This paper goes to the heart of this special issue by exploring the case of the web site, Jihadology, which the author founded and has managed for the past ten-plus years. It explores various issues including why such a site is necessary and/or useful, questions about dissemination and open access, lessons learned about responsibility and interaction with jihadis online, the evolution of the website that has the largest repository of jihadi content, interactions with governments and technology companies and how they viewed and dealt with the website. The paper also explores how the experience gained might help other researchers interested in creating primary source-first websites to assist in their research as well as to the benefit of others in the field. Therefore, this paper aims to shed light not only on this unique case, but also on the moral and ethical questions that have arisen through maintaining the Jihadology website for more than a decade in a time of changing online environments and more recent calls for censorship.
|
2021 |
Zelin, A.Y. |
View
Publisher
|