Journal Article |
Using Website Referrals to Identify Unreliable Content Rabbit Holes
View Abstract
Does the URL referral structure of websites lead users into ‘rabbit holes’ of unreliable content? Past work suggests algorithmic recommender systems on sites like YouTube lead users to view more unreliable content. However, websites without algorithmic recommender systems have financial and political motivations to influence the movement of users, potentially creating browsing rabbit holes. We address this gap using browser telemetry that captures referrals to a large sample of domains rated as reliable or unreliable information sources. Our results suggest the incentives for unreliable sites to retain and monetise users create rabbit holes. After landing on an unreliable site, users are very likely to be referred to another page on the site. Further, unreliable sites are better at retaining users than reliable sites. We find less support for political motivations. While reliable and unreliable sites are largely disconnected from one another, the probability of traveling from one unreliable site to another is relatively low. Our findings indicate the need for additional focus on site-level incentives to shape traffic moving through their sites.
|
2024 |
Greene, K.T., Pereira, M., Pisharody, N., Dodhia, R., Lavista Ferres, J. and Shapiro, J.N. |
View
Publisher
|
Journal |
Utilization of Cyberspace by Terrorist Groups and the Applicability of the Malaysian Law on Terrorism
View Abstract
It is an obvious and undeniable fact, that the cyberspace is become a powerful method which is increasingly and quickly utilized by terrorist organizations to achieve their gruesome and nefarious goals by hitting innocent individuals. This paper has conducted a critical and comprehensive study on the literature review aiming to answer several inquiries about utilization of cyberspace by terrorist groups and the applicability of the Malaysian law on terrorism. The meaning, characteristics and goals of cyber terrorism will be highlighted.
Furthermore, this paper will clarify how terrorist groups invade the cyberspace with highlighting on “ISIS” as an example. In addition, this paper will indicate how the Malaysian Law addresses the terrorism. This paper has proved that the terrorist groups become more sophisticated and complex by adopting the cyberspace. Moreover, this paper discloses how terrorist groups exploit the cyberspace. Even if Malaysian law adopts many measures and precautions to counter terrorism, but, it still needs more efforts to deal with terrorism, by regulating the “Bitcoins”, introducing a clear definition about the meaning of “lethal device” to encompass harm programs and viruses, and distinguishing between clicking “like” or sharing the terrorist items with use explicit words to glorify the terrorism and without use any explicit glorification words. The lawgiver must take into consideration the possession of terrorist items orpublications for academic and innocent purposes. Finally, under SOSMA, the power to intercept the communications must be subjected on the judicial oversight and the power of arrest must be based on objective test.
|
2016 |
Labanieh, M.F. and Zulhuda, S. |
View
Publisher
|
Journal Article |
Validating extremism Strategic use of authority appeals in al-Naba’ infographics
View Abstract
Daesh’s centralized media operations provide a steady stream of media products to citizens living in and around its controlled territories, with the result that several nations occupied or adjacent to the group have emerged as many of the most fruitful recruiting grounds for new members. To better understand the argumentation strategies targeting such audiences, this study examines the 119 infographics in the first 50 issues of Daesh’s official weekly Arabic newsletter, al-Naba’. The findings suggest that through a patterned application of statistical, historical, religious, and scientific arguments from authority to predictable topical areas, the infographics in al-Naba’ reinforce Daesh as a key source of information for the citizenry of the proclaimed caliphate.
|
2018 |
Winkler C., el-Damanhoury, K., Lemieux, A. |
View
Publisher
|
Journal Article |
Variations on a Theme? Comparing 4chan, 8kun, and Other chans’ Far-Right “/pol” Boards
View Abstract
Online forums such as 4chan and 8chan have grown in notoriety following a number of high-profile attacks conducted in 2019 by right-wing extremists who used their “/pol” boards (dedicated to “politically incorrect” discussions). Despite growing academic interest in these online spaces, little is still known about them; in particular, their similarities and differences remain to be teased out, and their respective roles in fostering a certain farright subculture need to be specified. This article therefore directly compares the content and discussion pace of six different /pol boards of “chan” forums, including some that exist solely on the dark web. We find that while these boards constitute together a particular subculture, differences in terms of both rate of traffic and content demonstrate the fragmentation of this subculture. Specifically, we show that the different /pol boards can be grouped
into a three-tiered architecture based upon both at once how popular they are and how extreme their content is.
|
2021 |
Baele, S.J., Brace, L. and Coan, T.G. |
View
Publisher
|
Journal Article |
Vicarious Trauma via the Observation of Extremist Atrocities: A Rapid Evidence Assessment
View Abstract
Researchers are increasingly conducting research using primary source data involving observation of, and exposure to, violent extremist individuals, their acts, their online content, and the ideologies that they act in support of. Of concern is that this increased use of primary source material has not occurred alongside a serious investigation of the traumatic outcomes that may result from constant exposure to such materials within the process of conducting academic research. As such, the goal of this review is to conduct a rapid evidence assessment to identify (a) What theories currently exist that conceptualize trauma stemming from vicarious observation of extremist atrocities? (b) In what similar domains (if any) have researchers conceptualized the trauma that stems from vicarious observation of extremist atrocities? (c) What is the current evidence base for these theories? And (d) What are the immediate research needs to extend this research and support the research workforce? Articles were identified using search strings related to types of trauma, and relevant domains of work (e.g., criminal justice, healthcare, national security, content moderation). In total 34 articles were screened and assessed in full. The work domains of these articles ranged from drone warfare to digital forensics and interrogation interpreters. Overall, exposure to traumatic images, videos, and events is associated with burnout, secondary traumatic stress, turnover intentions, and a host of wider negative psychosocial outcomes. Furthermore, this process is impacted by several factors including the nature of the content, the wider organizational culture, and individual differences.
|
2024 |
Shortland, N., Crayne, M.P. and Mezzapelle, J.L. |
View
Publisher
|
Chapter |
Victims’ Use of Social Media during and after the Utøya Terror Attack: Fear, Resilience, Sorrow and Solidarity
View Abstract
This chapter examines how those directly affected by the terror attack on Utøya in Norway on 22 July 2011 used social media to cope with the trauma. Through interviews with eight survivors and a study of their Facebook walls during the first month after the shooting, the chapter sets out to answer how they tell and re-tell the trauma on Facebook. In what way does their re-telling of the terror event give it meaning? With Narrative Therapy as its inspiration, this chapter studies different themes and stories on the Facebook walls, what is told about the event, its effects and responses to it. The meaning derived from the trauma is a story of national unity, democratic values and the redefining of Norway as a multicultural society. As for the perpetrator, he is written out of the story.
Book edited by Harald Hornmoen and Klas Backholm
|
2018 |
Frey E. |
View
Publisher
|