MA Thesis |
From Traits to Threats – Identification of Personality Traits for Individuals at Risk of Radicalisation on Social Media
View Abstract
This Thesis contributes by proposing a method for identifying users believed to be at risk of radicalisation on social media, by utilising the social media networks of already radicalised individuals and a set of indicators derived from related work on radicalisation. In addition, this Thesis provides a new to the field, in-depth analysis of the personality traits of Twitter users at risk of radicalisation and how they may differ from ordinary users. The results show that the proposed data collection and annotation scheme is able to successfully identify individuals at risk of radicalisation, yielding an inter-annotator agreement, measured by Cohen’s Kappa, of 0.83. The analysis of the predicted personality traits shows that users at risk of radicalisation have common profiles for agreeableness and conscientiousness. When comparing the predicted traits to that of ordinary, non-radical Twitter users, the predictions show a marginal difference in distribution for agreeableness, openness, and conscientiousness, indicating a certain difference in personality between the two domains.
|
2022 |
Underhaug, L.M. |
View
Publisher
|
Policy |
Delhi Declaration on countering the use of new and emerging technologies for terrorist purposes
View Abstract
The Counter-Terrorism Committee unanimously adopted the Delhi Declaration at the closing of its special meeting on countering the use of new and emerging technologies for terrorist purposes, held in India on 28-29 October 2022.
The special meeting focused on three main areas: unmanned aerial systems, terrorist financing and information and communications technologies. The meeting also examined overarching issues relating to the use of technologies for terrorist purposes, to include human rights, gender considerations, and future programming by the international community. The Delhi Declaration provides non-binding guidance to Member States and stakeholders in countering terrorist use of new and emerging technologies.
|
2022 |
UNCTC |
View
Publisher
|
Video |
Countering terrorist narratives and preventing the use of the Internet for terrorist purposes – Open meeting of the Counter-Terrorism Committee
View Abstract
The objective of the proposed open meeting is to assist the Committee to encourage States to better align their efforts in the area of countering terrorist narratives with the Framework and the guidelines contained in Council resolution 2354 (2017). Specifically, participants will be encouraged to:
1. Share information on trends and developments in terrorist narratives and effective measures to counter them, as well as on ways to measure and evaluate the effectiveness of such measures;
2. Discuss the benefits of a whole-of-society approach to countering terrorist narratives that involves a broad range of actors, including Governments, as well as youth; families; women; religious, cultural, and educational leaders; and other concerned civil society actors;
3. Share information on the benefits of countering terrorist narratives by amplifying positive and credible alternatives for audiences vulnerable to terrorist narratives;
4. Identify and analyse key aspects of the exploitation of information and communications technologies (ICT), including the Internet and social media, to disseminate terrorist narratives
5. Discuss ways to strengthen public-private sector engagement in countering terrorist narratives, both online and offline, including with respect to the TaT initiative and the work of the GIFCT
6. Share good practices in, and knowledge of, Member States’ compliance with the relevant international legal standards, including international human rights law, in this context, with respect in particular to the rights to freedom of expression and privacy
7. Encourage continued research into the drivers of terrorism and violent extremism in order to develop more focused counter-narrative programmes.
|
2020 |
UN Web TV: The United Nations Live & On Demand |
View
Publisher
|
Report |
Implementation of Security Council resolution 2178 (2014) by States affected by foreign terrorist fighters
View Abstract
The present report is the second in a series of reports to be issued pursuant to
Security Council resolution 2178 (2014), which requires the Counter-Terrorism
Committee Executive Directorate to assess Member States’ capacity to stem the flow
of foreign terrorist fighters, identify good practices in that regard and facilitate the
delivery of related technical assistance to States in need. The first report adopted a
thematic approach to the foreign terrorist fighter threat, focusing on the
implementation efforts of 21 Member States. The second report adopts a regional
approach and analyses the efforts of 32 States in Central Asia, the Maghreb, East
Africa/Horn of Africa, Western Europe and Oceania/Americas.
|
2015 |
UN Security Council Commitee |
View
Publisher
|
Journal Article |
Quarantining Online Hate Speech: Technical and Ethical Perspectives
View Abstract
In this paper we explore quarantining as a more ethical method for delimiting the spread of Hate Speech via online social media platforms. Currently, companies like Facebook, Twitter, and Google generally respond reactively to such material: offensive messages that have already been posted are reviewed by human moderators if complaints from users are received. The offensive posts are only subsequently removed if the complaints are upheld; therefore, they still cause the recipients psychological harm. In addition, this approach has frequently been criticised for delimiting freedom of expression, since it requires the service providers to elaborate and implement censorship regimes. In the last few years, an emerging generation of automatic Hate Speech detection systems has started to offer new strategies for dealing with this particular kind of offensive online material. Anticipating the future efficacy of such systems, the present article advocates an approach to online Hate Speech detection that is analogous to the quarantining of malicious computer software. If a given post is automatically classified as being harmful in a reliable manner, then it can be temporarily quarantined, and the direct recipients can receive an alert, which protects them from the harmful content in the first instance. The quarantining framework is an example of more ethical online safety technology that can be extended to the handling of Hate Speech. Crucially, it provides flexible options for obtaining a more justifiable balance between freedom of expression and appropriate censorship.
|
2020 |
Ullmann, S. and Tomalin, M. |
View
Publisher
|
Journal Article |
Digital Resilience Tactics of Syrian Refugees in the Netherlands: Social Media for Social Support, Health, and Identity
View Abstract
The process of adjusting to a new country may carry important stressors for refugees. In the light of neoliberal policies, refugees are expected to become resilient in a local arrival infrastructure and perform a specific subjectivity based on gratefulness, adaptability, and digital sensitivity to successfully integrate. Drawing on a qualitative, in-depth case study with Syrians living in the Netherlands, this article explores the impact of the retreat of the welfare state and unfolding digital transitions on resilience tactics of marginalized people like refugees. While recognizing the systemic violence and historic trauma many refugees have experienced, we focus on how refugees are expected to and develop ways to become resilient. Three digital resilience tactics are discussed: digital social support, digital health, and digital identities. Social support was mainly sought from family, friends, organizations, and social media platforms, whereas refugees’ engagement in meaningful digital practices aimed at fostering health promotion and identity management. Our fieldwork resurfaces paradoxes of digital resilience as described by careful emotional digital labor refugees engage in when communicating with families, the role of socio-cultural factors in shaping refugees’ ICT (information and communication technology) adoption and use for health support, and negotiation of different and conflicting identity axes online. Finally, our study provides some insights into the implementation of more effective online and offline practices in the context of social and health support by host countries.
|
2020 |
Udwan, G., Leurs, K. and Alencar, A. |
View
Publisher
|