Journal Article |
Capitalizing on the Koran to Fuel Online Violent Radicalization: A Taxonomy of Koranic References in ISIS’s Dabiq
View Abstract
The current study set out to investigate to what extent ISIS is bolstering its jihadist ideology on a ‘cut-and-paste’ or ‘cherry-picked’ version of Islam in their renowned online propaganda magazine Dabiq. The main objective was to examine in a systematic and quantitative way to what extent ISIS utilizes the Koran in an atomistic, truncated and tailored manner to bolster its religious legitimacy. A total of 15 issues of Dabiq and 700 Koranic references were scrutinized. By means of a quantitative analysis we developed an innovative taxonomy of Koranic chapters and verses (i.e. surahs and ayat, respectively) on the basis of their appearance in Dabiq. Our large-scale data analysis provide consistent empirical evidence for severe decontextualization practices of the Koran in three ways: (1) a thin, Medinan-dominated religious layer, (2) ayah mutilation, and (3) clustered versus exclusive mentions. Limitations and implications for future research, policy makers and CVE initiatives are discussed.
|
2018 |
Frissen, T., Toguslu, E., Van Ostaeyen, P., and d'Haenens, L. |
View
Publisher
|
Report |
Caught In The Net: The Impact Of “Extremist” Speech Regulations On Human Rights Content
View Abstract
Social media companies have long struggled with what to do about extremist content on their platforms. While most companies include provisions about “extremist” content in their community standards, until recently, such content was often vaguely defined, providing policymakers and content moderators a wide berth in determining what to remove, and what to allow. Unfortunately, companies have responded with overbroad and vague policies and practices that have led to mistakes at scale that are decimating human rights content.
|
2019 |
Jaloud, A. R. A., Al Khatib, K., Deutch, J., Kayyali, D. and York, J. C. |
View
Publisher
|
Journal Article |
Censoring Extremism: Influence of Online Restriction on Official Media Products of ISIS
View Abstract
Recognizing that militant, non-state groups utilize social media and online platforms to reach members, sympathizers, and potential recruits, state agencies and social media corporations now increasingly regulate access to accounts affiliated with such groups. Scholars examining deplatforming efforts have, to date, focused on the extent of audience loss after account restrictions and the identification of strategies for regrouping online followers on the same or different platforms over time. Left unexplored is if and how militant non-state groups adapt their official messaging strategies in response to platform restrictions despite continuing online access to them. To begin to fill that gap, this study compares ISIS’s 550 images displayed in the group’s official newsletter al-Naba 6 months before and after Europol’s November 2019 take-down of terrorist affiliated accounts, groups, channels, and bots on Telegram. It conducts a content analysis of images related to militaries and their outcomes, non-military activities and their outcomes, and presentational forms. The findings demonstrate that ISIS visually emphasizes its standard priming approach but shifts its agenda-setting strategy. While retaining some of its standard visual framing practices, the group also alters frames, particularly those related to images showing opposing militaries and military outcome.
|
2021 |
McMinimy, K., Winkler, C.K., Lokmanoglu, A.D. and Almahmoud, M. |
View
Publisher
|
Journal Article |
Challenges and Frontiers in Abusive Content Detection
View Abstract
Online abusive content detection is an inherently difficult task. It has received considerable attention from academia, particularly within the computational linguistics community, and performance appears to have improved as the field has matured. However, considerable challenges and unaddressed frontiers remain, spanning technical, social and ethical dimensions. These issues constrain the performance, efficiency and generalizability of abusive content detection systems. In this article we delineate and clarify the main challenges and frontiers in the field, critically evaluate their implications and discuss potential solutions. We also highlight ways in which social scientific insights can advance research. We discuss the lack of support given to researchers working with abusive content and provide guidelines for ethical research.
|
2019 |
Vidgen, B., Harris, A., Nguyen, D., Tromble, R., Hale, S. and Margetts, H. |
View
Publisher
|
VOX-Pol Blog |
Challenges of Using Twitter as a Data Source: An Overview of Current Resources
View Abstract
|
2016 |
Ahmed, W. |
View
Publisher
|
Book |
Challenging Extremist Views on Social Media: Developing a Counter-Messaging Response
View Abstract
This book is a timely and significant examination of the role of counter-messaging via social media as a potential means of preventing or countering radicalization to violent extremism. In recent years, extremist groups have developed increasingly sophisticated online communication strategies to spread their propaganda and promote their cause, enabling messages to be spread more rapidly and effectively. Countermessaging has been promoted as one of the most important measures to neutralize online radicalizing influences and is intended to undermine the appeal of messages disseminated by violent extremist groups. While many such initiatives have been launched by Western governments, civil society actors, and private companies, there are many questions regarding their efficacy. Focusing predominantly on efforts countering Salafi-Jihadi extremism, this book examines how feasible it is to prevent or counter radicalization and violent extremism with counter-messaging efforts. It investigates important principles to consider when devising such a program. The authors provide both a comprehensive theoretical overview and a review of the available literature, as well as policy recommendations for governments and the role they can play in counter-narrative efforts. As this is the first book to critically examine the possibilities and pitfalls of using counter-messaging to prevent radicalization or stimulate de-radicalization, it is essential reading for policymakers and professionals dealing with this issue, as well as researchers in the field.
|
2019 |
Eerten, J. van and Doosje, B. |
View
Publisher
|