Report |
Can the Right Meme? (And How?): A Comparative Analysis of Three Online Reactionary Meme Subcultures
View Abstract
This report analyses memes propagated among three online socio‐political groups drawn from sample datasets pulled from social media sites often used by adherents of each group. These groups include those connected to the India‐based Hindutva, US‐based neo‐Nazis and those engaging in pro‐Rittenhouse communications in late 2020. The authors chose the groups based on similarities in their ideological goals, race‐based nationalism and their close association with political violence in their respective countries.
|
2021 |
Stall, H., Prasad, H. and Foran, D. |
View
Publisher
|
Journal Article |
Cannibalizing the Constitution: On Terrorism, the Second Amendment, and the Threat to Civil Liberties
View Abstract
This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of threat posed by online incitement. This article clarifies the way these civil liberties interact to create the threat, suggesting that pro-democracy rights such as protections on speech and privacy should not bear all the burden of compromise for the sake of protection from terrorism.
|
2022 |
LaGuardia, F. |
View
Publisher
|
Journal Article |
Capitalizing on the Koran to Fuel Online Violent Radicalization: A Taxonomy of Koranic References in ISIS’s Dabiq
View Abstract
The current study set out to investigate to what extent ISIS is bolstering its jihadist ideology on a ‘cut-and-paste’ or ‘cherry-picked’ version of Islam in their renowned online propaganda magazine Dabiq. The main objective was to examine in a systematic and quantitative way to what extent ISIS utilizes the Koran in an atomistic, truncated and tailored manner to bolster its religious legitimacy. A total of 15 issues of Dabiq and 700 Koranic references were scrutinized. By means of a quantitative analysis we developed an innovative taxonomy of Koranic chapters and verses (i.e. surahs and ayat, respectively) on the basis of their appearance in Dabiq. Our large-scale data analysis provide consistent empirical evidence for severe decontextualization practices of the Koran in three ways: (1) a thin, Medinan-dominated religious layer, (2) ayah mutilation, and (3) clustered versus exclusive mentions. Limitations and implications for future research, policy makers and CVE initiatives are discussed.
|
2018 |
Frissen, T., Toguslu, E., Van Ostaeyen, P., and d'Haenens, L. |
View
Publisher
|
Report |
Caught In The Net: The Impact Of “Extremist” Speech Regulations On Human Rights Content
View Abstract
Social media companies have long struggled with what to do about extremist content on their platforms. While most companies include provisions about “extremist” content in their community standards, until recently, such content was often vaguely defined, providing policymakers and content moderators a wide berth in determining what to remove, and what to allow. Unfortunately, companies have responded with overbroad and vague policies and practices that have led to mistakes at scale that are decimating human rights content.
|
2019 |
Jaloud, A. R. A., Al Khatib, K., Deutch, J., Kayyali, D. and York, J. C. |
View
Publisher
|
Journal Article |
Censoring Extremism: Influence of Online Restriction on Official Media Products of ISIS
View Abstract
Recognizing that militant, non-state groups utilize social media and online platforms to reach members, sympathizers, and potential recruits, state agencies and social media corporations now increasingly regulate access to accounts affiliated with such groups. Scholars examining deplatforming efforts have, to date, focused on the extent of audience loss after account restrictions and the identification of strategies for regrouping online followers on the same or different platforms over time. Left unexplored is if and how militant non-state groups adapt their official messaging strategies in response to platform restrictions despite continuing online access to them. To begin to fill that gap, this study compares ISIS’s 550 images displayed in the group’s official newsletter al-Naba 6 months before and after Europol’s November 2019 take-down of terrorist affiliated accounts, groups, channels, and bots on Telegram. It conducts a content analysis of images related to militaries and their outcomes, non-military activities and their outcomes, and presentational forms. The findings demonstrate that ISIS visually emphasizes its standard priming approach but shifts its agenda-setting strategy. While retaining some of its standard visual framing practices, the group also alters frames, particularly those related to images showing opposing militaries and military outcome.
|
2021 |
McMinimy, K., Winkler, C.K., Lokmanoglu, A.D. and Almahmoud, M. |
View
Publisher
|
Journal Article |
Challenges and Frontiers in Abusive Content Detection
View Abstract
Online abusive content detection is an inherently difficult task. It has received considerable attention from academia, particularly within the computational linguistics community, and performance appears to have improved as the field has matured. However, considerable challenges and unaddressed frontiers remain, spanning technical, social and ethical dimensions. These issues constrain the performance, efficiency and generalizability of abusive content detection systems. In this article we delineate and clarify the main challenges and frontiers in the field, critically evaluate their implications and discuss potential solutions. We also highlight ways in which social scientific insights can advance research. We discuss the lack of support given to researchers working with abusive content and provide guidelines for ethical research.
|
2019 |
Vidgen, B., Harris, A., Nguyen, D., Tromble, R., Hale, S. and Margetts, H. |
View
Publisher
|