Journal Article |
Media, Fear and the Hyperreal: the Construction of Cyberterrorism as the Ultimate Threat to Critical Infrastructures
View Abstract
Analysis of the construction of the cyberterrorist threat, with the core argument that US media outlets have been significant contributors not just to the dissemination, but to the actual discursive construction of the contemporary cyberterrorist threat and, further, that it is their emphasis on the (imagined) fatal connectivity between virtual networks and physical infrastructures that makes the concept of cyberterror so powerful.
|
2008 |
Conway, M. |
View
Publisher
|
Journal Article |
Online Extremism and Terrorism Research Ethics: Researcher Safety, Informed Consent, and the Need for Tailored Guidelines
View Abstract
This article reflects on two core issues of human subjects’ research ethics and how they play out for online extremism and terrorism researchers. Medical research ethics, on which social science research ethics are based, centers the protection of research subjects, but what of the protection of researchers? Greater attention to researcher safety, including online security and privacy and mental and emotional wellbeing, is called for herein. Researching hostile or dangerous communities does not, on the other hand, exempt us from our responsibilities to protect our research subjects, which is generally ensured via informed consent. This is complicated in data-intensive research settings, especially with the former type of communities, however. Also grappled with in this article therefore are the pros and cons of waived consent and deception and the allied issue of prevention of harm to subjects in online extremism and terrorism research. The best path forward it is argued—besides talking through the diversity of ethical issues arising in online extremism and terrorism research and committing our thinking and decision-making around them to paper to a much greater extent than we have done to-date—may be development of ethics guidelines tailored to our sub-field.
|
2021 |
Conway, M. |
View
Publisher
|
VOX-Pol Publication |
Online Extremism and Terrorism Researchers’ Security, Safety, and Resilience: Findings from the Field
View Abstract
VOX-Pol’s new report presents findings from the REASSURE (Researcher, Security, Safety, and Resilience) project’s in-depth interviews with 39 online extremism and terrorism researchers. Based at universities, research institutes, and think tanks in Europe and North America, the interviewees studied mainly, albeit not exclusively, far-right and violent jihadist online activity. The report catalogues for the first time the range of harms they have experienced, the lack of formalised systems of care or training, and their reliance therefore on informal support networks to mitigate those harms.
|
2023 |
Pearson, E., Whittaker, J., Baaken, T., Zeiger, S., Atamuradova, F. and Conway, M. |
View
Publisher
|
Chapter |
Online Jihadi Instructional Content: The Role of Magazines
View Abstract
This chapter focuses on the instructional content, both text and images, published in 26 issues of three jihadi magazines: Al-Qaeda in the Arabian Peninsula’s Inspire, Inspire’s forerunner Jihad Recollections, and Somali Al-Shabab’s Gaidi M’taani. Instruction was found to be a core component of Inspire as distinct from the varying types and levels of instruction appearing in Jihad Recollections and Gaidi M’taani. Noticeable too was that the text and images composing bomb-making instructional guides were not only the commonest, but also the most detailed types of guides contained in Inspire, with both a high number of images and lengthy supporting text. A clear finding is thus that the purpose of AQAP’s Inspire was not just to inspire readers, in the sense of infusing them with some thought or feeling, but also to supply them with instructions on how these thoughts or feelings could be violently actuated.
|
2017 |
Conway, M., Parker, J. and Looney, S. |
View
Publisher
|
Journal Article |
Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-Betweens
View Abstract
The Syria conflict has been described as the most socially mediated in history, with online social media playing a particularly important role. At the same time, the everchanging landscape of the conflict leads to difficulties in applying analytical approaches taken by other studies of online political activism. Therefore, in this paper, we use an approach that does not require strong prior assumptions or the proposal of an advance hypothesis to analyze Twitter and YouTube activity of a range of protagonists to the conflict, in an attempt to reveal additional insights into the relationships between them. By means of a network representation that combines multiple data views, we uncover communities of accounts falling into four categories that broadly reflect the situation on the ground in Syria. A detailed analysis of selected communities within the antiregime categories is provided, focusing on their central actors, preferred online platforms, and activity surrounding “real world” events. Our findings indicate that social media activity in Syria is considerably more convoluted than reported in many other studies of online political activism, suggesting that alternative analytical approaches can play an important role in this type of scenario.
|
2014 |
O’Callaghan, D., Prucha, N., Greene, D., Conway, M., Carthy, J. and Cunningham, P. |
View
Publisher
|
Journal |
Online Terrorism and Online Laws
View Abstract
Terrorist and extremist movements have long exploited mass communications technology in pursuit of their political ends. The advent of the internet offers new opportunities. In response, state counter-measures seek to stem the impact of extreme ideologies by a number of tactics. “Positive” measures refer to those online initiatives that seek to make an impact through digital engagement and education and the provision of counter-narratives. “Negative” measures describe those approaches that advocate for, or result in, the deletion or restriction of violent extremist online content and/or the legal sanctioning of its online purveyors or users. More sanctions-based outcomes arise through discretionary state activity such as warnings and counselling of vulnerable individuals, or through disruptive counter-measures such as bans on the giving of lectures or prohibitions on the entry into the country of speakers or the taking down of extremist internet sites. Other measures step over into criminal justice, as when individuals are prosecuted for collecting materials or information (including typically information downloaded from the internet) or for issuing messages which can be construed as direct or indirect incitements to terrorism. This paper will analyse the responses to extremist uses of the internet, with an emphasis upon legal responses – “online laws”.
|
2015 |
Walkera, C. and Conway, M. |
View
Publisher
|