Journal Article |
Capitalizing on the Koran to Fuel Online Violent Radicalization: A Taxonomy of Koranic References in ISIS’s Dabiq
View Abstract
The current study set out to investigate to what extent ISIS is bolstering its jihadist ideology on a ‘cut-and-paste’ or ‘cherry-picked’ version of Islam in their renowned online propaganda magazine Dabiq. The main objective was to examine in a systematic and quantitative way to what extent ISIS utilizes the Koran in an atomistic, truncated and tailored manner to bolster its religious legitimacy. A total of 15 issues of Dabiq and 700 Koranic references were scrutinized. By means of a quantitative analysis we developed an innovative taxonomy of Koranic chapters and verses (i.e. surahs and ayat, respectively) on the basis of their appearance in Dabiq. Our large-scale data analysis provide consistent empirical evidence for severe decontextualization practices of the Koran in three ways: (1) a thin, Medinan-dominated religious layer, (2) ayah mutilation, and (3) clustered versus exclusive mentions. Limitations and implications for future research, policy makers and CVE initiatives are discussed.
|
2018 |
Frissen, T., Toguslu, E., Van Ostaeyen, P., and d'Haenens, L. |
View
Publisher
|
Report |
Caught In The Net: The Impact Of “Extremist” Speech Regulations On Human Rights Content
View Abstract
Social media companies have long struggled with what to do about extremist content on their platforms. While most companies include provisions about “extremist” content in their community standards, until recently, such content was often vaguely defined, providing policymakers and content moderators a wide berth in determining what to remove, and what to allow. Unfortunately, companies have responded with overbroad and vague policies and practices that have led to mistakes at scale that are decimating human rights content.
|
2019 |
Jaloud, A. R. A., Al Khatib, K., Deutch, J., Kayyali, D. and York, J. C. |
View
Publisher
|
Journal Article |
Censoring Extremism: Influence of Online Restriction on Official Media Products of ISIS
View Abstract
Recognizing that militant, non-state groups utilize social media and online platforms to reach members, sympathizers, and potential recruits, state agencies and social media corporations now increasingly regulate access to accounts affiliated with such groups. Scholars examining deplatforming efforts have, to date, focused on the extent of audience loss after account restrictions and the identification of strategies for regrouping online followers on the same or different platforms over time. Left unexplored is if and how militant non-state groups adapt their official messaging strategies in response to platform restrictions despite continuing online access to them. To begin to fill that gap, this study compares ISIS’s 550 images displayed in the group’s official newsletter al-Naba 6 months before and after Europol’s November 2019 take-down of terrorist affiliated accounts, groups, channels, and bots on Telegram. It conducts a content analysis of images related to militaries and their outcomes, non-military activities and their outcomes, and presentational forms. The findings demonstrate that ISIS visually emphasizes its standard priming approach but shifts its agenda-setting strategy. While retaining some of its standard visual framing practices, the group also alters frames, particularly those related to images showing opposing militaries and military outcome.
|
2021 |
McMinimy, K., Winkler, C.K., Lokmanoglu, A.D. and Almahmoud, M. |
View
Publisher
|
Journal Article |
Challenges and Frontiers in Abusive Content Detection
View Abstract
Online abusive content detection is an inherently difficult task. It has received considerable attention from academia, particularly within the computational linguistics community, and performance appears to have improved as the field has matured. However, considerable challenges and unaddressed frontiers remain, spanning technical, social and ethical dimensions. These issues constrain the performance, efficiency and generalizability of abusive content detection systems. In this article we delineate and clarify the main challenges and frontiers in the field, critically evaluate their implications and discuss potential solutions. We also highlight ways in which social scientific insights can advance research. We discuss the lack of support given to researchers working with abusive content and provide guidelines for ethical research.
|
2019 |
Vidgen, B., Harris, A., Nguyen, D., Tromble, R., Hale, S. and Margetts, H. |
View
Publisher
|
Journal Article |
Challenges of Deplatforming Extremist Online Movements: A Machine-Learning Approach
View Abstract
Online extremist movements are increasingly using social media communities to share content, spread their ideologies, recruit members, and mobilize offline activities. In recent years, mainstream platforms, including Twitter and Facebook, have adopted policies to remove or deplatform some of these movements. Yet online extremists are well-known for their abilities to adapt, self-censor, and migrate across online platforms. How successful have these extremist movement deplatformings been? To answer this question, we begin by training a classifier to identify content generated by four prominent extremist movements: white supremacists, patriot/militia groups, QAnon, and Boogaloos. After doing so, we use this classifier to analyze approximately 12 million posts generated by about 1500 online hate communities across 8 social media platforms, including both mainstream and alternative platforms. We find that the deplatformings of Boogaloos and QAnon by mainstream platforms were initially highly successful, but that both movements were able to find ways to re-introduce their content on these platforms. These findings highlight the challenges of movement-based deplatforming, and they point toward important implications for content moderation.
|
2023 |
Lupu, Y., Sear, R., Restrepo, N.J., Velásquez, N., Leahy, R., Goldberg, B. and Johnson, N.F. |
View
Publisher
|
VOX-Pol Blog |
Challenges of Using Twitter as a Data Source: An Overview of Current Resources
View Abstract
|
2016 |
Ahmed, W. |
View
Publisher
|