Journal Article |
Alt Tech and the public sphere: Exploring Bitchute as a political media infrastructure
View Abstract
The article explores Bitchute, a video-hosting platform associated with the Far/Alt Right, with the aim of understanding how it reconfigures political communication and the digital public sphere. Methodologically, the article employs the walkthrough method and non-participant observation to identify the main features and functionalities offered to users. These include a set of values that prioritise creators, an algorithmic organisation that keeps users engaged with a single creator channel rather than with the same topic across channels; and embedded buttons for tips and pledges for creators enabling them to directly monetise their content. The content posted on Bitchute tends to coalesce around politicised cultural issues. It is noteworthy that although Bitchute hosts some advertising, it does not use data for microtargeting and in general makes limited use of user data. We interpret these findings as suggesting that Bitchute constitutes a media infrastructure that encourages, incentivises and sustains microcelebrities of the Far/Alt Right, who act as ideology entrepreneurs. Bitchute can therefore be seen as an infrastructure for the multiplication/sustenance of ideological entrepreneurs/political influencers who vie for the attention and money of far-right publics. If we can speak of a structural transformation of the public sphere associated with Alt Tech, our discussion of Bitchute suggests that this takes the form of a political media infrastructure that enables the continued existence and consolidation of a new type of political actor, the ideology entrepreneur.
|
2023 |
Siapera, E. |
View
Publisher
|
PhD Thesis |
Techniques for analyzing digital environments from a security perspective
View Abstract
The development of the Internet and social media has exploded in the last couple of years. Digital environments such as social media and discussion forums provide an effective method of communication and are used by various groups in our societies. For example, violent extremist groups use social media platforms for recruiting, training, and communicating with their followers, supporters, and donors. Analyzing social media is an important task for law enforcement agencies in order to detect activity and individuals that might pose a threat towards the security of the society.
In this thesis, a set of different technologies that can be used to analyze digital environments from a security perspective are presented. Due to the nature of the problems that are studied, the research is interdisciplinary, and knowledge from terrorism research, psychology, and computer science are required. The research is divided into three different themes. Each theme summarizes the research that has been done in a specific area. The first theme focuses on analyzing digital environments and phenomena. The theme consists of three different studies. The first study is about the possibilities to detect propaganda from the Islamic State on Twitter. The second study focuses on identifying references to a narrative containing xenophobic and conspiratorial stereotypes in alternative immigration critic media. In the third study, we have defined a set of linguistic features that we view as markers of a radicalization.
|
2019 |
Shrestha, A. |
View
Publisher
|
Journal Article |
The Interaction of Extremist Propaganda and Anger as Predictors of Violent Responses
View Abstract
In this study, and with a view to extending upon existing findings on the effects of general violent media on violent cognitions, we experimentally measured the relationship between exposure to extremist propaganda and violent cognitions. Our results countered our hypotheses and the wider findings of violent media and aggression that exposure to violent stimuli increases violent thoughts and that this effect is moderated by trait aggression. Specifically, this study found that participants with low and medium trait aggression became more pro-social after being exposed to extremist propaganda. We discuss these results with reference to theories of terror management and mortality salience, as well as the implications of these results for wider theories of the role of online extremist material in the wider “radicalization” process.
|
2017 |
Shortland, N., Nader, E., Imperillo, N., Kyrielle, R. and Dmello, J. |
View
Publisher
|
Journal Article |
Vicarious Trauma via the Observation of Extremist Atrocities: A Rapid Evidence Assessment
View Abstract
Researchers are increasingly conducting research using primary source data involving observation of, and exposure to, violent extremist individuals, their acts, their online content, and the ideologies that they act in support of. Of concern is that this increased use of primary source material has not occurred alongside a serious investigation of the traumatic outcomes that may result from constant exposure to such materials within the process of conducting academic research. As such, the goal of this review is to conduct a rapid evidence assessment to identify (a) What theories currently exist that conceptualize trauma stemming from vicarious observation of extremist atrocities? (b) In what similar domains (if any) have researchers conceptualized the trauma that stems from vicarious observation of extremist atrocities? (c) What is the current evidence base for these theories? And (d) What are the immediate research needs to extend this research and support the research workforce? Articles were identified using search strings related to types of trauma, and relevant domains of work (e.g., criminal justice, healthcare, national security, content moderation). In total 34 articles were screened and assessed in full. The work domains of these articles ranged from drone warfare to digital forensics and interrogation interpreters. Overall, exposure to traumatic images, videos, and events is associated with burnout, secondary traumatic stress, turnover intentions, and a host of wider negative psychosocial outcomes. Furthermore, this process is impacted by several factors including the nature of the content, the wider organizational culture, and individual differences.
|
2024 |
Shortland, N., Crayne, M.P. and Mezzapelle, J.L. |
View
Publisher
|
Chapter |
The Jigsaw Initiative: Theoretical and Practical Considerations for Preventing Harm from Extreme and Extremist Content Online
View Abstract
Increasingly, global society is focused on the harm caused by material accessed on the internet. Individuals of all ages and backgrounds–policy makers, academics, politicians, mental health professionals, medical professionals and the general public–are seeking to understand the processes that govern the relationship between exposure to harmful content online and later harmful cognitions and behaviors. Several commentators have placed into stark focus several questions surrounding the use (and misuse) of the internet, and prevention of harm from it. Three issues come immediately to mind: First, what can be done to prevent the manifestation of harmful activities stemming from being online? Second, what is the underlying relationship between harmful material accessed online, and harmful behavioral outcomes? And third, what is the best approach (and how to we know what the “best” is) to prevent the manifestation of harmful behavior stemming from harmful content online? Rather than looking at each of these issues as a stovepipe, and seeking to answer each in isolation, in this chapter we adopt an integrationist perspective on the issue of preventing online harm online. Specifically, we will look at the theories of how and why exposure to extreme and harmful material online can cause negative real-world outcomes. We focus on the innovative Google-led program Jigsaw, 1 to explore the many and varied approaches that can be adopted to challenge and counter the issues of extreme and harmful material online. Finally, leveraging new approaches from public health (Su et al., 2021; Shortland et al., 2021), we outline the major ethical, practical, and theoretical issues that pervade technology-based efforts to tackle the issue of extreme and harmful material online.
|
2023 |
Shortland, N. and McGarry, P. |
View
Publisher
|
Journal Article |
The personality and propaganda puzzle: Exploring the effect of personality on exposure to extremist content online
View Abstract
Objective: This paper applies Reinforcement Sensitivity Theory to explain the role of exposure to violent extremist content online in the wider psychological process of “radicalization.” Reinforcement Sensitivity Theory is a suitable theory to apply to this domain given that (a) the motivation to engage in violent extremism is widely discussed, yet motivational theories are rarely applied and (b) current risk factors for engagement in violent extremist behavior show a high degree of overlap with core Reinforcement Sensitivity Theory variables (e.g., impulsivity and social dominance). Method: This study uses an experimental design in which 479 participants from Amazon’s Mechanical Turk were randomly assigned one of two short vignettes (violent extremist/violent nonextremist) to frame the content of a social media-based behavioral task. The effect of exposure to violent extremist content online on intentions for political mobilization was measured via the Activism and Radicalism Intentions Scale. Results: While exposure to online violent extremist content did not increase tendencies for political mobilization, Behavioral Activation System traits were positively associated with the willingness to engage with violent extremist content online and with intentions for political mobilization. Conclusions: Behavioral Activation System traits provide a possible avenue to explain individual differences in the process of radicalization and the potential relevance of Reinforcement Sensitivity Theory for theories of radicalization provides further evidence that new knowledge that can be gleaned by applying established psychological theories to the study of radicalization.
|
2021 |
Shortland, N. and McGarry, P. |
View
Publisher
|