Journal Article |
Digital Reconstruction: A Critical Examination of the History and Adaptation of Ku Klux Klan Websites
View Abstract
In response to the data revolution, academic research and media attention have increasingly focused on the technological adaptation and innovation displayed by the far right. The greatest attention is paid to social media and how groups and organizations are utilizing technological advancement and growth in virtual networks to increase recruitment and advance radicalization on a global scale. As with most social and political endeavors, certain technologies are in vogue and thus draw the attention of users and regulators and service providers. This creates a technological blind spot within which extremist groups frequently operate older and less well regarded technologies without the oversight that one might expect. This article examines the less well-studied traditional and official websites of the Ku Klux Klan, the most established and iconic of American far-right organizations. By incorporating non-participant observation of online spaces and thematic analysis, this research analyzes the evolution of 26 websites, from their emergence in the early 1990s to the present day. We examine the ways in which traditional printed communications and other ephemera have progressed with advances in technology, focusing on the following central elements of Klan political activism and community formation: Klan identity, organizational history, aims and objectives; technology and outreach, including online merchandise and event organization; and the constructions of whiteness and racism. The results add value and insight to comparable work by offering a unique historical insight into the ways in which the Klan have developed and made use of Web 1.0, Web 2.0, and Web3 technologies.
|
2024 |
Kingdon, A. and Winter, A. |
View
Publisher
|
Journal Article |
Digital Resilience Tactics of Syrian Refugees in the Netherlands: Social Media for Social Support, Health, and Identity
View Abstract
The process of adjusting to a new country may carry important stressors for refugees. In the light of neoliberal policies, refugees are expected to become resilient in a local arrival infrastructure and perform a specific subjectivity based on gratefulness, adaptability, and digital sensitivity to successfully integrate. Drawing on a qualitative, in-depth case study with Syrians living in the Netherlands, this article explores the impact of the retreat of the welfare state and unfolding digital transitions on resilience tactics of marginalized people like refugees. While recognizing the systemic violence and historic trauma many refugees have experienced, we focus on how refugees are expected to and develop ways to become resilient. Three digital resilience tactics are discussed: digital social support, digital health, and digital identities. Social support was mainly sought from family, friends, organizations, and social media platforms, whereas refugees’ engagement in meaningful digital practices aimed at fostering health promotion and identity management. Our fieldwork resurfaces paradoxes of digital resilience as described by careful emotional digital labor refugees engage in when communicating with families, the role of socio-cultural factors in shaping refugees’ ICT (information and communication technology) adoption and use for health support, and negotiation of different and conflicting identity axes online. Finally, our study provides some insights into the implementation of more effective online and offline practices in the context of social and health support by host countries.
|
2020 |
Udwan, G., Leurs, K. and Alencar, A. |
View
Publisher
|
Policy |
Digital Services Act & Terrorist Content Online Regulation: Analysis and Comparison
View Abstract
The Digital Services Act (DSA) and the Regulation on Terrorist Content Online (TCO) are both legislative measures enacted by the European Union (EU) which are aimed at regulating digital
services and combating the spread of harmful content online. While both measures are concerned with reducing online harm in the EU, they differ in the nature and extent of: the harm they purport to mitigate; the burden of compliance imposed on platforms undertaking relevant activities; and on the activities which bring platforms in scope. In its concern with a more specific and egregious form of online harm, the TCO generally imposes more stringent requirements on tech platforms and is expressed in more mandatory terms. However, this is not uniformly the case across all the areas which are common to both the DSA and the TCO. In the matter of crisis response in particular, the DSA’s requirements are more exacting and potentially more onerous than those provided by the TCO.
|
2024 |
Tech Against Terrorism Europe |
View
Publisher
|
Report |
Digital Terrorism and Hate 2012: The Power of Social Networking in the Digital Age
View Abstract
Analysis of ‘digital terrorism’ and hate on the Internet
|
2012 |
Abraham, R. and Rick Eaton, C. |
View
Publisher
|
Journal |
Digital/Commercial (in)Visibility
View Abstract
This article explores one aspect of digital politics, the politics of videos and more specifically of DAESH recruitment videos. It proposes a practice theoretical approach to the politics of DAESH recruitment videos focused on the re-production of regimes of (in)visibility. The article develops an argument demonstrating specifically how digital and commercial logics characterize the aesthetic, circulatory, and infrastructuring practices re-producing the regime of (in)visibility. It shows that digital/commercial logics are at the heart of the combinatorial marketing of multiple, contradictory images of the DAESH polity in the videos; that they are core to the participatory, entrepreneurial, individualized and affective processes of contagion determining whom the videos reach and involve; and that they shape the sorting, linking, flagging and censoring of the videos that define their accessibility on the internet. The theoretical and political cost of overlooking these digital and commercial characteristics of DAESH visibility practices are high. It perpetuates misconceptions of how the videos work and what their politics are and it reinforces the digital Orientalism/Occidentalism in which these misconceptions are anchored.
|
2017 |
Leander, A. |
View
Publisher
|
Journal Article |
Digitale Worte – Analoge Taten: Eine fallgestützte Analyse nach außen und nach innen kommunizierter Ideologie einer rechtsextremen Gruppierung
View Abstract
In diesem Beitrag werden auf Basis von staatsanwaltschaftlichen Verfahrensakten, Daten der Programmierschnittstelle von Twitter (API) und frei zugänglichen Online-Inhalten Konstitutions- und Kommunikationsdynamiken einer rechtsextremistischen Gruppierung analysiert, von der mehrere Mitglieder 2014 wegen der Bildung einer kriminellen Vereinigung verurteilt wurden. Es wird rekonstruiert und analysiert, wie die jungen Erwachsenen über verschiedene Kommunikationskanäle innerhalb ihrer Gruppe und nach außen kommunizieren, wie sich interne und externe Selbstdarstellungen unterscheiden. Dabei wird aufgezeigt, welchen Stellenwert Gewalt und Gewaltbefürwortung in dieser Gruppe besitzen, wie sich die Mitglieder als Individuen und als Kollektiv definieren, Geltung verschaffen und von anderen abgrenzen wollen. Da für die Kommunikation der Gruppe nicht zuletzt Social Media eine Rolle spielen, wird auch diskutiert, inwiefern Mechanismen digitaler, netzwerkbasierter Kommunikation, wie die sogenannte Filterblase, für den Radikalisierungsprozess relevant sind.
|
2020 |
Schwarz, K., Hartung, F., Piening, M.T., Bischof, S., Fernholz, T., Fielitz, M., Patz, J., Richter, C., Diskriminierung, F. and Hasskriminalität, F. |
View
Publisher
|