Blog
Women’s Key Role in Islamic State Online Networks, Explained
October 5, 2016
By Neil Johnson In early September, three women were arrested in Paris for attempting to detonate a car bomb outside Notre Dame cathedral. “If at first it appeared that women were confined to family and domestic chores by the Daesh terrorist organization, it must be noted that this view is now completely outdated,” François Molins, a ...
Blog
Tips and Tricks from Google/YouTube, Facebook, and EXIT Germany for Effective Online CVE
September 30, 2016
The EU’s Radicalisation Awareness Network (RAN) brings together practitioners from around Europe working on the prevention of radicalisation. The aim of RAN’s Communication and Narratives (C&N) working group is to gather insights on both online and offline communication that 1.) offers alternatives to or 2.) counters extremist propaganda and/or challenges extremist ideas. The following is ...
News
EC – VOX-Pol Lunch Briefing Series
September 26, 2016
The VOX-Pol Network of Excellence invites you to a series of Lunchtime Briefing Seminars, this autumn in Brussels, each exploring a different aspect of Violent Online Political Extremism The series is jointly organised by the VOX-Pol Network of Excellence and the Representation of the European Commission in Belgium. The briefings are aimed at an audience of policy ...
Blog
Accusations in a Mirror: ISIS, Anti-Muslim Hate Speech, and the Refugee Crisis
September 21, 2016
Rather than analyzing the so-called ‘Islamic States’’ use of (social) media, in this post Dr. Matti Pohjonen, VOX-Pol Research Fellow 2016, explores if parallels can be drawn between it and a topic he’s more familiar with: far right anti-Islamic hate speech.  Following the Paris, Brussels, and other attacks, newspaper commentaries have routinely warned about the ...
Blog
Responsible Communication by Internet Intermediaries
September 14, 2016
By Marcelo Thompson In debates concerning Internet intermediary liability, an often-expressed view is that intermediaries (such as Facebook and Google) shouldn’t be turned into adjudicators, who reason and decide about the legal or illegal nature of content they host, and thus about whether or not to take such content down. But is that a plausible view? ...
Blog
Computational Social Science: Understanding Terrorist Attacks on Twitter
September 7, 2016
By Erin C. McGrath and Cody Buntain Reported terrorist attacks increased dramatically over the last decade or so, from just under 3,000 per year in 2001 to nearly 17,000 in 2014, amplifying the number of people subjected to the effects of terrorist attacks nearly six-fold over the last decade. At the same time, the introduction, popularity, ...
Newsletter
VOX-Pol Newsletter 3(3) August 2016
August 11, 2016
Welcome to Volume 3 Issue 3 of the VOX-Pol Newsletter. If you have colleagues or friends who may be interested in the content of this newsletter or any events and research carried out by VOX-Pol, please encourage them to subscribe via our website. Follow us on Twitter @VOX_Pol for live updates and releases. Yours sincerely, The VOX-Pol ...
Blog
EXTREMISMO VIRAL – When did Islamic State’s (IS) Online Media Strategy Begin to Take Shape?
July 27, 2016
At the end of April, VOX-Pol’s Coordinator, Prof. Maura Conway, exchanged a series of emails with Brazilian magazine Imprensa’s Gabriela Ferigato for a feature piece she was writing on the so-called ‘Islamic State’s’ online activity. The feature appeared recently and is available to read HERE for Portuguese speakers. A lightly edited version of the original ...
Blog
Dataset Spotlight: How ISIS Uses Twitter- Interview with Khuram Zaman
July 20, 2016
by Megan Risdal Many of us know that data collection, cleaning, and processing is a time-consuming and sometimes arduous ordeal that requires patience along with elbow grease. It’s usually the end product—insights from an analysis to feed action—that motivates us to munge. In this interview, Khuram Zaman of Fifth Tribe, explains how a desire to ...
Blog
How Technology Could Help Predict Terrorist Attacks
July 13, 2016
by Sheryl Prentice The internet has become a weapon for terrorists, who use social media and other technologies to organise, recruit and spread propaganda. So is it possible to turn technology around and use it to not only catch terrorists but predict and potentially stop terror attacks before they happen? One thing we can do ...