2017
DOI: 10.1111/1745-9133.12267
|View full text |Cite
|
Sign up to set email alerts
|

Countering Violent Extremism Online and Offline

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(12 citation statements)
references
References 6 publications
(5 reference statements)
0
10
0
1
Order By: Relevance
“…(). As valuable as these data have been, Szmania and Fincher () point out that such data also have obvious limitations. As Sageman (: 572) has argued, it would be extremely helpful if the intelligence community would do a better job of sharing information about terrorist plots with researchers in the academic community.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…(). As valuable as these data have been, Szmania and Fincher () point out that such data also have obvious limitations. As Sageman (: 572) has argued, it would be extremely helpful if the intelligence community would do a better job of sharing information about terrorist plots with researchers in the academic community.…”
Section: Resultsmentioning
confidence: 99%
“…It is also worth emphasizing that much of the current research on terrorism within the academic community is based on unclassified open-source data such as those used by Gill et al (2017). As valuable as these data have been, Szmania and Fincher (2017) point out that such data also have obvious limitations. As Sageman (2014: 572) has argued, it would be extremely helpful if the intelligence community would do a better job of sharing information about terrorist plots with researchers in the academic community.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Extremists exploit social media platforms, and the Internet more generally, for a range of reasons; from spreading hateful narratives and propaganda to financing, recruitment, and sharing operational information (Gill et al, 2017). How best to counter such activity has recently been the focus of an emerging field of academic and policy debate (Aly, Macdonald, Jarvis, & Chen, 2016;Braddock & Horgan, 2016;Davies, Neudecker, Ouellet, Bouchard, & Ducol, 2016;Helmus, 2018;Szmania & Fincher, 2017). While many extremists end up barred from social media at the discretion of hosting platforms (Citron, 2018;Gillespie, 2018), often in discussion with government and law enforcement (Brocato, 2015;Brown & Pearson, 2018), significant attention is being paid to countermessaging and other strategic communication techniques as potential responses (Bertram, 2016;Beutel et al, 2016;Braddock & Horgan, 2016;Briggs & Feve, 2013;Brown & Marway, 2018;Cherney, 2016;Eerten & van Doosje, 2019).…”
Section: Introductionmentioning
confidence: 99%