The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1080/1057610x.2016.1157408
|View full text |Cite
|
Sign up to set email alerts
|

Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
105
0
7

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 185 publications
(113 citation statements)
references
References 10 publications
1
105
0
7
Order By: Relevance
“…For example, there are questions about the role of technology in facilitating group-based violence -an issue that has been explored already in the case of CVE (e.g. Conway, 2010;von Behr et al, 2013;Conway, 2016). In turn, this kind of knowledge may provide gang research with valuable lessons in the future.…”
Section: Discussionmentioning
confidence: 99%
“…For example, there are questions about the role of technology in facilitating group-based violence -an issue that has been explored already in the case of CVE (e.g. Conway, 2010;von Behr et al, 2013;Conway, 2016). In turn, this kind of knowledge may provide gang research with valuable lessons in the future.…”
Section: Discussionmentioning
confidence: 99%
“…Tuduhan ini didukung oleh bukti kuat bahwa ada proses swa-radikalisasi sebelum pelaku melakukan tindakan mereka. Pelaku terkena pesan radikal melalui internet dan media sosial dan kemudian menjalankan misi tanpa perintah dari siapa pun (Chan, 2016 (Conway, 2017;Danzell & Maisonet Montañez, 2016). Sebaliknya, munculnya teknologi baru berpotensi berfungsi sebagai kekuatan pengganda teroris.…”
Section: Pendahuluanunclassified
“…Studies have often had a singular focus on Twitter due to its particular affordances (e.g., ease of data collection due to its publicness, the nature of its application programming interface), which is problematic. 37 For example, Europol's Internet Referral Unit reported that, as far back as mid-2016, they had identified "70 platforms used by terrorist groups to spread their propaganda materials." 38 This section of the article is therefore concerned with the wider online ecology where IS supporters and other non-IS jihadist users operate, with a particular focus on out-links from Twitter.…”
Section: Beyond Twitter: the Wider Jihadi Online Ecologymentioning
confidence: 99%