Exploring the capabilities of Prevent in addressing radicalisation in cyberspace within Higher Education

Authors

  • Liam Sandford University of Gloucestershire

Keywords:

Prevent Duty, Counter Terrorism, Radicalisation, Higher Education, Counter-narratives

Abstract

The Counter Terrorism and Security Act (2015) introduced a binding duty on public sector bodies in the United Kingdom (UK), including education, to have ‘due regard to the need to prevent people from being drawn into terrorism’. The Prevent duty has become widely controversial in the Higher Education (HE) sector with questions as to whether it contravenes academic freedom and freedom of speech.

This research seeks to identify how Prevent may be applied to cyberspace to reduce risk of students being radicalised online at universities. Through semi-structured interviews (N= 16) with individuals working in Prevent and HE, attention is given to the capability of monitoring and filtering website content, which must be considered by universities as part of Prevent compliance. In addition, non-technical methods of reducing radicalisation in cyberspace are explored. Consideration is given to building students’ resilience to challenging information they see online through developing counter-narrative content for social media platforms. With students developing counter-narrative content themselves, specifically addressing vulnerability drivers to radicalisation, universities can enhance compliance with Prevent and create counter extremist content which can be used in cyberspace both in and outside of HE.

References

Abdulhamid, S and Ibrahim, F, 2014. Controlling citizens cyber viewing using enhanced internet content filters Information Technology and Computer Science, 12 (1), 56-63

Acik, N., Deakin, H and Hindle, R, 2018. Safeguarding, surveillance and control: school policy and practice responses to the Prevent duty in the ‘war on terror’ in the UK, The Palgrave International Handbook of School Discipline, Surveillance, and Social Control, 467-489

Aloi, G., Di Felice, M., Loscri, V., Pace, P and Ruggeri, G, 2014. Spontaneous smartphone networks as user-centric solution for the future internet, Communications Magazine, 52 (12), 26-33

Araujo, T., Neijens, P and Vliegenthart, 2015. What motivates consumers to retweet brand content? The impact of information, emotion and traceability on pass-along behaviour, Journal of Advertising Research, 55 (3), 284-295

Awan, I, 2017. Cyber extremism: ISIS and the power of social media, Society, 54 (2), 138

Barber, N and King, J, 2017. Henry Pearce: some thought on the encryption regulatory debate, UK Constitutional Law Association, 4 (25), 8-15

Barratt, M., Choi, T and Li, M, 2011. Qualitative case studies in operations management: trends, research outcomes, and future research implications, Journal of Operations Management, 29 (4), 329-342

Bertram, L, 2016. Terrorism, the internet and the social media advantage: exploring how terrorist organisations exploit aspects of the internet , social media and how these same platforms could be used to counter violent extremism, Journal for Deradicalisation, 7 (1), 225-252

Braun, V and Clarke, V, 2006. Using thematic analysis in psychology. Qualitative Research in Psychology, 3, 77-101

Burnard, P, 1991. A method of analysing interview transcripts in qualitative research, Nurse Education Today, 11 (6), 461-446

Busher, J., Choudhury, T., Thomas, P and Harris, G (2017). What the Prevent duty means for schools and colleges in England: An analysis of educationalists’ experiences. Research Report. Aziz Foundation

Cerekovic, A., Aran, O and Gatica-Perez, 2017. Rapport with virtual agents: what do human social cues and personalities explain?, Transactions on Affective Computering, 8 (3), 382-395

Ceron, A and Memoli, V, 2016. Flames and debates: do social media affect satisfaction with democracy?, Social Indicators Research, 126 (1), 255-240

Considine, B., Krahel, J., Lenk, M and Janvrin, D, 2016. Social technology: a compendium of short cases, Issues in Accounting Education, 31 (4), 417-430

Coppock, V and McGovern, 2014. ‘Dangerous minds’? Deconstructing counter terrorism discourse, radicalisation and the ‘psychological vulnerability’ of Muslim children and young people in Britain, Children and Society, 28 (3), 242-256

Cornell, H, 2016. Counter terrorism, radicalisation, and the university: debating the Prevent Strategy, Global Justice Academy Blog, 1 (20), 9-15

Costa, D, 2015. First word, PC Magazine, 1 (1), 6-8

Counter Terrorism and Security Act (2015). Available at http://www.legislation.gov.uk/ukpga/2015/6/pdfs/ukpga_20150006_en.pdf (Accessed: 7th November 2016)

Cozine, K, 2016. Social media and the globalisation of Sicarii, Global Security Studies, 7 (1), 1-12

Cram, I and Fenwick, H, 2018. Protecting free speech and academic freedom in universities, Modern Law Review, 81 (5), 825-873

Curren, R, 2017. Why character education?, Impact, 24 (1), 1-44

Davies, M, 2015. Academic freedom: a lawyer’s perspective, The International Journal of Higher Education Research, 70 (6), 987-1002

Durodie, B, 2016. Securitising education to prevent terrorism or losing direction?, British Journal of Educational Studies, 64 (1), 21-35

Elton-Chalcraft, S., Lander, V., Revell, L., Warner, D and Whitworth, L, 2017. To promote, or not to promote fundamental British values? Teachers’ standards, diversity and teacher education, British Educational Research Journal, 43 (1), 29-48

Extreme Dialogue (2017). About Extreme Dialogue, Available at http://extremedialogue.org/about/ (Accessed: 15th March 2017)

Goodman, S., Kirk, J and Kirk, M, 2007. Cyberspace as a medium for terrorists, Terrorism and Technology, Technological Forecasting and Social Change, 74 (2), 193-210

Guiora, L, 2018. Inciting terrorism on the internet: the limits of tolerating intolerance, Incitement to Terrorism, 253 (1), 1-10

Hare, C, 2017. Digital surveillance detrimental to learning, expert says, ATA News, 51 (10), 12-13

Heath-Kelly, C and Strausz, E, 2018. The banality of counterterrorism ‘after, after 9/11’? perspectives on the Prevent duty from the UK health care sector, Critical Studies on Terrorism, DOI: 10.1080/17539153.2018.1494123

Institute for Strategic Dialogue (2019). Innovation Fund Round 1 Awarded Projects, Available at https://www.isdglobal.org/innovation-fund/innovation-fund-round-1/ (Accessed: 14th April 2019)

Isaacson, S, 2016. Finding something more in targeted cyberspace activities, Rutgers University Law Review, 68 (1), 905

Lee, P., Hui, S and Fong, A, 2005. An intelligent categorisation for bilingual web content filtering, Transactions on Multimedia, 7 (6), 1183-1190

Loughry, M and Tosi, H, 2008. Performance implications of peer monitoring, Organisation Science, 19 (6), 876-890

McNicol, S, 2016. Responding to concerns about online radicalisation in UK schools through a radicalisation critical digital literacy approach, Computers in the Schools, 33 (4), 227-238

McQueeney, K, 2014. Disrupting Islamophobia: teaching the social construction of terrorism in the mass media, International Journal of Teaching and Learning in Higher Education, 26 (2), 297-309

Miah, S, 2017. The Prevent policy and the values discourse: Muslims and radical governmentality, Muslim Students, Education and Neoliberalism: Schooling a ‘suspect community’, 1 (1), 131-144

NUS (2015). Preventing Prevent handbook. Available at http://www.nusconnect.org.uk/articles/preventing-prevent-handbooks (Accessed: 20th March 2017)

O’Connor, K., Schmidt, G and Drouin, M, 2016. Suspended because of social media? Students’ knowledge and opinions of university social media policies and practices, Computers in Human Behaviour, 65 (6), 619-626

Pal. S, 2015. Spies, surveillance and stakeouts: Monitoring Muslim moves in British State Schools, Race, Ethnicity and Education, 18 (2), 183-201

Prevent Duty Guidance for Higher Education Institutions in England and Wales (2015). Available at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/445916/Prevent_Duty_Guidance_For_Higher_Education__England__Wales_.pdf (Accessed: 12th March 2017)

Prevent Duty Guidance for Higher Education Institutions in Scotland (2015). Available at https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/445921/Prevent_Duty_Guidance_For_Higher_Education__Scotland_-Interactive.pdf (Accessed: 20th November 2017)

Ribeiro, J, 2015. Facebook to widen use of safety check tool beyond Paris attacks, PC World, 1 (1), 1

Santoro, D, 2018. A cosmopolitanism of fear: the global significance of terrorism after 9/11, Knowledge Cultures, 6 (3), 28-42

Straw, W, 2016. How do you get people to leave Islamist or neo-nazi movements?, Left foot forward: Evidence Based Political Blogging, 8 (5), 36-45

Streitwieser, B., Kristen, A., & Duffy-Jaeger, K, 2019. Higher Education in an Era of Violent Extremism: Exploring Tensions Between National Security and Academic Freedom. JD Journal for Deradicalisation, Spring 2019 (18), 74-107

Sukarieh, M and Tannock, S, 2016. The deradicalisation of education: terror, youth and the assault on learning, Race and Class, 57 (4), 22-38

Terrazas-Arellanes, F., Knox, C., Anderson-Inman, L., Walden, D and Hildreth, 2016. The SOAR strategies for online academic research, Special and Gifted Education, 1 (1), 351-389

Theohary, C and Rollins, J, 2011. Terrorist use of the internet: information operations in cyberspace, International Journal of Terrorism and Political Hot Spots, 6 (4), 597-614

Thorne, A, 2015. Social media, civility and free expression, Academic Questions, 28 (3), 334-338

Vanderbeck, R and Johnson, P, 2016. The promotion of British values: sexual orientation equality, religion, and English schools, International Journal of Law, Policy and the Family, 30 (3), 292-321

Weimann, G (2014). New Terrorism and New Media. Washington, DC: Commons Lab of the Woodrow Wilson International Center for Scholars

Wolff, J and Lehr, W, 2018. When cyber threats loom, what can state and local governments do?, Georgetown Journal of International Affairs, 19 (1), 76-82

Wright, J and Breindl, Y, 2013. Internet filtering trends in liberal democracies: French and German regulatory debates, Internet Policy Review, 2 (2), 1

Xie, Y., Qiao, R., Shao, G and Chen, H, 2016. Research on Chinese social media users’ communications during public emergency events, Special Issue on Social Media in China, Telematics and Informatics, 34 (3), 740-754

Zelenkauskaite, A and Balduccini, M, 2017. ‘Information warfare’ and online news commenting: analysing forces of social influence through location based commenting user typology, Social Media and Society, 3 (3), 1-13

Zsidisin, G and Wagner, S, 2010. Do perceptions become reality? The moderating role of supply chain resiliency on disruption occurrence, Journal of Business Logistics, 31 (2), 1-20

Zucker, A, 2019. Using critical thinking to counter misinformation, Science Scope, 42 (8), 6-9

Downloads

Published

2019-06-21

Issue

Section

Articles