Reviewing the Role of the Internet in Radicalization Processes

Authors

  • Özen Odag Touro College Berlin, Germany
  • Anne Leiser Bremen International Graduate School of Social Sciences (BIGSSS), Jacobs University Bremen
  • Klaus Boehnke Bremen International Graduate School of Social Sciences (BIGSSS), Jacobs University Bremen, Germany, and Center for Sociocultural Research, Higher School of Economics, Moscow, Russia

Keywords:

Internet, Social Media, Radicalization, Extremism, Right-Wing Extremism, Jihadism

Abstract

This review presents the existing research on the role of the Internet in radicalization processes. Using a systematic literature search strategy, our paper yields 88 studies on the role of the Internet in a) right-wing extremism and b) radical jihadism. Available studies display a predominant interest in the characteristics of radical websites and a remarkable absence of a user-centred perspective. They show that extremist groups make use of the Internet to spread right wing or jihadist ideologies, connect like-minded others in echo chambers and cloaked websites, and address particularly marginalized individuals of a society, with specific strategies for recruitment. Existing studies have thus far not sufficiently examined the users of available sites, nor have they studied the causal mechanisms that unfold at the intersection between the Internet and its users. The present review suggests avenues for future research, drawing on media and violence research and research on social identity and deindividuation effects in computer-mediated communication.

Author Biography

Anne Leiser, Bremen International Graduate School of Social Sciences (BIGSSS), Jacobs University Bremen

This review presents the existing research on the role of the Internet in radicalization processes. Using a systematic literature search strategy, our paper yields 88 studies on the role of the Internet in a) right-wing extremism and b) radical jihadism. Available studies display a predominant interest in the characteristics of radical websites and a remarkable absence of a user-centred perspective. They show that extremist groups make use of the Internet to spread right wing or jihadist ideologies, connect like-minded others in echo chambers and cloaked websites, and address particularly marginalized individuals of a society, with specific strategies for recruitment. Existing studies have thus far not sufficiently examined the users of available sites, nor have they studied the causal mechanisms that unfold at the intersection between the Internet and its users. The present review suggests avenues for future research, drawing on media and violence research and research on social identity and deindividuation effects in computer-mediated communication.

References

Agarwal, S., & Sureka, A. (2015). Topic-specific YouTube crawling to detect online radicalization. In International Workshop on Databases in Networked Information Systems (pp. 133-151). Springer, Cham.

Aly, A. (2017). Brothers, believers, brave mujahideen: Focusing attention on the audience of violent jihadist preachers. Studies in Conflict and Terrorism, 40(1), 62-76.

Anderson, CA., Shibuya, A., Ihori, N., Swing, EL., Bushman, BJ., Sakamoto, A., ... Barlett, C. P. (2010). Violent video game effects on aggression, empathy, and prosocial behavior in Eastern and Western countries: A meta-analytic review. Psychological Bulletin, 136(2), 151-173.

Ashour, O. (2010). Online de-radicalization? Countering violent extremist narratives: Message, messenger and media strategy. Perspectives on Terrorism, 4(6), 15-19.

Archetti, C. (2013). Understanding terrorism in the age of global media: A communication approach. Basingstoke, England: Palgrave Macmillan.

Archetti, C. (2015). Terrorism, communication and new media: Explaining radicalization in the digital age. Perspectives on Terrorism, 9(1), 49-59.

Archer, T. (2011). Breivik’s swamp: Was the Oslo killer radicalized by what he read online? Foreign Policy. Retrieved December 12, 2019 from http://foreignpolicy.com/2011/07/25/breiviks-swamp/

Awan, A. (2007). Virtual jihadist media: Function, legitimacy and radicalizing efficacy. European Journal of Cultural Studies, 10(3), 389-408.

Back, L. (2002). Aryans reading Adorno: Cyber-culture and twenty-first-century racism. Ethnic and Radical Studies, 25(4), 628-651.

Bakker, E., & de Graaf, B. (2011). Preventing lone wolf terrorism: Some CT approaches addressed. Perspectives on Terrorism, 5(6), 43-50.

Barker, V. (2009). Older adolescents’ motivations for social network site use: The influence of gender, group identity, and collective self-esteem. CyberPsychology and Behavior, 12(2), 209-213.

Bartholow, B. D., & Anderson, C. A. (2002). Effects of violent video games on aggressive behavior: Potential sex differences. Journal of Experimental Social Psychology, 38(3), 283-290.

Baruch, B., Ling, T., Warnes, R., & Hofman, J. (2018). Evaluation in an emerging field: Developing a measurement framework for the field of counter-violent-extremism. Evaluation, 24(4), 475-495.

Hill, J. (2019). Germany shooting: Horror of Jews targeted in Halle attack. BBC. Retrieved December 12, 2019 from https://www.bbc.com/news/world-europe-49997779?intlink_from_url=https://www.bbc.com/news/topics/crm5pkwjyjyt/germany-gun-attack&link_location=live-reporting-story

Baaken, T., & Schlegel, L. (2017). Fishermen or swarm dynamics? Should we understand jihadist online-radicalization as a top-down or bottom-up process? Journal for Deradicalization, 13.

Benson, D. C. (2014). Why the Internet is not increasing terrorism. Security Studies, 23(2), 293–328.

Berger, J. M. (2015). The metronome of apocalyptic time: Social media as a carrier wave for millenarian contagion. Perspectives on Terrorism, 9(4), 61-71.

Bijvank, M. N., Konijn, E. A., & Bushman, B. J. (2007, May). Bridging the video game gap: Relating games, players, and their motivations. Paper presented at the Annual Meeting of the International Communication Association, San Francisco, California.

Bjørgo, T. (2011). Dreams and disillusionment: Engagement in and disengagement from militant extremist groups. Crime, Law and Social Change, 55(4), 277-285.

Blumler, J. G., & Katz, E. (1974). The uses of mass communication. Newbury Park, CA: Sage.

Boehnke, K., Münch, T., & Hoffmann, D. (2002). Development through media use? A German study on the use of radio in adolescence. International Journal of Behavioral Development, 26, 193-201.

Böckler, N., Hoffmann, J., & Zick, A. (2015). The Frankfurt airport attack: A case study on the radicalization of a lone-actor terrorist. Journal of Threat Assessment and Management, 2(3-4), 153.

Braddock, K., & Dillard, J. P. (2016). Meta-analytic evidence for the persuasive effect of narratives on beliefs, attitudes, intentions, and behaviors. Communication Monographs, 83(4), 446-467.

Braddock, K., & Horgan, J. (2015). Towards a guide for constructing and disseminating counternarratives to reduce support for terrorism. Studies in Conflict and Terrorism, 39(5), 381-404.

Brady, S. S., & Matthews, K. A. (2006). Effects of media violence on health-related outcomes among young men. Archives of Pediatrics and Adolescent Medicine, 160(4), 341-347.

Briggs, R., & Feve, S. (2013). Review of programs to counter narratives of violent extremism: What works and what are the implications for government? (Vol. July, 2013). London: Institute for Strategic Dialogue.

Brewer, G. (2011). Media violence. In G. Brewer (Ed.), Media Psychology (pp. 9 – 27). Hampshire, England: Palgrave Macmillan.

Brockmyer, J. F. (2013). Media violence, desensitization, and psychological engagement. In K. Dill (Ed.), The Oxford handbook of media psychology (pp. 212-223). New York: Oxford University Press.

Burke, J. (2003). Al-Qaeda: Casting a shadow of terror. London: I.B. Tauris.

Busch, C. (2005). Rechtsradikale Vernetzung im Internet [Right-wing radical networking on the Internet]. WeltTrends, 48, 67-78.

Byrne, C. L., Nei, D. S., Barrett, J. D., Hughes, M. G., Davis, J. L., Griffith, J. A., ... Mumford, M. D. (2013). Online ideology: A comparison of website communication and media use. Journal of Computer‐Mediated Communication, 18(2), 25-39.

Carter, J. A., Maher, S., & Neumann, P. R. (2014). “# Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks.” The International Centre For the Study of Radicalisation and Political Violence. Retrieved December 16, 2019 from https://icsr.info/2014/04/22/icsr-report-inspires-syrian-foreign-fighters/.

Carvalho, C. (2014). ‘Okhti’ online - Spanish Muslim women engaging online jihad – a Facebook case study. Heidelberg Journal of Religions on the Internet, 6, 24–41.

Chan, M. (2010), The impact of email on collective action: A field application of the SIDE model. New Media and Society, 12(8), 1313-1330.

Cheong, P. H., & Halverson, J. R. (2010). Youths in violent extremist discourse: Mediated identifications and interventions. Studies in Conflict and Terrorism, 33, 1104-1123.

Chermak, S., & Gruenewald, J. A. (2014). Laying a foundation for the criminological examination of right-wing, left-wing, and Al Qaeda-inspired extremism in the United States. Terrorism and Political Violence, 27(1), 133-159.

Cilluffo, F. J., Cardash, S.L., & Whitehead, A. J. (2007). Radicalization: Behind bars and beyond borders. Brown Journal of World Affairs, 13(2), 113-122.

Conway, M. (2005). Terrorist web sites: Their contents, functioning, and effectiveness. In P. Seib (Ed.), Media and Conflict in the Twenty-First Century (pp. 185-215). New York: Palgrave Macmillan.

Conway, M. (2012). From al-Zarqawi to al-Awlaki: The emergence of the Internet as a new form of violent radical milieu. CTX: Combatting Terrorism Exchange, 2(4), 12-22.

Conway, M. (2017). Determining the role of the Internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict and Terrorism, 40(1), 77-98.

Conway, M., & McInerney, L. (2008). Jihadi video and auto-radicalisation: Evidence from an exploratory YouTube study. In D. Ortiz-Arroyo, H.L. Larsen, D.D. Zeng, D. Hicks, & G. Wagner (Eds.), Intelligence and Security Informatics (pp. 108-118). Berlin: Springer.

Daniels, J. (2008). Race, civil rights, and hate speech in the digital era. In A. Everret (Ed.), Learning Race and Ethnicity: Youth and Digital Media (pp. 129-154), Cambridge, MA: MIT Press.

Daniels, J. (2009a). Cloaked websites: Propaganda, cyber-racism and epistemology in the digital era. New Media and Society, 11(5), 659-683.

Daniels, J. (2009b). Cyber racism: White supremacy online and the new attack on civil rights. Lanham, MD: Rowman & Littlefield.

De Koster, W., & Houtman, D. (2008). Stormfront is like a second home to me: On virtual community formation by right-wing extremists. Information, Communication and Society, 11(8), 1153-1175.

Douglas, K. M., & McGarty, C. (2002). Internet identifiability and beyond: A model of the effects of identifiability on communicative behavior. Group Dynamics: Theory, Research, and Practice, 6(1), 17-26.

Ducol, B. (2012). Uncovering the French-speaking jihadisphere: An exploratory analysis. Media, War and Conflict, 5(1), 51-70.

Dunbar, N. E., Connelly, S., Jensen, M. L., Adame, B. J., Rozzell, B., Griffith, J. A., & O'Hair, H. D. (2014). Fear appeals, message processing cues, and credibility in the websites of violent, ideological, and nonideological groups. Journal of Computer‐Mediated Communication, 19(4), 871-889.

Edwards, C., & Gribbon, L. (2013). Pathways to violent extremism in the digital era. The RUSI Journal, 158(5), 40-47.

Enomoto, C. E., & Douglas, K. (2019). Do internet searches for islamist propaganda precede or follow islamist terrorist attacks? Economics & Sociology, 12(1), 233-247. doi:10.14254/2071-789X.2019/12-1/13

Ernst, J., Schmitt, J. B., Rieger, D., Beier, A. K., Vorderer, P., Bente, G., & Roth, H. J. (2017). Hate beneath the counter speech? A qualitative content analysis of user comments on YouTube related to counter speech videos. Journal for Deradicalization, 10, 1-49.

Fisher, A., & Prucha, N. (2014). The call-up: The roots of a resilient and persistent jihadist presence on Twitter. Combating Terrorism Exchange, 4(3), 73-88.

Ferguson, C. J. (2002). Media violence: Miscast causality. American Psychologist, 57(6-7), 446-447.

Ferguson, C. J., & Kilburn, J. (2010). Much ado about nothing: The misestimation and overinterpretation of violent video game effects in Eastern and Western nations: Comment on Anderson et al. (2010). Psychological Bulletin, 136(2), 174-178.

Freedman, J. (2002). Media violence and its effect on aggression: Assessing the scientific evidence. Toronto: University of Toronto Press.

Frischlich, L., Rieger, D., Hein, M., & Bente, G. (2015). Dying the right-way? Interest in and perceived persuasiveness of parochial extremist propaganda increases after mortality salience. Frontiers in Psychology: Evolutionary Psychology and Neuroscience, 6(1222), 1-11.

Frischlich, L., Rieger, D., Schmitt, J. B., Morten, A., Schötz, R., Rutkowski, O., & Bente, G. (2017, May). A story for and not against: Effects and limitations of narrativity in propaganda videos and counter-narratives. Paper presented at the Annual Conference of the International Communication Association (ICA). San Diego, USA.

Frissen, T., Toguslu, E., Van Ostaeyen, P., & d’Haenens, L. (2018). Capitalizing on the Koran to fuel online violent radicalization: A taxonomy of Koranic references in ISIS’s Dabiq. Telematics & Informatics, 35(2), 491–503.

Gartenstein-Ross, D., & Grossman, L. (2009). Homegrown terrorists in the US and UK: An empirical examination of the radicalization process. Washington DC: FDD Press.

Geeraerts, S. B. (2012). Digital radicalization of youth. Social Cosmos, 3(1), 25-32.

Gendron, A. (2016). The call to jihad: Charismatic preachers and the Internet. Studies in Conflict & Terrorism, 40(1), 44-61.

Gerstenfeld, P. B., Grant, D. R., & Chiang, C. P. (2003). Hate online: A content analysis of extremist Internet sites. Analyses of Social Issues and Public Policy, 3(1), 29-44.

Gideon, L. (2012). Handbook of survey methodology for the social sciences. New York: Springer.

Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., & Horgan, J. (2017). Terrorist use of the Internet by the numbers: Quantifying behaviors, patterns, and processes. Criminology & Public Policy 16(1).

Gill, P., Corner, E., McKee, A., Hitchen, P., & Betley, P. (2019). What do closed source data tell us about lone actor terrorist behavior? A research note. Terrorism and Political Violence, 1-18.

Glaser, S., & Schneider, C. (2012), Zielgruppe Jugend: Rechtsextreme Im Social Web [Target youth: Right-wing extremists in the social web]. Aus Politik und Zeitgeschichte, 62(18-19), 39–46.

Greenberg, K. J. (2016). Counter-radicalization via the internet. The ANNALS of the American Academy of Political and Social Science, 668(1), 165-179.

Greitemeyer, T., & Mügge, D. O. (2014). Video games do affect social outcomes: A meta-analytic review of the effects of violent and prosocial video game play. Personality and Social Psychology Bulletin, 40(5), 578-589.

Gresser, S. M. (2018). Abu Musab al-Suri goes online: Conditions for the success of jihadist online strategies. Georgetown Security Studies Review, 6(2), 66-74.

Griffiths, M. D., Davies, M. N., & Chappell, D. (2004). Online computer gaming: A comparison of adolescent and adult gamers. Journal of Adolescence, 27(1), 87-96.

Hafez, M., & Mullins, C. (2015). The radicalization puzzle: A theoretical synthesis of empirical approaches to homegrown extremism. Studies in Conflict and Terrorism, 38(11), 958-975.

Halverson, J. R., & Way, A. K. (2012). The curious case of Colleen LaRose: Social margins, new media, and online radicalization. Media, War and Conflict, 5(2), 139-153.

Hoffmann, D., & McGee, L. (2003). Cultural and social aspects of smoking in adolescence: New strategies for a media non-smoking campaigns. Mediaculture Online. Retrieved September 12, 2018 from https://www.lmz-bw.de/fileadmin/user_upload/Medienbildung_MCO/fileadmin/bibliothek/hoffmann_mcgee_smoking_in_adolescence/hoffmann_mcgee_smoking.pdf

Hoffner, C. A., & Levine, K. J. (2005). Enjoyment of mediated fright and violence: A meta-analysis. Media Psychology, 7(2), 207-237.

Holt, T. J., Freilich, J. D., Chermak, S. M., & LaFree, G. (2018). Examining the utility of social control and social learning in the radicalization of violent and non-violent extremists. Dynamics of Asymmetric Conflict, 11(3), 125–148.

Holt, T., Freilich, J. D., Chermak, S. M., & McCauley, C. (2015) Political radicalization on the Internet: Extremist content, government control, and the power of victim and jihad videos, Dynamics of Asymmetric Conflict, 8(2), 107-120.

Holt, T. J., Freilich, J. D., Chermak, S. M., Mills, C., & Silva, J. (2019). Loners, colleagues, or peers? Assessing the social organization of radicalization. American Journal of Criminal Justice, 44(1), 83-105.

Huey, L., (2015). This is not your mother’s terrorism: Social media, online radicalization and the practice of political jamming. Contemporary Voices: St Andrews Journal of International Relations, 6(2).

Howard, T., Poston, B., & Benning, S. D. The neurocognitive process of digital radicalization: A theoretical model and analytical framework. Journal for Deradicalization, 19, 122-148.

Hutchinson, E. (2014). Researching forums in online ethnography: Practice and ethics. In M. Hand & S. Hillyard (Eds.), Big data? Qualitative approaches to digital research studies in qualitative methodology (Studies in Qualitative Methodology, Vol. 13), (pp. 91-112). Bingley, England: Emerald Group Publishing Limited.

Jähnke, B., Laufhütte, H. W., & Odersky, W. (2006). Strafgesetzbuch. Leipziger Kommentar / §§ 146-222. Berlin: de Gruyter.

Jenness, V., & Grattet, R. (2002). Die amerikanische Bewegung gegen Hate-Crimes - Rechtssoziologische Überlegungen zu Entstehungszusammenhängen und Entwicklungsgeschichte [The American movement against hate crimes: Legal-sociological considerations on forms of origin and development]. In K. Boehnke, D. Fuß, & J. Hagan, (Eds.), Jugendgewalt und Rechtsextremismus – Soziologische und psychologische Analysen in internationaler Perspektive (pp. 49-78). Weinheim, Germany: Juventa.

Keller, A. (2011). Der Dschihadismus als transnationale soziale Bewegung [Jihadism as a transnational social movement]. Working Papers in Social and Cultural Anthropology (Volume 1). Munich: LMU.

Kiesler, S., Siegel, J., & McGuire, T. W. (1984). Social psychological aspects of computer-mediated communication. American Psychologist, 39(10), 1123-1134.

King, M., & Taylor, D. M. (2011). The radicalization of homegrown jihadists: A review of theoretical models and social psychological evidence. Terrorism and Political Violence, 23(4), 602-622.

Klein, A. (2012). Slipping racism into the mainstream: A theory of information laundering. Communication Theory, 22(4), 427-448.

Koehler, D. (2014). The radical online: Individual radicalization processes and the role of the Internet. Journal for Deradicalization, 1, 116-134.

Koehler, D. (2015). De-radicalization and disengagement programs as counter-terrorism and prevention tools: Insights from field-experiences regarding German right-wing extremism and jihadism. In M. Lombardi, E. Ragab, & V. Chin (Eds.), Countering Radicalisation and Violent Extremism Among Youth to Prevent Terrorism (pp. 120-150). Amsterdam: IOS Press.

Kozinets, R. (2015). Netnography: Redefined (2nd ed.). London: Sage.

Krcmar, M., & Kean, L. G. (2005). Uses and gratifications of media violence: Personality correlates of viewing and liking violent genres. Media Psychology, 7(4), 399-420.

Kruglanski, A. W., Bélanger, J. J., & Gunaratna, R. (2019). The three pillars of radicalization: Needs, narratives, and networks. New York: Oxford University Press.

Kruglanski, A. W., Fernandez, J. R., Factor, A. R., & Szumowska, E. (2019). Cognitive mechanisms in violent extremism. Cognition, 188, 116-123.

Lee, B. J. (2019a). Informal countermessaging: The potential and perils of informal online countermessaging. Studies in Conflict & Terrorism, 42(1-2), 161-177.

Lee, B. J. (2019b). Countering violent extremism online: The experiences of informal counter messaging actors. Policy & Internet.

Lee, E., & Leets, L. (2002). Persuasive storytelling by hate groups online examining its effects on adolescents. American Behavioral Scientist, 45(6), 927-957.

Levin, B. (2002). Cyberhate: A legal and historical analysis of extremists' use of computer networks in America. American Behavioral Scientist, 45(6), 958-988.

Lasswell, H. D. (1948). The structure and function of communication in society. In L. Bryson (Ed.), The communication of ideas (pp. 37-51). New York: Harper.

Livingstone, S., Haddon, L., Görzig, A., & Olafsson, K. (2011). EU Kids Online Final Report. LSE Media and Communications.

Lea, M., Rogers, P., & Postmes, T. (2002). SIDE-VIEW: Evaluation of a system to develop team players and improve productivity in internet collaborative learning groups. British Journal of Educational Technology, 33(1), 54-64.

Lea, M., & Spears, R. (1991). Computer-mediated communication, de-individuation and group decision-making. International Journal of Man Machine Studies, 34, 283–301.

Lemmens, J. S., Bushman, B. J., & Konijn, E. A. (2006). The appeal of violent video games to lower educated aggressive adolescent boys from two countries. CyberPsychology and Behavior, 9(5), 638-641.

Lenz, C. & Nustad, P. (2015). Dembra: Ein norwegisches Projekt zur Vorbeugung gruppenbezogener Feindlichkeit durch Demokratie an Schulen [Dembra: A Norwegian project to prevent group-related hostility through democracy in schools]. In F. Decker, B. Henningsen, & K. Jakobsen (Eds.), Rechtspopulismus und Rechtsextremismus in Europa [Right-wing populism and right-wing extremism in Europe], (pp. 379-396). Glashütte, Germany: NOMOS.

Markham, A. N., & Buchanan, E. (2015). Ethical considerations in digital research contexts. In J. Wright (Ed.), International encyclopedia of the social and behavioral sciences (pp. 606-613). Amsterdam: Elsevier.

Mares, M. L., Oliver, M. B., & Cantor, J. (2008). Age differences in adults' emotional motivations for exposure to films. Media Psychology, 11(4), 488-511.

McDonwell-Smith, A., Speckhard, A., & Yayla, A. S. (2017). Beating ISIS in the digital space: Focus testing ISIS defector counter-narrative videos with American college students. Journal for Deradicalization, 10, 50-76.

Meleagrou-Hitchens, A. (2017). The challenges and limitations of online counter-narratives in the fight against ISIS recruitment in Europe and North America. Georgetown Journal of International Affairs 18(3), 95-104.

Meleagrou-Hitchens, A., Alexander, A., & Kaderbhai, N. (2017). The impact of digital communications technology on radicalization and recruitment. International Affairs, 93(5), 1233-1249.

Mitts, T. (2019). From isolation to radicalization: Anti-muslim hostility and support for ISIS in the west. The American Political Science Review, 113(1), 173-194.

Mott, G. (2019). A storm on the horizon? “Twister” and the implications of the blockchain and peer-to-peer social networks for online violent extremism. Studies in Conflict & Terrorism, 42(1-2), 206-227.

Myagkov, M., Shchekotin, E. V., Chudinov, S. I., & Goiko, V. L. (2019). A comparative analysis of right-wing radical and Islamist communities’ strategies for survival in social networks (evidence from the Russian social network VKontakte). Media, War & Conflict, online first. https://doi.org/10.1177/1750635219846028

Neumann, P. R. (2013). Options and strategies for countering online radicalization in the United States. Studies in Conflict and Terrorism, 36(6), 431-459.

Odağ, Ö., Uluğ, Ö. M., & Solak, N. (2016). “Everyday I’m çapuling”: Identity and collective action through social network sites in the Gezi Park protests in Turkey. Journal of Media Psychology: Theories, Methods, and Applications, 28(3), 148-159.

Pantucci, R. (2011). A typology of lone wolves: Preliminary analysis of lone Islamist terrorists. London: International Centre for the Study of Radicalisation and Political Violence.

Payne, K. (2009). Winning the battle of ideas: Propaganda, ideology, and terror. Studies in Conflict and Terrorism, 32(2), 109-128.

Pearson, E. (2015). The case of Roshonara Choudhry: Implications for theory on online radicalization, ISIS women, and the gendered jihad. Policy and Internet, 8(1), 5-33.

Piazza, J. A. & Guler, A. (2019). The online caliphate: Internet usage and ISIS support in the Arab world. Terrorism and Political Violence, online first. doi: 10.1080/09546553.2019.1606801

Picart, C. (2015). “Jihad Cool/Jihad Chic”: The roles of the Internet and imagined relations in the self-radicalization of Colleen LaRose (Jihad Jane). Societies, 5(2), 354-383.

Post, J. M., McGinnis, C., & Moody, K. (2014). The changing face of terrorism in the 21st century: The communications revolution and the virtual community of hatred. Behavioral Sciences and the Law, 32(3), 306-334.

Postmes, T., Spears, R., & Lea, M. (1998). Breaching or building social boundaries? SIDE-effects of computer-mediated communication. Communication Research, 25(6), 689-715.

Quayle, E., & Taylor, M. (2011). Social networking as a nexus for engagement and exploitation of young people. Information Security Technical Report, 16(2), 44-50.

Rafael, S. (2011). Neonazis in Sozialen Netzwerken [Neo-Nazis in social networks]. Medien und Erziehung, 5, 18–25.

Ramsay, G. (2009). Relocating the Virtual War. Terrorism, 31(10), 883-902.

Ravndal, J. A. (2013). Anders Behring Breivik’s use of the Internet and social media. Journal Exit-Deutschland. Zeitschrift für Deradikalisierung und demokratische Kultur, 2, 172-185.

Reeve, Z. (2019). Engaging with online extremist material: Experimental evidence. Terrorism and Political Violence, online first. doi: 10.1080/09546553.2019.1634559

Richards, I. (2019). A philosophical and historical analysis of “Generation Identity”: Fascism, online media, and the European new right. Terrorism and Political Violence, online first. doi: 10.1080/09546553.2019.1662403

Rieger, D., Frischlich, L., & Bente, G. (2013). Propaganda 2.0: Psychological effects of right-wing and Islamic extremist Internet videos. German Federal Criminal Police Office Institute of Law Enforcement Studies and Training (Ed.). Cologne, Germany: Wolters Kluwer.

Rieger, D., Frischlich, L., & Bente, G. (2017). Propaganda in an insecure, unstructured world: How psychological uncertainty and authoritarian attitudes shape the evaluation of right-wing extremist Internet propaganda. Journal for Deradicalization, 10, 203-229.

Rieger, D., Frischlich, L., & Bente, G. (2019). Dealing with the dark side: The effects of right-wing extremist and Islamist extremist propaganda from a social identity perspective. Media, War & Conflict, online first.. https://doi.org/10.1177/1750635219829165

Rorive, I. (2002). Strategies to tackle racism and xenophobia on the Internet: Where are we in Europe? International Journal of Communications Law and Policy, 7, 1-10.

Rosaen, S. F., Boyson, A. R., & Smith, S. L. (2006). Aggression-related characteristics and the selection of media violence. Zeitschrift für Medienpsychologie, 18(3), 119-130.

Rudner, M. (2016). “Electronic Jihad”: The Internet as Al Qaeda’s catalyst for global terror. Studies in Conflict and Terrorism, 40(1), 10-23.

Ryan, J. (2010). The Internet, the perpetual beta, and the ttate: The long view of the new medium. Studies in Conflict and Terrorism, 33(8), 673-681.

Sabouni, S., Cullen, A., & Armitage, L. (2017, June). A preliminary radicalisation framework based on social engineering techniques. International Conference On Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA) (pp. 1-5). IEEE.

Scrivens, R., Davies, G., & Frank, R. (2018). Measuring the evolution of radical right-wing posting behaviors online. Deviant Behavior, online first. doi: 10.1080/01639625.2018.1556994

Shafer, J. A. (2002). Spinning the web of hate: Web-based propagation by extremist organizations. Journal of Criminal Justice and Popular Culture, 9(2), 69-88.

Shane, S., Apuzzo, M., & Schmitt, E. (2015). Americans attracted to ISIS find an ‘Echo Chamber’ on social media. New York Times. Retrieved December 16, 2019 from https://www.nytimes.com/2015/12/09/us/americans-attracted-to-isis-find-an-echo-chamber-on-social-media.html

Schils, N., & Verhage, A. (2017). Understanding how and why young people enter radical or violent extremist groups. International Journal of Conflict and Violence, 11(2), 1-17.

Siapera, E. (2019). Organised and ambient digital racism: multidirectional flows in the Irish digital sphere. Open Library of Humanities, 5(1), 1-34.

Slater, M. D., Henry, K. L., Swaim, R. C., & Anderson, L. L. (2003). Violent media content and aggressiveness in adolescents: A downward spiral model. Communication Research, 30(6), 713-736.

Spears, R., & Postmes, T. (2015). Group identity, social influence, and collective action online. In S.S. Sundar (Ed.), The Handbook of the Psychology of Communication Technology (pp. 23-46). West Sussex: John Wiley and Sons.

Sun, Y., Ya-li, Z., Peng, X., & Boehnke, K. (2011, May). Understanding users' continuance intention in online social networks. Paper presented at the E-Business and E-Government International Conference (ICEE), Shanghai, PRC.

Tajfel, H. (Ed.). (1978). Differentiation between social groups: Studies in the social psychology of intergroup relations. London: Academic Press.

Timofeeva, Y. A. (2002). Hate Speech Online: Restricted or protected? Comparison of regulations in the United States and Germany. J. Transnat'l L. & Pol'y, 12, 253.

Torok, R. (2013). Developing an explanatory model for the process of online radicalisation and terrorism. Security Informatics, 2(1), 1-10.

Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: Terror on the Internet. Studies in Conflict and Terrorism, 25(5), 317-332.

Ungerleider, N. (2011). Examining Oslo terrorist Breivik’s Internet trail. Fast Company. Retrieved December 16, 2019 from https://www.fastcompany.com/1768974/examining-oslo-terrorist-breiviks-internet-trail

Vandewater, E. A., Lee, J. H., & Shim, M. (2005). Family conflict and violent electronic media use in school-aged children. Media Psychology, 7(1), 73-86.

Venhaus, J. (2010). ‘Why youth join Al-Qaeda.’ Report of the U.S. Institute of Peace. Retrieved December 16, 2019 from www.usip.org.

Vidino, L., & Hughes, S. (2015). “ISIS in America: From retweets to Raqqa.” George Washington University: Program on Extremism. Retrieved December 16, 2019 from https://extremism.gwu.edu/

Watkin, A. L., & Looney, S. (2019). “The lions of tomorrow”: A news value analysis of child images in jihadi magazines. Studies in Conflict & Terrorism, 42(1-2), 120-140.

Weimann, G. (2014a). New terrorism and new media. Washington DC: Wilson Center Common Labs.

Weimann, G. (2014b). Virtual packs of lone wolves: How the Internet made ‘lone wolf’ terrorism a misnomer. Washington, DC: Woodrow Wilson Center Report.

Windsor, L. (2018) The language of radicalization: Female Internet recruitment to participation in ISIS activities. Terrorism and Political Violence, online first. doi: 10.1080/09546553.2017.1385457

Yardi, S., & boyd, D. (2010). Dynamic debates: An analysis of group polarization over time on twitter. Bulletin of Science, Technology and Society, 30(5), 316-327.

Downloads

Published

2019-12-22

Issue

Section

Articles