Blog

Would you like to submit a VOX-Pol Blog Post? Click here for submission instructions.

This article summarises a recent study published in Terrorism and Political Violence. By Ryan Scrivens, Thomas W. Wojciechowski, Joshua D. Freilich, Steven M. Chermak, and Richard Frank Despite the ongoing need for researchers, practitioners, and policymakers to identify and assess the online activities of violent extremists prior to their engagement in violence offline, little is…

Want to submit a blog post? Click here. By Charis Papaevangelou, Jiahong Huang, Lucia Mesquita, and Sara Creta At a recent workshop, JOLT Early Stage Researchers (ESRs) worked in multi-disciplinary teams to develop ideas for research projects that address a major issue surrounding media and technology. As the European Commission prepares to announce its much-anticipated…

Want to submit a blog post? Click here. This Blog post summarises a conclusion paper from the EU’s Radicalisation Awareness Network.  By Jordy Krasenberg and Julia Handle  The perspective on the role of (young) women in extremism has changed over the last years towards better understanding of how women radicalise, how they are recruited, and…

Want to submit a blog post? Click here. By Alexander Mitchell Lee YouTube has gained a reputation for facilitating far-right radicalisation and spreading antisocial ideas. However, in an interesting twist, the same subversive, comedic, satiric and ironic tactics used by far-right internet figures are now being countered by a group of leftwing YouTubers known as “BreadTube”. By making videos…

This is the fourth and final in a series of four original Blog posts; the first is HERE the second is HERE the third is HERE. [Ed.] By Matti Pohjonen The previous cluster of methods looked at in the blog post series included methods developed to extrapolate insight from the content produced online and on social…

This is the third in a series of four original Blog posts; the first is HERE and the second is HERE. [Ed.] By Matti Pohjonen The previous blog posts looked at the costs and benefits of using network analysis to identify extremist networks. It suggested that one challenge in such network analysis-based research approaches is…

This is the second in a series of four original Blog posts; the first is HERE. [Ed.] By Matti Pohjonen The first blog post in this series explored how researchers interested in computational methods can assess the trade-off between the validity of the methods used and the potentially adverse social costs of using them in…