Blog

Would you like to submit a VOX-Pol Blog Post? Click here for submission instructions.

This Blog post is the second—the first is HERE—in a four-part series of article summaries from the EU H2020-funded BRaVE project’s  First Monday Special Issue exploring societal resilience to online polarization and extremism. Read the full article HERE [Ed.].  By James Fitzgerald The rise of QAnon presents researchers with a number of important questions. While emerging literature…

This Blog post is the first in a four-part series of article summaries from the EU H2020-funded BRaVE project’s  First Monday Special Issue exploring societal resilience to online polarization and extremism. The second is HERE. Read the full article HERE [Ed.]. By Inés Bolaños Somoano This post synopsises my article ‘The right-leaning be memeing: Extremist uses…

By Marco Farucci The events of January 6th showcased the strength of online communities and their ability to transfer extremist ideologies from the online to the offline world. Online extremism usually takes the form of violent, racist, and misogynistic content on social media. The business models of social media platforms are designed with ‘suggesting mechanisms’…

By Laura Higson-Bliss The UK government’s much anticipated online safety bill has now been released. The bill seeks to impose a duty of care on companies, such as social media platforms, to remove illegal content, and in some cases, “legal but harmful” content, quickly. Failure to comply will result in heavy fines or, in extreme…

By Linda Schlegel Over the last two years, the potential nexus between gaming and extremism has received a lot of attention. Researchers, practitioners, policy-makers and international organisations such as the EU and the UN have all declared the topic to be a key area of concern. However, surprisingly little is known about how and why extremists…

This article summarizes a recent study published in Terrorism and Political Violence. By Ryan Scrivens Although there is an ongoing need for law enforcement and intelligence agencies to identify and assess the online activities of violent extremists prior to their engagement in violence offline, little is empirically known about their online posting patterns generally or…

By Annukka Kurki and Veera Tuomala Although they have been around since the first newspapers were printed, fake news, disinformation, misinformation, and conspiracy narratives seem to be more prominent in our everyday lives than ever before. The COVID-19 pandemic has brought on an onslaught of new conspiracies and the spread of dangerous misinformation has been…

By Anne Craanen and Charley Gleeson Terrorist use of the internet is a complex and multi-faceted threat which requires an equally nuanced response. Terrorists use a wide ecosystem of tech platforms for a variety of purposes, composed of external (public propaganda dissemination) and internal (operational maintenance) communications. Our analysis shows that within the ecosystem of…

By the Institute of Strategic Dialogue Research Team On the 20th anniversary of the 9/11 attacks, Institute for Strategic Dialogue (ISD) researchers have been tracking and monitoring Salafi-jihadists across social media platforms, who look to radicalise and influence lone actor attacks, for over a year. In doing so, ISD has identified a networked community of…

By Joan Barata I. Freedom of expression and threats to national security Article 19 of the International Covenant on Civil and Political Rights (ICCPR) protects the right to freedom of expression as a universal right and strictly limits the powers of states to impose restrictions and conditions to its exercise. However, paragraph 3 of the…