Library

Welcome to VOX-Pol’s online Library, a research and teaching resource, which collects in one place a large volume of publications related to various aspects of violent online political extremism.

Our searchable database contains material in a variety of different formats including downloadable PDFs, videos, and audio files comprising e-books, book chapters, journal articles, research reports, policy documents and reports, and theses.

All open access material collected in the Library is easy to download. Where the publications are only accessible through subscription, the Library will take you to the publisher’s page from where you can access the material.

We will continue to add more material as it becomes available with the aim of making it the most comprehensive online Library in this field.

If you have any material you think belongs in the Library—whether your own or another authors—please contact us at onlinelibrary@voxpol.eu and we will consider adding it to the Library. It is also our aim to make the Library a truly inclusive multilingual facility and we thus welcome contributions in all languages.

Featured

Full Listing

TitleYearAuthorTypeLinks
Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age
2015 Archetti, C. Journal
This article aims to demonstrate that a greater understanding of communication in the 21st century is essential to more effective counterterrorism. In fact, while “strategic communication” and “narratives” are advocated by many analysts as essential weapons in countering extremism, few seem to truly understand the reality of the digital-age information environment where such tools need to be deployed. To contribute to bridging this gap, the article outlines some problematic misunderstandings of the contemporary information environment, provides an alternative communication-based framework to explain radicalization, and draws some counterintuitive lessons for tackling terrorism.
Cyber jihadists and Their Web
2015 Berton, B. and Pawlak, P. Policy
Policy advice for EU member states on how to tackle jihadist online recruitment techniques.
Panel on Monitoring the Net for Violent Extremist Material, organised by VOX-Pol at CPDP2015
2015 Panel on Monitoring the Net for Violent Extremist Material at CPDP2015 Video
Panel on Monitoring the Net for Violent Extremist Material, organised by VOX-Pol at CPDP2015
VOX-Pol: An Introduction
2015 VOX-Pol Video
VOX-Pol: An Introduction
Terrorisme i Cyberspace: Udfordringer ved Organisering og Udførelse af Politisk Vold Online
2015 Teglskov Jacobsen, J. Article
Internettet præsenteres ofte som et farligt redskab i hænderne på terrorister. Det er dog ikke nødvendigvis sandheden. Artiklen trækker på indsigter fra studier af sunniekstremistiske grupper, Anders B. Breivik og Anonymous og diskuterer terroristers anvendelse af internettet i organiseringen og udførelsen af terrorisme. Jeg vil argumentere for, at det anarkiske og anonyme internet fører mistillid og fragmentering med sig, hvilket gør det sværere for grupper at opretholde en fælles strategi og det fælles fjendebillede. Artiklen styrker derfor fortællingen om, at det hovedsageligt er ekskluderede og socialt marginaliserede enspændere, der ender med at planlægge voldshandlinger i isolation bag computerskærmen. I forlængelse heraf vil jeg pege på, at hovedparten af potentielle terrorister drages af fysisk interaktion,
våben og eksplosioner – og ikke udviklingen af komplekse cybervåben.
Pulling Back The Curtain - An Examination Of The English Defence League And Their Use Of Facebook
2015 Reynolds, T. PhD Thesis
As social media becomes an integral part of our daily lives, and groups seek to utilize this medium to facilitate activism, understanding the nature of these communications and the impact of the content on the individual user becomes a valid area of interest. When one then considers that extremist and terrorist groups have found social media to be an inexpensive and effective means for communication, radicalization, recruitment and member mobilization, the need for this understanding becomes critical. This research seeks to provide just such an understanding in its examination of Far-Right English Defence League and their use of Facebook during a period of increased activism and online growth. Important elements of this work include an understanding of the legal and ethical issues surrounding the collection of online content, particularly in extremist environments; the role of traditional media in their coverage of the group and whether the comments of the members reflect the group’s mission statement of the characterization of traditional media; the ability to enhance data segregation and analysis through the development and use of specialized software; and most importantly the findings from the data analysis. Contained within these findings is an understanding of the intricacies of online participation in extremist social media. These include insights into overall traffic generation, the use of links within communications and their impact on the member traffic, and how the group narrative put forth by the administrator is reflected in the dialogue of the users. The most important finding was an understanding of individual user participation within the group and how, even with such an inexpensive and pervasive media outlet, activist groups still struggle to overcome the problem of participation. That this knowledge can be applied in a meaningful way in counter extremist and counterterrorism efforts was an interesting and satisfying development.
Cyber-security In The European Region - Anticipatory Governance And Practices
2015 Munk, T. H. PhD Thesis
This thesis explores the nature of cyber security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The increased dependency on cyber space is visible in all public private sectors and governmental operations, as well as communications between groups and individuals. As a result, cyber attacks on public and private entities are increasing. This requires a security framework that is flexible and establishes different types of security cooperation to manage the widespread cyber risks. This is essential to the development of security strategies, governance forms, practices, and guidelines for enhancing resilience and preparedness towards cyber risks. Therefore, I am examining cyber security through the lenses of nodal governance and governmentality, which enables me to understand European cyber security strategies and governance forms developed by the Council of Europe, the European Union, and the North Atlantic Treaty Organization. To analyse existing strategies and governance forms, I have used two critical security schools, the Copenhagen School and the Paris School, which cover different aspects of the security agenda. The thesis develops a substantive analytical framework through two case studies, namely cyber security and cyber terrorism. The findings in this thesis identifies problem areas, such as the complexity of the nodal system, the legislative lacuna, reliance on different governance forms, transparency and accountability, and types of anticipatory governance and regulatory practices.
Just A Click Away- Radicalization In The Net Generation
2015 Frank, B. MA Thesis
The use of the Internet as a vehicle of socialization has exploded in the 21st century and while this presents exciting possibilities, it also comes with troubling ones. Among those who have embraced this new medium are extremist groups, who use the Web as a space in which to communicate, exchange ideas, network and reach new followers. In regards to this last point, it provides them near unlimited opportunities to gain access to potential recruits and converts, raising interesting questions in terms of the dynamics of the radicalization process and how it manifests itself within the confines of this new arena. Through an analysis of postings made to the discussion board of Stormfront.org, this research paper examines whether or not the radicalization process follows the same transformative pattern in the virtual world as has been described in some of the leading academic theories that address this phenomenon in the physical one.
Linksextreme Medien
2014 van Hüllen, R. Article
Linksextreme Medien wollen nicht möglichst objektiv über allgemeine Belange berichten. Sie sind auch keine Wirtschaftsunternehmen, die kundenorientiert Leistungen verkaufen wollen. Sie verfolgen politische Ziele - und bekämpfen die politischen Gegner.
De leefwereld en denkbeelden van Nederlandse en Belgische Syriëgangers: een analyse van elf Facebook-accounts
2014 Grol, P., Weggemans, D. and Bakker, E. Article
Content analysis of the posts from eleven Facebook accounts of known Dutch and Belgian foreign fighters (in Dutch). English summary is available here: http://leidensafetyandsecurityblog.nl/articles/foreign-fighters-on-social-media-an-analysis-of-11-facebook-accounts
Modified Frequency-Based Term Weighting Scheme for Accurate Dark Web Content Classification
2014 Sabbah, T. and Selamat, A. Chapter
Security informatics and intelligence computation plays a vital role in detecting and classifying terrorism contents in the web. Accurate web content classification using the computational intelligence and security informatics will increase the opportunities of the early detection of the potential terrorist activities. In this paper, we propose a modified frequency-based term weighting scheme for accurate Dark Web content classification. The proposed term weighting scheme is compared to the common techniques used in text classification such as Term Frequency (TF), Term Frequency-Inverse Document Frequency (TF-IFD), and Term Frequency- Relative Frequency (tf.rf), on a dataset selected from Dark Web Portal Forum. The experimental results show that the classification accuracy and other evaluation measures based on the proposed scheme outperforms other term weighting techniques based classification.
VOX-Pol Inaugural Conference Keynote Lecture: Thomas Hegghammer
2014 Hegghammer, T. Lecture
Inaugural VOX-Pol Conference:
'Violent Online Political Extremism: Setting a Research Agenda'
Kings College London: August 28-29, 2014
VOX-Pol Inaugural Conference Keynote Lecture: Manuela Caiani
2014 Caiani, M. Lecture
Inaugural VOX-Pol Conference:
'Violent Online Political Extremism: Setting a Research Agenda'
Kings College London: August 28-29, 2014
VOX-Pol Summer School Public Lecture: Brown Moses
2014 Higgins, E. Lecture
VOX-Pol Summer School: 'Topics in Violence Online Political Extremism'
Dublin: July 3, 2014
Down the (White) Rabbit Hole The Extreme Right and Online Recommender Systems
2014 O’Callaghan D., Greene D., Conway M., Carthy J. and Cunningham P. VOX-Pol Publication
In addition to hosting user-generated video content, YouTube provides recommendation services, where sets of related and recommended videos are presented to users, based on factors such as co-visitation count and prior viewing history. This article is specifically concerned with extreme right (ER) video content, portions of which contravene hate laws and are thus illegal in certain countries, which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTube’s recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTube’s related video service. A process is observable whereby users accessing an ER YouTube video are likely to be recommended further ER content, leading to immersion in an ideological bubble in just a few short clicks. The evidence presented in this article supports a shift of the almost exclusive focus on users as content creators and protagonists in extremist cyberspaces to also consider online platform providers as important actors in these same spaces.
The Stream: Are the Roots of Radicalisation Online?
2014 Al Jazeera Video
A New Approach to Counter Radicalization
2014 US Council on Foreign Relations Video
US Council on Foreign Relations panel discussion on approaches to countering radicalisation. Panel members include Peter Neumann of the International Centre for the Study of Radicalisation, a VOX-Pol partner. Originally recorded on 18 May 2011 and uploaded by the Council on Foreign Relations on April 1, 2011
King's College London Online Radicalisation
2014 Neumann, P. and Stevens, T. Video
Dr Peter Neumann and Tim Stevens of VOX-Pol partner, the International Centre for the Study of Radicalisation and Political Violence at Kings College London, discuss the role of cyberspace in terrorism and insurgency. They ask if policies such as internet censorship are effective measure to counteract online radicalisation. Originally uploaded by ICSR on 12 February 2010
The Power of Online Radicalization with Peter Neumann, part 1
2014 Neumann, P. Video
An Interview with Peter Neumann by David H. Schanzer, Associate Professor of the Practice for Public Policy and Director, Triangle Center of Terrorism and Homeland Security. Originally uploaded by D Schanzer on 31 January 2014 (Part 1)
'Waging War on the Ideological Battleground' Dr Anne Aly YouTube
2014 Aly, A. Lecture
Paper presented at Swansea University 2014: Terrorists' Use of the Internet (5th-6th June 2014) by Dr Anne Aly of Curtin University. Dr Daly's paper focuses on terroristic narratives and counter narratives online.