Library

Welcome to VOX-Pol’s Online Library, a research and teaching resource, which collects in one place a large volume of publications related to various aspects of violent online political extremism.

Our searchable database contains material in a variety of different formats including downloadable PDFs, videos, and audio files comprising e-books, book chapters, journal articles, research reports, policy documents and reports, and theses.

All open access material collected in the Library is easy to download. Where the publications are only accessible through subscription, the Library will take you to the publisher’s page from where you can access the material.

We will continue to add more material as it becomes available with the aim of making it the most comprehensive online Library in this field.

If you have any material you think belongs in the Library—whether your own or another authors—please contact us at onlinelibrary@voxpol.eu and we will consider adding it to the Library. It is also our aim to make the Library a truly inclusive multilingual facility and we thus welcome contributions in all languages.

Featured

Full Listing

TitleYearAuthorTypeLinks
Emotional Effects Of Terroristic Communication: Between Professional Propaganda And Media Coverage
2019 Johann, M. and Oswald, M. Article
Like no other terroristic organization, the Islamic State anchors forms of direct communication in its communication strategy. Although classical mass media still serve as multipliers in order to spread fear, modern terrorists increasingly focus on social media to address relevant recipients. Spreading their messages via mass media, terroristic communicators have to accept balancing media coverage: the classical media framing. With forms of direct communication however they are able to set own strategic communicator frames and narratives. The question arises whether these messages have different effects on recipients than corresponding media reports. In this article we analyze the effects of different forms of terroristic communication on the recipients’ emotions using an experimental design. The results indicate that strategic communicator frames are able to reinforce negative emotions. However, it could be observed that the recipients’ political knowledge and thematic interest are able to reduce the terrorists’ main target: fear.
Regulating Terrorist Content On Social Media: Automation And The Rule Of Law
2019 Macdonald, S., Correia, S. G. and Watkin, A. L. Article
Social-media companies make extensive use of artificial intelligence in their efforts to remove and block terrorist content from their platforms. This paper begins by arguing that, since such efforts amount to an attempt to channel human conduct, they should be regarded as a form of regulation that is subject to rule-of-law principles. The paper then discusses three sets of rule-of-law issues. The first set concerns enforceability. Here, the paper highlights the displacement effects that have resulted from the automated removal and blocking of terrorist content and argues that regard must be had to the whole social-media ecology, as well as to jihadist groups other than the so-called Islamic State and other forms of violent extremism. Since rule by law is only a necessary, and not a sufficient, condition for compliance with rule of values, the paper then goes on to examine two further sets of issues: the clarity with which social-media companies define terrorist content and the adequacy of the processes by which a user may appeal against an account suspension or the blocking or removal of content. The paper concludes by identifying a range of research questions that emerge from the discussion and that together form a promising and timely research agenda to which legal scholarship has much to contribute.
Exploring The Capabilities Of Prevent In Addressing Radicalisation In Cyberspace Within Higher Education
2019 Sandford, L. Article
The Counter Terrorism and Security Act (2015) introduced a binding duty on public sector bodies in the United Kingdom (UK), including education, to have ‘due regard to the need to prevent people from being drawn into terrorism’. The Prevent duty has become widely controversial in the Higher Education (HE) sector with questions as to whether it contravenes academic freedom and freedom of speech.
This research seeks to identify how Prevent may be applied to cyberspace to reduce risk of students being radicalised online at universities. Through semi-structured interviews (N= 16) with individuals working in Prevent and HE, attention is given to the capability of monitoring and filtering website content, which must be considered by universities as part of Prevent compliance. In addition, non-technical methods of reducing radicalisation in cyberspace are explored. Consideration is given to building students’ resilience to challenging information they see online through developing counter-narrative content for social media platforms. With students developing counter-narrative content themselves, specifically addressing vulnerability drivers to radicalisation, universities can enhance compliance with Prevent and create counter extremist content which can be used in cyberspace both in and outside of HE.
The Neurocognitive Process Of Digital Radicalization: A Theoretical Model And Analytical Framework
2019 Howard, T., Poston, B. and Benning, S. D. Article
Recent studies suggest that empathy induced by narrative messages can effectively facilitate persuasion and reduce psychological reactance. Although limited, emerging research on the etiology of radical political behavior has begun to explore the role of narratives in shaping an individual’s beliefs, attitudes, and intentions that culminate in radicalization. The existing studies focus exclusively on the influence of narrative persuasion on an individual, but they overlook the necessity of empathy and that in the absence of empathy, persuasion is not salient. We argue that terrorist organizations are strategic in cultivating empathetic-persuasive messages using audiovisual materials, and disseminating their message within the digital medium. Therefore, in this paper we propose a theoretical model and analytical framework capable of helping us better understand the neurocognitive process of digital radicalization.
Distinguishing Features Of The Activity Of Extreme Right Groups Under Conditions Of State Counteraction To Online Extremism In Russia
2019 Myagkov, M., Kashpur, V. V., Baryshev, A. A., Goiko, V. L. and Shchekotin, E. V. Article
The conservative shift taken by Russian authorities forced members of the Russian extreme right to seek shelter online. Nevertheless, they fell under censorship restrictions. The objective of this study is to reveal the distinguishing features of extreme right online groups and their participants' activity under conditions of censorship. The groups studied were identified by means of linguistic markers of extreme right sentiments and attitudes. The metrics of social network analysis were used to analyze interconnections between the groups and the internal migrations of closed communities. The study revealed that (1) extreme right online communities use the tactic of creating mirror Internet sites in case the main group is blocked; (2) blocking of the most extreme oppositional extreme right online groups induces the remaining ones to imitate obedience to law, using "softer forms" of extremist rhetoric; (3) the audience of the blocked groups continues spreading extremist ideas through channels related to other subjects. The study's authors conclude that prohibiting extreme right discourse promotes the proliferation of extreme right ideas and sentiments.
Flashback As A Rhetorical Online Battleground: Debating The (Dis)guise Of The Nordic Resistance Movement
2019 Blomberg, H. and Stier, J. Article
The right-wing Swedish Nordic Resistance Movement (NRM) is increasingly active on social media. Using discursive psychology, this text explores the rhetorical organization of text and rhetorical resources used on the Swedish online forum Flashback. The aim is to reveal and problematize truth claims about NRM made by antagonists and protagonists. Questions are (1) how and what do NRM antagonists and protagonists convey in Flashback posts about NRM, and its ideology and members? (2) how do NRM antagonists and protagonists make truth claims about NRM in Flashback posts? The empirical material consisting of 1546 Flashback posts analyzed to identify typical discussions on “NMR’s true nature”; accomplished social actions stemming from the posts. Findings show that the Flashback thread can be understood as being a rhetorical battle that concerns the “truth” about NRM, where a variety of rhetorical resources are used to render statements credibility and those involved legitimacy.
Organised and Ambient Digital Racism: Multidirectional Flows in the Irish Digital Sphere
2019 Siapera, E. Article
This article is concerned with the distinction between acceptable race talk in social media and organised, extreme or ‘frozen’ racism which is considered hate speech and removed. While in the literature this distinction is used to point to different variants, styles and mutations of racism, in social media platforms and in European regulatory frameworks it becomes policy. The empirical part of the article considers this distinction drawing upon a series of posts following a stabbing incident in a small Irish town, which organised Twitter accounts sought to connect to terrorism. The empirical analysis examines the tweets of those accounts and the comments left on the Facebook page and website of one of the main Irish online news outlets. The analysis shows few if any differences between the two, concluding that there is a blending of supremacist and everyday, ambient racist discourses. This blending indicates the operation of a transnational contagion, given the shared vocabularies and discourses. It further problematises the distinction between ‘illegal hate speech’ and ‘acceptable race talk’, and throws into question the principle underlying both the policies of social media as well as the European efforts to de-toxify the digital public sphere.
Engaging With Online Extremist Material: Experimental Evidence
2019 Reeve, Z. Article
Despite calls from governments to clamp down on violent extremist material in the online sphere, in the name of preventing radicalisation and therefore terrorism research investigating how people engage with extremist material online is surprisingly scarce. The current paper addresses this gap in knowledge with an online experiment. A fictional extremist webpage was designed and (student) participants chose how to engage with it. A mortality salience prime (being primed to think of death) was also included. Mortality salience did not influence engagement with the material but the material itself may have led to disidentification with the ingroup. Whilst interaction with the material was fairly low, those that did engage tended to indicate preference for hierarchy and dominance in society, stronger identification with the ingroup, higher levels of radicalism, and outgroup hostility. More engagement with the online extremist material was also associated with increased likelihood of explicitly supporting the extremist group. These findings show that indoctrination, socialisation, and ideology are not necessarily required for individuals to engage attitudinally or behaviourally with extremist material. This study is not conducted on the dependent variable, therefore shedding light on individuals who do not
engage with extremist material.
Reconciling Impact And Ethics: An Ethnography of Research in Violent Online Political Extremism
2019 Mahlouly, D. VOX-Pol Publication
Gathering empirical evidence from interviews and focus groups, this study highlights some of the ethical dilemmas faced by the academic community tasked with developing new methodological tools and conceptual frameworks for the study of violent online political extremism. At the same time, it examines how academics position themselves in relation to a broad range of non-academic stakeholders involved in the public debate about where violent extremism, terrorism and the Internet intersect. It argues that these external actors are introducing a multisectoral ‘market’ for research on online violent extremism, which creates both opportunities and limitations for the academic community. Finally, it analyses how academics from across a range of disciplines will be able to secure access to data and competitive research tools, while also engaging in a critical reflection about the ethical considerations at stake.
A Study Of Outlinks Contained In Tweets Monitoring Rumiya
2019 Macdonald, S., Grinnell, D., Kinzel A., and Lorenzo-Dus, A. Report
This paper focuses on the attempts by Daesh (also known as the Islamic State of Iraq and Syria, ISIS) to use Twitter to disseminate its online magazine, Rumiyah. It examines a data set of 11,520 tweets mentioning Rumiyah that contained an out link, to evaluate the success of Daesh’s attempts to use Twitter as a gateway to issues of its magazine.
Following The Whack-a-Mole: Britian First's Visual Strategy From Facebook To Gab
2019 Nouri,L., Lorenzo-Dus, N. and Watkin, A.L. Report
The focus of this paper is on the extremist group Britain First. As such, it does not explore online terrorist activity but rather examines how a group regarded as extremist is subject to online sanctions. The removal of the extremist group Britain First from Facebook in March 2018 successfully disrupted the group’s online activity, leading them to have to start anew on Gab, a different and considerably smaller social media platform. The removal also resulted in the group having to seek new online followers from a much smaller, less diverse recruitment pool. This paper demonstrates the further impact of the group’s platform migration on their online strategy – particularly on their choice of images and the engagement levels generated through them. The paper puts forward a number of key recommendations, most importantly that social-media companies should continue to censor and remove hateful content.
Mapping The Jihadist Information Ecosystem
2019 Fisher, A., Prucha, N. and Winterbotham, E. Report
Online disruption efforts generally aim to reduce the availability of jihadist content. Yet, the speed and agility of jihadist movements online – a multiplatform approach which a co-author of this paper has previously described as a ‘swarmcast’ – has allowed groups to evolve in response to disruption efforts and find new ways to distribute content. This paper describes a model of the flow of users between social media platforms and surface web pages to access jihadist content, using data obtained through innovative collection methods. The model provides an approximate picture of the jihadist information ecosystem and how multiple platforms are used to disseminate content.
The Evolution of Online Violent Extremism In Indonesia And The Philippines
2019 Nuraniyah, N. Report
Pro-Daesh (also known as the Islamic State of Iraq and Syria, ISIS) groups in Indonesia and the Philippines have come to rely on social media for propaganda, fundraising and disseminating instructional material, but in different ways. While Indonesian online extremism has deep roots, with local networks exploiting various online platforms over the past decade, extremist social media in the Philippines only really took off as a consequence of the May 2017 siege in the southern Philippine city of Marawi by pro-Daesh militants. This paper outlines the evolving use of online platforms by pro-Daesh groups in both countries and how this has enabled extremists to develop and strengthen their networks. Social media and encrypted chat apps have shaped the development of extremism in Indonesia and the Philippines in four main areas: branding, recruitment, fundraising, and the increasing role of women. For groups in the Philippines, direct communication with Daesh headquarters via Telegram facilitated their rebranding as the face of Daesh in Southeast Asia, more than just a local insurgency group. In both countries, social media facilitates vertical and horizontal recruitment, but not lone-actor terrorism. Extremist use of the internet for fundraising is still rudimentary –sophisticated financial cybercrime is still virtually non-existent. In all these aspects, women’s roles have become much more visible. For a long time, women had been barred from accessing extremist public spaces, let alone taking an active role as combatants. But through social media, women are now able to play more active roles as propagandists, recruiters, financiers, and even suicide bombers. This paper briefly discusses government responses to online extremism, noting that there have been mixed results between Indonesia and the Philippines. Indonesian authorities have undoubtedly been the more successful of the two regimes – both in terms of law enforcement and engagement with the tech sector – but its counter terrorism police now face the problem of how to judiciously use their powers in a democratic manner. The Philippines, meanwhile, is still at the starting line in terms of dealing with online extremism, with the military more accustomed to removing threats than trying to understand them.
Shedding Light On Terrorist And Extremist Content Removal
2019 Vegt, I.V.D. Gill, P., Macdonald,S. and Kleinberg, B. Report
Social media and tech companies face the challenge of identifying and removing terrorist and extremist content from their platforms. This paper presents the findings of a series of interviews with Global Internet Forum to Counter Terrorism (GIFCT) partner companies and law enforcement Internet Referral Units (IRUs). It offers a unique view on current practices and challenges regarding content removal, focusing particularly on human-based and automated approaches and the integration of the two.
Digital Discourse, Online Repression, And Cyberterrorism: Information Communication Technologies In Russia’s North Caucasus Republics
2019 Tewell, Z.S. MA Thesis
Is the cyber-utopian versus cyber-repression argument the most effective way to frame the political uses of new technologies? Contemporary discourse on social media fails to highlight political dynamics in authoritarian regimes with weak state control, where independent groups can capitalize on the use of coercive force. In this thesis, I will explore the various methods through which information communication technologies are utilized by civil groups, uncivil groups, and the state using Russia's North Caucasus republics as a case study. New technologies are exploited through a variety of means by an array of actors in the North Caucasus whose goals may not necessarily be democratic. Through this evidence I demonstrate that information communication technologies do not inherently aid democratization, nor do they necessarily aid the incumbent regime; rather, they are merely a conduit through which existing groups put forth their agendas regarding their ideals of the modern state.
Men Are Scum: Self-Regulation, Hate Speech, And Gender-Based Censorship On Facebook
2019 Nurik,C. Article
Because social media sites are self-regulating, each site has developed its own community standards, which serve as regulatory tools. However, the processes of content moderation are often unclear, subjective, and discriminatory. Drawing from a series of interviews with individuals in the “Men Are Scum” movement, this article describes the experiences of women who have been censored on Facebook and explores whether self-regulatory processes on this platform are distinctly gendered. It asserts that both explicit censorship (e.g., limited displays of the body) and implicit censorship (e.g., rampant and unchecked hate speech silencing women’s voices) are operatives on Facebook, limiting women’s expressive potentiality. Thus, this article proposes the term “gender-based censorship” as a lens through which to understand women’s experiences on Facebook. These findings help reveal the pitfalls of industry self-regulation in which profit motives are prioritized over the protection of users (especially those who may be marginalized offline).
Defining Online Hate And Its Public Lives: What Is The Place For Extreme Speech?
2019 Gagliardone, I. Article
Following Sahana Udupa and Matti Pohjonen’s (2019) invitation to move the debate beyond a normative understanding of hate speech, this article seeks to build a foundation for conceptual and empirical inquiry of speech commonly considered deviant and disturbing. It develops in three stages. It first maps the public lives of terms that refer to online vitriol and how they have been used by different communities of researchers, politicians, advocacy groups, and national organizations. Second, it shows how different types of “haters” have been interpreted as parts of “swarms” or “armies,” depending on whether their violent potential emerges around critical incidents or whether they respond to longer-term strategies through which communities and their leaders tie their speech acts to explicit narratives. The article concludes by locating “extreme speech” within this broader conceptual tapestry, arguing that the paternalistic the gaze that characterizes a lot of research on online hate speech is tied to what Chantal Mouffe has referred to as the “moralization of politics,” a phenomenon that cannot be matched by responses that are themselves moral.
A Comparative Approach To Social Media Extreme Speech: Online Hate Speech As Media Commentary
2019 Pohjonen, M. Article
By exploring lessons learned from Ethiopia and Finland, this article challenges two assumptions about online hate speech research. First, it challenges the assumption that the best way to understand controversial concepts such as online hate speech is to determine how closely they represent or mirror some underlying set of facts or state of affairs online or in social media. Second, it challenges the assumption that academic research should be seen as separate from the many controversies that surround online hate speech debates globally. In its place, the article proposes the theory of “commentary” as a comparative research framework aimed at explaining how the messy and complex world of online and social media practices is articulated as hate speech over other ways of imagining this growing problem in global digital media environments.
Nationalism In The Digital Age: Fun As A Metapractice Of Extreme Speech
2019 Udupa, S. Article
Critical assessments of the recent resurgence of right-wing nationalism have rightly highlighted the role of social media in these troubling times, yet they are constrained by an overemphasis on celebrity leaders defined as populists. This article departs from a leader-centric analysis and the liberal frame that still largely informs the assessment of political action, to foreground “fun” as a salient aspect of right-wing mobilization. Building on ethnographic fieldwork among the Hindu nationalists in India, I argue that fun is a meta practice that shapes the interlinked practices of fact-checking, abuse, assembly and aggression among online volunteers for the right-wing movement. Furthermore, fun remains crucial for an experience of absolute autonomy among online users in ideological battles. Providing the daily drip feed for exclusion, fun as a meta practice bears a formal similarity to objectivity in its performative effects of distance and deniability.
Writing On The Walls: Discourses On Bolivian Immigrants In Chilean Meme Humor
2019 Haynes, N. Article
Internet memes have become a popular form through which northern Chileans express frustrations with their marginalization on global, national, and local levels. At the same time, many of these memes criticize Bolivian immigrants for using resources and taking jobs from “true Chileans.” The humorous nature of these texts mitigates the extremity of embedded racial and nationalist ideologies, which are more explicitly expressed in political speech, news media, and quotidian language. This article uses critical discourse analysis to trace ideological formations across multiple online and offline instantiations, making visible a continuum of extreme speech. Through these connections, we see how anti-immigrant discourses position northern residents in a formation of nested marginality. Memes are thus a central way that disenfranchised Chilean citizens reinforce a worldview in which they consider themselves deserving of greater access to resources than Bolivians, precisely because of their marginalized position in relation to the nation.