This article summarizes a recent study published in Deviant Behavior. By Ryan Scrivens, George W. Burruss, Thomas J. Holt, Steven Chermak, Joshua D. Freilich, and Richard Frank Research has overwhelmingly found that central offline events influence online activity and highlight an important interaction between people’s on- and offline worlds. Less, however, is known about the…
Tweets
Some followers may be interested in these paid summer internship opportunities with @GIFCT_official. Note: though r… https://t.co/j7dnPJqIB4
- Saturday Apr 17 - 9:31am
“...Ireland became a signatory to the #ChristchurchCall to ‘eliminate terrorist & violent extremist online content’… https://t.co/3shpOqeTFI
- Thursday Apr 15 - 8:14am
RT @AvertResNet: A wealth of great resources from @VOX_Pol for researchers of online violent extremism here
- Wednesday Apr 14 - 6:24pm
Latest Posts
How Ireland Can Stop the Rise of the Far-right
Want to submit a blog post? Click here. By Ross Frenett We all watched in horror as rioters inspired by fringe far-right conspiracy theories...
Read
Watch the VOX-Pol Webinar on ‘Terrorism Informatics’
In March 2021, VOX-Pol published four Blog posts on the topic of ‘Terrorism Informatics’. The series covers A Framework for Researchers, Identifying Extremist Networks, Analysing Extremist Content,...
Read
(Young) Women’s Usage of Social Media and Lessons for Preventing Violent Extremism
Want to submit a blog post? Click here. This Blog post summarises a conclusion paper from the EU’s Radicalisation Awareness Network. By Jordy Krasenberg...
Read
Meet BreadTube, the YouTube Activists Trying to Beat the Far-right at Their Own Game
Want to submit a blog post? Click here. By Alexander Mitchell Lee YouTube has gained a reputation for facilitating far-right radicalisation and spreading antisocial ideas. However,...
Read
‘Terrorism Informatics’ Part IV: Predicting Extremist Behaviour
This is the fourth and final in a series of four original Blog posts; the first is HERE the second is HERE the third is...
Read
‘Terrorism Informatics’ Part III: Analysing Extremist Content
This is the third in a series of four original Blog posts; the first is HERE and the second is HERE. By Matti...
Read
Library Latest

