Skip to main content

Search form

Social Media

You are here

Home

Neojihadist Visual Politics: Comparing YouTube Vid ...

December 2014

This article discusses how political Islam uses digital visual narratives to create collective identities, enable the radicalisation and recruitment of new members and gather support for political causes.

Read more

OSCE Background Note – Jihadist Use of the Inter ...

This background note pertains to how far right extremist groups have coopted methods from the ‘cyber caliphate’ and jihadist Internet use to develop their own support networks.

Read more

Pedlars of Hate: The Violent Impact of the Europea ...

2012

This report analyzes over one hundred cases from 2010 through 2012 as it describes the various stages that far right movements move through, from peddling hate online to violence and death on the streets.

Read more

Radicalisation in the Digital Era: The Use of the ...

2013

This paper presents the results from exploratory primary research into the role of the Internet in the radicalization of 15 terrorists and extremists in the UK.

Read more

The Slippery Slope of Material Support Prosecution ...

December 2014

This article deals with the use of social media by terrorist groups as a means to curry support, fundraise, recruit, and spread ideology.

Read more

A Critical Reflection on Big Data: Considering API ...

October 2013

This paper looks at how data is created and by whom. A particular focus is the intersection between the application programming interface (API) as well as tools used to process data.

Read more

Mining Social Media: Tracking Content and Predicti ...

2012

This explanatory thesis is concerned with user generated text, audio and video media. According to Tsagkias two aspects, the social and user generated content, led to the development of two main research branches in social media analysis.

Read more

Detecting Linguistic Markers for Radical Violence ...

December 2013

This article attempts to address the challenge of surveilling potential lone-wolf terrorists. Since these individuals act on their own, information cannot be collected using traditional police methods such as infiltration or wiretapping. Cohen et al.

Read more

Crowdsourced Rumour Identification During Emergenc ...

2015

McCreadie, Macdonald and Ounis discuss the use of social media platforms, such as Twitter, to track significant events. Emergency response agencies are increasingly looking to social media as a source of real-time information about such events.

Read more

Foreign Fighters, Radicalization and the Internet ...

Mubin Shaikh, Police Project Consultant with the Romeo Dallaire Initiative, discusses the evolution of radical propaganda online, social media and foreign fighters and the need for a robust counter narrative. Mr.

Read more

Pages

  • « first
  • ‹ previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • next ›
  • last »

About us


This portal gathers an annotated collection of recent research on the ways in which social media and new technologies may be leveraged in the fight against violent extremism

MORE

Contact info

+1-613-755-4007 •  info@secdev.foundation

Copyright © 2014 - 2017 • The SecDev Foundation

  • Home
  • The SecDev Foundation