Janvier 2021 Bibliography updated Studies of the process of digital radicalization - Zenodo
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
1 janvier 2021 Bibliography updated Studies of the process of digital radicalization Séraphin ALAVA University of Toulouse – Member for Unesco Prev {DARING POPULAR EDUCATION & PREVENTING EXTREMISM} Réseaux des Savoirs - France Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
Bibliography "Studies of the process of digital radicalization". PR. Séraphin ALAVA 2020 Chair Unesco Prev - https://chaireunesco- prev.ca/en/home/ Background : The selective bibliography presented here focuses on interdisciplinary research developed over the past 6 years on three major themes for the prevention of radicalization, violent extremism and online hate speech. We wanted to gather in one bibliography at a time: • Research that describes and understands the processes of online radicalization, encompassing terrorist propaganda, extremist activism and online recruitment processes. • Research that promotes the construction of conceptual, technical, and methodological tools for the analysis and characterization of hate and extremist discourse. • Evaluative research on counter-discourse or counter-narrative deployment policies by seeking to take stock of evaluations, impact measures and innovations. • Technological research using big datas, datasphere analysis, development of effective action tools to fight online terrorism and online extremism. We are aware that this list is dated from 2015 to 2021. We strive to describe each result and provide a comprehensive literature review that selects the best research advances. We hope you find this bibliography useful in answering the three key social questions when addressing these areas: A) Are you sure that the digital world has become a space for radicalization and extremist recruitment? B) But how can we limit, on a regular basis, these dangers on the Internet? C) But is the fight possible? How to act on a daily basis. Liste des références : [1] Agarwal S. (2015). Applying Social Media Intelligence for Predicting and Identifying On-line Radicalization and Civil Unrest Oriented Threats. arXiv:1511.06858v1 [cs.CY] 21 Nov 2015 [2] Gaudette T., Scrivens R. et Venkatesh V. (2020). The Role of the Internet in Facilitating Violent Extremism: Insights from Former Right-Wing Extremists. Terrorism and Political Violence. DOI: 10.1080/09546553.2020.1784147 Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[3] Agarwal, I., Xie, O.,Vovsha, R., Rambow, R. Passonneau, “Sentiment Analysis of Twitter Data", In Proceedings of the ACL 2011Workshop on Languages in Social Media,2011 , pp. 30-38, 2011 [4] Agarwal, S., & Sureka, A. (2015, February). Using knn and svm based one-class classifier for detecting online radicalization on twitter. In International Conference on Distributed Computing and Internet Technology (pp. 431-442). Springer, Cham. [5] Aggarwal, Neil Krishan. 2016. The Taliban’s Virtual Emirate: The Culture and Psychology of an Online Militant Com- munity. New York: Columbia University Press. [6] Akemi Takeoka Chatfield et al. (2015). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. Proceedings of the 16th Annual International Conference on Digital Government ResearchMay 2015 Pages 239–249 [7] Alava S., D Frau-Meigs, G Hassan. (2017). Youth and violent extremism on social media: mapping the research. Unesco [8] Alava Séraphin, Frau-Meigs Divina, Hassan Ghayda, "How to qualify the relationship between social media and radicalization processes leading to violence? . Note de synthèse internationale", Quaderni, 2018/1 (n° 95), p. 39-52 [9] Alexander, Audrey. 2017. Digital Decay: Tracing Change Over Time among English- Language Islamic State Sympathizers on Twitter. Washington, D.C.: George Washington Uni- versity Program on Extremism. https://extremism.g- wu.edu/sites/g/files/zaxdzs2191/f/DigitalDecayFinal_- 0.pdf. [10] Allendorfer, W. H., & Herring, S. C. (2015). ISIS vs. the US government: A war of online video propaganda. First Monday, 20(12). [11] Al-Rawi, Ahmed. 2016. Video Games, Terrorism, and ISIS’s Jihad 3.0. Terrorism and Political Violence 30 (4): 740–60. http://www.tandfonline.com/doi/full/ 10.1080/09546553.2016.1207633. [12] Al-Saud, Abdullah bin Khaled. 2017. The Tranquillity Cam- paign: A Beacon of Light in the Dark World Wide Web. Perspectives on Terrorism 11 (2): 58–64. [13] Al-Shishani, Murad Batal. 2010. Taking Al-Qaeda’s Jihad to Facebook. Jamestown Terrorism Monitor 5 (4): 3–4. [14] Amarasingam, Amarnath. 2015. Elton “Ibrahim” Simpson’s Path to Jihad in Garland, Texas. War on the Rocks, May 14. https://warontherocks.com/2015/05/elton- ibrahim- simpsons-path-to-jihad-in-garland-texas/. [15] Anzalone, Christopher. 2010. From “Martyrdom” Videos to Jihadi Journalism in Somalia. Informed Comment, 25 Au- gust. https://www.juancole.com/2010/08/anzalone-from- %E2%80%98martyrdom%E2%80%99-videos-to-jihadi- journalism-in-somalia.html. [16] Anzalone, Christopher. 2016. Continuity and Change: The Evolution and Resilience of Al-Shabab’s Media Insur- gency, 2006–2016. Hate Speech International, 9 November. https://www.hate-speech.org/new-report-on-al-shabab- media/. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[17] Archetti, Christina. 2013. Understanding Terrorism in the Age of Global Media: A Communication Approach. New York: Palgrave Macmillan. [18] Archetti, Christina. 2018. The Unbearable Thinness of Strategic Communication. In Countering Online Propaganda and Violent Extremism: The Dark Side of Digital Dip- lomacy, ed. Comeliu Bjola and James Pamment, 81–96. Abingdon-on-Thames: Routledge. [19] Ascone, L., & Longhi, J. (2017). The expression of threat in jihadist propaganda. Fragmentum, (50), 85-98. [58] [20] Ashcroft, M., Fisher, A., Kaati, L., Omer, E., & Prucha, N. (2015, September). Detecting jihadist messages on twitter. In Intelligence and Security Informatics Conference (EISIC), 2015 European (pp. 161-164). IEEE. [21] Atton, Christina. 2006. Far-Right Media on the Internet: Culture, Discourse and Power. New Media and Society 8 (4): 573–87. [22] Awan, Imran. 2017. Cyber-Extremism: Isis and the Power of Social Media. Society 54 (2): 138–49. [23] Badawy, A., & Ferrara, E. (2017). The Rise of Jihadist Propaganda on Social Networks. arXiv preprint arXiv:1702.02263. [24] Bartlett, Jamie, and Alex Krasomdomski-Jones. 2016. Counter-speech on Facebook. London: DEMOS. https:// www.Demos.co.uk/wp-content/uploads/2016/09/ Counter- speech-on-facebook-report.pdf. [25] Bean, Hamilton, and Amanda Edgar. 2017. A Genosonic Analysis of ISIL and US Counter-Extremism Video Mes- sages. Media, War, and Conflict 10 (3): 327–44. [26] Benson, David C. 2014. Why the Internet Is Not Increasing Terrorism. Security Studies 23 (2): 293–328. [27] Bergen, Peter, Bruce Hoffmann, Michael Hurley, and Erroll Suthers. 2013. Jihadist Terrorism: A Threat Assessment. Washington, DC: Bipartisan Policy Centre. [28] Bergen, Peter. 2016. ISIS Online: Countering Terrorist Radicalization and Recruitment on the Internet and Social Media. [Prepared testimony]. Washington, DC: Committee on Homeland Security. https://www.hsgac.senate.gov/down- load/bergen- testimony_psi-2016-07-05. [29] Berger, J. M. (2015). Tailored online interventions: The islamic state’s recruitment strategy. CTC Sentinel, 8(10), 19- 23. [30] Berger, J. M. 2015. How Terrorists Recruit Online (and How to Stop It). Brookings Institution, Markaz blog, 9 Novem- ber. https://www.brookings.edu/blog/markaz/2015/11/09/ how-terrorists-recruit-online- and-how-to-stop-it/. [31] Berger, J. M. 2016. Nazis vs. ISIS on Twitter: A Comparative Study of White Nationalist and ISIS Online Social Media Networks. Washington, DC: George Washington Univer- sity Program on Extremism. https://cchs.gwu.edu/files/ downloads/Nazis%2520v.%2520ISIS%2520Final_0.pdf. [32] Berger, J. M. 2017. Deconstruction of Identity Concepts in Is- lamic State Propaganda: A Linkage-Based Approach to Counter-Terrorism Strategic Communications. The Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
Hague: EUROPOL. https://icct.nl/wp-content/uploads/2017/06/ bergerjm_deconstructionofislamicstatetexts.pdf. [33] Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on US Relations with the Islamic World, 3(20), 4-1. [34] Berger, J. M., & Perez, H. (2016). The Islamic State's Diminishing Returns on Twitter: How Suspensions are Limiting the Social Networks of English-speaking ISIS Supporters. George Washington University. [35] Berger, J. M., & Strathearn, B. (2013). Who Matters Online: Measuring Influence, Evaluating Content and Countering Violent Exremism in Online Social Networks. International Centre for the Study of Radicalisation and Political Violence. [36] Berger, J. M., and Heather Perez. 2016. The Islamic State’s Di- minishing Returns on Twitter: How Suspensions are Limit- ing the Social Networks of English-Speaking ISIS Support- ers. Washington, DC: George Washington University Program on Extremism. https://cchs.gwu.edu/sites/cch- s.gwu.edu/files/downloads/Berger_Occasional%20Paper-pdf. [37] Berger, J. M., and Jessica Stern. 2015. Isis: The State of Terror.New York: HarperCollins. [38] Berger, J. M., and Jonathon Morgan. 2015. The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter. Washington, DC: Brookings Insti- tution. https://www.brookings.edu/wp-content/uploads/ 2016/06/isis_twitter_census_berger_morgan.pdf. [39] Bermingham, A., Conway, M., McInerney, L., O'Hare, N., & Smeaton, A. F. (2009, July). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In Social Network Analysis and Mining, 2009. ASONAM'09. International Conference on Advances in (pp. 231-236). IEEE. [40] Bermingham, Adam, Maura Conway, Lisa McInerny, Neil O’Hare, and Alan Smeaton. 2009. Combining Social Net- work Analysis and Sentiment Analysis to Explore the Po- tential for Online Radicalisation: In Proceedings of the 2009 International Conference on Advances in Social Net- work Analysis and Mining, 231– 36. http://doras.dcu.ie/ 4554/. [41] Bloom, M., & Daymon, C. (2018). Assessing the Future Threat: ISIS's Virtual Caliphate. Orbis. [42] Bloom, Mia, Hicham Tiflati, and John Horgan. 2017. Navig- ating ISIS’s Preferred Platform: Telegram. Terrorism and Political Violence, July, 1–13. http://www.tandfonline.- com/doi/full/10.1080/09546553.2017.1339695. [43] Bonanate, Luigi. 1979. Some Unanticipated Consequences of Terrorism. Journal of Peace Research 3 (16): 197–211. [44] Bowman-Grieve, Lorraine. 2009. Exploring “Stormfront”: A Virtual Community of the Radical Right. Studies in Con- flict and Terrorism 32 (11): 989–1007. [45] Brantly, Aaron. 2017. Banning Encryption to Stop Terrorists: A Worse Than Futile Exercise. Combating Terrorism Cen- ter Sentinel 10 (5): 29–33. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[46] Briggs, Rachel, and Sebastien Feve. 2014. Counter the Appeal of Extremism Online. London: Institute for Strategic Dia- logue. https://www.dhs.gov/sites/default/files/publica- tions/Countering%20the%20Appeal%20of%20Extremism%20Online- ISD%20Report.pdf. [47] Burris, Val, Eemery Smith, and Ann Strahm. 2000. White Su- premacist Networks on the Internet. Sociological Focus 33 (2): 215–35. [48] Cabrera L., R., Pardo, A. G., Benouaret, K., Faci, N., Benslimane, D., & Camacho, D. (2017). Measuring the radicalisation risk in social networks. IEEE Access, 5, 10892- 10900. [49] Callimachi, Rukmini. 2015. ISIS and the Lonely Young American. New York Times, 27 June. https:// www.nytimes.com/2015/06/28/world/americas/isis-on- line- recruiting-american.html. [50] Callimachi, Rukmini. 2017. Not “Lone Wolves” After All: How ISIS Guides World’s Terror Plots from Afar. New York Times, 4 February. https://www.nytimes.com/ 2017/02/04/world/asia/isis-messaging-app-terror- plot.html. [51] Camacho, D., Gilpérez-López, I., Gonzalez-Pardo, A., Ortigosa, A., & Urruela, C. (2016, November). RiskTrack: a new approach for risk assessment of radicalisation based on social media data. In CEUR Workshop Proceedings. [52] Camstoll Group. 2016. Use of Social Media by Terrorist Fun- draisers and Financiers. Los Angeles and Washington, D.C.: Camstoll Group. https://www.camstoll.com/wp- content/uploads/2016/04/Social-Media-Report- 4.22.16.pdf. [53] Cano Basave, A. E., He, Y., Liu, K., & Zhao, J. (2013). A weakly supervised bayesian model for violence detection in social media. [54] Caren, Neal, Kay Jowers, and Sarah Gaby. 2012. A Social Movement Online Community: Stormfront and the White Nationalist Movement. In Media, Movements, and Political Change, ed. Jennifer Earl and Deana A. Rohlinger, 163–93 . Bingley, UK: Emerald Group. [55] Carter Center. 2016. Countering Daesh Propaganda: Action- Oriented Research for Practical Policy Outcomes. Atlanta, GA: Carter Center. https://www.cartercenter.org/re- sources/pdfs/peace/conflict_resolution/countering-isis/ counteringdaeshpropaganda-feb2016.pdf. [56] Carter, Joseph A., Shiraz Maher, and Peter R. Neumann. 2014. #Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks. London: International Centre for the Study of Radicalisation. https://icsr.info/ wp- content/uploads/2014/04/ICSR-Report-Greenbirds- Measuring-Importance-and- Influence-in-Syrian-Foreign- Fighter-Networks.pdf. [57] Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi- sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249). ACM. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[58] Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., & Weimann, G. (2008). Uncovering the dark Web: A case study of Jihad on the Web. Journal of the Association for Information Science and Technology, 59(8), 1347-1359. [59] Chouliaraki, Lilie, and Angelos Kissas. 2017. The Communic- ation of Horrorism: A Typology of ISIS Online Death Videos. Critical Studies in Media Communication 35 (1): 24–39. [60] Conway, Maura, and Lisa McInierney. 2008. Jihadi Video and Auto-Radicalisation: Evidence from an Exploratory Youtube Study. In Intelligence and Security Informatics, ed. Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Dajun Zeng, David Hicks, and Gerhard Wagner, 108–18. Esbjerg: EuroISI. [61] Conway, Maura, Moign Khawaja, Suraj Lakhani, Jeremy Reffin, Andrew Robertson, and David Weir. 2017. Disrupt- ing Daesh: Measuring Takedown of Online Terrorist Mater- ial and its Impacts. N.p.: VOX-Pol. http://www.voxpol.eu/ download/vox- pol_publication/DCUJ5528-Disrupting- DAESH-1706-WEB-v2.pdf. [62] Conway, Maura. 2005. Terrorist Web Sites: Their Contents, Functioning, and Effectiveness. In New Media and the New Middle East, ed. Philip Seib, 235–58. New York: Pal- grave Macmillan. [63] Conway, Maura. 2012. From Al-Zarqawi to Al-Awlaki: The Emergence and Development of an Online Radical Mi- lieu. CTX: Combating Terrorism Exchange 2 (4): 12–22. [64] Correa, D., & Sureka, A. (2013). Solutions to detect and analyze online radicalization: a survey. arXiv preprint arXiv:1301.4916. [65] De Koster, Willem, and Dick Houtman. 2008. “Stormfront Is Like a Second Home to Me”: On Virtual Community Formation by Right-Wing Extremists. Information, Com- munication and Society 11 (8): 1155–76. [66] De Smedt, T., De Pauw, G., & Van Ostaeyen, P. (2018). Automatic Detection of Online Jihadist Hate Speech. arXiv preprint arXiv:1803.04596. [67] Della Porta, Donatella, and Gary LaFree. 2012. Processes of Radicalization and De- Radicalization. International Journal of Conflict and Violence 6 (1): 4–10. [68] Derbas, N., Segond, F., Padró, M., Dusserre, E., Dobre, T., Monaci, S., & Mastrobuoni, G. (2017, August). Semantic analysis supporting de-radicalisation. In Database and Expert Systems Applications (DEXA), 2017 28th International Workshop on (pp. 17-21). IEEE. [69] Diaz, Alexandro R., Jongeun Choi, Thomas J. Holt, Steven Chermak, and Joshua D. Freilich. 2016. Data-driven Sys- tem Identification of the Social Network Dynamics in Online Postings of an Extremist Group. In 2016 IEEE In- ternational Conference on Cybercrime and Computer Forensic, ed. Barry Cartwright, George Weir and Laurie Yiu-Chung Lau, n.p. N.p.: IEEE. [70] Donelan, Helen. 2009. Online Communication and Collabora- tion: A Reader. Abingdon- on-Thames: Routledge. [71] Douglas, Karen, Graig McGarty, Ana-Maria Bliuc, and Gir- ish Lala. 2005. Understanding Cyberhate: Social Compet- ition and Social Creativity in Online White Supremacist Groups. Social Science Computer Review 23 (1): 68–76. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[72] Elga Sikkens, Marion van San, Stijn Sieckelinck. (2016). Participant Recruitment through Social Media: Lessons Learned from a Qualitative Radicalization Study Using Facebook. Sagejournals, Volume: 29 issue: 2, page(s): 130-139 [73] Emma Morris (2016) Children: extremism and online radicalization, Journal of Children and Media, 10:4, 508-514 [74] Farwell, James P. 2014. The Media Strategy of ISIS. Survival 56 (6): 49–55. [75] Fernandez, M., Asif, M., & Alani, H. (2018). Understanding the Roots of Radicalisation on Twitter. [76] Ferrara, E. (2017). Contagion dynamics of extremist propaganda in social networks. Information Sciences, 418, 1- 12 [77] Ferrara, E., Wang, W. Q., Varol, O., Flammini, A., & Galstyan, A. (2016, November). Predicting online extremism, content adopters, and interaction reciprocity. In International conference on social informatics (pp. 22-39). Springer, Cham. [78] Feuer, Alan. 2018. One Brooklyn Man’s Lonely Journey to Ji- had. New York Times, 3 January. https://www.nytimes.- com/2018/01/03/nyregion/akhror-saidakhmetov- terror- brooklyn-nyc.html. [79] Fioretti, Julia. 2017. Social Media Giants Step Up to Join Fight Against Extremist Content. Reuters, 26 June. https://www.reuters.com/article/us-internet-extremism/ social-media-giants-step-up-joint-fight-against-extrem- ist-content-idUSKBN19H20A. [80] Frampton, Martyn, Ali Fisher, and Nico Prucha. 2017. The New Netwar: Countering Extremism Online. London: Policy Exchange. https://policyexchange.org.uk/wp-con- tent/uploads/2017/09/The-New-Netwar-1.pdf. [81] Freiburger, Tina, and Jeffrey Crane. 2008. A Systematic Ex- amination of Terrorist Use of the Internet. International Journal of Cyber Criminology 2 (1): 309–19. [82] Fu, T., Abbasi, A., & Chen, H. (2010). A focused crawler for Dark Web forums. Journal of the Association for Information Science and Technology, 61(6), 1213- 1231. [83] Gambhir, Harleen. 2016. The Virtual Caliphate: ISIS’s Inform- ation Warfare. Washington, DC: Institute for the Study of War. http://www.understandingwar.org/backgrounder/ virtual-caliphate-isiss- information-warfare. [84] Gartenstein-Ross, Daveed, and Madeleine Blackman. 2017. ISIL’s Virtual Planners: A Critical Terrorist Innovation. War on the Rocks, 4 January. https://warontherocks.com/ 2017/01/isils-virtual-planners-a-critical-terrorist-innova- tion/. [85] Gartenstein-Ross, Daveed, and Nathaniel Barr. 2016. The Myth of Lone-Wolf Terrorism. Foreign Affairs. http:// www.defenddemocracy.org/media- hit/gartenstein-ross- daveed-the-myth-of-lone-wolf-terrorism/. [86] Gartenstein-Ross, Daveed, Nathaniel Barr, and Bridget Moreng. 2016. The Islamic State’s Global Propaganda Strategy. The Hague: International Centre for Counter- Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
Terrorism. https://www.icct.nl/wp-content/uploads/ 2016/03/ICCT-Gartenstein-Ross- IS-Global-Propaganda- Strategy-March2016.pdf. [87] Gates, Scott, and Sukanya Podder. 2015. Social Media, Re- cruitment, Allegiance and the Islamic State. Perspectives on Terrorism 9 (4): 107–16. http://www.terrorismanalysts.- com/pt/index.php/pot/article/view/446. [88] Geeraerts, Sanne B. 2012. Digital Radicalization of Youth. Social Cosmos 3 (1): 25– 32. [89] Gendron, Angela. 2017. The Call to Jihad: Charismatic Preachers and the Internet. Studies in Conflict and Terror- ism 40 (1): 44–61. [90] Gerstenfeld, Phyllis B., Diana R. Grant, and Chau-Pu Chi- ang. 2003. Hate Online: A Content Analysis of Extremist Internet Sites. Analyses of Social Issues and Public Policy 3 (1): 29–44. [91] G Hassan, S Brouillette-Alarie, S Alava, D Frau-Meigs, L Lavoie, A Fetiu (2019).Exposure to extremist online content could lead to violent radicalization: A systematic review of empirical evidence. International journal of developmental science 12 (1-2), 71-88 [92] Ghajar-Khosravi, S., Kwantes, P., Derbentseva, N., & Huey, L. (2016). Quantifying salient concepts discussed in social media content: An analysis of tweets posted by ISIS fangirls. Journal of Terrorism Research, 7(2), 79-90. [93] Gill, Paul, Emily Corner, Maura Conway, Amy Thornton, Mia Bloom, and John Horgan. 2017. Terrorist Use of the Internet by the Numbers: Quantifying Behaviours, Pat- terns, and Processes. Criminology and Public Policy 16 (1): 99–117. [94] Gill, Paul, John Horgan, and Paige Deckert. 2014. Bombing Alone: Tracing the Motivations and Antecedent Behavi- ors of Lone-Actor Terrorists. Journal of Forensic Sciences 59 (2): 425–35. [95] Goldman, Zachary K., Elli Maruyama, Elizabeth Rosenberg, Edoardo Saravalle, and Julia Solomon-Strauss. 2017. Ter- rorist Use of Virtual Currencies: Containing the Potential Threat. Washington, DC: CNAS. http://www.lawandse- curity.org/wp- content/uploads/2017/05/CLSCNASReport- TerroristFinancing-Final.pdf. [96] Gomes, B. G., Holanda, P. H., Couto da Silva, A. P., & Goussevskaia, O. (2017, October). Profiling ISIS Supporters on Twitter. In Proceedings of the 23rd Brazillian Symposium on Multimedia and the Web (pp. 457-460). ACM. [97] Guidère Mathieu, "Internet, High Place of Radicalization", Pouvoirs, 2016/3 (No. 158), pp. 115-123. URL: https://www.cairn.info/revue-pouvoirs-2016-3-page- 115.htm [98] Hartung, M., Klinger, R., Schmidtke, F., & Vogel, L. (2017, June). Identifying Right- Wing Extremism in German Twitter Profiles: a Classification Approach. In International Conference on Applications of Natural Language to Information Systems (pp. 320-325). Springer, Cham. [99] Hegghammer, Thomas. n.d. Interpersonal Trust on Jihadi In- ternet Forums. Unpublished manuscript. [100] Hoffman, Bruce. 2006. Using the Web as a Weapon: The Inter- net as a Tool for Violent Radicalization and Homegrown Terrorism. [Prepared Testimony]. Washington, Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
DC: Com- mittee on Homeland Security. https://fas.org/irp/con- gress/2007_hr/web.pdf. [101] Hoffman, Bruce. 2008. The Myth of Grass-Roots Terrorism: Why Osama bin Laden Still Matters. Foreign Affairs 87 (3): 133–38. [102] Hoffman, Bruce. 2017. Inside Terrorism. New York: Columbia University Press. [103] Holbrook, Donald. 2013. Far Right and Islamist Extremist Discourses: Shifting Patterns of Enmity. In Extreme Right Wing Political Violence and Terrorism, ed. Max Taylor, P. [104] Holbrook, Donald. 2015. A Critical Analysis of the Role of the Internet in the Preparation and Planning of Acts of Terrorism. Dynamics of Asymmetric Conflict 8 (2): 121–33. [105] Holbrook, Donald. 2017. What Types of Media Do Terrorists Collect? An Analysis of Religious, Political, and Ideological Publications Found in Terrorism Investigations in the UK. The Hague: International Centre for Counter-Terrorism. https://icct.nl/wp- content/uploads/2017/09/ICCT-Hol- brook-What-Types-of-Media-Do-Terrorists- Collect-Sept- 2017-2.pdf. [106] Hoskins, Andrew, and Ben O’Loughlin. 2009. Media and the Myth of Radicalisation. Media, War, and Conflict 2 (2): 107–10. [107] Hoyle, Carolyn, Alexandra Bradford, and Ross Frenett. 2015. Becoming Mulan? Female Western Migrants to ISIS. Lon- don: Institute for Strategic Dialogue. https://www.isdg- lobal.org/wp-content/uploads/2016/02/ISDJ2969_Becom- ing_Mulan_01.15_WEB.pdf. [108] Huey, Laura, and Hillary Peladeau. 2016. Cheering on the Ji- had: An Exploration of Women’s Participation in Online Pro-Jihadist Networks. Waterloo, Ontario: The Canadian Network for Research on Terrorism, Security and Society. http://tsas.ca/wp- content/uploads/2016/05/TSASWP16- 07_Huey-Peladeau.pdf. [109] Huey, Laura. (2015). This is Not Your Mother's Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming. Journal of Terrorism Research . May 2015, Vol. 6 Issue 2, p1-16. 16p [110] Hughes, Seamus, and Alexander Meleagrou-Hitchens. 2017. The Threat to the United States from the Islamic State’s Virtual Entrepreneurs. Combating Terrorism Center Sen- tinel 10 (31): 1–8. [111] Iannaccone, Laurence, and Eli Berman. 2006. Religious Ex- tremism: The Good, The Bad, and the Deadly. Public Choice 128 (1): 109–29. [112] Ingram, Haroro J. 2016a. A “Linkage-Based” Approach to Combating Militant Islamist Propaganda: A Two-Tiered Framework for Practitioners. The Hague: International Centre for Counter-Terrorism. https://icct.nl/wp-content/ uploads/2016/11/ICCT-Ingram-A-Linkage-Based-Ap- proach-Nov2016.pdf. [113] Ingram, Haroro J. 2016b. An Analysis of Inspire and Dabiq: Lessons from AQAP and Islamic State’s Propaganda War. Studies in Conflict & Terrorism 40 (5): 357–375. [114] Ingram, Haroro J., and Craig Whiteside. 2017. The Yemen Raid and the Ghost of Anwar al-Awlaki. Atlantic, 9 Febru- ary. https://www.theatlantic.com/international/archive/ 2017/02/yemen-raid-trump- awlaki-al-qaeda-isis/516180/. [115] Ingram, Haroro J.. 2015. The Strategic Logic of Islamic State Information Operations. Australian Journal of Interna- tional Affairs 69 (6): 729–52. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[116] Jacobson, Michael. 2009. Terrorist Financing on the Internet. Combating Terrorism Center Sentinel 2 (6): 17–20. https:// www.washingtoninstitute.org/uploads/Documents/ opeds/4a438817e3a3c.pdf. [117] Jessica Johnson. (2018). White men's self-radicalization: the "false news" and emotional networking of paranoia. Communication, Culture and Criticism, Volume 11, Number 1, March 2018, Pages 100-115. [118] Johanson, Anna. 2017. ISIS-Chan – The Meanings of the Manga Girl in Image Warfare Against the Islamic Staritical Studies on Terrorism 11 (1): 1–25. http:// www.tandfonline.com/doi/full/10.1080/17539153.2017.1348889?scroll=top&needA ccess=true. [119] Johnson, Neil, Minzhang Zheng, Yulia Vorobyeva, Andrew Gabriel, Houliang Qi, Nicolas Velasquez, Pedro Man- rique, Darnell Johnson, Eduardo Restrepo, Chaoming Song, and Stefan Wuchty. 2016. New Online Ecology of Adversarial Aggregates: ISIS and Beyond. Science 352 (6292): 1459–63. [120] Kamolnick, Paul. 2017. How Muslim Defenders Became “Blood Spilling” Crusaders: Adam Gadahn’s Critique of the “Jihadist” Subversion of Al Qaeda’s Media Warfare Strategy. Terrorism and Political Violence 29 (3): 444–63. [121] Katz, Rita. 2016. Almost Any Messaging App Will Do – If You’re ISIS. Vice Motherboard, July 14. https://mother- board.vice.com/en_us/article/kb7n4a/isis- messaging- apps. [122] Kenney, Michael. 2010. Beyond the Internet: Metis, Techne and the Limitations of Online Artifacts for Islamist Ter- rorists. Terrorism and Political Violence 22 (2): 177– 97. [123] Khatib, Lina. 2013. Image Politics in the Middle East: The Role of the Visual in Political Struggle. London: I. B. Tauris. [124] Kimmage, Daniel. 2008. The Al-Qaeda Media Nexus. Wash- ington, DC: Radio Free Europe Radio Liberty. https://doc- s.rferl.org/en-US/AQ_Media_Nexus.pdf. [125] Kimmage, Daniel. 2010. Al-Qaeda Central and the Internet. Washington, DC: New America Foundation. https://cch- s.gwu.edu/sites/cchs.gwu.edu/files/downloads/HSPI_Re- port_15.pdf. [126] Klausen, Jytte. 2015. Tweeting the Jihad. Studies in Conflict and Terrorism 38 (1): 1–22. [127] Klein, Susan, and Crystal Flinn. 2017. Social Media Compli- ance Programs and the War against Terrorism. Harvard National Security Journal 8: 53–112. [128] Koehler, Daniel. 2015. The Radical Online: Individual Radic- alization Processes and the Role of the Internet. Journal for Deradicalization 1 (winter 2014/15): 116–34. [129] Lara-Cabrera, R., Gonzalez-Pardo, A., Barhamgi, M., & Camacho, D. (2017, August). Extracting radicalisation behavioural patterns from social network data. In Database and Expert Systems Applications (DEXA), 2017 28th International Workshop on (pp. 6-10). IEEE. [130] Laurene Renaut. (2019). Jihadist Radicalization and Victim-Discourse on social Media: From Victim to Executioner. Argumentation et analyse du discours N°23/2019, P. 1-32 Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[131] Lia, Brynjar, and Thomas Hegghammer. 2010. Jihadi Stra- tegic Studies: The Alleged Al Qaida Policy Study Preced- ing the Madrid Bombings. Studies in Conflict and Terror- ism 27 (5): 355–75. [132] Liang, S. (2015). Cyber Jihad : Understanding and Countering Islamic State Propaganda. Retrieved from http://www.gcsp.ch/News- Knowledge/Publications/Cyber-Jihad-Understanding-and-Countering-Islamic- State-Propaganda [133] M. Currie, and Donald Holbrook, 215–37. London: Bloomsbury Academic. [134] Macnair, L., & Frank, R. (2018). The mediums and the messages: exploring the language of Islamic State media through sentiment analysis. Critical Studies on Terrorism, 1-20. [135] Magdy, W., Darwish, K., & Weber, I. (2015). # FailedRevolutions: Using Twitter to study the antecedents of ISIS support. arXiv preprint arXiv:1503.02401. [136] Magdy, W., Darwish, K., & Weber, I. (2015). # FailedRevolutions: Using Twitter to study the antecedents of ISIS support. arXiv preprint arXiv:1503.02401. [137] Magdy, Walid, Kareem Darwish, and Ingmar Weber. 2015. #Failedrevolutions: Using Twitter to Study the Antecedents of ISIS Support. N.p.: Association for the Advancement of Artificial Intelligence. https://arxiv.org/pdf/ 1503.02401.pdf. [138] Manrique, Pedro, Zhenfeng Cao, Andrew Gabriel, John Hor- gan, Paul Gill, Hong Qi, Elvira Restrepo, Daniela John- son, Stefan Wuchty, Chaoming Song, and Neil Johnson. 2016. Women’s Connectivity in Extreme Networks. Sci- ence Advances 2 (6): e1501742. http://advances.sci- encemag.org/content/advances/2/6/e1501742.full.pdf. [139] McCauley, Clark, and Sophia Moskalenko. 2008. Mechan- isms of Political Radicalization: Pathways toward Terror- ism. Terrorism and Political Violence 20 (3): 415–33. [140] McDowell-Smith, Allison, Anne Speckhard, and Ahmet S. Yayla. 2017. Beating ISIS in the Digital Space: Focus Test- ing ISIS Defector Counter-Narrative Videos with Amer- ican College Students. Journal for Deradicalization 1 (10). http://journals.sfu.ca/jd/index.php/jd/article/view/83. [141] Meleagrou-Hitchens, Alexander. 2012. As American as Apple Pie: How Anwar al-Awlaki Became the Face of Western Ji- had. London: International Centre for the Study of Radic- alisation. https://icsr.info/wp-content/uploads/2011/09/ ICSR-Report- As-American-As-Apple-Pie-How-Anwar-al- Awlaki-Became-the-Face-of-Western- Jihad.pdf. [142] Milton, Daniel. 2016. Communication Breakdown: Unravelling the Islamic State’s Media Efforts. West Point: Combating Terrorism Center. [143] Mirani, T. B., & Sasi, S. (2016, December). Sentiment analysis of ISIS related Tweets using Absolute location. In Computational Science and Computational Intelligence (CSCI), 2016 International Conference on (pp. 1140-1145). IEEE. [144] Moriarty, B. (2015). Defeating ISIS on Twitter. Technology Science. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[145] Mozes, Tomer, and Gabriel Weimann. 2010. The E-Market- ing Strategy of Hamas. Studies in Conflict and Terrorism 33 (3): 211–25. [146] Neumann, Peter, and Brooke Rogers. 2011. Recruitment and Mobilisation for the Islamist Militant Movement in Europe. London: International Centre for the Study of Radicalisa- tion. http://icsr.info/2008/10/recruitment-and-mobilisa- tion-for- the-islamist-militant-movement-in-europe/. [147] Neumann, Peter. 2013a. Radikalisierung, Deradikalisierung und Extremismus. Aus Politik und Zeitgeschichte 63: 3–10. [148] Neumann, Peter. 2013b. Options and Strategies for Counter- ing Online Radicalization in the United States. Studies in Conflict and Terrorism 36 (6): 431–59. [149] Neumann, Peter. 2013c. The Trouble with Radicalization. In- ternational Affairs 89 (4): 873–93. [150] Nockleby, J. T. (1994). Hate Speech in Context: The Case of Verbal Threats. Buff. L. Rev., 42, 653. [151] O’Halloran, Kay, Sabine Tan, Peter Wignell, John Bateman, Ducson Pham, Michele Grossman, and Andrew Vande Moere. 2016. Interpreting Text and Image Relations in Vi- olent Extremist Discourse: A Mixed Methods Approach for Big Data Analytics. Terrorism and Political Violence 31 (3): 454–74. http://www.tandfonline.com/doi/pdf/ 10.1080/09546553.2016.1233871?needAccess=true. [152] O’Hara, Kieron, and David Stevens. 2015. Echo Chambers and Online Radicalism: Assessing the Internet’s Compli- city in Violent Extremism. Policy and Internet 7 (4): 401– 22. [153] O'Callaghan, D., Greene, D., Conway, M., Carthy, J., & Cunningham, P. (2013, May). Uncovering the wider structure of extreme right communities spanning popular online networks. In Proceedings of the 5th Annual ACM Web Science Conference (pp. 276-285). ACM. [154] O'Callaghan, D., Prucha, N., Greene, D., Conway, M., Carthy, J., & Cunningham, P. (2014, August). Online social media in the Syria conflict: Encompassing the extremes and the in-betweens. In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on (pp. 409-416). IEEE. [155] Pauwels, Lieven, and Nele Schils. 2016. Differential Online Exposure to Extremist Content and Political Violence: Testing the Relative Strength of Social Learning and Competing Perspectives. Terrorism and Political Violence 28 (1): 1–29. [156] Pearson, Elizabeth. 2015. The Case of Roshonara Choudhry: Implications for Theory on Online Radicalization, ISIS Women, and the Gendered Jihad. Policy and Internet 8 (1): 5–34. [157] Phillips, Vaughan. 2017. The Islamic State’s Strategy: Bur- eaucratizing the Apocalypse through Strategic Commu- nication. Studies in Conflict and Terrorism 40 (9): 731–57. [158] Prucha, N., & Fisher, A. (2013). Tweeting for the caliphate: Twitter as the new frontier for jihadist propaganda. CTC Sentinel, 6(6), 19-23. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[159] Prus, Robert. 2005. Terrorism, Tyranny, and Religious Ex- tremism as Collective Activity: Beyond the Deviant, Psy- chological and Power Mystiques. American Sociologist 36: (1): 47–74. [160] Qi, X., Christensen, K., Duval, R., Fuller, E., Spahiu, A., Wu, Q., & Zhang, C. Q. (2010, August). A hierarchical algorithm for clustering extremist web pages. In Advances in Social Networks Analysis and Mining (ASONAM), 2010 International Conference on (pp. 458-463). IEEE. [161] Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity. International Journal of Human-Computer Studies, 65(1), 71-84. [71]Qin, J., Zhou, Y., & Chen, H. (2011). A multi-region empirical study on the internet presence of global extremist organizations. Information Systems Frontiers, 13(1), 75-88. [162] Ramsay, Gilbert. 2013. Jihadi Culture on the World Wide Web. London: Bloomsbury. [163] Raphael Ottoni, Robert West, Virgilio A F Almeida, Wagner Meira. (2020). Auditing radicalization pathways on YouTube. FAT* '20: Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency, January 2020 Pages 131–141 [164] Ravndal, Jacob Aasland. 2013. Anders Behring Breivik’s Use of the Internet and Social Media. Journal EXIT-Deutsch- land, 2013, no. 2, 172–85. http://journals.sfu.ca/jed/in- dex.php/jex/article/view/28/0. [165] Reed, Alastair, and Haroro J. Ingram. 2017. Exploring the Role of Instructional Material in AQAP’s Inspire and ISIS’s Rumiyah. The Hague: Europol. https://www.euro- pol.europa.eu/publications-documents/exploring-role-of- instructional-material-in- aqaps-inspire-and-isis-rumiyah. [166] Reiger, Diana, Lary Frischlich, and Gary Bente. 2013. Propa- ganda 2.0: Psychological Effects of Right-Wing and Islamic Extremist Internet Videos. Munich: Luchterhand Literat- urverlag. [167] Renfer, Marc, and Henriette Haas. 2008. Systematic Analysis in Counterterrorism: Messages on an Islamist Internet- Forum. International Journal of Intelligence and Counterin- telligence 21 (2): 314–36. [168] Research Perspectives on Online Radicalisation: A Literature Review, 2006–2016. N.p.: VOX-Pol. http://icsr.info/ 2017/05/icsr-vox-pol-paper-research-perspectives- online- radicalisation-literature-review-2006-2016/. [169] Reuter, C., Pätsch, K., & Runft, E. (2017). IT for Peace? Fighting Against Terrorism in Social Media–An Explorative Twitter Study. i-com, 16(2), 181-193. [170] Reynolds, Louis, and Mohammed Hafez. 2017. Social Net- work Analysis of German Foreign Fighters in Syria and Iraq. Terrorism and Political Violence 31 (4): 661–86. http:// www.tandfonline.com/doi/abs/ 10.1080/09546553.2016.1272456. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[171] Reynolds, Louis, and Ralph Scott. 2016. Digital Citizens: Countering Extremism Online. London: Demos. https:// www.Demos.co.uk/wp- content/uploads/2016/12/Digital- Citizenship-web.pdf. [172] Riebe, Thea, Katja Patsch, Marc-Andre Kaufhold, and Chris- tian Reuter. 2018. From Conspiracies to Insults: A Case Study of Radicalisation in Social Media Discourse. [173] Robin Thompson. (2011). Radicalization and use of social media. Strategic Security Journal, Vol. 4, n ° 4 (hiver 2011), pp. 167-190 (26 pages) [174] Rogan, Hanna. 2006. Jihadism Online: A Study of How Al- Qaida and Radical Islamist Groups Use the Internet for Ter- rorist Purposes. Kjeller, Norway: Norwegian Defence Re- search Establishment. [175] Rowe, M., & Saif, H. (2016, May). Mining Pro-ISIS Radicalisation Signals from Social Media Users. In ICWSM (pp. 329-338). [176] Rudner, Martin. 2016. “Electronic Jihad”: The Internet as Al Qaeda’s Catalyst for Global Terror. Studies in Conflict and Terrorism 40 (1): 10–23. [177] Sageman, Marc. 2004. Understanding Jihadi Networks. Phil- adelphia: University of Pennsylvania Press. [178] Sageman, Marc. 2005. Understanding Jihadi Networks. Stra- tegic Insights 4 (4): n.p. [179] Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century. Philadelphia: University of Pennsylvania Press. [180] Saif, H., Dickinson, T., Kastler, L., Fernandez, M., & Alani, H. (2017, May). A semantic graph-based approach for radicalisation detection on social media. In European Semantic Web Conference (pp. 571-587). Springer, Cham. [181] Saif, H., Fernández, M., Rowe, M., & Alani, H. (2016, October). On the role of semantics for detecting pro-isis stances on social media. In CEUR Workshop Proceedings (Vol. 1690). [182] Saif, Hassan, Thomas Dickinson, Leon Kastler, Miriam Fernandez, and Harith Alani. 2017. A Semantic Graph- Based Approach for Radicalisation Detection on Social Media. European Semantic Web Conference 2017: The Se- mantic Web, ed. Eva Blomqvist, Diana Maynard, Aldo Gangemi et al. 571–87. Cham, Germany: Springer Inter- national. https://link.springer.com/chapter/10.1007/978-3- 319-58068-5_35. [183] Salami, Iwa. 2017. Terrorism Financing with Virtual Curren- cies: Can Regulatory Technology Solutions Combat This? Studies in Conflict & Terrorism 41 (12): 968–89. http:// www.tandfonline.com/doi/pdf/ 10.1080/1057610X.2017.1365464?needAccess=true. [184] Saltman, Erin, and Melanie Smith. 2015. “Till Martyrdom Do Us Part”: Gender and the ISIS Phenomenon. London: Insti- tute for Strategic Dialogue. https://www.isdglobal.org/ wp- content/uploads/2016/02/Till_Martyrdom_Do_Us_Part_Gender_and_the_ISIS_Phen omenon.pdf. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[185] Scanlon, J. R., & Gerber, M. S. (2014). Automatic detection of cyber-recruitment by violent extremists. Security Informatics, 3(1), 5. [186] Scanlon, J. R., & Gerber, M. S. (2014). Automatic detection of cyber-recruitment by violent extremists. Security Informatics, 3(1), 5. [187] Schmid, Alex. 2013. The Definition of Terrorism. In The Rout- ledge Handbook of Terrorism Research, ed. Alex Schmid, 38–98. Abingdon-on-Thames: Routledge. [188] Schmid, Alex. 2014. Violent and Non-Violent Extremism: Two Sides of the Same Coin? The Hague: International Centre for Counter-Terrorism. https://www.icct.nl/download/file/ ICCT-Schmid-Violent-Non-Violent-Extremism- May- 2014.pdf. [189] Scrivens, Ryan, Garth Davies, and Richard Frank. 2016. [190] Searching for Signs of Extremism on the Web: An Intro- duction to Sentiment- Based Identification of Radical Au- thors. Behavioural Sciences of Terrorism and Political Ag- gression 10 (1): 39–59. [191] Seib, Philip, and Dana M. Janbek. 2010. Global Terrorism and New Media: The Post-Al Qaeda Generation. Abingdon-on- Thames: Routledge. [192] Selepak, Andrew. 2010. Skinhead Super Mario Brothers: An Examination of Racist and Violent Games on White Su- premacist Web Sites. Journal of Criminal Justice and Pop- ular Culture 17 (1): 1–47. [193] Shane, Scott. 2016. The Enduring Influence of Anwar Al-Aw- laki in the Age of the Islamic State. Combating Terrorism Center Sentinel 9 (7): 15–20. [194] Sheikh, Jakob. 2016. “I Just Said It. The State”: Examining the Motivations for Danish Foreign Fighters in Syria. Per- spectives on Terrorism 10 (6). http://www.terrorismana- lysts.com/pt/index.php/pot/article/view/557. [195] Shortland, Neil D. 2016. “On the Internet, Nobody Knows You’re a Dog”: The Online Risk Assessment of Violent Extremists. In Violence and Society: Breakthroughs in Re- search and Practice, 591–615. Hershey, PA: Information Science Reference. [196] Silverman, Tanya, Christopher J. Stewart, Zahed Amanalluh, and Jonathan Birdwell. 2016. The Impact of Counter-Nar- ratives: Insights from a Year-Long Cross- Platform Pilot Study of Counter-Narrative Curation, Targeting, Evaluation and Impact. London: Institute for Strategic Dialogue. ht- tps://www.Demos.co.uk/wp- content/uploads/2016/09/ Counter-speech-on-facebook-report.pdf. [197] Simi, Pete, and Robert Futrell. 2006. Cyberculture and the Endurance of White Power Activism. Journal of Political and Military Sociology 34 (1): 115–42. [198] Smith, Laura. 2017. In the Early 1980s, White Supremacist Groups Were Early Adopters (and Masters) of the Inter- net. Timeline, 11 October. https://timeline.com/white-su- premacist-early-internet-5e91676eb847. [199] Stalinsky, Steven, and R. Sosnow. 2017. Germany-Based En- crypted Messaging App Telegram Emerges as Jihadis’ Preferred Communications Platform. MEMRI website, Lab Projects, 3 January. https://www.memri.org/cjlab/ germany- based-encrypted-messaging-app-telegram-emerges-as-jihadis-preferred- communications-platform- part-v-of-memri-series-encryption-technology-em- braced-by-isis-al-qaeda-other-jihadis. [200] Stenerson, Anne. 2013. “Bomb-Making for Beginners”: In- side an Al-Qaeda E-Learning Course. Perspectives on Ter- rorism 7 (1): 25–37. http://www.terrorismanalysts.com/pt/ index.php/pot/article/view/241/html. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[201] Stevens, David, and Kieron O’Hara. 2015. The Devil’s Long Tail: Religious and Other Radicals in the Internet Market- place. London: Hurst. [202] Stevens, Tim, and Peter Neumann. 2012. Countering Online Radicalisation: A Strategy for Action. London: Interna- tional Centre for the Study of Radicalisation. http://ic- sr.info/wp-content/uploads/2012/10/1236768491ICSROn- lineRadicalisationReport.pdf. [203] Sullivan, Rachel. 2014. Live-Tweeting Terror: A Rhetorical Analysis of @Hsmpress_ Twitter Updates during the 2013 Nairobi Hostage Crisis. Critical Studies on Terrorism 7 (3): 422–33. [204] Sureka, A., & Agarwal, S. (2014, September). Learning to classify hate and extremism promoting tweets. In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint (pp. 320-320). IEEE. [205] Taub, Ben. 2015. Journey to Jihad: Why are teenagers join- ing ISIS? New Yorker, May 25. https://www.newyorker.- com/magazine/2015/06/01/journey-to- jihad. [206] Torres-Soriano, Manuel Ricardo. 2012. The Dynamics of the Creation, Evolution, and Disappearance of Terrorist In- ternet Forums. International Journal of Conflict and Viol- ence 7 (1): 1–14. [207] Torres-Soriano, Manuel Ricardo. 2016. The Hidden Face of Jihadist Internet Forum Management: The Case of Ansar Al Mujahideen. Terrorism and Political Violence 28 (4): 735–49. [208] Tuck, Henry, and Tanya Silverman. 2016. The Counter-Nar- rative Handbook. London: Institute for Strategic Dialogue. http://www.isdglobal.org/wp- content/uploads/2016/06/ Counter-narrative-Handbook_1.pdf. [209] Varanese, J. A. (2016). “Follow Me So I Can DM You Back”: An Exploratory Analysis of a Female Pro-ISIS Twitter Network. [210] Vera Mironova and Karam Alhamad, “The Names of Jihad: A Guide to ISIS' Noms de Guerre,” Foreign Affairs, July 14, 2017, https://www.foreignaffairs.com/articles/syria/2017-07-14/names-jihad [211] Vermeulen, Floris, and Frank Bovenkerk. 2012. Engaging with Violent Islamic Extremism. The Hague: Eleven Interna- tional. [212] Von Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalisation in the digital era. [213] Von Behr, Ines, Charlie Edwards, Luke Gribbon, and Anais Reding. 2013. Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism. Brus- sels: RAND Europe. https://www.rand.org/content/dam/ rand/pubs/research_reports/RR400/RR453/ RAND_RR453.pdf. [214] Wagemakers, Joas. 2011. Al-Qa’ida’s Editor: Abu Jandal Al- Azdi’s Online Jihadi Activism. Politics, Religion, and Ideo- logy 12 (4): 355–69. [215] Wei, Y., & Singh, L. (2017, May). Using network flows to identify users sharing extremist content on social media. In Pacific-Asia Conference on Knowledge Discovery and Data Mining (pp. 330-342). Springer, Cham. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[216] Weimann, G. (2016). Going dark: Terrorism on the dark Web. Studies in Conflict & Terrorism, 39(3), 195-206. [78]Burris, V., Smith, E., and Strahm, A. White Supremacist Networks on the Internet. Sociological Focus 33, 2 (2000), 215–235. [217] Weimann, Gabriel, and Katharina von Knop. 2008. Applying the Notion of Noise to Countering Online Terrorism. [218] Weimann, Gabriel. 2004. www.terror.net: How Modern Ter- rorism Uses the Internet. Washington, DC: United States Institute of Peace. [219] Weimann, Gabriel. 2006. Virtual Disputes: The Use of the In- ternet for Terrorist Debates. Studies in Conflict and Ter- rorism 29 (7): 623–39. [220] Weimann, Gabriel. 2010. Terror on Facebook, Twitter, and Youtube. Brown Journal of World Affairs 16 (2): 45–54. [221] Weimann, Gabriel. 2016. Terrorist Migration to the Dark Web. Perspectives on Terrorism 10 (3): 40–44. http://www.- terrorismanalysts.com/pt/index.php/pot/article/view/513. [222] Weisburd, Aaron A. 2009. Comparison of Visual Motifs in Ji- hadi and Cholo Videos on YouTube. Studies in Conflict and Terrorism 32 (12): 1066–74. [223] Wibtrope, Ronald. 2012. Rational Extremism: The Political Economy of Radicalism. Cambridge, UK: Cambridge Uni- versity Press. [224] Wiktorowicz, Quintan. 2003. Islamic Activism: A Social Move- ment Theory Approach. Bloomington: Indiana University Press. [225] Wiktorowicz, Quintan. 2005. Radical Islam Rising: Muslim Extremism in the West. Oxford: Rowman and Littlefield. [226] William Grenier-Chalifoux. (2017). Offline radicalization: the role of social networks in the passage to the Islamist terrorist act (1990-2016). Université de Quebec à Montreal UQAM [227] Winkler, Carol K. 2016. Visual Images: Distinguishing Daesh’s Internal and External Communication Strategies. In Countering Daesh Propaganda: Action-Ori- ented Research for Practical Policy Outcomes, 15–20. At- lanta: Carter Center. [228] Winkler, Carol K., Kareem El Damanhoury, Aaron Dicker, and Anthony F. Lemieux. 2016. The Medium is Terrorism: Transformation of the About to Die Trope in Dabiq. Terrorism and Political Violence 31 (2): 224–43. http:// www.tandfonline.com/doi/abs/ 10.1080/09546553.2016.1211526. [229] Winter, C. (2015). Documenting the virtual ‘caliphate’. Quilliam Foundation, 33. [230] Winter, Charlie. 2015a. The Virtual “Caliphate”: Understand- ing the Islamic State’s Propaganda Strategy. N.p.: Quilliam. https://www.stratcomcoe.org/charlie- winter-virtual-ca- liphate-understanding-islamicstates-propaganda- strategy; accessed 10 January 2018. [231] Winter, Charlie. 2015b. Documenting the Virtual “Caliphate”. Quilliam. http://www.quilliaminternational.com/wp-con- tent/uploads/2015/10/FINAL- documenting-the-virtual- caliphate.pdf. [232] Winter, Charlie. 2016. An Integrated Approach to Islamic State Recruitment. Barton, Australia: Australian Strategic Policy Institute. https://www.aspi.org.au/report/integ- rated-approach-islamic-state-recruitment. Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
[233] Wright, S. , Dorman, N. and Cortbus, C., “Twitter shuts down isis supporters and jihadists as mi5 launch anti−terror social media crackdown,” in Mirror UK News, 2015. [234] Xu, J., & Lu, T. C. (2016, December). Automated classification of extremist Twitter accounts using content-based and network-based features. In Big Data (Big Data), 2016 IEEE International Conference on (pp. 2545-2549). IEEE. [235] Zelin, Aaron Y. 2013. The State of Global Jihad Online. Wash- ington, DC: New America Foundation. http://www.wash- ingtoninstitute.org/uploads/Documents/opeds/ Zelin20130201- NewAmericaFoundation.pdf. [236] Zelin, Aaron Y. 2015. Picture or It Didn’t Happen: A Snap- shot of the Islamic State’s Official Media Output. Perspectives on Terrorism 9 (4): 85–97. http://www.terroris- manalysts.com/pt/index.php/pot/article/view/445/html. [237] Zelizer, Barbie. 2010. About to Die: How News Images Move the Public. Oxford: Oxford University Press. [238] Zhang, Y., Zeng, S., Fan, L., Dang, Y., Larson, C. A., & Chen, H. (2009, June). Dark web forums portal: searching and analyzing jihadist forums. In Intelligence and Security Informatics, 2009. ISI'09. IEEE International Conference on (pp. 71- 76). IEEE. For more information on preventing radicalization and countering violent extremism https://chaireunesco-prev.ca/en/home/ Knowledge Activists / Militants des savoirs 2021 seraphin.alava@univ-tlse2.fr
You can also read