Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 29, 2024 Mon

Time: 11:22 pm

Results for online extremism

2 results found

Author: Briggs, Rachel

Title: Policy Briefing: Countering the Appeal of Extremism Online

Summary: This report was commissioned by the Danish government and has been written by The Institute for Strategic Dialogue (ISD). It draws on discussions and conclusions from three days of meetings in Copenhagen in June 2013 with a range of relevant stakeholders to discuss ways of tackling online extremism. Co-organised by the Danish government and ISD, these international meetings involved academics, practitioners, central and local government policy makers, intelligence agencies and representatives from the private technology sector. The purpose of this paper is not to summarise those discussions, but drawing on them to offer a framework and series of recommendations for the ways that governments should structure and resource their responses to online extremism. The report offers the following findings and recommendations for governments: Extremists and violent extremists are using the Internet and social media to inspire, radicalise and recruit young people to their cause, whether as passive supporters, active enthusiasts or those willing to become operational. Not enough has been done to date to tackle the use of the Internet and social media by extremists and violent extremists. Most effort has been focused on negative measures, such as take-downs and filtering. While this is important, more focus and resources need to be invested to enable the silent majority to be better equipped to see through extremist propaganda, take control of online spaces, and actively push back on extremist messages. There are three areas where government should focus its efforts: Strengthening digital literacy and critical consumption among young people i. Governments should support mainstream digital literacy and critical consumption programmes through state schools and also support provision through youth and community organisations; ii. Governments should support at arm's length projects working with at risk youth to deconstruct extremist messages Increasing counter-messaging, counter-narrative and alternative narrative activity: i. Government strategic communications need to be centralised and coordinated, either through a dedicated unit or by assigning lead status to a single unit or department ii. Governments need to be realistic about the challenges that limit their ability to play an active 'messenger' role in counter-narrative, apart from in limited circumstances. iii. Governments should make significant investments in funding non-governmental organisations able to offer credible alternatives. Building the capacity of credible messengers: i. Governments should make significant investments in building the skills and expertise of the most effective counter-messengers to build their capacity in technology, production, communications, and campaigning. ii. Governments should use their convening power to bring the private tech sector to the table as their expertise can help the voices of credible messengers. iii. Governments should fund centralised information gathering to provide economies of scale and ensure that effective counter-messengers have the information they need to work, such as analytics, audience profiling, and the sharing of good practice in alternative and counter-narratives. iv. Government must work multilaterally to pool resources in this area, taking an active role in streamlining the cross-border exchange of expertise and lessons learned in capacity building.

Details: London: Institute for Strategic Dialogue, 2014. 23p.

Source: Internet Resource: Accessed May 14, 2015 at: http://www.strategicdialogue.org/Inspire_Radicalize_Recruit.pdf

Year: 2014

Country: International

URL: http://www.strategicdialogue.org/Inspire_Radicalize_Recruit.pdf

Shelf Number: 135638

Keywords:
Counter-Radicalization
Extremist Groups
Online Extremism
Radical Groups
Radicalization
Social Networks

Author: Klausen, Jytte

Title: Finding Online Extremists in Social Networks

Summary: Online extremists in social networks pose a new form of threat to the general public. These extremists range from cyberbullies who harass innocent users to terrorist organizations such as the Islamic State of Iraq and Syria (ISIS) that use social networks to recruit and incite violence. Currently social networks suspend the accounts of such extremists in response to user complaints. The challenge is that these extremist users simply create new accounts and continue their activities. In this work we present a new set of operational capabilities to deal with the threat posed by online extremists in social networks. Using data from several hundred thousand extremist accounts on Twitter, we develop a behavioral model for these users, in particular what their accounts look like and who they connect with. This model is used to identify new extremist accounts by predicting if they will be suspended for extremist activity. We also use this model to track existing extremist users as they create new accounts by identifying if two accounts belong to the same user. Finally, we present a model for searching the social network to efficiently find suspended users' new accounts based on a variant of the classic Polya's urn setup. We find a simple characterization of the optimal search policy for this model under fairly general conditions. Our urn model and main theoretical results generalize easily to search problems in other fields.

Details: Unpublished paper, 2016. 49p.

Source: Internet Resource: Accessed December 23, 2016 at: https://pdfs.semanticscholar.org/3a42/19deb22b90f807cec920ade6470a7bd44c3b.pdf

Year: 2016

Country: International

URL: https://pdfs.semanticscholar.org/3a42/19deb22b90f807cec920ade6470a7bd44c3b.pdf

Shelf Number: 147812

Keywords:
Extremist Groups
Extremists
Online Extremism
Radical Groups
Social Networks