Charlie Winter, P. Neumann, Alexander Meleagrou-Hitchens, Magnus Ranstorp, Lorenzo Vidino, J. Fürst
{"title":"网络极端主义:网络行动主义、激进化和反策略的研究趋势","authors":"Charlie Winter, P. Neumann, Alexander Meleagrou-Hitchens, Magnus Ranstorp, Lorenzo Vidino, J. Fürst","doi":"10.4119/IJCV-3809","DOIUrl":null,"url":null,"abstract":"This article reviews the academic literature on how and for what purposes violent extremists use the Internet, at both an individual and organizational level. After defining key concepts like extremism, cyber-terrorism and online radicalization, it provides an overview of the virtual extremist landscape, tracking its evolution from static websites and password-protected forums to mainstream social media and encrypted messaging apps. The reasons why violent extremist organizations use online tools are identified and evaluated, touching on propaganda, recruitment, logistics, funding, and hacking. After this, the article turns to the ways violent extremist individuals use the Internet, discussing its role as a facilitator for socialization and learning. The review concludes by considering the emergent literature on how violent extremism is being countered online, touching on both defensive and offensive measures.","PeriodicalId":45781,"journal":{"name":"International Journal of Conflict and Violence","volume":"14 1","pages":"1-20"},"PeriodicalIF":0.4000,"publicationDate":"2020-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.4119/IJCV-3809","citationCount":"28","resultStr":"{\"title\":\"Online Extremism: Research Trends in Internet Activism, Radicalization, and Counter-Strategies\",\"authors\":\"Charlie Winter, P. Neumann, Alexander Meleagrou-Hitchens, Magnus Ranstorp, Lorenzo Vidino, J. Fürst\",\"doi\":\"10.4119/IJCV-3809\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article reviews the academic literature on how and for what purposes violent extremists use the Internet, at both an individual and organizational level. After defining key concepts like extremism, cyber-terrorism and online radicalization, it provides an overview of the virtual extremist landscape, tracking its evolution from static websites and password-protected forums to mainstream social media and encrypted messaging apps. The reasons why violent extremist organizations use online tools are identified and evaluated, touching on propaganda, recruitment, logistics, funding, and hacking. After this, the article turns to the ways violent extremist individuals use the Internet, discussing its role as a facilitator for socialization and learning. The review concludes by considering the emergent literature on how violent extremism is being countered online, touching on both defensive and offensive measures.\",\"PeriodicalId\":45781,\"journal\":{\"name\":\"International Journal of Conflict and Violence\",\"volume\":\"14 1\",\"pages\":\"1-20\"},\"PeriodicalIF\":0.4000,\"publicationDate\":\"2020-09-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://sci-hub-pdf.com/10.4119/IJCV-3809\",\"citationCount\":\"28\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Conflict and Violence\",\"FirstCategoryId\":\"90\",\"ListUrlMain\":\"https://doi.org/10.4119/IJCV-3809\",\"RegionNum\":4,\"RegionCategory\":\"社会学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"INTERNATIONAL RELATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Conflict and Violence","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.4119/IJCV-3809","RegionNum":4,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
Online Extremism: Research Trends in Internet Activism, Radicalization, and Counter-Strategies
This article reviews the academic literature on how and for what purposes violent extremists use the Internet, at both an individual and organizational level. After defining key concepts like extremism, cyber-terrorism and online radicalization, it provides an overview of the virtual extremist landscape, tracking its evolution from static websites and password-protected forums to mainstream social media and encrypted messaging apps. The reasons why violent extremist organizations use online tools are identified and evaluated, touching on propaganda, recruitment, logistics, funding, and hacking. After this, the article turns to the ways violent extremist individuals use the Internet, discussing its role as a facilitator for socialization and learning. The review concludes by considering the emergent literature on how violent extremism is being countered online, touching on both defensive and offensive measures.