DOI QR코드

DOI QR Code

Role of Social Media in Online Radicalization: Literature Review and Research Agenda

  • Tanu Shree (Dept. of Information Technology and Systems at IIM Raipur) ;
  • Sumeet Gupta (Indian Institute of Management Raipur)
  • 투고 : 2018.10.13
  • 심사 : 2019.01.28
  • 발행 : 2019.06.30

초록

This study attempts to synthesize the literature on radicalization and examine the role of social media in promoting radicalization. The study is based on the review of prominent studies on radicalization in both offline and online settings. The study builds upon the literature in offline settings on radicalisation and presents a research agenda for radicalization in online settings. The study also presents a model of radicalization delineating the role of social media.

키워드

참고문헌

  1. Aly, A. (2010). Proceedings of the 1st Australian Counter Terrorism Conference. Terrorism. 
  2. Andre, V., and Harris-Hogan, S. (2013). Mohamed merah: From petty criminal to neojihadist. Politics, Religion & Ideology. https://doi.org/10.1080/21567689.2013.792655 
  3. Atran, S. (2008). Who becomes a terrorist today? Perspectives on Terrorism, 2(5), 1-6. 
  4. Baker-Beall, C., Heath-Kelly, C., and Jarvis, L. (2014). Counter-radicalisation: Critical perspectives. Counter - Radicalisation: Critical Perspectives. https://doi.org/10.4324/9781315773094 
  5. Baran, Z. (2005). Fighting the war of ideas. Foreign Affairs. https://doi.org/10.2139/ssrn.677403 
  6. Bartlet, J., and Miller, C. (2012). The edge of violence: Towards telling the difference between violent and non-violent radicalization. Terrorism and Political Viol ence, 24(1), 1-21. https://doi.org/10.1080/09546553.2011.594923 
  7. Bartlett, J., and Miller, C. (2011). Truth, lies and the internet a report into young people's digital fluency. Demos, (September), 1-59. Retrieved from http://www.demos.co.uk/files/Truth_-_web.pdf 
  8. Bergin, A., Osman, S. B., Ungerer, C., and Yasin, N. A. M. (2009). ASPI special report: Countering internet radicalisation in Southeast Asia. ASPI Special Report. 
  9. Bermingham, A., Conway, M., Mclnerney, L., O'Hare, N., and Smeaton, A. F. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009, 231-236. https://doi.org/10.1109/ASONAM.2009.31 
  10. Bjelopera, J., and Randol, M. (2010). American jihadist terrorism: Combating a complex threat. Congressional Research Service. 
  11. Blanchard, D. A., and Rambo, L. R. (1994). Understanding religious conversion. Contemporary Sociology. https://doi.org/10.3171/2014.3.PEDS13381 
  12. Blanchard, D. A., and Rambo, L. R. (1994). Understanding religious conversion. Contemporary Sociology. https://doi.org/10.2307/2074335 
  13. Borum, R. (2011). Rethinking radicalization. Journal of Strategic Security, 4(4), 1-6. Retrieved from http://scholarcommons.usf.edu/jss 
  14. Briggs, R., and Strugnell, A. (2011). Radicalisation: The role of the internet. Institute for Strategic Dialogue, 1-12. https://doi.org/10.1093/ajae/aau104 
  15. Chen, C.-W., and Lin, C.-S. (2014). Building a sense of virtual community: The role of the features of social networking sites. Cyberpsychology, Behavior, and Social Networking, 17(7), 460-465. https://doi.org/10.1089/cyber.2013.0530 
  16. Cogburn, D. L., and Espinoza-Vasquez, F. K. (2011). From networked nominee to networked nation: Examining the impact of web 2.0 and social media on political participation and civic engagement in the 2008 obama campaign. Journal of Political Marketing, 10(1-2), 189-213. https://doi.org/10.1080/15377857.2011.540224 
  17. Conway, M. (2012). From al-Zarqawi to al-Awlaki: The emergence and development of an online radical milieu. CTX: Combating Terrorism Exchange. 
  18. Conway, M. (2014a). From "cyberterrorism" to "online radicalism." Exchanging Terrorism Oxygen for Media Airwaves. https://doi.org/10.4018/978-1\-4666-5776-2.ch014
  19. Conway, M. (2014b). Reality check: Assessing the (un)likelihood of cyberterrorism. In Cyberterrorism: Understanding, Assessment, and Response. https://doi.org/10.1007/978-1-4939-0962-9_6 
  20. Conway, M. (2016). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77-98. https://doi.org/10.1080/1057610X.2016.1157408 
  21. Diehl, T., Weeks, B. E., and Gil de Zunga, H. (2016). Political persuasion on social media: Tracing direct and indirect effects of news use and social interaction. New Media and Society, 18(9), 1875-1895. https://doi.org/10.1177/1461444815616224 
  22. Dozier, D. M., Shen, H., Sweetser, K. D., and Barker, V. (2016a). Demographics and internet behaviors as predictors of active publics. Public Relations Review. https://doi.org/10.1016/j.pubrev.2015.11.006 
  23. Dozier, D. M., Shen, H., Sweetser, K. D., and Barker, V. (2016b). Public relations review demographics and internet behaviors as predictors of active publics. Public Relations Review, 42(1), 82-90. https://doi.org/10.1016/j.pubrev.2015.11.006 
  24. Gray, D. H., and Head, A. (2009). The importance of the internet to the post-modern terrorist and its role as a form of safe haven. European Journal of Scientific Research, 25(3), 396-404. 
  25. Gueorguieva, V. (2008). Voters, MySpace, and You Tube. Social Science Computer Review, 26(3), 288-300. https://doi.org/10.1177/0894439307305636 
  26. Hafez, M., and Mullins, C. (2015). The radicalization puzzle: A theoretical synthesis of empirical approaches to homegrown extremism. Studies in Conflict & Terrorism. https://doi.org/10.1080/1057610X.2015.1051375 
  27. Haythornthwaite, C. (2005). Social networks and internet connectivity effects. Information Communication and Society. https://doi.org/10.1080/13691180500146185 
  28. Helfstein, S. (2012). Edges of radicalization: Ideas, individuals and networks in violent extremism. Retrieved from http://www.dtic.mil/docs/citations/ADA556711 
  29. Homeland Security Institute. (2009). The internet as a terrorist tool for recruitment & radicalization of youth. Science and Technology Directorate. 
  30. Horgan, J. (2008). From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. Annals of the American Academy of Political and Social Science. https://doi.org/10.1177/0002716208317539 
  31. Hoskins, A., and O'Loughlin, B. (2015). Arrested war: The third phase of mediatization. Information Communication and Society. https://doi.org/10.1080/1369118X.2015.1068350 
  32. John, H., and Braddock, K. (2010). Rehabilitating the terrorists?: Challenges in assessing the effectiveness of de-radicalization programs. Terrorism and Political Violence, 22(2), 267-291. https://doi.org/10.1080/09546551003594748 
  33. Kao, D. T., Chuang, S.-C., Wang, S.-M., and Zhang, L. (2013). Message framing in social networking sites. Cyberpsychology, Behavior, and Social Networking, 16(10), 753-760. https://doi.org/10.1089/cyber.2011.0605 
  34. Karpf, D. (2010). Online political mobilization from the advocacy group's perspective: Looking beyond clicktivism. Policy & Internet, 2(4), 7-41. https://doi.org/10.2202/1944-2866.1098 
  35. Kruglanski, A. W., Gelfand, M. J., Beanger, J. J., Sheveland, A., Hetiarachchi, M., and Gunaratna, R. (2014). The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Political Psychology, 35(Suppl.1), 69-93. https://doi.org/10.1111/pops.12163 
  36. Langman, L. (2017). From virtual public spheres to global justice : A critical theory of internetworked social movements author (s): lauren langman Published by : American Sociological Association Stable URL : http://www.jstor.org/stable/4148893 From Virtual Public Spheres, 23(1), 42-74. 
  37. Magouirk, J., Atran, S., and Sageman, M. (2008). Connecting terrorist networks. Studies in Conflict and Terrorism. https://doi.org/10.1080/10576100701759988 
  38. Marie, A., Sulaiman, A., and Ismawati, N. (2014). Computers in human behavior Facebook : The enabler of online civic engagement for activists. Computers in Human Behavior, 32, 284-289. https://doi.org/10.1016/j.chb.2013.12.017 
  39. McCauley, C., and Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20(3), 415-433. https://doi.org/10.1080/09546550802073367 
  40. Mcgarty, C., Thomas, E. F., Lala, G., Smith, L. G. E., and Bliuc, A. M. (2014). New technologies, new identities, and the growth of mass opposition in the arab spring. Political Psychology. https://doi.org/10.1111/pops.12060 
  41. Moghaddam, F. M. (2009). De-Radicalization and the staircase from terrorism. In The Faces of Terrorism: Multidisciplinary Perspectives (pp. 277-292). https://doi.org/10.1002/9780470744499.ch16 
  42. Moskalenko, S., and Mccauley, C. (2009). Terrorism and political violence measuring political mobilization: The distinction between activism and radicalism measuring political mobilization. The Distinction Between Activism and Radicalism, 21(2), 239-260. https://doi.org/10.1080/09546550902765508 
  43. Naji, A. B. (2004). The management of savagery: The most critical stage through which the Umma Will Pass. John M. Olin Institute for Strategic Studies at Harvard University. https://doi.org/http://hdl.handle.net/10066/6849 
  44. Neumann, A., Vilata, I., Len, X., Garcia, P. E., Navarro, L., and Lopez, E. (2012). Community-lab: Architecture of a community networking testbed for the future internet. International Conference on Wireless and Mobile Computing, Networking and Communications, 620-627. https://doi.org/10.1109/WiMOB.2012.6379141 
  45. Neumann, P., and Kleinmann, S. (2013). How rigorous is radicalization research? Democracy and Security, 9(4), 360-382. https://doi.org/10.1080/17419166.2013.802984 
  46. Pantucci, R. (2011). A typology of lone wolves : Preliminary analysis of lone islamist terrorists dditorial assistants. Developments in Radicalisation and Political Violence, (March), 1-23. https://doi.org/http://icsr.info/2011/04/a\-typology-of-lone-wolves-preliminary-analysis-of-lone-islamist-terrorists/ https://doi.org/http://icsr.info/2011/04/a\-typology-of-lone-wolves-preliminary-analysis-of-lone-islamist-terrorists/ 
  47. Porta, D. Della, and LaFree, G. (2012). Guest editorial: Processes of radicalization and de-radicalization. International Journal of Conflict and Violence, 6(1), 4-10. 
  48. Precht, T. (2007). Home grown terrorism and Islamist radicalisation in Europe. From conversion to terrorism. https://doi.org/10.1007/978-94-007-4978-8 
  49. Ramakrishna, K. (2015). Islamist terrorism and militancy in Indonesia: The power of the manichean mindset. Islamist Terrorism and Militancy in Indonesia: The Power of the Manichean Mindset. https://doi.org/10.1007/978-981-287-194-7 
  50. Rambo, L. R. (1999). Theories of conversion: Understanding and interpreting religious change. Social Compass, 46(3), 259-271. https://doi.org/10.1177/003776899046003003 
  51. Rambo, L. R., and Bauman, S. C. (2012). Psychology of conversion and spiritual transformation. Pastoral Psychology, 61(5-6), 879-894. https://doi.org/10.1007/s11089-011-0364-5 
  52. Ranstorp, M., and Hyllengren, P. (2013). Prevention of violent extremism in third countries. Center for Assymetric Threats Studies. 
  53. Schmid, A. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. Terrorism and Counter-Terrorism Studies. https://doi.org/10.19165/2013.1.02 
  54. Schmid, A. P. (2016). Research on radicalisation: Topics and themes. Perspectives on Terrorism, 10(3), 26-32. 
  55. Sedgwick, M. (2010). The concept of radicalization as a source of confusion. Terrorism and Political Violence, 22(4), 479-494. https://doi.org/10.1080/09546553.2010.491009 
  56. Shetret, L. (2011). The use of the internet for educational purposes. Procedia \-Social and Behavioral Sciences, 28(February), 606-611. https://doi.org/10.1016/j.sbspro.2011.11.115 
  57. Silber, M. D., and Bhatt, A. (2007). Radicalization in the west: The homegrown threat, 1-90. https://doi.org/10.1177/036354659001800501 
  58. Silverman, T., Stewart, C. J., and Birdwell, J. (2016). The impact of counter-narratives. Institute of Strategic Dialogue. 
  59. Stevens, T. (2009). Regulating the 'dark web': How a two-fold approach can tackle peer-to-peer radicalisation. RUSI Journal, 154(2), 28-33. https://doi.org/10.1080/03071840902965687 
  60. Suyin, Y., and Park, J. (2010). Countering internet radicalisation: A holistic approach. RSIS Commentaries. Retrieved from http://hdl.handle.net/10220/6657 
  61. Sweetser, K. D., and Kelleher, T. (2011). A survey of social media use, motivation and leadership among public relations practitioners. Public Relations Review, 37(4), 425-428. https://doi.org/10.1016/j.pubrev.2011.08.010 
  62. Tausch, N., Becker, J. C., Spears, R., Christ, O., Saab, R., Singh, P., and Siddiqui, R. N. (2011). Explaining radical group behavior: Developing emotion and efficacy routes to normative and nonnormative collective action. Journal of Personality and Social Psychology. https://doi.org/10.1037/a0022728 
  63. Torok, R. (2010). "Make a bomb in your mums kitchen": Cyber recruiting and socialisation of 'white moors' and home grown jihadists. Proceedings of the 1st Australian Counter Terrorism Conference, (November), 54-61. Retrieved from http://ro.ecu.edu.au/act/6 
  64. von Behr, I., Reding, A., Edwards, C., and Gribbon, L. (2013). Radicalisation in the digital era: The use of the internet in 15 cases of terrorism and extremism. Rand, 76. https://doi.org/10.1214/07-EJS057 
  65. Weimann, G. (2007). Virtual terrorism. The Internet and Governance in Asia: A Critical Reader, 1-22. 
  66. Zhao, Y., Liu, J., Tang, J., and Zhu, Q. (2013). Conceptualizing perceived affordances in social media interaction design. Aslib Proceedings: New Information Perspectives. https://doi.org/10.1108/00012531311330656