Skip to main content

The Role of the Internet in Facilitating Violent Extremism and Terrorism: Suggestions for Progressing Research

  • Living reference work entry
  • First Online:
The Palgrave Handbook of International Cybercrime and Cyberdeviance

Abstract

Many researchers, practitioners, and policy-makers continue to raise questions about the role of the Internet in facilitating violent extremism and terrorism. A surge in research on this issue notwithstanding, relatively few empirically grounded analyses are yet available. This chapter provides researchers with five key suggestions for progressing knowledge on the role of the Internet in facilitating violent extremism and terrorism so that we may be better placed to determine the significance of online content and activity in the latter going forward. These five suggestions relate to (1) collecting primary data across multiple types of populations; (2) making archives of violent extremist online content accessible for use by researchers and on user-friendly platforms; (3) outreaching beyond terrorism studies to become acquainted with, for example, the Internet studies literature and engaging in interdisciplinary research with, for example, computer scientists; (4) including former extremists in research projects, either as study participants or project collaborators; and (5) drawing connections between the on- and offline worlds of violent extremists.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Abbas, T., & Yigit, I. H. (2016). Perspectives on ethno-national conflict among Kurdish families with members in the PKK. Terrorism and Political Violence, 28(2), 297–315.

    Article  Google Scholar 

  • Amarasingam, A. (2016, August 11). What Aaron told me: An expert on extremism shares his conversations with the terror suspect. National Post. https://nationalpost.com/news/canada/what-aaron-told-me-an-expert-on-extremism-shares-his-conversations-with-the-terror-suspect

  • Anti-Defamation League. (1985). Computerized networks of hate: An ADL fact finding report. https://archive.org/details/ComputerizedNetworksOfHate.

  • Awan, I. (2017). Cyber-extremism: ISIS and the power of social media. Social Science and Public Policy, 54, 138–149.

    Google Scholar 

  • Baines, P. R., O’Shaughnessy, N. J., Moloney, K., Richards, B., Butler, S., & Gill, M. (2010). The dark side of political marketing: Islamist propaganda, reversal theory and British Muslims. European Journal of Marketing, 44(3/4), 478–495.

    Article  Google Scholar 

  • Barrelle, K. (2015). Pro-integration: Disengagement from and life after extremism. Behavioral Sciences of Terrorism and Political Aggression, 7(5), 129–142.

    Article  Google Scholar 

  • Bartlett, J., & Littler, M. (2011). Insight the EDL: Populist politics in the digital era. Demos. https://www.demos.co.uk/files/Inside_the_edl_WEB.pdf?1331035419

  • Bastos, M., & Walker, S. T. (2018). Facebook’s data lockdown is a disaster for academic researchers. The Conversation. https://theconversation.com/facebooks-data-lockdown-is-a-disaster-for-academic-researchers-94533

  • Bazex, H., & Mensat, J.-Y. (2016). Who are the French Jihadists? Analysis of 12 cases to help develop profiles and assessment of the risk of acting out. Annales Medico-Psychologiques, 174(4), 257–265.

    Article  Google Scholar 

  • Berger, J. M., & Morgan, J. (2015). The ISIS Twitter census. Washington: Brookings Institution.

    Google Scholar 

  • Berger, J. M., & Strathearn, B. (2013). Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks. London: International Centre for the Study of Radicalisation and Political Violence.

    Google Scholar 

  • Bjørgo, T., & Horgan, J. (Eds.) (2008). Leaving terrorism behind: Individual and collective disengagement. London: Routledge.

    Google Scholar 

  • Böckler, N., Hoffmann, J., & Zick, A. (2015). The Frankfurt airport attack: A case study on the radicalization of a lone-actor terrorist. Journal of Threat Assessment and Management, 2(3–4), 153–163.

    Article  Google Scholar 

  • Bouzar, D., & Martin, M. (2016). Pour quels motifs les jeunes s’engagent-ils dans le djihad? Neuropsychiatrie de l’Enfance et de l’Adolescence, 64(6), 353–359.

    Article  Google Scholar 

  • Bowen, G., & Bowen, R. (2015). Brand trust in offline and online environments: Lessons for social media. In G. Bowen & W. Ozue (Eds.), Computer-mediated marketing strategies: Social media and online brand communities (pp. 58–82). Hershey: IGI Global.

    Chapter  Google Scholar 

  • Bowers, K., Gill, P., Morgan, P., Meiklejohn, S., & Johnson, S. (2018). Challenges for EMMIE as a realist evaluation framework. In G. Farrell & A. Sidebottom (Eds.), Realist evaluation for crime science: Essays in honour of Nick Tilley (pp. 98–118). London: Routledge.

    Chapter  Google Scholar 

  • Bowie, N. G. (2018). 30 terrorism databases and data sets: A new inventory. Perspectives on Terrorism, 12(5), 51–61.

    Google Scholar 

  • Braddock, K., & Horgan, J. (2016). Towards a guide for constructing and disseminating counternarratives to reduce support for terrorism. Studies in Conflict and Terrorism, 39(5), 381–404.

    Article  Google Scholar 

  • Briggs, R., & Feve, S. (2013). Review of programs to counter narratives of violent extremism: What works and what are the implications for government. London: Institute for Strategic Dialogue.

    Google Scholar 

  • Bryce, J., & Fraser, J. (2014). The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions. Computers in Human Behavior, 30, 299–306.

    Article  Google Scholar 

  • Bubolz, B. F., & Simi, P. (2015). Leaving the world of hate: Life-course transitions and self-change. American Behavioral Scientist, 59(12), 1588–1608.

    Article  Google Scholar 

  • Capellan, J. A. (2015). Lone wolf terrorist or deranged shooter? A study of ideological active shooter events in the United States, 1970–2014. Studies in Conflict and Terrorism, 38(6), 395–413.

    Article  Google Scholar 

  • Carter, J., Maher, S., & Neumann, P. (2014). #Greenbirds: Measuring importance and influence in Syrian foreign fighter networks. London: International Centre for the Study of Radicalisation and Political Violence.

    Google Scholar 

  • Chen, H. (2012). Dark web: Exploring and data mining the dark side of the web. New York: Springer.

    Book  Google Scholar 

  • Chermak, S. M., Freilich, J. D., Parkin, W. S., & Lynch, J. P. (2012). American terrorism and extremist crime data sources and selectivity bias: An investigation focusing on homicide events committed by far-right extremists. Journal of Quantitative Criminology, 28, 191–218.

    Article  Google Scholar 

  • Conway, M. (2016). Determining the role of the Internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict and Terrorism, 40(1), 77–98.

    Article  Google Scholar 

  • Davey, J., Birdwell, J., & Skellett, R. (2018). Counter conversations: A model for direct engagement with individuals showing signs of radicalization online. London: Institute for Strategic Dialogue.

    Google Scholar 

  • Desmarais, S. L., Simons-Rudolph, J., Brugh, C. S., Schilling, E., & Hoggan, C. (2017). The state of scientific knowledge regarding factors associated with terrorism. Journal of Threat Assessment and Management, 4(4), 180–209.

    Article  Google Scholar 

  • Drevon, J. (2016). Embracing Salafi Jihadism in Egypt and mobilizing in the Syrian Jihad. Middle East Critique, 25(4), 321–339.

    Article  Google Scholar 

  • Ducol, B. (2012). Uncovering the French-speaking Jihadisphere: An exploratory analysis. Media, War and Conflict, 5(1), 51–70.

    Article  Google Scholar 

  • Edwards, C., & Gribbon, L. (2013). Pathways to violent extremism in the digital era. RUSI Journal, 158(5), 40–47.

    Article  Google Scholar 

  • Ekman, M. (2018). Anti-refugee mobilization in social media: The case of soldiers of Odin. Social Media and Society, 4(1), 1–11.

    Google Scholar 

  • Freilich, J. D., & Chermak, S. M. (2012). Terrorists use of the Internet: An analysis of strategies, objectives and law responses. In H. S. Yoon (Ed.), Cyberterrorism: Trends and responses (pp. 133–167). Seoul: Korean Institute of Criminology.

    Google Scholar 

  • Frenett, R., & Dow, M. (2014). One to one interventions: A pilot CVE methodology. London: Institute for Strategic Dialogue and Curtain University.

    Google Scholar 

  • Gerstenfeld, P. B., Grant, D. R., & Chiang, C.-P. (2003). Hate online: A content analysis of extremist Internet sites. Analyses of Social Issues and Public Policy, 3(1), 29–44.

    Article  Google Scholar 

  • Gill, P. (2015). Lone-actor terrorists: A behavioural analysis. London: Routledge.

    Book  Google Scholar 

  • Gill, P., & Corner, E. (2015). Lone-actor terrorist use of the Internet and behavioural correlates. In L. Jarvis, S. Macdonald, & T. M. Chen (Eds.), Terrorism online: Politics, law, technology and unconventional violence (pp. 35–53). London: Routledge.

    Google Scholar 

  • Gill, P., Horgan, J., & Deckert, P. (2014). Bombing alone: Tracing the motivations and antecedent behaviours of lone-actor terrorists. Journal of Forensic Sciences, 59(2), 425–435.

    Article  Google Scholar 

  • Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., & Horgan, J. (2017). Terrorist use of the Internet by the numbers: Quantifying behaviors, patterns, and processes. Criminology and Public Policy, 16(1), 99–117.

    Article  Google Scholar 

  • Gray, D. H., & Head, A. (2009). The importance of the Internet to the post-modern terrorist and its role as a form of safe haven. European Journal of Scientific Research, 25(3), 396–404.

    Google Scholar 

  • Gruenewald, J., Chermak, S., & Freilich, J. D. (2013). Distinguishing “loner” attacks from other domestic extremist violence: A comparison of far-right homicide incident and offender characteristics. Criminology and Public Policy, 12(1), 65–91.

    Article  Google Scholar 

  • Harris-Hogan, S., Barrelle, K., & Zammit, A. (2015). What is countering violent extremism? Exploring CVE policy and practice in Australia. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 6–24.

    Article  Google Scholar 

  • Hassan, G., Brouillette-Alarie, S., Alava, S., Frau-Meigs, D., Lavoie, L., Fetiu, A., …, Sieckelinck, S. (2018). Exposure to extremist online content could lead to violent radicalization: A systematic review of empirical evidence. International Journal of Developmental Science, 12(1–2), 71–88.

    Article  Google Scholar 

  • Hegghammer, T. (2014). Interpersonal trust on Jihadi Internet forums. http://hegghammer.com/_files/Interpersonal_trust.pdf

  • Helmus, T. C., & Klein, K. (2018). Assessing outcomes of online campaigns countering violent extremism: A case study of the redirect method. Santa Monica: RAND Corporation.

    Book  Google Scholar 

  • Holbrook, D. (2017). What types of media do terrorists collect? (International Centre for Counter-Terrorism research paper). https://icct.nl/wp-content/uploads/2017/09/ICCT-Holbrook-What-Types-of-Media-Do-Terrorists-Collect-Sept-2017-2.pdf

  • Holbrook, D. (2019). The terrorism information environment: Analysing terrorists’ selection of ideological and facilitative material. Terrorism and Political Violence, 1–23.

    Google Scholar 

  • Holbrook, D., & Taylor, M. (2017). Terrorism as process narratives: A study of pre-arrest media usage and the emergence of pathways to engagement. Terrorism and Political Violence, 1–20.

    Google Scholar 

  • Holt, T. J. (2012). Exploring the intersections of technology, crime and terror. Terrorism and Political Violence, 24(2), 337–354.

    Article  Google Scholar 

  • Horgan, J., Shortland, N., Abbasciano, S., & Walsh, S. (2016). Actions speak louder than words: A behavioral analysis of 183 individuals convicted for terrorist offenses in the United States from 1995 to 2012. Journal of Forensic Sciences, 61(5), 1228–1237.

    Article  Google Scholar 

  • Horgan, J., Altier, M. B., Shortland, N., & Taylor, M. (2017). Walking away: The disengagement and de-radicalization of a violent right-wing extremist. Behavioral Sciences of Terrorism and Political Aggression, 9(2), 63–77.

    Article  Google Scholar 

  • Ilardi, G. J. (2013). Interviews with Canadian radicals. Studies in Conflict and Terrorism, 36(9), 713–738.

    Article  Google Scholar 

  • Jackson, R. (2012). Unknown knowns: The subjugated knowledge of terrorism studies. Critical Studies on Terrorism, 5(1), 11–29.

    Article  Google Scholar 

  • Jacobson, M. (2010). Terrorist drop-outs: One way of promoting a counter-narrative. Perspectives on Terrorism, 3(2), 12–17.

    Google Scholar 

  • Johnson, N. F., Zheng, M., Vorobyeva, Y., Gabriel, A., Qi, H., Velasquez, N., …, Wuchty, S. (2016). New online ecology of adversarial aggregates: ISIS and beyond. Science, 352(6292), 1459–1463.

    Article  Google Scholar 

  • King, G., & Persily, N. (2018). A new model for industry-academic partnerships (Working paper). https://gking.harvard.edu/files/gking/files/partnerships.pdf

  • Klausen, J., Campion, S., Needle, N., Nguyen, G., & Libretti, R. (2016). Toward a behavioral model of “homegrown” radicalization trajectories. Studies in Conflict and Terrorism, 39(1), 67–83.

    Article  Google Scholar 

  • Kleinmann, S. M. (2012). Radicalization of homegrown Sunni militants in the United States: Comparing converts and non-converts. Studies in Conflict and Terrorism, 35(4), 278–297.

    Article  Google Scholar 

  • Koehler, D. (2014a). Right-wing extremist radicalization processes: The formers’ perspective. JEX Journal EXIT-Deutschland, 1, 307–377.

    Google Scholar 

  • Koehler, D. (2014b). The radical online: Individual radicalization processes and the role of the Internet. Journal for Deradicalization, 1, 116–134.

    Google Scholar 

  • LaFree, G., & Freilich, J. D. (2018). Government policies for counteracting violent extremism. Annual Review of Criminology, 2, 383–404.

    Article  Google Scholar 

  • Lee, E., & Leets, L. (2002). Persuasive storytelling by hate groups online: Examining its effects on adolescents. American Behavioral Scientist, 45(6), 927–957.

    Article  Google Scholar 

  • Leimeister, J. M., & Krcmar, H. (2005). Acceptance and utility of a systematically designed virtual community for cancer patients. In P. Van Den Besselaar, G. De Michelis, J. Preece, & C. Simone (Eds.), Communities and technologies 2005: Proceedings of the second communities and technologies conference (pp. 129–148). Dordrecht: Springer.

    Chapter  Google Scholar 

  • Macnair, L., & Frank, R. (2017). Voices against extremism: A case study of a community-based CVE counter-narrative campaign. Journal for Deradicalization, 10, 147–174.

    Google Scholar 

  • Macnair, L., & Frank, R. (2018). The mediums and the messages: Exploring the language of Islamic state media through sentiment analysis. Critical Studies on Terrorism, 11(3), 438–457.

    Article  Google Scholar 

  • Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., & Baldwin, T. (2016). #ISISisNotIslam or #DeportAllMuslims? Predicting unspoken views. In Proceedings of the 8th ACM conference on web science, Hannover, Germany (pp. 95–106).

    Google Scholar 

  • Naquin, C. E., & Paulson, G. D. (2003). Online bargaining and interpersonal trust. Journal of Applied Psychology, 88(1), 113–120.

    Article  Google Scholar 

  • Nissenbaum, H. (2001). Securing trust online: Wisdom or oxymoron. Boston University Law Review, 81(3), 635–664.

    Google Scholar 

  • Nouri, L., Lorenzo-Dus, N., & Di-Cristofaro, M. (2017). Extreme far right groups’ use of social media: A focus on Britain first and reclaim Australia (Cyberterrorism Project research report, No. 7). Swansea: Cyberterrorism Project.

    Google Scholar 

  • Özeren, S., Sever, M., Yilmaz, K., & Sözer, A. (2014). Whom do they recruit? Profiling and recruitment in the PKK/KCK. Studies in Conflict and Terrorism, 37(4), 322–347.

    Article  Google Scholar 

  • Pauwels, L., & Schils, N. (2016). Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1), 1–29.

    Article  Google Scholar 

  • Porter, L. E., & Kebbell, M. R. (2011). Radicalization in Australia: Examining Australia’s convicted terrorists. Psychiatry, Psychology and Law, 18(2), 212–231.

    Article  Google Scholar 

  • RAND Corporation. (2017). Dos and don’ts of involving formers in PVE/CVE work. https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-papers/docs/dos_and_donts_involving_formers_in_pve_cve_work_bordeaux_27_06_2017_en.pdf

  • Rapoport, D. (2002). The four waves of rebel terror and September 11. Anthropoetics, 8(1), 1–19.

    Google Scholar 

  • Reeser, A. M. S. (2011). The tipping point to terrorism: Involvement in right-wing terrorist groups in the United States. Ph.D. thesis. https://digitalcommons.unomaha.edu/cgi/viewcontent.cgi?article=1034andcontext=studentwork

  • Reuell, P. (2018). Organization set to release massive trove of information, strictly for research purposes. The Harvard Gazette. https://news.harvard.edu/gazette/story/2018/07/mining-facebook-data-for-science/

  • Reynolds, L., & Tuck, H. (2016). The counter-narrative monitoring and evaluation handbook. London: Institute for Strategic Dialogue.

    Google Scholar 

  • Riaz, A., & Parvez, S. (2018). Bangladeshi militants: What do we know? Terrorism and Political Violence, 30(6), 944–961.

    Article  Google Scholar 

  • Rieger, D., Frischlich, L., & Bente, G. (2013). Propaganda 2.0: Psychological effects of right-wing and Islamic extremist Internet videos. Cologne: Wolters Kluwer.

    Google Scholar 

  • Schmid, A. P., & Jongman, A. J. (1988). Political terrorism: A new guide to actors, authors, concepts, data bases, theories and literature. New Brunswick: Transaction Books.

    Google Scholar 

  • Schuurman, B. (2018). Research on terrorism, 2007–2016: A review of data, methods, and authorship. Terrorism and Political Violence. 1–16.

    Google Scholar 

  • Scrivens, R., Davies, G., & Frank, R. (2017). Searching for signs of extremism on the web: An introduction to sentiment-based identification of radical authors. Behavioral Sciences of Terrorism and Political Aggression, 10(1), 39–59.

    Article  Google Scholar 

  • Scrivens, R., Davies, G., & Frank, R. (2018). Measuring the evolution of radical right-wing posting behaviors online. Deviant Behavior, 1–17.

    Google Scholar 

  • Sieckelinck, S., Sikkens, E., van San, M., Kotnis, S., & De Winter, M. (2017). Transitional journeys into and out of extremism. A biographical approach. Studies in Conflict and Terrorism,42(7), 662–682.

    Google Scholar 

  • Sikorskaya, I. (2017). Messages, images and media channels promoting youth radicalization in Kyrgyzstan. Bishkek: Search for Common Ground.

    Google Scholar 

  • Silke, A. (2001). The devil you know: Continuing problems with research on terrorism. Terrorism and Political Violence, 13(4), 1–14.

    Article  Google Scholar 

  • Silke, A. (2004). An introduction to terrorism research. In A. Silke (Ed.), Research on terrorism: Trends, achievements and failures (pp. 1–29). London: Routledge.

    Chapter  Google Scholar 

  • Silke, A. (2013). Research on terrorism: A review of the impact of 9/11 and the global war on terrorism. In A. Dolnik (Ed.), Conducting terrorism field research: A guide. London: Routledge.

    Google Scholar 

  • Silverstone, R. (2005). Media, technology and everyday life in Europe: From information to communication. Aldershot: Ashgate.

    Google Scholar 

  • Simi, P., & Windisch, S. (2018). Why radicalization fails: Barriers to mass casualty terrorism. Terrorism and Political Violence, 1–20.

    Google Scholar 

  • Simi, P., Sporer, K., & Bubolz, B. F. (2016). Narratives of childhood adversity and adolescent misconduct as precursors to violent extremism: A life-course criminological approach. Journal of Research in Crime and Delinquency, 53(4), 536–563.

    Article  Google Scholar 

  • Simi, P., Blee, K., DeMichele, M., & Windisch, S. (2017). Addicted to hate: Identity residual among former white supremacists. American Sociological Review, 82(6), 1167–1187.

    Article  Google Scholar 

  • Society for Terrorism Research. (2018). STR2019 – call for papers. https://www.sv.uio.no/c-rex/english/news-and-events/news/2018/str2019-call-for-papers.html

  • Southern Poverty Law Center. (2015). Dylann Roof may have been a regular commenter at neo-Nazi website. The Daily Stormer. https://www.splcenter.org/hatewatch/2015/06/21/dylann-roof-may-have-been-regular-commenter-neo-nazi-website-daily-stormer

  • Statista. (2018). Most famous social network sites worldwide as of October 2018, ranked by number of active users (in millions). https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

  • Stenersen, A. (2008). The Internet: A virtual training camp? Terrorism and Political Violence, 20(2), 215–233.

    Article  Google Scholar 

  • Stier, S., Posch, L., Bleier, A., & Strohmaier, M. (2017). When populists become popular: Comparing Facebook use by the right-wing movement Pegida and German political parties. Information, Communication and Society, 20(9), 1365–1388.

    Article  Google Scholar 

  • Turpin-Petrosino, C. (2002). Hateful sirens…who hears their song? An examination of student attitudes toward hate groups and affiliation potential. Journal of Social Issues, 58(2), 281–301.

    Article  Google Scholar 

  • van San, M. (2018). Belgian and Dutch young men and women who joined ISIS: Ethnographic research among the families they left behind. Studies in Conflict and Terrorism, 41(1), 39–58.

    Article  Google Scholar 

  • von Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalization in the digital era: The use of the Internet in 15 cases of terrorism and extremism. Santa Monica: RAND Corporation.

    Google Scholar 

  • Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in Human Behavior, 21(1), 105–125.

    Article  Google Scholar 

  • Weimann, G. (2010). Terror on Facebook, Twitter, and YouTube. Brown Journal of World Affairs, 16(2), 45–54.

    Google Scholar 

  • Windisch, S., Ligon, G. S., & Simi, P. (2017). Organizational [dis]trust: Comparing disengagement among former left-wing and right-wing violent extremists. Studies in Conflict and Terrorism, 42(6), 559–580.

    Google Scholar 

  • Wojcieszak, M. (2009). “Carrying online participation offline” – Mobilization by radical online groups and politically dissimilar offline ties. Journal of Communication, 59(3), 564–586.

    Article  Google Scholar 

  • Wojcieszak, M. (2010). ‘Don’t talk to me’: Effects of ideologically homogeneous online groups and politically dissimilar offline ties on extremism. New Media and Society, 12(4), 637–655.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ryan Scrivens .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s), under exclusive licence to Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Scrivens, R., Gill, P., Conway, M. (2019). The Role of the Internet in Facilitating Violent Extremism and Terrorism: Suggestions for Progressing Research. In: The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-90307-1_61-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90307-1_61-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-90307-1

  • Online ISBN: 978-3-319-90307-1

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics