Understanding the Psychology of Persuasive Violent Extremist Online Platforms

Author(s):  
Loo Seng Neo ◽  
Leevia Dillon ◽  
Priscilla Shi ◽  
Jethro Tan ◽  
Yingmin Wang ◽  
...  

Exploiting the benefits afforded by the Internet, violent extremists have created and utilised a myriad of online platforms (e.g., websites, forums, blogs, social media) that have abetted and enhanced their recruitment campaigns across the world. While the idea of countering violent extremists' online presence is a matter of considerable security interest, the paucity of research analysing the persuasiveness of their online platforms to certain target audiences impedes law enforcement agencies' capability to deal with them. There is a need to understand why their online platforms are so persuasive to certain target audiences. Focusing on these online platforms, this chapter will examine the features of these platforms that enhance the appeal of violent extremist messages.

2019 ◽  
pp. 27-42
Author(s):  
Loo Seng Neo ◽  
Leevia Dillon ◽  
Priscilla Shi ◽  
Jethro Tan ◽  
Yingmin Wang ◽  
...  

Exploiting the benefits afforded by the Internet, violent extremists have created and utilised a myriad of online platforms (e.g., websites, forums, blogs, social media) that have abetted and enhanced their recruitment campaigns across the world. While the idea of countering violent extremists' online presence is a matter of considerable security interest, the paucity of research analysing the persuasiveness of their online platforms to certain target audiences impedes law enforcement agencies' capability to deal with them. There is a need to understand why their online platforms are so persuasive to certain target audiences. Focusing on these online platforms, this chapter will examine the features of these platforms that enhance the appeal of violent extremist messages.


Author(s):  
Zemfira K. Salamova ◽  

Social media has contributed to the spread of fashion, style or lifestyle blogging around the world. This study focuses on self-presentation strategies of Russian-speaking fashion bloggers. Its objects are Instagram accounts and YouTube channels of two Russian fashion bloggers: Alexander Rogov and Karina Nigay. The study also observes their appearances as guests in various interview shows on YouTube. Alexander Rogov received his initial fame through his television projects. Karina Nigay achieved popularity online on YouTube and Instagram, therefore she is a “pure” example of Internet celebritiy, whose rise to fame took place on the Internet. The article includes the following objectives 1) to study the self-branding of fashion bloggers on various online platforms; 2) to analyze the construction of fashion bloggers’ expert positions and its role in their personal brands. Turning to fashion blogging allows us to consider how its representatives build their personal brands and establish themselves as experts in the field of fashion and style in Russianlanguage social media.


2017 ◽  
Vol 29 (4) ◽  
pp. 51-71 ◽  
Author(s):  
V. Subramaniyaswamy ◽  
R. Logesh ◽  
M. Abejith ◽  
Sunil Umasankar ◽  
A. Umamakeswari

Social Media has become one of the major industries in the world. It has been noted that almost three fourth of the world's population use social media. This has instigated many researches towards social media. One such useful application is the sentimental analysis of real time social media data for security purposes. The insights that are generated can be used by law enforcement agencies and for intelligence purposes. There are many types of analyses that have been done for security purposes. Here, the authors propose a comprehensive software application which will meticulously scrape data from Twitter and analyse them using the lexicon based analysis to look for possible threats. They propose a methodology to obtain a quantitative result called criticality to assess the level of threat for a public event. The results can be used to understand people's opinions and comments with regard to specific events. The proposed system combines this lexicon based sentimental analysis along with deep data collection and segregates the emotions into different levels to analyse the threat for an event.


2021 ◽  
Vol 4 (1) ◽  
pp. 36-48
Author(s):  
Uyan Wiryadi

The purpose of this study: 1) To find out copyright violations in the field of music in the form of a cover song by recording through social media connected with Law Number 28 of 2014 concerning Copyright. 2) To find out the factors that influence copyright violations in the music field in the form of cover songs by recording through social media. The writing of this thesis uses a statute approach, by reviewing amendments to Law Number 28 of 2014 concerning Copyright and its implications for copyright and its implementation by state institutions and the Republic of Indonesia Law No. 19 of 2016 concerning Amendment of Law Number 11 Year 2008 Regarding Information and Electronic Transactions. Results of research conducted by the author: When someone does a cover song through social media without permission from the creator, both for the purpose not for commercial or commercial purposes, it is an infringement of copyright. Factors that influence the occurrence of violations of copyright in Indonesia include: 1) Weak law enforcement against violators. 2) Works on the internet can easily be duplicated and disseminated globally in a short period of time and in large quantities. 3) There is no limit on the place of the offender because a domain name or website can be accessed by anyone globally. 4) Procedures for events between countries in dealing with violations of copyright on the internet, such as to determine who the perpetrators are and when they occur and determine the jurisdiction of violations still vary.  


2018 ◽  
Vol 4 (2) ◽  
pp. 85-95 ◽  
Author(s):  
Justyna Masłyk

Abstract The main purpose of this article is to present the results of research concerning the use of social media by companies from the SME sector in Podkarpackie Province. The article includes data obtained in the first stage of the study, which is a part of a research project on the use of social media in the area of creating the image of an organization / company as an employer.The survey covered the entire population of companies from the SME sector, which are registered in Podkarpackie Province (REGON database). The research phase, the results of which are presented in this article, mainly involved the analysis of data on companies from the SME sector in Podkarpackie Province in terms of their presence on the Internet (having an individual website, having company profiles on selected social networks). The results of the first stage of the study confirm that the companies see the potential of the online presence / functioning in social media (more and more companies have their own website, Facebook profiles). The dynamics of changes in this area is definitely not adequate to the pace of new media development. On the basis of preliminary results of further stages of the research, it can also be concluded that in the vast majority of cases, however, these are non-strategic and non-systematic activities.


2021 ◽  
Vol 10 (1) ◽  
pp. 73-88
Author(s):  
Enrique Orduña-Malea ◽  
Cristina I. Font-Julian ◽  
José Antonio Ontalba-Ruipérez ◽  
Raúl Compés-López

Globalisation, the Internet and social media have changed the kind of actors with influence in the wine industry and the way these actors create signals to communicate credible information about experience and trust attributes. Among the most prestigious experts in the world of wine are the Masters of Wine (MW). Although initially devoted to international trade, they have spread their activities and their opinion is more and more appreciated by producers and consumers. The main objective of this article is to determine this community of experts’ behaviour on Twitter. In order to do so, four factors (presence, activity, impact and community) have been considered. All Twitter profiles belonging to users awarded with the MW qualification were identified and analysed. In addition, a set of 35,653 tweets published by the MWs were retrieved and analysed through descriptive statistics. The results show MWs on Twitter as high attractors (number of followers), moderate publishers (original contents published), moderate influencers (number of likes and retweets), and low interactors (number of friends and mentions to other users). These findings reveal that the MW community is not using Twitter to gain or reinforce their reputation as an accredited expert in the wine industry, giving more influential space on Twitter to consumers and amateurs.


2015 ◽  
Vol 1 (1) ◽  
pp. 4-11
Author(s):  
Syed Sami Raza

In 2011 the law enforcement agencies of Pakistan killed a group of foreigners traveling across Pakistan-Afghanistan border. The agencies then tried to cover up the incident by calling it a potential suicide-bombing attack. However, they could not succeed in the cover-up plan primarily due to a photograph of one of the killed aliens—a woman—that appeared on local media. In this photograph the alien woman is shown lying on the ground near a sandbag-covered check-post waving for mercy/justice. The photograph becomes viral on both electronic news and social media and impels the government to order an inquiry. In this article, I engage the concept of “divine violence” and explore the photograph’s politics of aesthetics, which I argue contextualizes the photograph’s meaning during a creative moment for human rights.


Author(s):  
Ahmet Sarıtaş ◽  
Elif Esra Aydın

Today, using of the internet extended social media by individuals habitually enables both the business firms and politicians to reach their target mass at any time. In this context, internet has become a popular place recently where political communication and campaigns are realized by ensuring a new dimension to political campaigns. When we examine the posts and discussions in the social media, we can say that they are converted into open political sessions. As there are no censorship in such channels, individuals have a freedom to reach to any partial/impartial information and obtain transparent and fast feedback, and with this regard, political parties, leaders and candidates have a chance to be closer to electors. In this study, it is aimed to give information about the social media, present what medium has been used for election campaigns from the past until today and besides, by considering the effects of effective and efficient use of social media and new trends related to the internet by politicians, together with their applications in the world, to make suggestions about its situation and application in Turkey.


Author(s):  
Loo Seng Neo

The growing pervasiveness of the internet and the rise of social media have revolutionised how individuals communicate and interact with one another. Serving as an effective conduit for communication, these technological advancements have also been exploited by individuals with malicious intent (e.g., criminals, violent extremists). As the world witnesses an upward trend of such crime and security concerns in the online sphere, it places the ‘responsibility' on intelligence and law enforcement agencies to respond with the appropriate technological interventions. Thus, this article will discuss how digital footprints can be leveraged to identify potential security threats, particularly for crime and security issues that will result in negative repercussion at the national level, such as acts of violent extremism and hate crimes.


2018 ◽  
pp. 90-97 ◽  
Author(s):  
Reshu Goyal ◽  
Praveen Dhyani ◽  
Om Prakash Rishi

Time has changed and so does the world. Today everything has become as a matter of one click. With this effort we are trying to explore the new opportunities features and capabilities of the new compeers of Internet applicability known as Social Media or Web 2.0. The effort has been put in to use the internet, social media or web 2.0 as the tool for marketing issues or the strategic business decision making. The main aim is to seek social media, web 2.0 internet applications as the tool for marketing.


Sign in / Sign up

Export Citation Format

Share Document