Kevin Marc Blasiak

Kevin Marc Blasiak
  • Doctor of Philosophy
  • Postdoc at TU Wien

About

12
Publications
14,006
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
58
Citations
Introduction
I am passionate about technology, humans and the socio-technical relationships in between. I research on societal issues of Information Systems i.e. Online Extremism Prevention, Online Governance in decentralized settings, CVE Technology and Adaptive Software Development Before embarking on my PhD journey and research, I worked with seed-stage startups and in management consulting at one of the big four consultancies.
Current institution
TU Wien
Current position
  • Postdoc
Additional affiliations
October 2023 - present
TU Wien
Position
  • Postdoc
January 2018 - December 2019
PricewaterhouseCoopers
Position
  • Senior Associate
October 2016 - December 2017
CGI
Position
  • Consultant
Education
January 2020 - February 2024
The University of Queensland
Field of study
  • Information Systems
August 2014 - June 2016
Kozminski University
Field of study
  • Management in Virtual Environments
August 2010 - June 2014
Helsinki Metropolia University of Applied Sciences
Field of study
  • International Business and Logistics

Publications

Publications (12)
Conference Paper
Full-text available
Agile information systems development (ISD) is an iterative development methodology, widespread among new product development teams. The agile ISD method is highly responsive to changing requirements, which enables innovation and outputs that meet customer demands. To remain responsive, team members need to continuously obtain new skills and knowle...
Research
Full-text available
We conducted a multidisciplinary literature review on terrorist and violent extremist use of the internet.
Conference Paper
Full-text available
Online extremism and radicalization on social media are major concerns of governments, social media companies, and civic organizations worldwide. Online extremist threats are further amplified through conspiracy theories surrounding the current pandemic, increased social isolation, and more time spent online. Evidenced by the recent extremist attac...
Conference Paper
Full-text available
Online extremism and radicalisation on social media (SM) are significant concerns of governments, SM companies, and society. The 2021 attack on the US Capitol illustrates the severity of extremism fuelled through SM communications. The literature suggests the removal of extremist messages from SM to limit online extremism. However, scholars argue t...
Article
Full-text available
Article
Scholars studying online extremism and terrorism face major challenges, including finding safe access to hostile environments where members evade law enforcement. Protective measures, such as research ethics, often overlook the safety of investigators. Investigators, including Open-Source Intelligence (OSINT) analysts, encounter emotional harm, abu...
Article
Full-text available
Online extremism remains a persistent problem despite the best efforts of governments, tech companies and civil society. Digital technologies can induce group polarization to promote extremism and cause substantial changes to extremism (e.g., create new forms of extremism, types of threats or radicalization approaches). Current methods to counter e...
Technical Report
Full-text available
Tech platforms use recommender algorithms to control society's key resource: attention. With these algorithms they can quietly demote or hide certain content instead of just blocking or deleting it. This opaque practice is called "shadowbanning". While platforms will often deny they engage in shadowbanning, there's plenty of evidence it's well and...
Article
Full-text available
We propose to extend the current binary understanding of terrorism (vs. non-terrorism) with a Dynamic Matrix of Extremisms and Terrorism (DMET). DMET considers the whole ecosystem of content and actors that can contribute to a continuum of extremism (e.g., right-wing, left-wing, religious, separatist, single-issue). It organizes levels of extremism...
Presentation
We conducted a systematic literature review of Terrorist and Violent Extremist Use of the Internet. In our review, we systematically compared our findings in the literature to the real-world incidence as expressed by Google search statistics. We found that the focus of academic research and the real-world incidence of Cyber-extremism diverge. Since...
Data
Agile information systems development (ISD) is an iterative development methodology, widespread among new product development teams. The agile ISD method is highly responsive to changing requirements, which enables innovation and outputs that meet customer demands. To remain responsive, team members need to continuously obtain new skills and knowle...
Book
Full-text available
The book aims to give an insight into the multifacetedness of changes the Internet–referred to here as the digital world–triggers in both theory and practice of marketing and management. The book has been divided into 5 subject areas, ie management, strategy, communications, brand, and consumer, all of which act as the main themes of subsequent cha...

Network

Cited By