Content uploaded by Hamid Akın Ünver
Author content
All content in this area was uploaded by Hamid Akın Ünver on Jan 08, 2023
Content may be subject to copyright.
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/332888079
Internet, Social Media and Conflict Studies: Can Greater Interdisciplinarity Solve
the Analytical Deadlocks in Cybersecurity Research?
Preprint · May 2019
DOI: 10.31235/osf.io/nj8gx
CITATION
1
READS
20
1 author:
Some of the authors of this publication are also working on these related projects:
GAIA - Global Artificial Intelligence Armament Dataset View project
Computational International Relations View project
Hamid Akın Ünver
Ozyegin University
51 PUBLICATIONS207 CITATIONS
SEE PROFILE
All content following this page was uploaded by Hamid Akın Ünver on 01 January 2023.
The user has requested enhancement of the downloaded file.
Internet, Social Media and Conflict Studies
Author(s): H. Akın Ünver
Source:
St Antony's International Review
, May 2019, Vol. 15, No. 1 (May 2019), pp. 101-124
Published by: St. Antony's International Review
Stable URL: https://www.jstor.org/stable/10.2307/27027756
REFERENCES
Linked references are available on JSTOR for this article:
https://www.jstor.org/stable/10.2307/27027756?seq=1&cid=pdf-
reference#references_tab_contents
You may need to log in to JSTOR to access the linked references.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact support@jstor.org.
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
St. Antony's International Review
is collaborating with JSTOR to digitize, preserve and extend
access to
St Antony's International Review
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
101
I, S M
C S:
C G I
S A D
C R
H. Akın Ünver, Kadir Has University
Abstract
In recent years, computational research methods, digital trace data, and
online human interactions have contributed to the emergence of new technol-
ogy-oriented sub-elds within International Relations (IR). Although cyber-
security scholarship had an initial promise to be the primus inter pares among
these emerging elds, the main thrust of this new methodological innovation
came through the ‘digital conict studies’ sub-eld. By integrating Internet
and social media research tools and questions into its core topics of sub-na-
tional violence, terrorism, and radical mobilisation, digital conict studies
has recently succeeded in addressing some of the data validity and methodol-
ogy problems faced by cybersecurity scholarship. is article begins by briey
reviewing some of the persistent data and method-oriented hurdles faced by
cybersecurity scholarship. en, it moves on to a more detailed account of how
digital conict studies have been addressing some of these deadlocks by focus-
ing individually on the literature on onset, mobilisation, targeting, intensity/
duration, and termination phases of conicts. Ultimately, the article concludes
with the suggestion that cybersecurity scholarship can move past its own
deadlocks by building more granular and dedicated research datasets, and also
by establishing mechanisms to share event data with the scientic community.
e long-touted theoretical slumber of International Rela-
tions (IR) as a discipline1 was markedly disturbed by the advent of
cybersecurity scholarship. Described by many scholars as the ‘real
fourth domain,’ even surpassing the importance of space, digitisa-
tion of human power relations, and their competition across an
entirely new ground, cyber opened up the way for the ‘revival’ of
IR.2 Pre-cyber IR was deadlocked for two main reasons. First, in
the aftermath of the Cold War the eld had lost its connection
to the very origins of its existence—likelihood of large-scale glo-
balised war. With no pressing global threat to study and theorise,
the eld was split across deconstructivist and post-positivist sub-
strands that ran into their own set of limitations.3 Second, the
post-9/11 turn in IR had lowered the analytical lens of the bulk
of the discipline into terrorism and sub-national violence, making
IR more of a surrogate mother of a comparative civil war or rebel
dynamics ospring. e eld of conict studies has exploded so
much in the last decade that it has ended up almost swallowing up
H. , Akın Ünver “Internet, Social Media and Conict Studies: Can Greater
Interdisciplinarity Solve the Analytical Deadlocks in Cybersecurity Research?,”
St Antony’s International Review 15. no. 1 (2019): 101-124.
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
102 IR. Yet, it focused more on insurgency and the micro-dynamics of
violence, as well as on dyadic socio-political interactions between
state and non-state actors, none of which are the central thrust of
IR as a discipline.
Cybersecurity promised salvation to IR from being sucked
up into the vortex of conict and terrorism research. It oered
scholars a truly global network of state and non-state interactions
(both benign and malicious), made some of the more classical con-
cepts of the eld (such as bandwagoning, hedging, deterrence, re-
taliation) relevant again, and oered a new research agenda that
went beyond conict and violence. Attribution problems neces-
sitated a more international and cooperative approach to cyber-
security and brought a new cyber-institutionalist tradition.4 ‘At-
tacker’s advantage’ in cybersecurity re-introduced the question of
alliances, balancing, and condence-building measures.5 e uid
and largely uncharted nature of cyberspace reminded scholars of
the importance of the anarchy and hegemony debate, as well as
the centrality of the rules and norms literature in IR. While cyber
hasn’t yet inuenced the eld as much as either conventional or
nuclear weapons did back in the Cold War, it has undoubtedly in-
troduced a new wave of issue-broadening nudges, briey widening
the discipline’s obsession with sub-national violence.
However, cyber research also ended up in a cul-de-sac of
sorts. Due to the sheer magnitude of ‘events’ in cyber research,
it raised a range of conceptual and measurement problems. ese
problems have led to some unforthcoming answers to essential
questions about how to study the eld: What constitutes a cyber
‘attack?’6 How do we disentangle oensive and defensive capabili-
ties in cyber?7 How do we acquire and catalogue event data, given
the sheer magnitude and near-impossibility of reliably measuring
cyber competition? How do we verify the accuracy of attribution?
Given attribution problems, how do we reliably establish norms
and minimise commitment problems in compliance? Who are we
establishing norms for, and who are we rallying against? On the
other end of the debate is the ‘megafauna’ argument that criticised
the eld’s over-emphasis on a small number of politically critical
cyber events (usually with physical implications), overlooking the
importance of the large volume of ‘smaller events’ that don’t have
a measurable or visible impact on infrastructure or systems.8 Both
ends of the debate present us with a dierent hurdle facing cyber
research: do we have too much, or too little measurable data to
work with? All of these data availability and quality issues of cyber
haven’t prevented theorising about it in IR, but made empirical
tests of those claims highly dicult.
Ultimately, IR’s cybersecurity scholarship ran into two dif-
culties: rst, an inability to grow beyond the connes of tradi-
tional IR and second, dangerously treading on ‘purely theoretical’
territory. Even when thinking solely in terms of the disruptive ef-
fects of cyber, the nuclear analogy ran into a number of problems.
After all, nuclear weapons had a binary nature—they are either
detonated or not detonated. eir deterrent nature came from the
possibility of detonation. Cybersecurity, on the other hand, is any-
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
103
thing but binary. DDoS, MitM, spear phishing, SQL injection, and
XSS are dierent attack types that serve a dierent purpose. Of-
ten, the target learns about the fact that it was attacked weeks af-
ter the actual incident. More sophisticated forms of cyberattacks
are also hard to notice, measure, and turn into event data, and are
even harder to attribute to an actor. Its twists and turns, intensity,
and type all require a much more nuanced understanding of the
engineering aspects of the eld compared to nuclear weapons. It
also rendered a truly multi-method approach, through combining
the forces of computer engineers, data scientists, and IR special-
ists, but this kind of sustained interdisciplinarity is still rare in
the scholarship. Furthermore, persistent problems in generating
a statistically meaningful, let alone representative, dataset make
cybersecurity theories dicult to test empirically.
As cybersecurity scholarship dealt with these structural
problems, Internet and social media studies began solving some
of those persistent problems in harvesting trace data to help build
new theories on technology and IR. e power of social media,
both as a form of real-time communication and also as a network-
ing hub, has been demonstrated most visibly during the Arab
Spring demonstrations in the MENA region and in the Occupy
movements across Europe and North America, as well.9 en with
the onset and intensication of the Syrian, Iraqi, and Ukrainian
civil wars, the power of digital interconnectedness as an enabler
of mobilisation, resource generation, propaganda, and issue fram-
ing has been further bolstered.10 e highly interactive and public
nature of social media platforms not only increased the speed of
communication between actors, but also rendered this communi-
cation visible to the broader social media community all around
the world. Social media has become a new marketplace of ideas,
equally disliked and needed, by politicians, diplomats, interna-
tional institutions, civil society groups, and violent groups alike.
Compared to cybersecurity, where data is both uncontrol-
lably large, elusive, and fast, Internet research has rendered the
study of human interactions in digital space more manageable. Al-
though data size and speed can still be an issue, social media data
is less elusive compared to cybersecurity data, and depending on
the platform and topic, scraping entire sets of public data can be
far easier compared to cataloguing cyber event data. e secrecy
and covertness of cybersecurity research can be a deterrent fac-
tor for social scientists, which might explain why more of them
are switching to the open source nature of social media research.
Furthermore, although cyber research is signicantly important
for IR theory, it lies distant to the wider empirical debates on sam-
ple size, representativeness, measurement, causal eects, and be-
havioural variances.11 Ultimately, until cybersecurity researchers
solve the riddles of data extraction, dataset sharing, and meas-
urement, cybersecurity research risks the danger of remaining an
elite-focused, small-N eld, compared to the large-scale ‘social’
scope of social media research. is has led to a rapidly developing
eld of computational social science: the use of coding and pro-
gramming tools to study social dynamics, behaviour, and choice.12
Despite enriching other sub-elds in IR, however, Internet and so-
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
104 cial media studies have primarily beneted the conict and politi-
cal violence discipline. To that end, when exploring how Internet
Communication Tools (ICTs) aect IR, the bulk of the scholarship
again comes from the conict studies camp.
e remainder of this paper will discuss how the ‘digital con-
ict studies’ eld has incorporated the ‘technological turn’ in IR
into its main theoretical thrust, by building upon and expanding
the framework used by Lars-Erik Cederman and Manuel Vogt13 on
the main phases of conicts: onset/initiation, resource mobilisa-
tion, target prioritisation, duration/intensity, and conict ter-
mination, peacebuilding, and re-integration. Although a similar
phasing or periodisation is hard to model exactly on cybersecurity
scholarship, this review aims to provide a more structured frame-
work for the empirical study of cybersecurity. Furthermore, this
periodisation may help future cybersecurity scholars to structure
their data observation, extraction, and sharing mechanisms to
test existing IR-related cybersecurity theories and build new ones.
Internet, Social Media, and Conict: Primary Analytical
Foci
As outlined in the critical review articles by Anita Gohdes14
and omas Zeitzo,15 there is quite a rapid development of ro-
bust, empirically sophisticated studies on how digital interconnec-
tivity impacts contentious politics and human conict. e earlier
studies inspired by the Arab Spring and the Occupy movement fo-
cused on the eect of digital media on protests, focusing mainly
on onset and state responses against digital mobilisation.16 As pro-
tests evolved into deadlier conicts, the eld has also evolved into
explaining how ICTs aected violence in civil wars like in Syria,
Iraq, and Ukraine.17 Important studies, some of which will be ex-
plored in this paper, have primarily focused on conict initiation,
recruitment, propaganda, terrorist attacks, narrative-building,
branding/marketing of armed groups, and state responses.
However, there are several fundamental conict dynamics
that are still understudied, such as conict duration, bargaining/
negotiation and conict termination, group disbanding, and po-
litical transition of violent conicts. Furthermore, although there
are ample studies on how social media radicalises individuals,18
there is an insucient body of empirical investigation on how
digital interconnectedness de-radicalises or moderates users. is
section is divided into ve sub-sections that deal with some of the
main works in their respective sub-elds, and the current analyti-
cal limitations of those respective sub-elds. ese are namely:
conict onset; resource mobilisation; target selection; intensity/
duration; and conict termination, peacebuilding, and reintegra-
tion.
Onset: Grievance/Greed Framing
Social media has expedited the dissemination of frames relat-
ed to sustained political grievances and opportunities.19 Its scope
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
105
and speed led to the emergence of non-geographical communities
of grievance, all receiving information about repression, disenfran-
chisement, and oppression respective to their areas of concern.20
Similarly—this strategy best employed by ISIS—opportunity
structures in conict, such as wealth, prestige, and social accept-
ance are now transmitted across the world, leading to the mobili-
sation at an unprecedented level of diversity in recruits.21 Much of
the digital recruitment tactics popularized by ISIS were later used
en masse across the world, including Western far-right groups. Of
course, social media is not the only medium through which such
frames have been disseminated in the past. Newspapers, novels,
and motion pictures have all helped communicate grievances and
greed narratives in the past. What makes social media novel, how-
ever, is its speed and size. Compared to older forms of media (per-
haps, with the slight exception of live broadcasting technologies),
social media and the Internet oer real-time dissemination of nar-
ratives to a far larger audience. Some of the time-lag and media ac-
cess (urban/rural, rich/poor) constraints that were the hallmarks
of older examples of grievance/greed narratives’ diusion are less
relevant in the case of social media. Owing to the lowered barriers
of entry, digital communication thus increases the speed and size
of both the responses to framing stimuli and also the materialisa-
tion of counter-narratives.
In addition to speed and scale, ICTs also oer a permanent,
non-physical, and omni-accessible archival function for users.22
is is especially valid for grievance diusion,23 which is a crucial
driver of early mobilisation. By both spreading and permanently
recording events and narratives in digital space, users bestow an
archival power to digital media. is, in turn, allows grievances to
be not only communicated more quickly, but also consumed in a
sustained and at-will manner. In addition to enabling masses to
mobilise quickly, this sustained grievance eect of ICTs also inten-
sies existing social, ethnic, and religious tensions, through daily
access and consumption of grievance-related content.24 is does
not only impact the likelihood and frequency of conicts but also
determines the size and social support for these conicts. In a way,
the real-time archival utility of social media both drives violence
onset likelihood, as well as how intense these acts of violence be-
come. is is true both for the digital content disseminated by a
single source to multiple individual users (propaganda and infor-
mation cascades), and also content sought and acquired by the us-
ers themselves (information-seeking).
ICTs and conict onset are relatively well-studied as a dyad.
Currently, some of the frontiers in this sub-eld are the use of
fake news, trolls, and bots—deliberate information manipula-
tors—and identifying how they impact greed/grievance dynamics
dierently than the ow of accurate information.25 Does disinfor-
mation, for example, enable the spread of emotional and mobilis-
ing content better than deliberate and accurate information?26 Do
non-state actors use disinformation as part of their extensive stra-
tegic logic, or do they nd disinformation as a potentially trust-
mitigating factor?
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
106 Much of these research questions were tested overwhelm-
ingly with ISIS, rendering the group as a litmus test of some of
the most prominent political communication theories in digital
space.27 Yet, the scholarship that lies at the intersection of politi-
cal communication and computer science elds does try to address
a broader range of cases beyond ISIS. Purohit (et al.)28 and Karuna
(et al.)29 use text-mining tools to look at how digital frames on
gender-based violence are disseminated online, using a corpus-
based latent Dirichlet analysis (LDA). Both studies nd a greater
collaboration between grievance campaigns in geographically
distant communities and discover a signicant degree of ‘digital
cross-pollination’ between physically disconnected online cam-
paigns. De Choudhury (et al.),30 on the other hand, explore how
images and videos on social media contribute to the intensication
or de-sensitisation of emotions in Mexico, related to cartel-based
violence. ey focus on sub-district level digital content across two
years and nd that both the state and cartels strategically deploy
images to deter and assert psychological dominance against each
other, as well as the local populace, in a methodical way. Similarly,
Monroy-Hernandez (et al.)31 dissect to what extent ‘civic bloggers’
(locals who document cartel violence on weblogs and social me-
dia) have any eect on conict awareness and mobilisation. ey
discover that districts that contain more public media bloggers,
and are thus exposed to greater volumes and frequency of conict
reporting, have a greater tendency to be desensitised and are less
likely to participate in violence.
Wang (et al.),32 on the other hand, explore the digital impact
of the Sandy Hook shooting on users’ sentiments on gun control,
discovering that anti-violence (pro-gun control) sentiments linger
on much longer compared to anti-gun control content in the after-
math of the shooting. ey also demonstrate that these pro-gun
control sentiments linger on longer in Connecticut (the incident
state), compared to other states in the United States, invalidat-
ing the main premise of the ‘terror management theory.’ In the
same vein, Ayers (et al.)33 conduct large-scale scraping of websites,
forums, social media sites, and online advertisements in the US,
revealing that online awareness-building campaigns and tailored
ads on digital platforms could measurably mitigate gun-related
deaths. While most of the ‘images and frames’ literature rely on
text-based methods, Won (et al.)34 focused on images shared on
social media websites to draw a causal link between emotions that
those images trigger and the actual intensity of the relevant pro-
test event. Drawing on more than 40,000 geotagged protest imag-
es, the researchers nd that greater protest duration and intensity
are correlated with the emotional triggering capacity of the images
shared from the protest area. Finally, Muller and Schwartz dem-
onstrate a causal relationship between anti-refugee sentiment in
German-speaking Facebook and physical anti-refugee violence in
Germany at the municipality level,35 while Patton (et al.)36 draw di-
rect links between ‘Internet bragging’ and the tendency to exhibit
gang violence-related behaviour in Chicago. Building a predictive
model, Patton (et. al.) demonstrate a high level of reliability in
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
107
enabling social workers to recognise gang violence-related themes
and engage in better targeted preventive action.
ese studies push the eld strongly into the domain of au-
tomated-recognition and prediction foci. Most of these studies are
also heavily concentrated on the US or the UK, requiring a sig-
nicant broadening of the cases beyond the Global North. Some of
the untapped research questions include how regional inequality,
linguistic or ethnic fractionalisation, and regime type inuence
the ICT-onset literature.
Resource Mobilisation
Not all successful cases of greed/grievance communication
lead to violence. Without pre-existing social forces and trust rela-
tions, purely digital networks have a low level of success of mo-
bilising or remaining mobilised for an extended period.37 One of
the main drivers of the staying power of movements is how well
they mobilise resources.38 is mobilisation is not just limited to
manpower or nancial resources, but also includes sustenance of
frames, attention, alliances, commitment, and organisational co-
hesion. To that end, the advent of Internet and social media are
primarily thought as positive drivers of resource mobilisation. Af-
ter all, this was one of the main reasons why the early works on the
Arab Spring and the Occupy movement were quick to call them ‘so-
cial media revolutions.’39 When dissidents discovered their latent
power through digital interconnectivity, they were able to come
together and challenge hegemony, or so the logic went. However,
later studies have proved that this was not always the case.40 Social
media was a signicant development but was also exaggerated in
its eect on social movements. ICTs did drive attention and aware-
ness, but these two variables had a mixed eect on actual mobili-
sation, commitment, and staying power. Rather, ICTs’ eects re-
lied on pre-existing traditional networks and trust relations.
is necessitates a greater empirical focus on the analytical
sweet spot that delves into how traditional social networks use
and deploy ICTs to generate sustained framing and identity-build-
ing resources. Mostly, studies omit this context and try to draw
a straightforward causal link between how much movements use
social media and how well they mobilise as a result. Furthermore,
past the onset and mobilisation mark, few studies explore how
movements sustain both ideological and material resources, espe-
cially when the rival actor is also a non-state actor.41 To that end,
most scholarship focuses on how protestors, rioters, militias, and
terrorist groups utilise ICTs against state actors, but not as much
on how this interaction materialises between and within non-
state actors themselves. Some of the most novel ways of studying
mobilisation dynamics can be seen in Gahot (et al.)42 where the
authors use epidemiological modelling to visualise the diusion
and sustaining of the 2005 French riots. is is one of the bet-
ter experiments in bringing greater interdisciplinarity into social
research, as the authors pay specic attention to social dynamics
(neighbourhood relations, district social networks, and protestor
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
108 community proximity) in their contagion model. In a similar vein,
Davies (et al.)43 explore how the 2011 London riots have been
mobilised against police crackdown, using digital communication
tools to build a contagion dataset of both onset and sustained re-
source-generation dynamics. Ultimately, the authors discover that
there is a Pareto-optimal level of police presence per each riot dis-
trict that deters rioter resource mobilisation; any less or more po-
lice deployment causes greater protest mobilisation and resources
deployed in the riot.
e ICT-religion nexus is a potentially helpful disciplinary
link to conict studies, especially in terms of exploring how loose
belief networks retain membership, income, and resource-gen-
eration practices in digital space. Heidi Campbell demonstrates
how Christian congregations that are geographically distant can
retain ‘online congregations’ through live-feed sermons and chat
groups.44 ese online congregations not only build awareness and
disseminate frames, but also play a signicant role in the material
domain, in terms of fundraising and mustering numbers for pro-
tests and social responsibility projects.45 In the same vein, Ellison
and Boyd illustrate how this ‘online congregation’ dynamic can be
observed in Islam and Judaism as well, as individuals discover and
often at times identify with their digital congregations more than
their physical ones.46 Mellor and Rinnawi focus specically on the
Islamic use of ICTs and exemplify how digital congregations are
more important drivers of resource mobilisation in diaspora Is-
lamic communities in Europe and the United States, whereas in
predominantly Muslim countries too, the eect of social media
leads to the emergence of diverging loyalties.47 Such diverging loy-
alties create an ‘à la carte Islam’ where the pious can choose from
dierent sermons and fatwas issued by the online or oine imams,
demonstrating hybrid loyalties based on which congregation or
imam supplies the version of theological interpretation they re-
quire. In the case of Judaism, Nathan Abrams demonstrates how
social media leads to ‘post-denominational Judaism,’ where iden-
tity construction and mobilisation dynamics display the similar
congregational hybridity that we see in Islam.48
Target Prioritisation
Once movements attain critical mass and are directed in uni-
son towards a common goal, the next step becomes target selec-
tion. In the case of non-violent movements, this target becomes
a key building, central square, or a historic site to occupy or con-
duct a sit-in at, whereas in violent movements these range from
military installations/checkpoints, critical infrastructure, or (with
terrorist groups) civilian areas. What is the role of social media
on how groups pick their targets and guide their followers to that
target? Some of the earlier works on this question had a slight
reporting bias around areas of high Internet connectivity,49 al-
though newer forms of scholarship have begun developing unique
ways to disentangle violence occurrence from violence reporting.50
Some of the most prominent studies on violence targeting empha-
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
109
sise four trends: strategic area/zone focus, critical infrastructure
focus, political focus, and intimidation focus. ere is currently
no major work on how ICTs aect any particular focus. Rather,
most target-related studies explore how social media sustains and
intensies ongoing conict dynamics, evidenced best in omas
Zeitzo’s work on the 2012 Gaza Conict.51 Also, Jibon Naher and
Matiur Rahman Minar look at how social media posts drive chat
groups or page followers to particular types of violence, including
the target(s) of such acts in Bangladesh.52 ey demonstrate how
ICTs not only impact the speed and size of violent mobilisation,
but also drive users towards key ethnic or religious targets.
Targeting presents a very specic causal problem in the ICT-
conict nexus. e majority of existing studies can explain how
ICT use can guide mobilisation, intensity, polarisation, and radi-
calisation, but there is not much robust evidence on whether the
popularity of particular target types on ICTs really aect targeting
behaviour on the ground. is is a challenging puzzle to solve, be-
cause it is hard to disaggregate targeting choice as a result of its so-
cial media popularity, from its choice as the order of a command-
ing superior.53 Further problems arise in determining whether
ICTs inuence commanders or troops on the ground in hand pick-
ing a particular set of targets. Especially with regard to communal
violence, the role of ICTs in instigating certain ethnic or religious
groups using targeted messaging and imagery is under-explored.
Similar to military targeting, there is much to be done on exploring
whether the decision to attack a particular target or community
follows a strict hierarchy (i.e., communal elders or propagandists)
or to generate a mob mentality (autonomous crowd behaviour).
Some tangential journalism work on this is done through What-
sApp-related gang violence in India.54 Some of the most relevant
ndings on this line of inquiry are that digital targeting practices
through text or images contribute substantially to the unearthing
of dormant social tensions, leading to attacks on women speci-
cally. is gender dimension in violent group targeting prioriti-
sation is an important avenue for further research and connects
somewhat to another strand of literature on digital shaming and
harassment.55 Furthermore, due to the real-time eects of ICTs,
the time gap between designating a target in digital space and the
actual mobilisation of the masses around the designated target is
much less.
My co-author and I have discovered this targeting eect of
ICTs when exploring the mobilisation dynamics during the failed
coup in Turkey in July 2016.56 Sharing videos, images, and text in
large numbers, anti-coup protestors were extremely quick in mo-
bilising and overwhelming checkpoints, military installations, and
other hotspots of conict. In most cases, it is possible to draw di-
rect linkages between the emergence of a particular hotspot or tar-
get on social media, and the masses of crowds gathered around it
within an hour or less. We also, however, warn against the existing
social network dimension of these targeting preferences. It is not
only ICTs that guided people to specic locations—rather it is the
dissemination of these targets by family members, friends, or re-
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
110 ligious congregation channels (all trusted pre-existing networks)
through ICTs that created the trust network required to march to-
wards designated spots. Future ICT-targeting studies have to take
this digital-physical interaction into account.
Intensity and Duration
Scholarly research on conict intensity and duration has
grown increasingly popular in the last decade, owing to new data-
sets and measurement types that allow greater analytical focus.
e primary thrust of the conict intensity/duration literature has
been to inform policy on the ways of shortening conicts.57 By re-
ducing conict duration, as the conict literature asserts, conict
intensity would also be reduced.58 However, premature freezing of
conicts due to external pressure(s) also frequently leads to a re-
escalation of those conicts once international attention wanes.59
erefore, the causal relationship between duration and intensity
is still being negotiated in the literature, as this link works dif-
ferently in various political contexts. Although conict intensity
(measured as casualties) and duration (measured as months) have
been explained most popularly through combatant motivation,
nancing, public commitment, capacity, and external support,60
the role of ICTs has been a relatively nascent inquiry. e com-
mon consensus in the conict literature is that ICTs make conicts
more intense.61 is nding is being increasingly challenged by a
new scholarship that focuses on the availability bias and measure-
ment level problems of these ndings. Nils Weidmann, for exam-
ple, asserts convincingly that access to ICTs creates a reporting
bias.62 is reporting bias is related both to the communication of
violent cases that would remain uncommunicated without ICTs,
and to the oversharing of violent events over non-violent events
that occurs among those with access to ICTs in conict zones. is
highlights the need for interdisciplinarity to solve some of the
availability bias and data-gathering problems related to proximity
to ICT infrastructure.
Guo (et al.),63 for example, demonstrate how betweenness
centrality can oer a better explanation on why certain geogra-
phies become more conict-prone than others. ey emphasise
cities as hubs of communication, and thus bestow greater impor-
tance on the cities for their narrative and frame-dissemination
capacity that in turn inuence conict intensity and duration pat-
terns. In their view, conict intensity and duration are both pro-
portional to their distance to major cities, and also the between-
ness centrality measure of major cities themselves. Walther (et
al.),64 on the other hand, focus on the Sahel-Sahara to aggregate
digital and pre-digital communication and archival data, generat-
ing a militant attack database. Using this database, they are able
to infer which national communication and counter-insurgency
policies worked better in terms of mitigating the intensity and du-
ration of Al-Qaeda in Mali (AQIM)’s violence in the Sahel region.
However, with the exception of these few examples, the ICT-dura-
tion or intensity literature is still very young. A potential analyti-
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
111
cal eld to approach the intensity/duration problem would be to
engage more with the digital political communication literature.
Echo chambers and polarisation are proper proxy measures
to solve this deadlock. Barberá (et. al)65 demonstrate how politi-
cal preferences are disseminated across accounts that are similar
in political ideology, but that such similarity disappears in non-
political issues. is could be an inspirational point of departure
for conict studies as the dissemination of conict-related infor-
mation along ideological or identity lines would potentially have
a signicant inuence on conict intensity. Del Vicaro (et al.),66
on the other hand, demonstrate how the dissemination patterns
of disinformation is especially contingent upon network ideol-
ogy. Focusing on how conspiracy theories ow on Facebook, the
authors demonstrate that polarisation becomes more observable
in the dissemination of false narratives rather than accurate in-
formation. Bastos (et al.)67 test the same hypothesis in the Brexit
campaign and discover that both accurate and inaccurate types of
content were shared across a more dense and central network in
the Leave camp, and followed a looser and less dense network in
the Remain camp. is nding is important as it hints at the role
of political ideology in the dissemination of accurate and false-
type conict-related content. In a more recent study, Cota (et al.)68
looked at a large dataset of Twitter messages from Brazil related
to the impeachment of President Dilma Rousse and discovered
that more extreme content was disseminated across a broader au-
dience, compared to less extreme and more moderate content that
had a lower level of spread. is study sheds some light on po-
tential conict communications literature on the degree to which
extreme versus moderate content becomes popular during emer-
gencies, escalations, and critical political moments.
Termination, Peacebuilding, Re-integration
How do ICTs impact the decision to end a conict? e lit-
erature is skewed so much on the initiative and sustaining dynam-
ics of ICTs on conict that the analytical ‘wave’ hasn’t yet reached
the nal stages of the violence cycle. is is due partly to the fact
that recent years have witnessed much more conict initiation
and escalation compared to conict termination.69 Most conict
termination scholarship focuses on tangible factors, such as the
decline of manpower, funds, or other resources to explain de-es-
calation and termination dynamics.70 Other studies explain how
external interventions, inghting, leadership change, and social
shifts might lead to similar outcomes.71 However, there have been
no empirical studies yet on how ICTs impact the de-escalation and
termination aspects of conicts.
Earlier hypotheses on how ICTs might inuence conict of-
fered promising notes. Most of them thought greater intercon-
nectedness and on-hand information availability have a normalis-
ing eect on violent interactions. Importing from more traditional
theories on media and conict, the early ICT literature suggested
that warring factions or mobilised masses could be ‘convinced’ to
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
112 stand down and attain greater mutual understanding with rival
groups (or governments) by digital messaging (i.e., ICTs), resulting
in conict termination.72 Most of the peacebuilding initiatives in
the 1990s thus emphasised ‘greater communication’ and frequent
socialisation between the opposing sides, and by the 2000s most
of these initiatives welcomed the idea of digital communication
as a peace enabler.73 However, the evidence yielded a more com-
plex and nuanced picture. One main misjudgement about the ICT-
peace link was the fact that ICTs grew into multi-directional media
systems, as opposed to the uni-directional nature of television,
motion pictures, or the radio. is meant that ‘feeding content’ to
warring factions, in the same manner that propaganda dissemi-
nation worked in the past, was impossible.74 Content consumers
are now also content producers and curators, causing far too many
narratives to spread online for any single actor to dominate the
mainstream media.75 e prevalence of multiple and competing
narratives, along with the ever-present shadow of disinformation,
also have the potential to intensify existing divisions, rather than
heal them.76 To counter these eects, along with attempts to skew
these discussions by combing out ‘unwanted content,’ govern-
ments have also become increasingly reliant on censorship, Inter-
net restrictions, and the strategic deployment of bots and trolls to
further contaminate the information ecosystem.77 However, these
tools are still not in dominant use in most conict-prone countries
as instability prevents the establishment of functioning Internet
infrastructure. is severs the link between ICTs and aected
communities in rural areas or poor urban districts, rendering any
uni-directional move towards mediation inecient.
From existing empirical evidence, it is hard to hypothesise
whether ICTs will have any standalone eect on conict termina-
tion and peacebuilding, without interacting with material factors
on the ground. Some of these material factors are already well-
covered by the non-ICT conict termination literature: external
intervention, combatant resolve, leadership change, resource de-
pletion, social change, and so on. ICTs may indeed bolster peace-
keeping eorts, provided that the material resources of peace-
keeping are suciently in place.
e nal link in the conict chain is attaining sustained non-
violence and community-building in the aected territories. Cur-
rently, there is no signicant work in the eld of how ICTs impact
peacekeeping and community-building, leaving a sizeable analyti-
cal gap in the literature. is originates from the overwhelming
focus on the earlier onset/mobilisation aspects of violence, leaving
a plethora of untapped topics on the later phases of violence. Yet,
the literature will inevitably gravitate towards the more positive
and constructive aspects of ICTs on conict. Community-building
and re-integration phases of the conict cycle have a higher likeli-
hood of being impacted by purely ICT-led eorts. When willing-
ness to ght is diminished and the societal-political consensus is
in place, then ICT tools can work through a multitude of ways to
help bolster peace agreements and their enforcement. e most
direct and visible use of ICTs in this phase has been the monitor-
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
113
ing of ceaseres and other commitment violations, enabling all
parties to keep an eye on the other in a more direct way.78 When
the speed and scale advantages of ICTs are deployed after peace
is attained, then these assets can signicantly bolster condence-
building measures and render community-building and re-inte-
gration eorts more robust. In other words, ICTs will work when
there are ‘physical’ attempts towards reconciliation, and will re-
main ineective without any social consensus or driver towards
mediation.
Conclusion
is article has sought to trace some of the current analytical
fronts of digital conict studies to oer a framework for IR’s cyber-
security scholarship on how it can escape some of the short-term
methodological and conceptual deadlocks. Specically, the cyber-
security eld suers from an absence of granular and representa-
tive (or even indicative) data generation, and a sharing mechanism
for the purposes of the scholarly community. is prevents an
empirical testing of the majority of the claims made in cybersecu-
rity theory, as well as impairs how much we can import from the
oft-mentioned ‘nuclear analogy’ in IR for the purposes of cyberse-
curity scholarship. One of the main reasons why the digital con-
ict studies discipline could surmount most of the hurdles posed
by the emerging technologies is that the eld has been building
granular and representative event datasets since the 1960s. From
the founding blocks of the Correlates of War Project in the 1960s,
UCDP/PRIO and START-UMD datasets emerged, leading the way
for the emergence of many other dataset projects, including the
ICEWS, ACLED, ViEWS, and GDELT projects. Multiple long-term
open source scientic research datasets have helped to advantage
the conict literature as it adapts to the requirements of the tech-
nological turn in IR. e absence of a long-term scientic event
dataset has steered cybersecurity researchers of IR to work with an
ambiguous sample of cybersecurity events that will remain struc-
turally insucient for robust theory-building and theory-testing.
A second major dierence is that digital conict studies has
developed far more interdisciplinary and collaborative ties than
cybersecurity scholarship has. By focusing on human trace data
to infer human conict dynamics, digital conict literature has
largely retained the social and human prerogatives of the eld. In
contrast, cybersecurity scholarship is still largely distant to the
core questions of political and social fundamentals of digitalised
human interactions, so far refraining from directly dealing with
the role of psychological, sociological, and ethnographic aspects
of cybersecurity. One recent exception is Nadiya Kostyuk and Yuri
Zhukov’s exploration of how cyber-attacks inuenced conict dy-
namics on the front lines in Ukraine.79 is article provides one
of many potential trajectories for cybersecurity scholarship in ad-
dressing the data availability and validity issues.
ICTs bring a set of welcome challenges and opportunities
for conict research. However, the most immediate task for IR in
general is to escape yet another conict studies entrapment when
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
114 successfully adapting to the question of how emerging technolo-
gies impact world events. ICTs bring a wide array of analytical op-
portunities to test IR’s existing mainstream theories, as well as de-
velop new ones, as digital communication enables the harvesting
of both more abundant and more granular data types. ese data
types will not only improve our understanding of how states inter-
act with their societies and other states in the digital domain, but
will also lead the way to the formulation of more advanced types of
international institutions and cooperation architectures. Regard-
less, conict studies will likely continue to spearhead IR’s broader
disciplinary focus on the ICTs.
While there is quite an abundance of attention on the earlier
phases of social movements and violent events, there is currently
a gap in the more advanced phases of such phenomena. e eld
is still burgeoning in explaining how ICT use aects target selec-
tion, intensity/duration, and peacebuilding eorts, but holds a
relatively more robust set of ndings on the onset and mobilisa-
tion phases. To remedy this gap, digital political communication
literature seems to be the most apparent linkage for the conict
studies community. Some of the most prominent works in PolCom
already have theoretical answers to how violence aects attention,
emotion, and mediation in critical political events and debates.
Yet, the bulk of that literature focuses on American or Euro-
pean contexts, where both Internet penetration and social media
use are signicant enough to yield robust results.80 e challenge
of the conict studies literature is two-pronged: rst, tackle data
availability and parity issues in comparative works on countries
with uneven access to ICTs, and second, disentangle conict re-
porting frequency from conict occurrence frequency. Both prob-
lems may eventually solve themselves as global interconnectivity
widens and ICT data becomes more representative and compara-
ble. However, studies can still benet signicantly from explor-
ing how yearly, generational, or geographical changes in ICT use
impact all ve phases of conicts discussed above. Rather than
waiting for ICT data to become eventually representative, scholars
may nd a plethora of topics to dig into across cases in areas with
dierent levels of digital access. Greater interdisciplinarity across
the elds of computer science, physics, biology, and complexity
elds will enable conict researchers to generate more sophisti-
cated models and more robust ndings on this emerging frontier.
Another largely untopped topic is the role of technology
companies in driving/mitigating conict. Platform architecture, as
well as the increased relevance of big tech companies during crises
and emergencies, render them de facto actors in all conicts.81 Di-
rect eects of platform inuence on conicts, such as the decision
to censor and emphasise certain types of content, or decisions to
partner with governments or certain civil society actors will have
an increasing inuence on all phases of conicts. However, indi-
rect eects, such as algorithmic bias,82 attention economy,83 and
rent-generation structures of social networks84 will also impact
conicts and conict actors signicantly. Given the fact that plat-
forms run on advertisement revenue and those advertisements
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
115
target engagement metrics, it will be inevitable for platforms to
push more extreme content that elicits an emotional response,
thus generating more revenue.
e success of the emerging eld of digital conict stud-
ies can oer three main lessons for the developing cybersecurity
eld. First, ‘cyber IR’ has to prioritise building event datasets that
strike a balance between data size and quality. Given the fact that
conict studies has several important datasets and data process-
ing projects unique to the eld (UCDP/PRIO,85 ICEWS,86 ACLED,87
UMD-START,88 or ViEWS89), the eld is better-suited to incor-
porate digital media and communication-related data types. Al-
though the Center for Strategic and International Studies90 and
the Council on Foreign Relations91 have their IR-specic ‘major
events’ data, the cases are a very unhelpfully small fraction of
cybersecurity events that happen on a daily basis. Furthermore,
both datasets bring in the question of ‘major event according to
whom?,’ given the heavy bias in favour of attacks against Ameri-
can infrastructure. Even data from Norse Corporation, FireEye,
Kaspersky, Fortinet, or similar cybersecurity companies, are by
no means representative or transparent in terms of the method-
ology behind data generation. Furthermore, their full datasets
aren’t available for public use, which brings its own set of replica-
tion problems. Second, cyber IR scholarship has to reach beyond
the connes of traditional IR theories and begin engaging more
with the techno-sociology and techno-politics literature. How do
states and societies perceive and prioritise the dangers of threats
originating from the cybersecurity/defence domain? What is the
impact of organisational, political, and social dierences between
and within countries in politicising and securitising cyber threats?
How do we incorporate disinformation, information overload, and
digital distraction into IR’s threat spectrum? How do the ‘modes of
production’ of digital hardware, software, and data impact balance
of power between countries and alter state-society relations on a
global scale? Should the eld deal primarily with the threats faced
by states (infrastructure damage, national secrecy, and conden-
tial data hacking), or society (surveillance, data capitalism, private
data protection)? Finally, cybersecurity scholarship will have to
broaden its focus of interest beyond what the major powers are
doing and study the impact of major power rivalry on the rest
of the world, with specic emphasis on inter-state and sub-state
inequalities. Given the fact that access to advanced cybersecuri-
ty technology is a distinct privilege of only the wealthiest of na-
tions, it is expected to create another form of hegemonic balanc-
ing and counter-balancing behaviour. How do we study regional
and systemic inequalities in access to cybersecurity hardware and
software infrastructure and how do these inequalities shape state
behaviour and state-society relationships across dierent regimes
and security cultures?
Ultimately, ICTs will occupy a more important place in the
media-conict nexus compared to the historical eects of the tele-
gram, radio, television, or motion picture. is is because access to
ICTs are more intimate (i.e., through smartphones that are always
nearby), real-time, multi-directional, and at-will compared to all
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
116 previous forms of mass communication. is will also render ICTs
a key analytical topic in all aspects of human relations, including
conict. More focus on the communicative aspects of mobilisa-
tion, movements, and violence will ultimately unlock new ideas
and theories of human behaviour. To do this, however, this article
argues in favour of the analytical value of greater interdisciplinar-
ity and more risk-taking across elds.
Notes
1 David A. Lake, “eory Is Dead, Long Live eory: e End of the Great
Debates and the Rise of Eclecticism in International Relations,” European
Journal of International Relations 19, no. 3 (2013): 567–87, https://doi.
org/10.1177/1354066113494330; Rosa Vasilaki, “Provincialising IR? Deadlocks
and Prospects in Post-Western IR eory,” Millennium: Journal of International
Studies 41, no. 1 (2012): 3–22, https://doi.org/10.1177/0305829812451720;
Stefano Guzzini, “e Ends of International Relations eory: Stages of Reexiv-
ity and Modes of eorizing,” European Journal of International Relations 19,
no. 3 (2013): 521–41, https://doi.org/10.1177/1354066113494327; Barry Bu-
zan and Richard Little, “Why International Relations Has Failed as an Intellectual
Project and What to Do About It,” Millennium: Journal of International Studies
30, no. 1 (2001): 19–39, https://doi.org/10.1177/03058298010300010401.
2 Nazli Choucri and David D. Clark, “Integrating Cyberspace and International Re-
lations: e Co-Evolution Dilemma,” SSRN Scholarly Paper (Rochester, NY: Social
Science Research Network, 2012), https://papers.ssrn.com/abstract=2178586;
Chintan Vaishnav, Nazli Choucri, and David Clark, “Cyber International Rela-
tions as an Integrated System,” Environment Systems and Decisions 33, no. 4
(2013): 561–76, https://doi.org/10.1007/s10669-013-9480-3; Lucas Kello, “e
Meaning of the Cyber Revolution: Perils to eory and Statecraft,” International
Security 38, no. 2 (2013): 7–40, https://doi.org/10.1162/ISEC_a_00138.
3 Jonathan Havercroft and Raymond Duvall, “Challenges of an Agonistic Con-
structivism for International Relations,” Polity 49, no. 1 (2016): 156–64, https://
doi.org/10.1086/689978; Jarrod Hayes, “Reclaiming Constructivism: Identity
and the Practice of the Study of International Relations,” PS: Political Science &
Politics 50, no. 1 (2017): 89–92, https://doi.org/10.1017/S1049096516002213;
David M. McCourt, “Practice eory and Relationalism as the New Construc-
tivism,” International Studies Quarterly 60, no. 3 (2016): 475–85, https://doi.
org/10.1093/isq/sqw036; omas J. Biersteker, “Critical Reections on Post-
Positivism in International Relations,” International Studies Quarterly 33, no.
3 (1989): 263–67, https://doi.org/10.2307/2600459; omas Diez and Jill
Steans, “A Useful Dialogue? Habermas and International Relations,” Review
of International Studies 31, no. 1 (2005): 127–40, https://doi.org/10.1017/
S0260210505006339.
4 Nicholas Tsagourias, “Cyber Attacks, Self-Defence and the Problem of Attribu-
tion,” Journal of Conict and Security Law 17, no. 2 (2012): 229–44, https://
doi.org/10.1093/jcsl/krs019; omas Rid and Ben Buchanan, “Attributing Cyber
Attacks,” Journal of Strategic Studies 38, no. 1–2 (2015): 4–37, https://doi.org/1
0.1080/01402390.2014.977382.
5 Joseph S. Nye, “Nuclear Lessons for Cyber Security?” Strategic Studies Quar-
terly 5, no. 4 (2011): 18–38.
6 Scott W. Beidleman, “Dening and Deterring Cyber War,” Defence Technical In-
formation Center (Carlisle, PA: US Army War College), January 6, 2009, https://
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
117
apps.dtic.mil/docs/citations/ADA500795.
7 Rebecca Slayton, “What Is the Cyber Oense-Defense Balance? Conceptions,
Causes, and Assessment,” International Security 41, no. 3 (2017): 72–109, htt-
ps://doi.org/10.1162/ISEC_a_00267.
8 Alexander D. Kent, "Cyber Security Data Sources for Dynamic Network Re-
search,” Security Science and Technology 1 (May 2016): 37-65; Radu F. Babiceanu
and Remzi Seker. "Big Data and Virtualization for Manufacturing Cyber-physical
Systems: A Survey of the Current Status and Future Outlook,” Computers in In-
dustry 81 (2016), 128-137.
9 Nahed Eltantawy and Julie B. Wiest, "e Arab Spring: Social Media in the
Egyptian Revolution: Reconsidering Resource Mobilization eory,” Internation-
al Journal of Communication 5 (2011): 18; Philip N. Howard, Aiden Duy, Deen
Freelon, Muzammil M. Hussain, Will Mari, and Marwa Maziad, “Opening Closed
Regimes: What Was the Role of Social Media During the Arab Spring?” SSRN
Scholarly Paper (Rochester, NY: Social Science Research Network, 2011) https://
ssrn.com/abstract=2595096; Gadi Wolfsfeld, Elad Segev, and Tamir Sheafer, “So-
cial Media and the Arab Spring: Politics Comes First,” e International Journal
of Press/Politics 18, no. 2 (2013), 115-137.
10 Philip N . Howard and Muzammil M. Hussain, “e Role of Digital Media,”
Journal of Democracy 22, no. 3 (2011): 35-48; Daniel Byman and Jennifer Wil-
liams, “Jihadism's Global Civil War,” e National Interest 136 (2015), 10-18; for
a broader range of cases, see Joshua Tucker, Andrew Guess, Pablo Barberá, Cris-
tian Vaccari, Alexandra Siegel, Sergey Sanovich, Denis Stukal, and Brendan Ny-
han, Social Media, Political Polarization, and Political Disinformation: A Review
of the Scientic Literature, Hewlett Foundation, 2018.
11 Jean Camp, Lorrie Cranor, Nick Feamster, Joan Feigenbaum, Stephanie For-
rest, Dave Kotz, Wenke Lee, Patrick Lincoln, Vern Paxson, Mike Reiter, Ron
Rivest, William Sanders, Stefan Savage, Sean Smith, Eugene Spaord, and Sal
Stolfo, “Data for Cybersecurity Research: Process and “Wish List,”” National Sci-
ence Foundation Workshop on Cyber Security Data for Experimentation, 2010.
12 David Lazer et al., “Life in the Network: e Coming Age of Computational
Social Science,” Science 323, no. 5915 (2009): 721–23, https://doi.org/10.1126/
science.1167742; R. Conte et al., “Manifesto of Computational Social Science,”
e European Physical Journal Special Topics 214, no. 1 (2012): 325–46, https://
doi.org/10.1140/epjst/e2012-01697-8.
13 Lars-Erik Cederman and Manuel Vogt, “Dynamics and Logics of Civil War,”
Journal of Conict Resolution 61, no. 9 (2017): 1992-2016.
14 Anita R. Gohdes, “Studying the Internet and Violent Conict,” Con-
ict Management and Peace Science, October 25, 2017, https://doi.
org/10.1177/0738894217733878.
15 omas Zeitzo, “How Social Media Is Changing Conict,” Jour-
nal of Conict Resolution 61, no. 9 (2017): 1970–91, https://doi.
org/10.1177/0022002717721392.
16 Mohammad-Munir Adi, e Usage of Social Media in the Arab Spring (LIT Ver-
lag Münster, 2014); Maximillian Hänska Ahy, “Networked Communication and
the Arab Spring: Linking Broadcast and Social Media,” New Media & Society 18,
no. 1 (January 1, 2016): 99–116, https://doi.org/10.1177/1461444814538634;
Nahed Eltantawy and Julie B. Wiest, “e Arab Spring| Social Media in the
Egyptian Revolution: Reconsidering Resource Mobilization eory,” Interna-
tional Journal of Communication 5 (2011): 18; Philip N. Howard et al., “Open-
ing Closed Regimes;” Habibul Haque Khondker, “Role of the New Media in the
Arab Spring,” Globalizations 8, no. 5 (2011): 675–79, https://doi.org/10.1080/1
4747731.2011.621287; Axel Bruns, Tim Higheld, and Jean Burgess, “e Arab
Spring and Social Media Audiences: English and Arabic Twitter Users and eir
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
118 Networks,” American Behavioral Scientist 57, no. 7 (2013): 871–98, https://doi.
org/10.1177/0002764213479374.
17 Jytte Klausen, “Tweeting the Jihad: Social Media Networks of Western For-
eign Fighters in Syria and Iraq,” Studies in Conict & Terrorism 38, no. 1 (2015):
1-22; omas Elkjer Nissen, "Terror.com: IS’s social media warfare in Syria and
Iraq,” Contemporary Conicts 2, no. 2 (2014(: 2-8; Farwell, “e Media Strat-
egy of ISIS;” Jad Melki and May Jabado, “Mediated Public Diplomacy of the
Islamic State in Iraq and Syria: e Synergistic Use of Terrorism, Social Media
and Branding,” Media and Communication 4, no. 2 (2016): 92-103; Olga Onuch,
"EuroMaidan Protests in Ukraine: Social Media Versus Social Networks,” Prob-
lems of Post-Communism 62, no. 4 (2015), 217-235; Jacob N. Shapiro and Nils
B. Weidmann, “Is the Phone Mightier an the Sword? Cellphones and Insurgent
Violence in Iraq,” International Organization 69, no. 2 (2015): 247- 274.
18 Robin L. ompson, “Radicalization and the Use of Social Media,” Journal of
Strategic Security 4, no. 4 (Winter 2011): 167–90; Scott Gates and Sukanya Pod-
der, “Social Media, Recruitment, Allegiance and the Islamic State,” Perspectives
on Terrorism 9, no. 4 (2015): 107–16; Lieven Pauwels and Nele Schils, “Dier-
ential Online Exposure to Extremist Content and Political Violence: Testing the
Relative Strength of Social Learning and Competing Perspectives,” Terrorism and
Political Violence 28, no. 1 (2016): 1–29, https://doi.org/10.1080/09546553.20
13.876414; Matthew Costello et al., “Who Views Online Extremism? Individual
Attributes Leading to Exposure,” Computers in Human Behavior 63 (2016): 311–
20, https://doi.org/10.1016/j.chb.2016.05.033.
19 Paul Collier and Anke Hoeer, “Greed and Grievance in Civil War,” Policy
Research Working Paper (Washington DC: e World Bank, May 2006); Paul
Collier, Anke Hoeer, and Dominic Rohner, “Beyond Greed and Grievance:
Feasibility and Civil War,” Oxford Economic Papers 61, no. 1 (2009): 1–27,
https://doi.org/10.1093/oep/gpn029; Marc L. Hutchison, Salvatore Schiano,
and Jenifer Whitten-Woodring, “When the Fourth Estate Becomes a Fifth Col-
umn: e Eect of Media Freedom and Social Intolerance on Civil Conict,” e
International Journal of Press/Politics 21, no. 2 (2016): 165–87, https://doi.
org/10.1177/1940161216632362.
20 Sebastián Valenzuela, Arturo Arriagada, and Andrés Scherman, “e So-
cial Media Basis of Youth Protest Behavior: e Case of Chile,” Journal of
Communication 62, no. 2 (2012): 299–314, https://doi.org/10.1111/j.1460-
2466.2012.01635.x; Sarah Anne Rennick, “Personal Grievance Sharing, Frame
Alignment, and Hybrid Organisational Structures: e Role of Social Media in
North Africa’s 2011 Uprisings,” Journal of Contemporary African Studies 31, no.
2 (2013): 156–74, https://doi.org/10.1080/02589001.2013.781322; Sebastián
Valenzuela, “Unpacking the Use of Social Media for Protest Behavior: e Roles
of Information, Opinion Expression, and Activism,” American Behavioral Scien-
tist 57, no. 7 (2013): 920–42, https://doi.org/10.1177/0002764213479375.
21 Farwell, “e Media Strategy of ISIS;” J.M. Berger, “e Metronome of Apoca-
lyptic Time: Social Media as Carrier Wave for Millenarian Contagion,” Perspec-
tives on Terrorism 9, no. 4 (2015): 61–71; Anita Peresin and Alberto Cervone,
“e Western Muhajirat of ISIS,” Studies in Conict & Terrorism 38, no. 7 (2015):
495–509, https://doi.org/10.1080/1057610X.2015.1025611.
22 Andrew T. Little, “Communication Technology and Protest,” e Journal
of Politics 78, no. 1 (2015): 152–66, https://doi.org/10.1086/683187; Zeynep
Tufekci and Christopher Wilson, “Social Media and the Decision to Participate in
Political Protest: Observations From Tahrir Square,” Journal of Communication
62, no. 2 (2012), 363–79, https://doi.org/10.1111/j.1460-2466.2012.01629.x.
23 Qiongyou Pu and Stephen J. Scanlan, “Communicating Injustice?” Informa-
tion, Communication & Society 15, no. 4 (May 1, 2012): 572–90, https://doi.
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
119
org/10.1080/1369118X.2012.665937; Rebecca Kay LeFebvre and Crystal Arm-
strong, “Grievance-Based Social Movement Mobilization in the #Ferguson Twit-
ter Storm,” New Media & Society 20, no. 1 (January 1, 2018): 8–28, https://doi.
org/10.1177/1461444816644697.
24 Anita Breuer, Todd Landman, and Dorothea Farquhar, “Social Media and Pro-
test Mobilization: Evidence from the Tunisian Revolution,” Democratization 22,
no. 4 (June 7, 2015): 764–92, https://doi.org/10.1080/13510347.2014.885505
; Gary Tang, “Mobilization by Images: TV Screen and Mediated Instant Griev-
ances in the Umbrella Movement,” Chinese Journal of Communication 8, no. 4
(October 2, 2015): 338–55, https://doi.org/10.1080/17544750.2015.1086398.
25 Meital Balmas, “When Fake News Becomes Real: Combined Exposure to
Multiple News Sources and Political Attitudes of Inecacy, Alienation, and
Cynicism,” Communication Research 41, no. 3 (2014): 430–54, https://doi.
org/10.1177/0093650212453600; Samuel C. Woolley and Philip N. Howard,
“Automation, Algorithms, and Politics| Political Communication, Computational
Propaganda, and Autonomous Agents — Introduction,” International Journal of
Communication 10 (2016).
26 For a good overview of the emerging literature on US disinformation, see:
Brendan Nyhan, “How Misinformation and Polarization Aect American Democ-
racy,” in Tucker et al., Social Media, Political Polarization, and Political Disinfor-
mation.
27 Farwell, “e Media Strategy of ISIS”; Elizabeth Pearson, “Online as the New
Frontline: Aect, Gender, and ISIS-Take-Down on Social Media,” Studies in
Conict & Terrorism 41, no. 11 (2018): 850–74, https://doi.org/10.1080/1057
610X.2017.1352280; Yair Galily et al., “e Boston Game and the ISIS Match:
Terrorism, Media, and Sport,” American Behavioral Scientist 60, no. 9 (2016):
1057–67, https://doi.org/10.1177/0002764216632844.
28 Hemant Purohit et al., “Gender-Based Violence in 140 Characters or Fewer: A
#BigData Case Study of Twitter,” ArXiv:1503.02086 [Cs], March 6, 2015, http://
arxiv.org/abs/1503.02086.
29 Prakruthi Karuna et al., “On the Dynamics of Local to Global Campaigns for
Curbing Gender-Based Violence,” ArXiv:1608.01648 [Cs], August 4, 2016, http://
arxiv.org/abs/1608.01648.
30 Munmun De Choudhury, Andrés Monroy-Hernández, and Gloria Mark,
“‘Narco’ Emotions: Aect and Desensitization in Social Media during the
Mexican Drug War,” Proceedings of the 32nd Annual ACM Conference on Hu-
man Factors in Computing Systems - CHI ’14, 2014, 3563–72, https://doi.
org/10.1145/2556288.2557197.
31 Andrés Monroy-Hernández et al., “e New War Correspondents: e Rise
of Civic Media Curation in Urban Warfare,” ArXiv:1507.01291[Cs] July 5, 2015,
https://doi.org/10.1145/2441776.2441938.
32 Nan Wang, Blesson Varghese, and Peter D. Donnelly, “A Machine Learning
Analysis of Twitter Sentiment to the Sandy Hook Shootings,” ArXiv:1609.00536
[Cs], September 2, 2016, http://arxiv.org/abs/1609.00536.
33 John W. Ayers et al., “Can Big Media Data Revolutionarize Gun Violence
Prevention?” ArXiv:1611.01148 [Cs], November 3, 2016, http://arxiv.org/
abs/1611.01148.
34 Donghyeon Won, Zachary C. Steinert-relkeld, and Jungseock Joo, “Protest
Activity Detection and Perceived Violence Estimation from Social Media Images,”
ArXiv:1709.06204 [Cs], September 18, 2017, http://arxiv.org/abs/1709.06204.
35 Karsten Müller and Carlo Schwarz. "Fanning the ames of hate: Social me-
dia and hate crime," SSRN Scholarly Paper (Rochester, NY: Social Science Re-
search Network, 2018), https://papers.ssrn.com/sol3/papers.cfm?abstract_
id=3082972.
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
120 36 Desmond U. Patton, Jerey Lane, Patrick Leonard, Jamie Macbeth, and Joce-
lyn R. Smith Lee, “Gang Violence on the Digital Street: Case Study of a South Side
Chicago Gang Member’s Twitter Communication,” New Media & Society 19, no.
7 (2017): 1000-1018.
37 Zeynep Tufekci, Twitter and Tear Gas: e Power and Fragility of Networked
Protest (New Haven: Yale University Press, 2017); José Van Dijck, omas Po-
ell, and Martijn De Waal, e Platform Society: Public Values in a Connective
World (New York: Oxford University Press, 2018); Bernard Enjolras, Kari Steen-
Johnsen, and Dag Wollebæk. “Social Media and Mobilization to Oine Demon-
strations: Transcending Participatory Divides?,”New Media & Society 15, no. 6
(2013): 890-908; Anita Breuer, Todd Landman, and Dorothea Farquhar. "Social
Media and Protest Mobilization: Evidence from the Tunisian Revolution." De-
mocratization 22, no. 4 (2015): 764-792.
38 Kristen Lovejoy and Gregory D. Saxton, “Information, Community, and Ac-
tion: How Nonprot Organizations Use Social Media,” Journal of Computer-
Mediated Communication 17, no. 3 (2012): 337–53, https://doi.org/10.1111/
j.1083-6101.2012.01576.x; Breuer, Landman, and Farquhar, “Social Media and
Protest Mobilization”; Enjolras, Steen-Johnsen, and Wollebæk, “Social Media
and Mobilization to Oine Demonstrations.”
39 Khondker, “Role of the New Media in the Arab Spring;” Bruns, Higheld, and
Burgess, “e Arab Spring and Social Media Audiences;” Christopher Wilson and
Alexandra Dunn, “e Arab Spring: Digital Media in the Egyptian Revolution:
Descriptive Analysis from the Tahrir Data Set,” International Journal of Com-
munication 5 (2011): 1248–1272.
40 Eltantawy and Wiest, “e Arab Spring: Social Media in the Egyptian Revo-
lution;” Michael Homan and Amaney Jamal, “Religion in the Arab Spring:
Between Two Competing Narratives,” e Journal of Politics 76, no. 3 (2014):
593–606, https://doi.org/10.1017/S0022381614000152.
41 Gohdes, “Studying the Internet and Violent Conict.”
42 Laurent Bonnasse-Gahot et al., “Epidemiological Modelling of the 2005
French Riots: A Spreading Wave and the Role of Contagion,” Scientic Reports 8,
no. 1 (2018): 107, https://doi.org/10.1038/s41598-017-18093-4.
43 Toby P. Davies et al., “A Mathematical Model of the London Riots and eir
Policing,” Scientic Reports 3 (2013): 1303, https://doi.org/10.1038/srep01303.
44 Heidi A. Campbell, Digital Religion: Understanding Religious Practice in New
Media Worlds (New York: Routledge, 2012), 58; Heidi A. Campbell, “Understand-
ing the Relationship Between Religion Online and Oine in a Networked So-
ciety,” Journal of the American Academy of Religion 80, no. 1 (2012): 64–93,
https://doi.org/10.1093/jaarel/lfr074.
45 Heidi A. Campbell, When Religion Meets New Media (Routledge, 2010), 126,
https://doi.org/10.4324/9780203695371.
46 Nicole B. Ellison and Danah M. Boyd, “Sociality rough Social Network Sites,”
in e Oxford Handbook of Internet Studies, ed. William H. Dutton, Oxford
Handbooks (Oxford, UK: Oxford University Press, 2013).
47 Noha Mellor and Khalil Rinnawi, Political Islam and Global Media: e Bound-
aries of Religious Identity (New York, NY: Routledge, 2016), 126, 135.
48 Nathan Abrams, “Appropriation and Innovation: Facebook, Grassroots Jews
and Oine Post-Denominational Judaism,” in Digital Judaism: Jewish Nego-
tiations with Digital Media and Culture, ed. Heidi A. Campbell (New York, NY:
Routledge, 2015).
49 Jan H. Pierskalla and Florian M. Hollenbach, “Technology and Collec-
tive Action: e Eect of Cell Phone Coverage on Political Violence in Africa,”
American Political Science Review 107, no. 2 (2013): 207–24, https://doi.
org/10.1017/S0003055413000075; Allan Dafoe and Jason Lyall, “From Cell
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
121
Phones to Conict? Reections on the Emerging ICT–Political Conict Re-
search Agenda,” Journal of Peace Research 52, no. 3 (2015): 401–13, https://doi.
org/10.1177/0022343314563653.
50 Nils B. Weidmann, “A Closer Look at Reporting Bias in Conict Event Data,”
American Journal of Political Science 60, no. 1 (2016): 206–18, https://doi.
org/10.1111/ajps.12196; Mihai Croicu and Joakim Kreutz, “Communication
Technology and Reports on Political Violence: Cross-National Evidence Using Af-
rican Events Data,” Political Research Quarterly 70, no. 1 (2017): 19–31, https://
doi.org/10.1177/1065912916670272.
51 omas Zeitzo, “Does Social Media Inuence Conict? Evidence from the
2012 Gaza Conict,” Journal of Conict Resolution 62, no. 1 (2018): 29–63, htt-
ps://doi.org/10.1177/0022002716650925.
52 Jibon Naher and Matiur Rahman Minar, “Impact of Social Media Posts in Real
Life Violence: A Case Study in Bangladesh,” ArXiv:1812.08660 [Cs], December
19, 2018, http://arxiv.org/abs/1812.08660.
53 Lisa Hultman, Jacob Kathman, and Megan Shannon, “United Nations Peace-
keeping and Civilian Protection in Civil War,” American Journal of Political Sci-
ence 57, no. 4 (2013): 875–91, https://doi.org/10.1111/ajps.12036; Jessica A.
Stanton, “Regulating Militias: Governments, Militias, and Civilian Targeting in
Civil War,” Journal of Conict Resolution 59, no. 5 (August 1, 2015): 899–923,
https://doi.org/10.1177/0022002715576751.
54 Vindu Goel, Suhasini Raj, and Priyadarshini Ravichandran, “How WhatsApp
Leads Mobs to Murder in India,” e New York Times, July 18, 2018, https://
www.nytimes.com/interactive/2018/07/18/technology/whatsapp-india-kill-
ings.html; Marcos Martínez, “Burned to Death Because of a Rumour on What-
sApp,” BBC News, November 12, 2018, https://www.bbc.com/news/world-latin-
america-46145986.
55 Jessica Megarry, “Online Incivility or Sexual Harassment? Conceptualising
Women’s Experiences in the Digital Age,” Women’s Studies International Forum
47 (2014): 46–55, https://doi.org/10.1016/j.wsif.2014.07.012; Jesse Fox and
Wai Yen Tang, “Women’s Experiences with General and Sexual Harassment in
Online Video Games: Rumination, Organizational Responsiveness, Withdrawal,
and Coping Strategies,” New Media & Society 19, no. 8 (2017): 1290–1307, htt-
ps://doi.org/10.1177/1461444816635778.
56 H. Akin Unver and Hassan Alassaad, “How Turks Mobilized Against the
Coup,” Foreign Aairs, September 14, 2016, https://www.foreignaairs.com/ar-
ticles/2016-09-14/how-turks-mobilized-against-coup.
57 E. Elbadawi and N. Sambanis, “Why Are ere so Many Civil Wars in Africa?
Understanding and Preventing Violent Conict,” Journal of African Economies
9, no. 3 (2000): 244–69, https://doi.org/10.1093/jae/9.3.244; Ibahim Elbadawi
and Nicholas Sambanis, “How Much War Will We See?: Explaining the Prevalence
of Civil War,” Journal of Conict Resolution 46, no. 3 (2002): 307–34, https://
doi.org/10.1177/0022002702046003001.
58 Megan Shannon, Daniel Morey, and Frederick J. Boehmke, “e Inuence of
International Organizations on Militarized Dispute Initiation and Duration,” In-
ternational Studies Quarterly 54, no. 4 (December 1, 2010): 1123–41, https://
doi.org/10.1111/j.1468-2478.2010.00629.x.
59 Elena Pokalova, “Conict Resolution in Frozen Conicts: Timing in Nagorno-
Karabakh,” Journal of Balkan and Near Eastern Studies 17, no. 1 (2015): 68–85,
https://doi.org/10.1080/19448953.2014.986378; Stephen Blank, “Russia and
the Black Sea’s Frozen Conicts in Strategic Perspective,” Mediterranean Quar-
terly 19, no. 3 (2008): 23–54.
60 Håvard Hegre, “e Duration and Termination of Civil War,” Journal of Peace
Research 41, no. 3 (2004): 243–52, https://doi.org/10.1177/0022343304043768;
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
122 Karl R. de Rouen and David Sobek, “e Dynamics of Civil War Duration and
Outcome,” Journal of Peace Research 41, no. 3 (2004): 303–20, https://doi.
org/10.1177/0022343304043771; James D. Fearon, “Why Do Some Civil Wars
Last So Much Longer than Others?” Journal of Peace Research 41, no. 3 (2004):
275–301, https://doi.org/10.1177/0022343304043770.
61 T. Camber Warren, “Explosive Connections? Mass Media, Social Media, and
the Geography of Collective Violence in African States,” Journal of Peace Research
52, no. 3 (2015): 297–311, https://doi.org/10.1177/0022343314558102; Din-
issa Duvanova et al., “Violent Conict and Online Segregation: An Analysis of So-
cial Network Communication across Ukraine’s Regions,” Journal of Comparative
Economics 44, no. 1 (2016): 163–81, https://doi.org/10.1016/j.jce.2015.10.003.
62 Weidmann, “A Closer Look at Reporting Bias in Conict Event Data.”
63 Weisi Guo et al., “e Spatial Ecology of War and Peace,” ArXiv:1604.01693
[Physics], April 6, 2016, http://arxiv.org/abs/1604.01693.
64 Olivier Walther, Christian Leuprecht, and David Skillicorn, “Wars Without
Beginning or End: Violent Political Organizations and Irregular Warfare in the
Sahel-Sahara,” ArXiv:1606.02705 [Physics], June 8, 2016, http://arxiv.org/
abs/1606.02705.
65 Pablo Barberá et al., “Tweeting From Left to Right: Is Online Political Commu-
nication More an an Echo Chamber?” Psychological Science 26, no. 10 (2015):
1531–42, https://doi.org/10.1177/0956797615594620.
66 Michela Del Vicario et al., “Public Discourse and News Consumption on On-
line Social Media: A Quantitative, Cross-Platform Analysis of the Italian Ref-
erendum,” ArXiv:1702.06016 [Physics], February 20, 2017, http://arxiv.org/
abs/1702.06016; Michela Del Vicario et al., “Polarization and Fake News: Early
Warning of Potential Misinformation Targets,” ArXiv:1802.01400 [Cs], February
5, 2018, http://arxiv.org/abs/1802.01400.
67 Marco T. Bastos, Dan Mercea, and Andrea Baronchelli, “e Spatial Dimension
of Online Echo Chambers,” ArXiv:1709.05233 [Physics], September 15, 2017,
http://arxiv.org/abs/1709.05233.
68 Wesley Cota et al., “Quantifying Echo Chamber Eects in Information Spread-
ing over Political Communication Networks,” ArXiv:1901.03688 [Physics], Janu-
ary 11, 2019, http://arxiv.org/abs/1901.03688.
69 Nils-Christian Bormann, Lars-Erik Cederman, and Manuel Vogt, “Language,
Religion, and Ethnic Civil War,” Journal of Conict Resolution 61, no. 4 (April 1,
2017): 744–71, https://doi.org/10.1177/0022002715600755.
70 Joakim Kreutz, “How and When Armed Conicts End: Introducing the UCDP
Conict Termination Dataset,” Journal of Peace Research 47, no. 2 (2010):
243–50, https://doi.org/10.1177/0022343309353108; J. Michael Quinn, T. Da-
vid Mason, and Mehmet Gurses, “Sustaining the Peace: Determinants of Civil
War Recurrence,” International Interactions 33, no. 2 (2007): 167–93, https://
doi.org/10.1080/03050620701277673; David E. Cunningham, Kristian Skrede
Gleditsch, and Idean Salehyan, “It Takes Two: A Dyadic Analysis of Civil War Du-
ration and Outcome,” Journal of Conict Resolution 53, no. 4 (2009): 570–97,
https://doi.org/10.1177/0022002709336458.
71 Monica Duy Toft, “Ending Civil Wars: A Case for Rebel Victory?” Interna-
tional Security 34, no. 4 (2010): 7–36, https://doi.org/10.1162/isec.2010.34.4.7;
Barbara F. Walter, “Does Conict Beget Conict? Explaining Recurring Civ-
il War,” Journal of Peace Research 41, no. 3 (2004): 371–88, https://doi.
org/10.1177/0022343304043775; Michael Tiernay, “Killing Kony: Leadership
Change and Civil War Termination,” Journal of Conict Resolution 59, no. 2
(2015): 175–206, https://doi.org/10.1177/0022002713499720.
72 Devon E. A. Curtis, “Broadcasting Peace: An Analysis of Local Media Post-Con-
ict Peacebuilding Projects in Rwanda and Bosnia,” Canadian Journal of Develop-
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
123
ment Studies / Revue Canadienne d’études Du Développement 21, no. 1 (2000):
141–66, https://doi.org/10.1080/02255189.2000.9669886; Wilhelm Kempf,
“Media Contribution to Peace Building in War Torn Societies,” Working Paper,
Diskussionsbeiträge Der Projektgruppe Friedensforschung (Konstanz: Universi-
ty of Konstanz, 1998), https://kops.uni-konstanz.de/handle/123456789/10701.
73 Monroe E. Price and Mark ompson, “Intervention, Media and Human
Rights,” Survival 45, no. 1 (2003): 183–202, https://doi.org/10.1093/surviv-
al/45.1.183; Gadi Wolfsfeld, Eitan Y. Alimi, and Was Kailani, “News Media and
Peace Building in Asymmetrical Conicts: e Flow of News between Jordan
and Israel,” Political Studies 56, no. 2 (2008): 374–98, https://doi.org/10.1111/
j.1467-9248.2007.00683.x.
74 Clay Shirky, “e Political Power of Social Media: Technology, the Public
Sphere, and Political Change,” Foreign Aairs 90, no. 1 (2011): 28–41.
75 Oliver Boyd-Barrett, “Ukraine, Mainstream Media and Conict Propaganda,”
Journalism Studies 18, no. 8 (2017): 1016–34, https://doi.org/10.1080/146167
0X.2015.1099461.
76 Nadiya Kostyuk and Yuri M. Zhukov, “Invisible Digital Front: Can Cyber At-
tacks Shape Battleeld Events?” Journal of Conict Resolution 63, no. 2 (2019):
317–47, https://doi.org/10.1177/0022002717737138; eodore P. Gerber and
Jane Zavisca, “Does Russian Propaganda Work?” e Washington Quarterly 39,
no. 2 (2016): 79–98, https://doi.org/10.1080/0163660X.2016.1204398; Ulises
A. Mejias and Nikolai E. Vokuev, “Disinformation and the Media: e Case of
Russia and Ukraine,” Media, Culture & Society 39, no. 7 (2017): 1027–42, htt-
ps://doi.org/10.1177/0163443716686672.
77 Gary King, Jennifer Pan, and Margaret E. Roberts, “How Censorship in Chi-
na Allows Government Criticism but Silences Collective Expression,” American
Political Science Review 107, no. 2 (2013): 326–43, https://doi.org/10.1017/
S0003055413000014; Yi Mou, Kevin Wu, and David Atkin, “Understanding the
Use of Circumvention Tools to Bypass Online Censorship,” New Media & Soci-
ety 18, no. 5 (2016): 837–56, https://doi.org/10.1177/1461444814548994;
Anita R. Gohdes, “Pulling the Plug: Network Disruptions and Violence in Civil
Conict,” Journal of Peace Research 52, no. 3 (2015): 352–67, https://doi.
org/10.1177/0022343314551398; Howard et al., “Opening Closed Regimes.”
78 David Patrikarakos, War in 140 Characters: How Social Media Is Reshaping
Conict in the Twenty-First Century (New York, NY: Basic Books, 2017); Chris-
tian Christensen, “Twitter Revolutions? Addressing Social Media and Dissent,”
e Communication Review 14, no. 3 (2011): 155–57, https://doi.org/10.1080/
10714421.2011.597235; Matthew L. Williams et al., “Policing Cyber-Neighbour-
hoods: Tension Monitoring and Social Media Networks,” Policing and Society 23,
no. 4 (2013): 461–81, https://doi.org/10.1080/10439463.2013.780225; Goh-
des, “Studying the Internet and Violent Conict.”
79 Nadiya Kostyuk and Yuri M. Zhukov, “Invisible Digital Front: Can Cyber At-
tacks Shape Battleeld Events?” Journal of Conict Resolution. 63, no. 2 (2019):
317-347.
80 A further line of inquiry would be whether heavy scholarly and policy atten-
tion on disinformation in Western liberal democracies render disinformation
and organised distraction easier and more likely in countries outside NATO and/
or are not liberal democracies. For a range of time-frequency analyses on coun-
tries beyond mainstream scholarly focus, see: Rolf Fredheim-led ‘Robotrolling’
reports, available at: https://www.stratcomcoe.org/robotrolling-20171.
81 Anne Helmond, “e Platformization of the Web: Making Web Data
Platform Ready,” Social Media + Society 1, no. 2 (2015): 1-11, https://doi.
org/10.1177/2056305115603080; Jean-Christophe Plantin et al., “Infrastructure
Studies Meet Platform Studies in the Age of Google and Facebook,” New Media &
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
124 Society 20, no. 1 (2018): 293–310, https://doi.org/10.1177/1461444816661553.
82 Saya Umoja Noble, Algorithms of Oppression: How Search Engines Rein-
force Racism, 1st ed. (New York, NY: New York University Press, 2018).
83 Zeynep Tufekci, “‘Not is One’: Social Movements, the Attention Economy,
and Microcelebrity Networked Activism,” American Behavioral Scientist 57, no.
7 (2013): 848–70, https://doi.org/10.1177/0002764213479369; Zeynep Tufek-
ci, “Engineering the Public: Big Data, Surveillance and Computational Politics,”
First Monday 19, no. 7 (2014), https://doi.org/10.5210/fm.v19i7.4901; Bernard
J. Jansen et al., “Twitter Power: Tweets as Electronic Word of Mouth,” Journal of
the American Society for Information Science and Technology 60, no. 11 (2009):
2169–88, https://doi.org/10.1002/asi.21149.
84 David Lazer, “e Rise of the Social Algorithm,” Science 348, no. 6239 (2015):
1090–91, https://doi.org/10.1126/science.aab1422; Gunn Sara Enli and Eli Sk-
ogerbø, “Personalized Campaigns in Party-Centred Politics,” Information, Com-
munication & Society 16, no. 5 (2013): 757–74, https://doi.org/10.1080/13691
18X.2013.782330.
85 Department of Peace and Conict Research, Uppsala University and the Cen-
tre for the Study of Civil War at the Peace Research Institute Oslo (PRIO). “UCDP/
PRIO Armed Conict Dataset.” Accessed May 16, 2019. https://www.prio.org/
Data/Armed-Conict/UCDP-PRIO/.
86 Lockheed Martin. “Integrated Crisis Early Warning System (ICEWS).” Ac-
cessed May 16, 2019. https://www.lockheedmartin.com/en-us/capabilities/
research-labs/advanced-technology-labs/icews.html.
87 “Armed Conict Location & Event Data Project (ACLED).” Accessed May 16,
2019. https://www.acleddata.com/.
88 National Consortium for the Study of Terrorism and Responses to Terrorism
– University of Maryland. “START.” Accessed May 16, 2019. https://www.start.
umd.edu/.
89 Department of Peace and Conict Research – Uppsala University. “Violence
Early-Warning System (ViEWS).” Accessed May 16, 2019. https://www.pcr.
uu.se/research/views/.
90 Technology Policy Program – Center for Strategic and International Studies.
“Signicant Cyber Incidents.”Accessed May 16, 2019. https://www.csis.org/pro-
grams/cybersecurity-and-governance/technology-policy-program/other-pro-
jects-cybersecurity.
91 Council on Foreign Relations. “Cyber Operations Tracker.” Accessed May 16,
2019. https://www.cfr.org/interactive/cyber-operation
This content downloaded from
176.236.87.110 on Sun, 01 Jan 2023 20:41:34 UTC
All use subject to https://about.jstor.org/terms
View publication stats