Technical Report

DARE Report 5.1: GREECE Country level reports on drivers of self-radicalisation and digital sociability among Europeans

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

The reports presented here concern the role of the Internet and social media in processes of self-radicalisation. The term self-radicalisation refers to a type of radicalisation process that designates the radicalising individual as the instigator of the process. The DARE study investigates self-radicalisation specifically in relation to the role of participatory media in the process. In line with the dual focus of the DARE project as a whole, this study is concerned with the role of participatory media in the self-radicalisation of people identifying as supporters of i) radical Islamist and ii) anti-Islam(ist) or wider far right groups. The findings of this work are presented through an introduction and 7 National Reports covering: Belgium, France, Germany, Greece, Netherlands, Norway and the United Kingdom. A cross-national report and a policy brief building on these reports are also available.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
How do you produce an authentic self on social media? This question is increasingly critical for the modern politician. Many voters prize authenticity as more important than policies, and social media is playing an ever-greater role in electoral politics. Further critical attention is required to understand how politicians are using social media to present an authentic self as a strategy to win votes. Whereas previous research has focused on how the content of politicians’ messages affects their authenticity, this article explores how authenticity is produced through formal aspects of self-presentational cues. To do so, the article analyzes the authenticity cues in Donald Trump’s tweets during the 2016 United States election. In what was widely dubbed as “the authenticity election,” Trump was able to present an authentic self on Twitter using little more than 140 alphanumeric characters. What cues were at play, and why did they work? By analyzing how news media narrated Trump’s authenticity, and applying a semiotic analysis based on the theory of Charles Sanders Peirce, this article uncovers the key authenticity cues in Trump’s tweets, and examines the semiotic mechanisms behind them. I show that Trump’s authenticity depended upon the deployment of indexes, signs that bear a causal link to the object they refer to. Trump’s indexes of the self—the typographic texture, the tweets’ timestamps, and the operating system tags—combined to produce an authentic form for Trump’s tweets to inhabit. I then close with observations of indexical authenticity being leveraged by other politicians.
Article
Full-text available
As an iconic image of our time, the selfie has attracted much attention in popular media and scholarly writing. The focus so far has been on the representation of the self or subjectivity. We propose a complementary perspective that foregrounds the intersubjective function of the selfie. We argue that the presence of selfhood is often an assumption. What distinguishes the selfie from other photographic genres is its ability to enact intersubjectivity – the possibility for difference of perspectives to be created and this difference to be shared between the image creator and the viewer. Based on a social semiotic analysis of selfies on Instagram, we identify four subtypes of selfie, each deploying a combination of visual resources to represent a distinct form of intersubjectivity. Our analysis suggests that the potential for empowerment is inherent in the visual structure of the selfie, and that, as a genre, it is open for recontextualisation across contexts and social media platforms.
Article
Full-text available
The current crises in Syria has led to a number of Britons travelling abroad to fight with groups such as Isis. Capitalising on this growth, Isis are now increasingly fighting an online cyber war, with the use of slick videos, online messages of hate and even an app that all aim to radicalise and create a new generation of cyber jihadists. These modern day tools are helping Isis spread their propaganda and ideology to thousands of online sympathisers across the world. Indeed, the group has actively been using social media sites such as Twitter, Facebook and YouTube to recruit new would be members. This is being done through images and the streaming of violent online viral videos filmed and professionally edited that are targeting young and impressionable people. Portraying a glamorised and ‘cool’ image, Isis fighters are beginning to act as the new rock stars of global cyber jihad. The Internet therefore is becoming the virtual playground for extremist views to be reinforced and act as an echo chamber. This study analysed 100 different Facebook pages and 50 Twitter user accounts which generated over 2050 results and helped the author create a typology of seven key behaviour characteristics and motivations. The findings in this study confirmed the author’s original hypothesis, i.e. online hate is being used by groups such as Isis for a variety of reasons such as recruitment and propaganda. Moreover, this material is coordinated and controlled by Isis as a means for publishing and sending out key messages.
Article
Full-text available
This article explores interpersonal meaning in social media photographs, using the representation of motherhood in Instagram images as a case study. It investigates the visual choices that are made in these images to construe relationships between the represented participants, the photographer, and the ambient social media viewer. The author draws upon existing work on the visual systems of point of view and focalization to explore interpersonal meaning in these images, and proposes that an additional system – subjectification – is needed to account for the kinds of relationship between the viewer and the photographer that are instantiated in social photographs, as well as the ways in which subjectivity is signaled in these images. The dataset analyzed is the entire Instagram feed of a single user who posts images of her experience of motherhood and a collection of 500 images using the hashtag #motherhood.
Article
Full-text available
Some scholars and others are skeptical of a significant role for the Internet in processes of violent radicalization. There is increasing concern on the part of other scholars, and increasingly also policymakers and publics, that easy availability of violent extremist content online may have violent radicalizing effects. This article identifies a number of core questions regarding the interaction of violent extremism and terrorism and the Internet, particularly social media, that have yet to be adequately addressed and supplies a series of six follow-up suggestions, flowing from these questions, for progressing research in this area. These suggestions relate to (1) widening the range of types of violent online extremism being studied beyond violent jihadis; (2) engaging in more comparative research, not just across ideologies, but also groups, countries, languages, and social media platforms; (3) deepening our analyses to include interviewing and virtual ethnographic approaches; (4) up-scaling or improving our capacity to undertake “big data” collection and analysis; (5) outreaching beyond terrorism studies to become acquainted with, for example, the Internet Studies literature and engaging in interdisciplinary research with, for example, computer scientists; and (6) paying more attention to gender as a factor in violent online extremism.
Article
Full-text available
The paper focuses on crossposting, as a form of digital remediation consisting in the production and distribution of multimodal texts in multiple online spaces through embedding and sharing. The study sketches the analytical steps to approach the phenomenon, applying them on a UK food blogger’s activity spanning her blog, her Facebook, Twitter, YouTube, Pinterest, and Instagram accounts. In the instance examined, recontextualized texts are re-genred; genre assignment is given by the combination of the multimodal configuration in each space and the blogger’s use of these affordances to her aims. Through minimum new text creation, by recontextualizing her texts in different spaces, the blogger can shape differently her relation with the audience. The analytical framework is intended as a flexible tool that, adjusted as appropriate, can be used for a broader in-depth analysis of crossposting.
Article
Full-text available
As dozens of British women and girls travel to join Islamic State in Syria and Iraq, there are increasing concerns over female radicalization online. These fears are heightened by the case of Roshonara Choudhry, the first and only British woman convicted of a violent Islamist attack. The university student in 2010 stabbed her Member of Parliament, after watching YouTube videos of the radical cleric Anwar Al Awlaki. Current radicalization theories portray Choudhry as a “pure lone wolf,” a victim of Internet indoctrination, without agency. This article explores how gender factors in her radicalization, to present an alternative to existing theoretical explanations. An engagement with gender reveals its role in Choudhry's radicalization, first, in precluding her from a real-world engagement with Islamism on her terms, pushing her to the Internet; then in increasing her susceptibility to online extremist messages; finally, in fomenting an eventually intolerable dissonance between her online and multiple “real” gendered identities, resulting in violence. The article emphasizes the transgressive nature of this act of female violence in Salafi-Jihadi ideology; also, the importance of this gendered ideology as the foundation of ISIS recruitment online. It emphasizes the importance of understanding the operation of gender in the Jihad's production of violence, and roles for men and women alike.
Chapter
Full-text available
The contemporary rise of popular support for fascism is investigated in this article through an examination of Golden Dawn's remarkable appeal to a section of Greek youth. This leads to the problematization of mainstream explanatory and interpretive discourses that attribute Golden Dawn's electoral and political attractiveness almost exclusively to anger and a will to punish the political system which is regarded as being responsible for the country's collapse and the harsh consequences of austerity and recession. Drawing upon the findings of ethnographic research on Golden Dawn and its young voters’ and supporters’ ideology and political activism conducted as part of the MYPLACE project, we argue that Golden Dawn's young voters and supporters are much more than angry youth. Their choice to support a fascist political agenda and practice cannot be reduced solely to an emotional reaction to the crisis but rests on wider ideological and political affinities and links that have been building over the previous two or three decades. In this sense, the contemporary rise of fascism in Greece appears as not merely a straightforward and simple outcome of the crisis but the complex result of previous socio-political transformations, sharpened, magnified and accelerated by the current systemic crash.
Article
Full-text available
This paper focuses on the display of identity on Facebook, and more specifically on how undergraduate students in Cardiff, Wales, say they express identity on their profiles. The theoretical context of this study is observed processes of change in the way we play out identity through what have been described as globalisation, deterritorialisation and the rise of lifestyle consumer society. The paper is based on an analysis of responses from a questionnaire and interviews with 100 students from Media and Communication degrees at the University of Glamorgan. The data collection is designed to indicate what kinds of self-categorisation are used. These data are analysed using Social Actor Analysis developed by Machin and Van Leeuwen. The paper shows that we find a range of identity categories, some that are based around a biological model of national identity, while others focus on a belonging to a territory, others on national cultural activities and yet others link to lifestyle identity. What is most notable in this Welsh sample is the high use of nationalist identity categories and biological ethnic classification alongside other lifestyle identities.
Article
Full-text available
List of tables List of figures Preface Introduction: 1. The decline and fall of political activism? 2. Theories of political activism Part I. The Puzzle of Electoral Turnout: 3. Mapping turnout 4. Do institutions matter? 5. Who votes? Part II. Political Parties: 6. Mapping party activism 7. Who joins? Part III. Social Capital and Civic Society: 8. Social capital and civic society 9. Traditional mobilising agencies: unions and churches 10. New social movements, protest politics and the internet 11. Conclusions: the reinvention of political activism? Appendix: comparative framework Notes Select bibliography Index.
Conference Paper
Full-text available
Directed links in social media could represent anything from intimate friendships to common interests, or even a passion for breaking news or celebrity gossip. Such directed links determine the flow of information and hence indicate a user's influence on others—a concept that is crucial in sociology and viral marketing. In this paper, using a large amount of data collected from Twit- ter, we present an in-depth comparison of three mea- sures of influence: indegree, retweets, and mentions. Based on these measures, we investigate the dynam- ics of user influence across topics and time. We make several interesting observations. First, popular users who have high indegree are not necessarily influential in terms of spawning retweets or mentions. Second, most influential users can hold significant influence over a variety of topics. Third, influence is not gained spon- taneously or accidentally, but through concerted effort such as limiting tweets to a single topic. We believe that these findings provide new insights for viral marketing and suggest that topological measures such as indegree alone reveals very little about the influence of a user.
Article
The purpose of social media websites like Twitter, Tumbler, and Facebook is that its user can express their feelings without being pressurized by anyone. User can give their point of view regarding the recent events in their surroundings as well as give suggestions to improve surroundings in text-based format while conveying their emotions which they are not able to easily verbalize using emoticons and emoji. For better understanding of people’s opinion, it is important to analyze this semiotics as well as sentence. In this paper we will discuss importance of semiotics in sentiment analysis. The main contribution of this paper to provide an approach to determine sentiment score of a tweet with semiotics with multi-dimensional sentiment analysis. In our algorithmic approach we have created semiotic dictionary which have sentiment score for each semiotic with sentiment expressed by it most frequently. We have compared our algorithmic approach with the prediction approach for sentiment classification and calculating sentiment scores. Proposed approach overcome limitation of regression analysis approach as it also helps finding sentiment score in case of where semiotic role is “Addition” and it is more effective at calculating sentiment score than other approach.
Article
This article focuses on the place and role of women in the ideology of the Greek neo-Nazi political party Golden Dawn (GD). The article considers the place of women in GD’s ideology as well as how GD envisages the role of women in society. It asks whether this vision of women’s role is reflected in the participation of women in the party’s activities. Based on a content analysis of material derived from the party’s official websites, it is argued that women play a key role in GD’s ideological edifice. This is evident in the party’s concern with the construction of a nationalist habitus for women. This habitus is rooted in ideas of anti-feminism, motherhood and family and the primacy of nation and nationalist sentiment in determining women’s lives.
Article
This article focuses on the differences between the official video clip of a song dedicated to the nation and the remakes uploaded on social media by anonymous users. It argues that social media act as the semiosphere boundary, on which, for Lotman [2005. “On the Semiosphere.” Sign Systems Studies 33 (1): 205–229] central dominant texts and peripheral structures meet to generate new meaning. The work draws on Lotman's semiosphere, on nation-building, and on the bottom-up construction of reality of social media. Methodologically, semiotic analysis is applied to the images of all the videos. Results show that the peripheral elements theorised by Lotman adapt to and renew the language of the centre. In fact, they adopt the same structure of the official video but expand, revitalise and deconstruct the sedimented versions of Italy that it offers. As in Lotman, the periphery challenges the dominant hierarchy. Finally, all the videos agree on relegating the woman to a secondary role.
Article
This article investigates the potential role of the Internet for Spanish extremist right-wing organizations for their contacts (at the national as well as at the international level), the promotion of a collective identity and their mobilization. To address this issue, it employs a combination of quantitative and qualitative research techniques. A social network analysis, based on online links between about 90 Spanish extreme right organizations, aims to investigate the organizational (online) structure of the right-wing Spanish milieu, and a content analysis of right wing web sites to grasp the degree and forms of their Internet's usage for various goals. The analysis focuses on different types of Spanish extreme right organizations (from political parties to skinhead and cultural groups). The results are interpreted against the off line political and cultural setting of opportunities and constraints offered by the country.
Article
L'auteur est Max Reinert , et non A. Reinert comme indiqué par erreur sur l'article publié
Book
What explains the dramatic rise of the extreme, ultranationalist Golden Dawn in a country that has experienced Nazi invasion and a military dictatorship? This book places the rise of the Golden Dawn in the context of the Eurozone crisis and argues that its rise is not merely the product of economic malaise. Rather, the success of the Golden Dawn is dependent on the extent to which it was able to propound plausible solutions to the three sets of crises - economic, political and ideological - that culminated in an overall crisis of democracy in Greece. The authors argue that much of the party's success can be attributed to its strategic choice to tap into the widespread disillusionment of the Greek people by offering them a 'nationalist solution': a rhetoric that emphasizes the twin fascist myths of social decadence and national rebirth.
Book
This book examines the fascinating interplay of party and media behavior to explain one of the most important phenomena in Western Europe: the rise of far-right parties. To account for the divergent electoral fortunes of these parties, the book examines how political parties and the mass media have dealt with growing public concerns over national identity. Mainstream politicians chose to “play the nationalist card,” creating opportunities for the entry of far-right parties into the political system. In some cases, the media gave outsized exposure to such parties, allowing them to capitalize on these opportunities; in other cases, they ignored them, blocking their entry into the political system. Using elite interviews, content analysis, and primary documents to trace identity politics since the 1980s, this book presents an original interpretation of identity politics and media behavior in Austria, Germany, Greece, and France since the 1980s.
Article
One of the most groundbreaking sociology texts of the mid-20th century, Howard S. Becker's Outsiders is a thorough exploration of social deviance and how it can be addressed in an understanding and helpful manner. A compulsively readable and thoroughly researched exploration of social deviance and the application of what is known as "labeling theory" to the studies of deviance. With particular research into drug culture, Outsiders analyzes unconventional individuals and their place in normal society.
Article
This article examines an aspect of transnational activity that is often neglected, namely the transnational activism of the far right. It uses a case study of the British National Party (BNP) and the Nationaldemokratische Partei Deutschlands (NPD – German National Democratic Party) in order to explore how its leaders and activists share ideas and information, policy and praxis, and how this is employed in the development of a strategic ‘master frame’ that they believe will allow them to overcome the limits of purely national activity in a globalised world. It explores the evolution of the links between the two parties, their nature and indeed the limits of such transnational activism upon national ‘frames’ in order to present a historical overview of the diffusion of ideology and strategy within the contemporary European far right.
Article
While the use of the internet and social media as a tool for extremists and terrorists has been well documented, understanding the mechanisms at work has been much more elusive. This paper begins with a grounded theory approach guided by a new theoretical approach to power that utilizes both terrorism cases and extremist social media groups to develop an explanatory model of radicalization. Preliminary hypotheses are developed, explored and refined in order to develop a comprehensive model which is then presented. This model utilizes and applies concepts from social theorist Michel Foucault, including the use of discourse and networked power relations in order to normalize and modify thoughts and behaviors. The internet is conceptualized as a type of institution in which this framework of power operates and seeks to recruit and radicalize. Overall, findings suggest that the explanatory model presented is a well suited, yet still incomplete in explaining the process of online radicalization.
Article
This article applies instruments of social network analysis to a study of communication networks within the Italian and German extremist right. Web links between organizational websites are used as a proxy. Indeed, extremist groups increasingly use and abuse the Internet for their propaganda and their recruitment, and also for their internal communication. The analysis includes both political parties and non-party organizations, even violent groups. In a macro-, micro-, and meso-analysis, the various specificities of the two national political sectors are demonstrated and linked to the offline reality. The Italian network appears to be very fragmented, highly diversified, and difficult to be coordinated (‘policephalous network’), whereas the German network is denser and much more concentrated on a few central actors (‘star structure’). These differences are mainly due to political opportunity structures in the two countries. Additionally, whereas the Italian network structure allows for the construction of a typology of sub-groups of organizations, the German communicative structure seems to be more erratic and less coordinated. The article also highlights the function of websites which are not related to any specific group. Indeed, these are of special importance for the far right as a political arena which is usually banned from the dominant societal discourses (if not even legally forbidden). Considering this, new modes of communication can be of greater use for extremist groups than for more traditional political actors.
Article
This article is driven by two interrelated questions. First, is the Internet enabling organizational change among traditional interest groups and political parties, such that they are starting to resemble the looser network forms characteristic of social movements? Second, what role is the Internet playing in new, conceptually intriguing citizen organizations such as MoveOn, the U.S.-based but internationally oriented entity? I develop the concept of repertoires to argue that the Internet encourages “organizational hybridity.” This captures two trends. First, established interest groups and parties are experiencing processes of hybridization based on the selective transplantation and adaptation of digital network repertoires previously considered typical of social movements. Second, new organizational forms are emerging that exist only in hybrid form and that could not function in the ways that they do without the Internet and the complex spatial and temporal interactions it facilitates. These “hybrid mobilization movements” (including MoveOn, the example considered here) blend repertoires typically associated with all three organizational types—parties, interest groups, and social movements. Moreover, I suggest that fast “repertoire switches,” spatially—between online and offline realms, and temporally—within and between campaigns, are emerging characteristics of contemporary political mobilization.
Book
Getting an innovation adopted is difficult; a common problem is increasing the rate of its diffusion. Diffusion is the communication of an innovation through certain channels over time among members of a social system. It is a communication whose messages are concerned with new ideas; it is a process where participants create and share information to achieve a mutual understanding. Initial chapters of the book discuss the history of diffusion research, some major criticisms of diffusion research, and the meta-research procedures used in the book. This text is the third edition of this well-respected work. The first edition was published in 1962, and the fifth edition in 2003. The book's theoretical framework relies on the concepts of information and uncertainty. Uncertainty is the degree to which alternatives are perceived with respect to an event and the relative probabilities of these alternatives; uncertainty implies a lack of predictability and motivates an individual to seek information. A technological innovation embodies information, thus reducing uncertainty. Information affects uncertainty in a situation where a choice exists among alternatives; information about a technological innovation can be software information or innovation-evaluation information. An innovation is an idea, practice, or object that is perceived as new by an individual or an other unit of adoption; innovation presents an individual or organization with a new alternative(s) or new means of solving problems. Whether new alternatives are superior is not precisely known by problem solvers. Thus people seek new information. Information about new ideas is exchanged through a process of convergence involving interpersonal networks. Thus, diffusion of innovations is a social process that communicates perceived information about a new idea; it produces an alteration in the structure and function of a social system, producing social consequences. Diffusion has four elements: (1) an innovation that is perceived as new, (2) communication channels, (3) time, and (4) a social system (members jointly solving to accomplish a common goal). Diffusion systems can be centralized or decentralized. The innovation-development process has five steps passing from recognition of a need, through R&D, commercialization, diffusions and adoption, to consequences. Time enters the diffusion process in three ways: (1) innovation-decision process, (2) innovativeness, and (3) rate of the innovation's adoption. The innovation-decision process is an information-seeking and information-processing activity that motivates an individual to reduce uncertainty about the (dis)advantages of the innovation. There are five steps in the process: (1) knowledge for an adoption/rejection/implementation decision; (2) persuasion to form an attitude, (3) decision, (4) implementation, and (5) confirmation (reinforcement or rejection). Innovations can also be re-invented (changed or modified) by the user. The innovation-decision period is the time required to pass through the innovation-decision process. Rates of adoption of an innovation depend on (and can be predicted by) how its characteristics are perceived in terms of relative advantage, compatibility, complexity, trialability, and observability. The diffusion effect is the increasing, cumulative pressure from interpersonal networks to adopt (or reject) an innovation. Overadoption is an innovation's adoption when experts suggest its rejection. Diffusion networks convey innovation-evaluation information to decrease uncertainty about an idea's use. The heart of the diffusion process is the modeling and imitation by potential adopters of their network partners who have adopted already. Change agents influence innovation decisions in a direction deemed desirable. Opinion leadership is the degree individuals influence others' attitudes
Article
From the Publisher:Alienating for some, yet most intimate and real for others, emerging communications technologies are creating a varied array of cyberspace experiences. Nowhere are the new and old more intertwined, as familiar narratives of the past and radical visions of the future inform our attempts to assess the impact of cyberspace on self and society. Amid the dizzying pace of technological innovation, Annette N. Markham embarks on a unique, ethnographic approach to understanding Internet users by immersing herself in online reality. The result is an engrossing narrative as well as a theoretically engaging journey. A cast of characters, the self-reflexive author among them, emerge from Markham's interviews and research to depict the complexity and diversity of Internet realities. While cyberspace is hyped as a disembodied cultural arena where physical reality can be transcended, Markham finds that to understand how people experience the Internet, she must learn how to be embodied there--a process of acculturation and immersion which is not so different from other anthropological projects of cross-cultural understanding. Both new and not-so-new, cyberspace provides a context in which we can ask new sorts of questions about all cultural experience.
Article
These are social epidemics, and the moment when they take off, when they reach their critical mass, is the Tipping Point.
Article
A central idea in marketing and diffusion research is that influentials-a minority of individuals who influence an exceptional number of their peers-are important to the formation of public opinion. Here we examine this idea, which we call the "influentials hypothesis," using a series of computer simulations of interpersonal influence processes. Under most conditions that we consider, we find that large cascades of influence are driven not by influentials but by a critical mass of easily influenced individuals. Although our results do not exclude the possibility that influentials can be important, they suggest that the influentials hypothesis requires more careful specification and testing than it has received. (c) 2007 by JOURNAL OF CONSUMER RESEARCH, Inc..
Understanding online political networks: The case of the far right and far left in Greece
  • P Agathangelou
  • I Katakis
  • L Rori
  • D Gunopulos
  • B Richards
Agathangelou, P., Katakis, I., Rori, L., Gunopulos, D. and Richards, B. (2017) 'Understanding online political networks: The case of the far right and far left in Greece', in Ciampaglia G.L., Mashhadi A., Yasseri T. (eds), Social Informatics, 9th International Conference SocInfo 2017, Proceedings Part 1, LNCS 10539, pp.162-177.
Youth and violent extremism on social media: Mapping the research
  • S Alava
  • D Frau-Meigs
  • G Hassan
Alava, S., Frau-Meigs, D. and Hassan, G. (2017) Youth and violent extremism on social media: Mapping the research, Paris: United Nations Educational, Scientific and Cultural Organization.
Migration narratives in Europe through conversations on public social media
  • Stiftung Bacamo
Bacamo and Stiftung, F.E. (2019) Migration narratives in Europe through conversations on public social media, https://www.bakamosocial.com/2018-eu-migration-study (last accessed July 29, 2019).
The alt-right twitter census: Defining and describing the audience for alt-right content on twitter
  • M J Berger
Berger, M.J. (2018) The alt-right twitter census: Defining and describing the audience for alt-right content on twitter, VOX-Pol Network of Excellence.
The Influentials: One American in ten tells the other nine how to vote, where to eat, and what to buy
  • J Berry
  • E Keller
Berry, J. and Keller, E. (2003) The Influentials: One American in ten tells the other nine how to vote, where to eat, and what to buy, New York: Free Press.
Connected: The Surprising power of our social networks and how they shape our lives
  • N Christakis
  • J Fowler
Christakis, N. and Fowler, J. (2010) Connected: The Surprising power of our social networks and how they shape our lives, Athens: Katoptro (in Greek).
From al-Zarqawi to al-Awlaki: The emergence of the Internet as a new form of violent radical milieu
  • M Conway
Conway, M. (2012) 'From al-Zarqawi to al-Awlaki: The emergence of the Internet as a new form of violent radical milieu', CTX: Combating Terrorism Exchange, 2 (4): 12-22
Violent Extremism and Terrorism Online in 2018: The Year in Review, Network of Excellence for Research in Violent Online Political Extremism
  • M Conway
Conway, M. (2019) Violent Extremism and Terrorism Online in 2018: The Year in Review, Network of Excellence for Research in Violent Online Political Extremism, Vox-Pol.
Constructing identity on social networks: An analysis of competences of communication constituted on Facebook
  • D Dobrowsky
Dobrowsky, D. (2012) 'Constructing identity on social networks: An analysis of competences of communication constituted on Facebook.com', Central European Journal of Communication, 1, pp. 91-103.