Julian Droogan's research while affiliated with Macquarie University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (15)
Little is known about which features of Facebook’s interface appeal to users of far-right extremist groups, how such features may influence a user’s interpretation of far-right extremist themes and narratives, and how this is being experienced across various nations. This paper looks at why certain ‘Reactions’ appealed to users in Australian and Ca...
This Element presents original research into how young people interact with violent extremist material, including terrorist propaganda, when online. It explores a series of emotional and behavioural responses that challenge assumptions that terror or trauma are the primary emotional responses to these online environments. It situates young people's...
Academics and policymakers recognize the absence of empirically grounded research to support the suppositions on which terrorist focused policies are based. (Sageman, Marc. 2014. “The Stagnation in Terrorism Research”. Terrorism and Political Violence 26 (4): 565–80) We developed our project, Mapping Networks and Narratives of Online Right-Wing Ext...
This chapter presents an analysis of themes related to Islamophobia in Inspire and Dabiq—two prominent English-language e-zines produced by Al-Qa’ida in the Arabia Peninsula (AQAP) and the self-proclaimed ‘Islamic State’ (IS). Both organizations used e-zines to promote their cause, celebrate their successes and inspire violence by radicalized indiv...
The advent of social media platforms has created an online environment that transcends geographic and political boundaries as well as traditional mechanisms of state-based authority. The decentralised nature of social media and its ability to disseminate content anonymously and to reach wide audiences has afforded violent extremist groups opportuni...
This paper provides an overview of the current state of terrorism in Pakistan. It argues that the Pakistani state’s complex relationship with militancy and terrorism is complicated by three long-standing drivers. These are (1) a profound obsession with and fear of Indian aggression and encirclement among the military and intelligence communities th...
Yoga is increasingly being used in India’s cultural nationalist discourse at home and soft power projection abroad, with mixed results. This paper unpacks the rise of India’s use of yoga as a form of soft power narrative through contextualising it within the a ‘soft’ Hindutva cultural nationalist discourse. It is argued that this discourse represen...
This article presents a thematic network analysis of Dabiq—a prominent English-language e-magazine produced by the Islamic State. Through formal qualitative analysis, the article examines the e-magazine’s first 13 issues in order to better understand its structure, evolution and intended audiences. In terms of structure, thematic network analysis p...
Al Qaeda in the Arabian Peninsula’s Inspire magazine has received attention within Western academia and media for its role in inspiring and instructing a series of homegrown terrorist attacks. Reporting on the magazine often characterises it as a Western-centric instrument of jihadi discourse. This characterisation, while broadly accurate, is in ne...
This paper presents a review of recent academic scholarship and debates on cyber terrorism, and more broadly of what is known about terrorist's direct use of the Internet as weapon and, less directly, as a communication device. It presents an overview of a field of discourse that has, since its inception, provided a number of foreboding and even do...
The Regional Assistance Mission to Solomon Islands (RAMSI) has provided a relative decline of violence in Honiara for over a decade. However, the combination of customary cultural practices utilised in negotiating status and power in Solomon Islands society with ongoing demographic and economic processes exacerbated by the period of foreign interve...
This paper presents the outcomes of the 2014 Countering Violent Extremism (CVE) Symposium: Partnering to Build Solutions, organised by the Centre for Policing, Intelligence and Counter Terrorism (PICT), Macquarie University. This event developed the practical and conceptual tools and context needed to provide a unique space within with diverse stak...
Citations
... This provides a useful heuristic tool for differentiating between roles that young people may adopt, and Nilan points out that followers can move back and forth between these positions. Framing of young people as 'followers' of particular groups or ideas-even hateful ones-potentially downplays the degree to which they are active participants in creating and curating the environment in which they thrive (for example, see Waldek et al. 2021). However, this does not take away from the important contribution Nilan's book makes to illuminating the mechanisms of how youth engage with the far right. ...
... Apart from the Internet and the mainstream media, hate speech in political discourse is also on the rise. Globally, political movements, parties, and politicians that oppose liberal democracy and build their support by spreading hate towards marginalised and minority groups-e.g., migrants, Muslims, Roma, and gays and lesbians-are gaining popularity (Lazaridis et al. 2016;Yerly 2022;Tejedor Calvo 2021, 2020;Ballsun-Stanton et al. 2021). This phenomenon most often is termed (far-)right or exclusionary populism, which can be defined as an ideological concept that combines anti-elitism, authoritarianism, and nativism (Mudde and Kaltwasser 2013;Mudde 2007). ...
... The sociotechnical perspective of online extremism also requires structural changes to successful CVE operations. Researchers ought to help governments draft regulations for platform providers to transparently share data that enable human oversight (Droogan & Waldek, 2019) and independent research (Cottee & Cunliffe, 2020) while protecting personal user privacy (TAT, 2021c) and avoiding empowering extremist organizations by making their content available (13.2). In return, research could also seek to inform governmental agencies on structural changes (e.g., specialized task forces, collaborations with local communities) that are suited to counter extremist movements online setup (13.4) (Droogan et al., 2018). ...
... Small, 2016), which instills a "collectivist obligation" amongst the youth to follow society's ways (Watkins & Biggs, 2001, p. 282) and, ultimately, distancing critical thinking (Feyyaz, 2016) and muting disparate voices (Zaidi et al., 2016). Moreover, Pakistan, being a developing country, faces multiple social and political issues (Droogan, 2018;Saeed et al., 2014) adding further pressure on these young minds. With technology, media, and education, the country's youth, especially majors in English, have started comparing their norms with modern values (Zubair, 2006) resulting in adjustment issues (Haidar, 2021a) which require attention and ventilation. ...
... Extremist organizations differ regarding the extent (e.g., ISIS more than Al Qaeda) and purpose for which they use online technologies in (e.g., RWE particularly invest in online learning) (Gill et al., 2017). Online technologies also offer powerful new means to counter extremism tasks in the form of monitoring and strategic communication engagement (e.g., by governments, tech companies) (Droogan et al., 2018;Ganesh & Bright, 2020) or by 'civic monitoring' from the user community who flag extremist content and accounts (Hatakka, 2020). Simultaneously, researchers criticize platform providers (Droogan et al., 2018) and governments (Reed & Ingram, 2018) for the ineptitude of their individual CVE efforts. ...
... The Prime Minister of India, Narendra Modi, has been an active promoter of yoga since mid-2010. Pushing the United Nations to accept the cultural importance of yoga and establish an International Yoga Day, Modi has proclaimed India to be the cultural ambassador of yoga (Gautam & Droogan, 2018). Modi's efforts for exporting yoga to China, Japan, and Israel has enhanced the bilateral relationships between these countries and promoted peaceful cooperation (Gautam & Droogan, 2018). ...
... Current academic debate on the Islamic State's online propaganda focuses mostly either on the content of its official productions or on the proliferation strategies employed. One example of the first tendency can be spotted in the plethora of articles discussing the narratives exploited in the e-magazines of Daesh (Wignell et al. 2017;Jacoby 2019;Droogan and Peattie 2017;Kibble 2016;Lorenzo-Dus and Macdonald 2018). Likewise, a great deal of academic attention has also been paid to understanding the specificity of the content of the Islamic State's audiovisuals Dauber et al. 2019) and audio releases (Gråtrud 2016;Pieslak and Lahoud 2018). ...
... Looking at terrorist use of the internet, despite their highly sophisticated use of the internet for recruitment, radicalisation, and propaganda [5], even the so-called Islamic State (IS) at their peak did not manage to engage in cyber-terrorism proper, see following for what that means. As Julian Droogan and Lise Waldek point out, "in the realms of academia, policy and the media [have] provided many foreboding and even doomsday warnings about the future of cyber-terrorism, which in the main have failed to come to realization" [16]. So-called IS used cyberspace to motivate and guide a range of terrorist acts [5], and as counter-terrorism actors stepped up their actionsincluding actions in cyberspace-to disrupt larger high profile terrorist activities around the world [7], so-called IS evolved their strategies [29][30][31] to encourage low technology small group acts of terrorism, using whatever technologies they had at hand-as a spokesperson for so-called IS stated in 2014, "If you are not able to find an IED or a bullet, then single out the disbelieving American, Frenchman, or any of their allies. ...
... Content analysis is used in diverse ways, extending from written texts (Bartley 2022;Ingram 2021;Novenario 2016) to auditory texts (Kuznar 2017) and visual-audio texts [videos] (Barr and Herfroy-Mischler 2018). Additionally, a host of other methods and frameworks have been applied, such as grounded theory (Foy 2015), social movement theory (Pelletier et al. 2016), interviews (Winter 2015), multiple discourse analysis (O'Halloran et al. 2019), cyclical cognitive reinforcement (Ingram 2017), and thematic network analysis (Droogan and Peattie 2018). ...
... Of course, the reasons for conflict are often complex, rooted in uneven development, internal migration, unequal levels of access to resources and the like. Migrants are often restricted in their access to land; for those 'settlers' who have access it is often unstable; and land has emerged as the basis for a politics of exclusion based on indigeneity (Allen, 2012;Droogan and Waldek, 2015). ...