Paul Gill's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publication (1)
Many researchers, practitioners, and policy-makers continue to raise questions about the role of the Internet in facilitating violent extremism and terrorism. A surge in research on this issue notwithstanding, relatively few empirically-grounded analyses are yet available. This chapter provides researchers with five key suggestions for progressing...
Citations
... Over the past decade, related research begun to emerge more rapidly accompanied by ISIS' dominant rise in online terrorism and the ever-growing presence of online right-wing extremism (RWE) (Conway, 2018). Accordingly, our own review of the number of articles that were published on online extremism or terrorism over the past 15 years Despite the rapid academic advances that inform counter extremist activities, the augmenting impact of digital technologies (e.g., social media, encrypted messaging, artificial intelligence, blockchain) for extremism and the novel support that digital technologies afford countermeasures have not yet been fully explored (Conway, 2017;Khalil, 2021;Scrivens et al., 2020;Winter et al., 2020). A recent literature review ascertains that one of the greatest remaining challenges of online extremism is the rapidly changing technological landscape (Winter et al., 2020). ...