Why do online countering violent extremism strategies not work? The case of digital jihad

M Lakomy - Terrorism and political violence, 2023 - Taylor & Francis
This article discusses the reasons why content moderation and control in cyberspace, being
a primary means of online countering violent extremism (CVE), does not work as intended. It …

How the Iraqi Kurdistan Independence Debate Came to DieWestern IR Scholars as Co-Protagonists of the Nationalist Conflicts They Set Out to Describe

H Černy - Variations on Sovereignty, 2023 - taylorfrancis.com
This chapter casts light on the understudied and rarely problematised role of scholars
shaping perceptions of peoples in nationalist conflicts through their methodological …

'Was the “Islamic State” a State?'Claiming, Contesting, and Creating Jihadist Statehood

M Grasten, J Grzybowski - Variations on Sovereignty, 2023 - taylorfrancis.com
The so-called 'Islamic State in Iraq and Syria'(ISIS) gained global attention not only due to its
display of gruesome violence and spectacular military successes, but also its audacious …

Dark web jihad: exploring the militant Islamist information ecosystem on The Onion Router

M Lakomy - Behavioral Sciences of Terrorism and Political …, 2024 - Taylor & Francis
This paper maps communication channels exploited by the Salafi-jihadist violent extremist
organisations (VEOs) and their followers between March 2020 and June 2022 on The Onion …

[PDF][PDF] Visual representations of martyrdom: Comparing the symbolism of Jihadi and far-right online martyrologies

N Miotto - Journal for Deradicalization, 2022 - journals.sfu.ca
Martyrologies are often associated with Jihadi propaganda. From Al-Qaeda to the Islamic
State, Islamist groups have been widely spreading their cult of martyrs through e-magazines …

The virtual" Caliphate" strikes back? Mapping the Islamic State's information ecosystem on the surface web

M Lakomy - Security Journal, 2023 - Springer
This study maps the surface web information ecosystem exploited by the Islamic State (IS)
and its followers between December 2020 and June 2021. Open-source intelligence …

Open-source intelligence and research on online terrorist communication: Identifying ethical and security dilemmas

M Lakomy - Media, War & Conflict, 2024 - journals.sagepub.com
This article explores key ethical and security challenges related to exploitation of open-
source intelligence (OSINT) in research on online terrorist propaganda. In order to reach this …

[图书][B] The West: A new history of an old idea

N Mac Sweeney - 2023 - books.google.com
* A BBC RADIO 4 Book of the Week*'A fantastic achievement'Peter Frankopan, author of The
Silk Roads' Bright, expansive, and iconoclastic, this deliciously witty book has the potential …

Verbal attacks on terrorist groups increase violence against civilians

I Iliev, N Bet Younadam, BJ Kinne - PNAS nexus, 2024 - academic.oup.com
Terrorists and other transnational extremist groups are responsible for thousands of civilian
deaths. In confronting extremists, governments have relied heavily on threats, demands …

The Threats and Current Practices of Malicious Use of Artificial Intelligence in Psychological Security in China

D Bazarkina, EA Mikhalevich, E Pashentsev… - The Palgrave Handbook …, 2023 - Springer
This chapter examines the current and future threats to China's psychological security
caused by the malicious use of artificial intelligence (MUAI), as well as the response …