Information Systems Frontiers

, Volume 13, Issue 1, pp 75–88 | Cite as

A multi-region empirical study on the internet presence of global extremist organizations

  • Jialun Qin
  • Yilu Zhou
  • Hsinchun Chen


Extremist organizations are heavily utilizing Internet technologies to increase their abilities to influence the world. Studying those global extremist organizations’ Internet presence would allow us to better understand extremist organizations’ technical sophistication and their propaganda plans. In this work, we explore an integrated approach for collecting and analyzing extremist Internet presence. We employed automatic Web crawling techniques to build a comprehensive international extremist Web collection. We then used a systematic content analysis tool called the Dark Web Attribute System to analyze and compare these extremist organizations’ Internet usage from three perspectives: technical sophistication, content richness, and Web interactivity. By studying 1.7 million multimedia Web documents from around 224 Web sites of extremist organizations, we found that while all extremist organizations covered in this study demonstrate high level of technical sophistication in their Web presence, Middle Eastern extremists are among the most sophisticated groups in both technical sophistication and media richness. US groups are the most active in supporting Internet communications. Our analysis results will help domain experts deepen their understanding on the global extremism movements and make better counter-extremism measures on the Internet.


Extremism Internet Web mining 


  1. 9/11 Commision Report. (2004). Published by the National Commission on Terrorist Attacks Upon the United States, available at
  2. Albertsen, K. (2003). The Paradigma Web Harvesting Environment. In Proc. of 3rd European Conference of Research and Advanced Technology for Digital Libraries (ECDL) Workshop on Web Archives 2003.Google Scholar
  3. Armstrong, H. L., & Forde, P. J. (2003). Internet anonymity practices in computer crime. Information Management & Computer Security, 11(5), 209–215.CrossRefGoogle Scholar
  4. Bowers, F. (2004). Terrorists spread their messages online. Christian Science Monitor, July 28, 2004, available at
  5. Bunt, G. R. (2003). Islam in the Digital Age: E-jihad, Online Fatwas and Cyber Islamic Environments. London: Pluto Press.Google Scholar
  6. Burris, V., Smith, E., & Strahm, A. (2000). White supremacist networks on the Internet. Sociological focus, 33(2), 215-234.Google Scholar
  7. Chau, M., & Chen, H. (2003). Comparison of three vertical search spiders. IEEE Computer, 36, 56–62.Google Scholar
  8. Chau, M., Qin, J., Zhou, Y., Tseng, C., & Chen, H. (2008). SpidersRUs: creating specialized search engines in multiple languages. Decision Support Systems, 45, 621–640.CrossRefGoogle Scholar
  9. Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (2004). The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web. In Proc. of International IEEE Conference on Intelligent Transportation Systems.Google Scholar
  10. Chou, C. (2003). Interactivity and interactive functions in web-based learning systems: a technical framework for designers. British Journal of Educational Technology, 34(3), 265–279.CrossRefGoogle Scholar
  11. Coll, S. & Glasser, S. B. (2005). Terrorists Turn to the Web as Base of Operations. Washington Post, Aug 7, 2005.Google Scholar
  12. Demchak, C., Friis, C., & La Porte, T. M. (2001). Webbing governance: National differences in constructing the face of public organizations. Handbook of public information systems. G. D. Garson. NYC: Marcel Dekker.Google Scholar
  13. Denning, D. E. (2004). Information Operations and Terrorism,” Journal of Information Warfare (draft), 2004, available at
  14. Gerstenfeld, P. B., Grant, D. R., & Chiang, C. (2003). Hate Online: A Content Analysis of Extremist Internet Sites. Analyses of Social Issues and Public Policy, 3(1), 29-44.CrossRefGoogle Scholar
  15. Internet Haganah, Internet Haganah report, 2005, available at
  16. ISTS (2004). Examining the Cyber Capabilities of Islamic Terrorist Groups”. Report, Institute for Security Technology Studies, 2004.
  17. Jenkins, B. M. (2004). World becomes the hostage of media-savvy terrorists: Commentary. USA Today, August 22, 2004.
  18. Kleinberg, J. (1999). Authoritative Sources in a Hyperlinked Environment. Journal of the ACM, 46(5), 604-632.CrossRefGoogle Scholar
  19. Muriel, D. (2004). Terror Moves to the Virtual World. CNN News, April 8, 2004, available at
  20. Nunnelly, J. (1978). Psychometric theory. New York: McGraw Hill.Google Scholar
  21. Palmer, J. W., & Griffith, D. A. (1998). An emerging model of Web site design for marketing. Communications of the ACM, 41(3), 45–51.CrossRefGoogle Scholar
  22. Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and Web interactivity. International Journal on Human Computer Studies, 65(1), 71–84.CrossRefGoogle Scholar
  23. Schneider, S. M., Foot, K., Kimpton, M., & Jones, G. (2003). Building thematic web collections: Challenges and experiences from the September 11 Web Archive and the Election 2002 Web Archive. In Proc. of the 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.Google Scholar
  24. SITE (2004). Special report published by SITE Institute,
  25. Thomas, T. L. (2003). Al Qaeda and the Internet: The Danger of ‘Cyberplanning’. Parameters, Spring 2003, pp. 112–23, available at
  26. Tsfati, Y., & Weimann, G. (2002). terror on the internet. Studies in Conflict & Terrorism, 25, 317–332.CrossRefGoogle Scholar
  27. Weimann, G. (2004). How modern terrorism use the internet. Special Report, U.S. Institute of Peace. Available at
  28. Whine, M. (1999). Cyberspace: A new medium for communication, command and control by extremists. Available at
  29. Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). U.S. domestic extremist groups on the Web: link and content analysis. IEEE Intelligent Systems Special Issue on Homeland Security, 20(5), 44–51.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Operations and Information Systems DepartmentUniversity of Massachusetts LowellLowellUSA
  2. 2.Information Systems and Technology ManagementGeorge Washington UniversityWashingtonUSA
  3. 3.Department of Management Information SystemsThe University of ArizonaTucsonUSA

Personalised recommendations