Advertisement

Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into Extremism

  • Yeslam Al-Saggaf
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 255)

Abstract

The aim of this paper is to propose a methodology to understand the grievances that radical groups could invoke to win the sympathy of youth, differentiate radicalised from non-radicalised individuals using signatures of personality and identify indicators of transition from radicalisation into extremism. The grievances of youth, techniques for identifying radicalised youth and indicators of transition to extremism have not been studied before. This is also the first time that a methodology for tracing radicalisation along a continuum (from when youth express grievances, to when they become radicalised, to when they transition into extremism) has been proposed. The methodology makes a significant contribution to the available strategies for studying online radicalisation.

Keywords

Online radicalisation Extremism Terrorism Grievances Machine learning algorithms for text classification Stylometric signatures of personality Critical slowing down near tipping points 

Notes

Acknowledgments

The author wishes to thank Prof Terry Bossomaier (Charles Sturt University) for his contribution and A/Prof Patrick Walsh (Charles Sturt University) and Rachel MacCulloch (Charles Sturt University) for their helpful comments and suggestions.

References

  1. 1.
    Al-Saggaf, Y.: Understanding online radicalisation using data science. Int. J. Cyber Warf. Terror. (IJCWT) 6(4), 12–27 (2016)Google Scholar
  2. 2.
    Bergin, A.: The internet as a platform for radicalisation. In: Proceedings of the Strategic Policy Forum, 5 May 2009, pp. 1–2. Australian Strategic Policy Institute, Perth (2009)Google Scholar
  3. 3.
    Bermingham, A., Conway, M., McInerney, L., O’Hare, N., Smeaton, A.F.: Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In: International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009, pp. 231–236. IEEE, July 2009Google Scholar
  4. 4.
    Edwards, C., Gribbon, L.: Pathways to violent extremism in the digital era. RUSI J. 158(5), 40–47 (2013)Google Scholar
  5. 5.
    Reynolds, T.: Ethical and legal issues surrounding academic research into online radicalisation: a UK experience. Crit. Stud. Terror. 5(3), 499–513 (2012)Google Scholar
  6. 6.
    Scanlon, J.R., Gerber, M.S.: Forecasting violent extremist cyber recruitment. IEEE Trans. Inf. Forensics Secur. 10(11), 2461–2470 (2015)Google Scholar
  7. 7.
    Spaaij, R., Hamm, M.S.: Key issues and research agendas in lone wolf terrorism. Stud. Confl. Terror. 38(3), 167–178 (2015)Google Scholar
  8. 8.
    Torok, R.: Discourses of terrorism: the role of Internet technologies (social media and online propaganda) on Islamic radicalisation, extremism and recruitment post 9/11. Unpublished PhD Thesis. Edith Cowan University (2016)Google Scholar
  9. 9.
    Wadhwa, P., Bhatia, M.P.S.: Tracking on-line radicalization using investigative data mining. In: 2013 National Conference on Communication (NCC), pp. 1–5. IEEE, February 2013Google Scholar
  10. 10.
    Aly, A.: Online radicalisation and the Muslim Diaspora. In: Proceedings of the Strategic Policy Forum, pp. 7–8. Australian Strategic Policy Institute, Perth, Australia, 5 May 2009Google Scholar
  11. 11.
    McCauley, C., Moskalenko, S.: Mechanisms of political radicalization: pathways toward terrorism. Terror. Politi. Violence 20(3), 415–433 (2008)Google Scholar
  12. 12.
    Borum, R.: Radicalization into violent extremism I: a review of social science theories. J. Strat. Secur. 4(4), 7–36 (2011).  https://doi.org/10.5038/1944-0472.4.4.1Google Scholar
  13. 13.
    Upal, M.A.: Confronting Islamic Jihadist movements. J. Terror. Res. 6(2), 57–69 (2015)Google Scholar
  14. 14.
    Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Secur. Inf. 3(1), 1–10 (2014)Google Scholar
  15. 15.
    Kernot, D., Bossomaier, T., Bradbury, R.: Novel text analysis for investigating properties of self: did Shakespeare and Thomas Kyd write Edward III? (2017)Google Scholar
  16. 16.
    Kernot, D., Bossomaier, T., Bradbury, R.: Stylometric techniques for multiple author clustering: Shakespeare‘s authorship in the Passionate Pilgrim. Int. J. Adv. Comput. Sci. Appl. 8, 1–8 (2017)Google Scholar
  17. 17.
    Kernot, D., Bossomaier, T., Bradbury, R.: Novel text analysis for investigating personality: identifying the dark lady in Shakespeare’s Sonnets. J. Quant. Linguist. 24, 255–272 (2017)Google Scholar
  18. 18.
    Kernot, D., Bossomaier, T., Bradbury, R.: The impact of depression and apathy on sensory language. Open J. Modern Linguist. 7, 8–32 (2017)Google Scholar
  19. 19.
    Scheffer, M., et al.: Anticipating critical transitions. Science 338, 344–348 (2012)Google Scholar
  20. 20.
    Al-Saggaf, Y., Kharabsheh, R.: Political online communities in Saudi Arabia: the major players. In: Hongladarom, S. (ed.) Proceedings of the Third Asia Pacific Computing and Philosophy Conference, pp. 27–47. The Center for Ethics of Science and Technology, Chulalongkorn University, Bangkok (2009)Google Scholar
  21. 21.
    Al-Saggaf, Y., Weckert, J.: Political online communities (POCs) in Saudi Arabia. In: Marshall, S., Taylor, W., Yu, X. (eds.) Encyclopaedia of Developing Regional Communities with ICT, pp. 557–563. Idea Group Reference, Hershey (2006)Google Scholar
  22. 22.
    Al-Saggaf, Y.: Exploring political online forums in Saudi Arabia through thematic content analysis. In: Hongladarom, S. (ed.) Computing and Philosophy in Asia, pp. 13–30. Cambridge Scholars Publishing, Newcastle (2007)Google Scholar
  23. 23.
    Al-Saggaf, Y., Simmons, P.: Social media in Saudi Arabia: exploring its use during two natural disasters. Technol. Forecast. Soc. Chang. 95, 3–15 (2015).  https://doi.org/10.1016/j.techfore.2014.08.013Google Scholar
  24. 24.
  25. 25.
    Torok, R.: Developing an explanatory model for the process of online radicalisation and terrorism. Secur. Inf. 2(1), 1–10 (2013)Google Scholar
  26. 26.
    Del Vicario, M., et al.: The spreading of misinformation online. PNAS Early Ed. 113(3), 554–559 (2016)Google Scholar
  27. 27.
    Ramswell, P.Q.: The utilization and leveraging of grievance as a recruitment tool and justification for terrorist acts committed by Islamic extremists. Small Wars J. (2014). http://smallwarsjournal.com/jrnl/art/the-utilization-and-leveraging-of-grievance-as-a-recruitment-tool-and-justification-for-ter
  28. 28.
    Bradbury, R., Bossomaier, T., Kernot, D.: Predicting the emergence of self-radicalisation through social media: a complex systems approach. In: Conway, M., Jarvis, L., Lehane, O., Macdonald, S., Nouri, L. (eds.) Terrorists’ use of the internet: assessment and response, pp. 379–389. IOS Press, Amsterdam (2017)Google Scholar
  29. 29.
    Kernot, D., Bossomaier, T., Bradbury, R.: The stylometric impacts of ageing and life events on identity. J. Quant. Linguist. (2017).  https://doi.org/10.1080/09296174.2017.1405719Google Scholar
  30. 30.
  31. 31.
    Wilson, R.E., Gosling, S.D., Graham, L.T.: A review of Facebook research in the social sciences. Perspect. Psychol. Sci. 7(3), 203–220 (2012)Google Scholar
  32. 32.
    Bandura, A.: Selective moral disengagement in the exercise of moral agency. J. Moral Educ. 31, 101–119 (2002)Google Scholar
  33. 33.
    Al-Saggaf, Y., Chutikulrungsee, T.T.: Twitter usage in Australia and Saudi Arabia and influence of culture: an exploratory cross-country comparison. In: Paterno, D., Bourk, M., Matheson, D. (eds.) Refereed proceedings of the Australian and New Zealand Communication Association Conference: Rethinking communication, space and identity (2015). http://www.anzca.net/conferences/past-conferences/
  34. 34.
    Al-Saggaf, Y., Himma, K., Kharabsheh, R.: Political online communities in Saudi Arabia: the major players. J. Inf. Commun. Eth. Soc. 6(2), 127–140 (2008)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.School of Computing and MathematicsCharles Sturt UniversityWagga WaggaAustralia

Personalised recommendations