Abstract
This chapter critically examines the role that the Internet and the Internet of Things (IoT) play in violent extremism. The chapter specifically focuses on arguments surrounding radicalisation as a pathway to terrorism and how individuals become radicalised due to different radicalisation processes and theories. Based on this critical analysis, the chapter argues that the Internet plays a key role in radicalisation to violent extremism due to several approaches. Issues highlighted in this chapter mainly focusses on the struggles of social media (SM) moderation and regulations. Furthermore, the chapter discusses how the IoT can aid SM regulation to reduce online radicalisation to violent extremism through artificial intelligence (AI) and machine learning (ML) technology. It will be argued how AI and ML could be deployed to reduce terrorist content online, making social media platforms (SMPs) a safer cyber space for individuals to operate within.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ali M (2015) ISIS and propaganda: how ISIS exploits women. Reuters Inst Study Journal 10–11
Al-Rawi A (2018) Video games, terrorism, and ISIS’s Jihad 3.0. Terror Polit Violence 30(4):740–760
Aly A, Macdonald S, Jarvis L, Chen TM (2017) Introduction to the special issue: terrorist online propaganda and radicalization
Amedie J (2015) The impact of social media on society
Anglano C, Canonico M, Guazzone M (2017) Forensic analysis of telegram messenger on android smartphones. Digit Investig 23:31–49
Anumala H, Busetty SM (2015) Distributed device health platform using Internet of Things devices. In: 2015 IEEE International conference on data science and data intensive systems, pp 525–531
Archetti C (2013) Terrorism, communication, and the media. In: Understanding terrorism in the age of global media, pp 32–59
Baruah TD (2012) Effectiveness of social media as a tool of communication and its potential for technology enabled connections: a micro-level study. Int J Sci Res Publ 2(5):1–10
Baugut P, Neumann K (2020) Online news media and propaganda influence on radicalized individuals: findings from interviews with Islamist prisoners and former Islamists. New Media Soc 22(8):1437–1461
Baumeister RF, Leary MR (1995) The need to belong: desire for interpersonal attachments as a fundamental human motivation. Psychol Bull 117(3):497
Benigni MC, Joseph K, Carley KM (2017) Online extremism and the communities that sustain it: detecting the ISIS supporting community on Twitter. PLoS ONE 12(12):e0181405
Bertram L (2015) How could a terrorist be de-radicalised? Jo Deradic 5:120–149
Bertram L (2016) Terrorism, the Internet and the social media advantage: exploring how terrorist organizations exploit aspects of the Internet, social media and how these same platforms could be used to counter-violent extremism. J Deradic 7:225–252
Bjelopera JP (2012) The domestic terrorist threat: background and issues for congress
Bloom M, Tiflati H, Horgan J (2019) Navigating ISIS’s preferred platform: Telegram1. Terror Polit Violence 31(6):1242–1254
Blum A (2007) Machine learning theory. Carnegie Melon University, School of Computer Science, p 26
Borum R (2014) Psychological vulnerabilities and propensities for involvement in violent extremism. Behav Sci Law 32(3):286–305
Butler AS, Panzer AM, Goldfrank LR (2003) Understanding the psychological consequences of traumatic events, disasters, and terrorism. In: Preparing for the psychological consequences of terrorism: a public health strategy
Christensen G (2019) Artificial Intelligence of Things (AIoT). IoT agenda. https://internetofthingsagenda.techtarget.com/definition/Artificial-Intelligence-of-Things-AIoT
Christmann K (2012) Preventing religious radicalisation and violent extremism: a systematic review of the research evidence
Cohen-Almagor R (2005) Media coverage of terror: troubling episodes and suggested guidelines. Can J Commun 30(3):383–409
Conway M, Dillon J (2019) Future trends: live-streaming terrorist attacks? VOX-Pol
Counter Terrorism Policing (2018) Specialist unit tackles online extremism. https://www.counterterrorism.police.uk/specialist-unit-tackles-online-extremism/
Crenshaw M (1981) The causes of terrorism. Comp Polit 13(4):379–399
Crosby F (1976) A model of egoistical relative deprivation. Psychol Rev 83(2):85
D’Souza SM (2015) Online radicalisation and the specter of extremist violence in India. Mantraya Brief (1)
Dekel R, Nuttman-Shwartz O (2009) Posttraumatic stress and growth: the contribution of cognitive appraisal and sense of belonging to the country. Health Soc Work 34(2):87–96
Diener E (1979) Deindividuation, self-awareness, and disinhibition. J Pers Soc Psychol 37(7):1160
D’Incau F, Soesanto S (2017) Countering online radicalisation [Blog]. https://ecfr.eu/article/commentary_countering_digital_radicalisation_7216/
Donovan J, Lewis B, Friedberg B (2018) Parallel ports. Sociotechnical change from the Alt-Right to Alt-Tech. In: Post-digital cultures of the far right. transcript-Verlag, pp 49–66
Doosje B, Moghaddam FM, Kruglanski AW, De Wolf A, Mann L, Feddes AR (2016) Terrorism, radicalization and de-radicalization. Curr Opin Psychol 11:79–84
Doosje B, van den Bos K, Loseman A, Feddes AR, Mann L (2012) “My in-group is superior!”: susceptibility for radical right-wing attitudes and behaviors in Dutch youth. Negot Confl Manag Res 5(3):253–268
Douglas K (2010) Deindividuation. Encyclopaedia Britannica. https://www.britannica.com/topic/deindividuation#ref310686
Facebook Community Standards (n.d.) Objectional content. Hate speech. Community Standards (facebook.com)
Ganor B (2002) Defining terrorism: is one man’s terrorist another man’s freedom fighter? Police Pract Res 3(4):287–304
Gaydhani A, Doma V, Kendre S, Bhagwat L (2018) Detecting hate speech and offensive language on twitter using machine learning: an n-gram and tf-idf based approach. arXiv:1809.08651
Gill P (2007) A multi-dimensional approach to suicide bombing. Int J Confl Violence (IJCV) 1(2):142–159
Gill P, Horgan J, Deckert P (2014) Bombing alone: tracing the motivations and antecedent behaviors of lone-actor terrorists. J Forensic Sci 59(2):425–435
Gillis A (2020) Internet of things. IoT agenda. What is IoT (Internet of Things) and how does it work? (techtarget.com)
Goldberg ME, Gorn GJ (1987) Happy and sad TV programs: how they affect reactions to commercials. J Consum Res 14(3):387–403
Goodwin MJ (2011) New British fascism: rise of the British National Party. Routledge
Gray DH, Head A (2009) The importance of the Internet to the post-modern terrorist and its role as a form of safe haven. Eur J Sci Res 25(3):396–404
Grusin R (2010) Premediation: affect and mediality after 9/11. Springer
Guelke A (2009) The new age of terrorism and the international political system. IB Tauris
Hardy K (2018) Comparing theories of radicalisation with countering violent extremism policy. J Deradic 15:76–110
Hariman R, Lucaites JL (2007) No caption needed: iconic photographs, public culture, and liberal democracy. University of Chicago Press
Hasim NNM, Mohamed H, Ibrahim J (2016) The effect and challenges of online radicalization on modern day society. Int J Inf Commun Technol 6(12)
Hogg MA (2020) Uncertain self in a changing world: a foundation for radicalisation, populism, and autocratic leadership. Eur Rev Soc Psychol 1–34
Hogg MA, Kruglanski A, Van den Bos K (2013) Uncertainty and the roots of extremism. J Soc Issues 69(3):407–418
Home Office (2011) The prevent strategy. Crown Publishing Group, London, pp 107–108
Hudson RA (1999) The sociology and psychology of terrorism: who becomes a terrorist and why? Federal Research Div., Library of Congress, Washington DC
Hussin S (2018) Singapore’s approach to countering violent extremism. Combatting violent extremism and terrorism in Asia and Europe. Konrad Adenauer Stiftung, p 171
Jones S (2009) Radicalisation in Denmark. Renewal 17(1):22–28
Jones S (2018) Radicalisation in the Philippines: the Cotabato Cell of the “East Asia Wilayah.” Terror Polit Violence 30(6):933–943
Jowett GS, O’donnell V (2018) Propaganda & persuasion. Sage Publications
Koehler D (2014) The radical online: individual radicalization processes and the role of the Internet. J Deradic 1:116–134
Kovács A (2015) The ‘new jihadists’ and the visual turn from al-Qa’ida to ISIL/ISIS/Da’ish. Bitzpol Aff 2(3):47–69
Krona M (2020) Collaborative media practices and interconnected digital strategies of Islamic State (IS) and Pro-IS supporter networks on telegram. Int J Commun 14:1888–1910
Kundnani A (2012) Radicalisation: the journey of a concept. Race Class 54(2):3–25
Macdonald S, Correia SG, Watkin AL (2019) Regulating terrorist content on social media: automation and the rule of law. Int J Law Context 15(2):183–197
McCauley C, Moskalenko S (2008) Mechanisms of political radicalization: pathways toward terrorism. Terror Polit Violence 20(3):415–433
Milmo C (2014) Iraq crisis exclusive: Isis jihadists using World Cup and Premier League hashtags to promote extremist propaganda on Twitter. The Independent
Moghaddam FM (2008) How globalization spurs terrorism: the lopsided benefits of “one world” and why that fuels violence. Praeger Security International
Moghaddam FM, Heckenlaible V, Blackman M, Fasano S, Dufour DJ (2016) Globalization and terrorism. Soc Psychol Good Evil 415
Neo LS, Dillon L, Khader M (2017) Identifying individuals at risk of being radicalised via the Internet. Secur J 30(4):1112–1133
Patrikarakos D (2018) Web 2.0: the new battleground. Armed Confl Surv 4(1):51–64
Radicalisation Awareness Network (2017) Working with families and safeguarding children from radicalisation. https://bit.ly/2UEP29a
Ramakrishna K (2011) Self-radicalisation and the Awlaki connection. In: Strategic currents. ISEAS Publishing, pp 140–142
Sageman M (2004) Understanding terror networks. University of Pennsylvania Press
Sageman M (2008) A strategy for fighting international Islamist terrorists. Ann Am Acad Pol Soc Sci 618(1):223–231
Salahuddin M, Alam K (2015) Internet usage, electricity consumption and economic growth in Australia: a time series evidence. Telemat Inform 32(4):862–878
Schmid AP (2013) Radicalisation, de-radicalisation, counter-radicalisation: a conceptual discussion and literature review. ICCT Res Paper 97(1):22
Schroeter M (2020) Global network on extremism & technology. Artificial intelligence and countering violent extremism: a primer. GNET-Report-Artificial-Intelligence-and-Countering-Violent-Extremism-A-Primer_V2.pdf
Silber MD, Bhatt A, Analysts SI (2007) Radicalization in the West: the homegrown threat. Police Department, New York, pp 1–90
Smith BL (2020) Propaganda. Encyclopaedia Britannica. Propaganda | Definition, history, techniques, examples, & facts | Britannica
Spears R, Lea M, Lee S (1990) De-individuation and group polarization in computer-mediated communication. Br J Soc Psychol 29(2):121–134
Speckhard A, Ellenberg M (2020) Is Internet recruitment enough to seduce a vulnerable individual into terrorism. Homeland Security Today
Statista (2020) Global digital population as of October 2020 [Graph]. https://www.statista.com/statistics/617136/digital-population-worldwide/
Stewart BB, Thompson JW (2002) U.S. Patent No. 6,414,635. U.S. Patent and Trademark Office, Washington, DC. 1498394371873592871-06414635 (storage.googleapis.com)
Striegher JL (2015) Violent-extremism: an examination of a definitional dilemma
Suler J (2004) The online disinhibition effect. Cyberpsychol Behav 7(3):321–326
Tajfel H, Turner J (1986) The social identity theory of intergroup behavior. Psychology of intergroup relations
Terrorism Act 2000 (TACT) https://www.legislation.gov.uk/ukpga/2000/11/section/1#:~:text=(1)In%20this%20Act%20%E2%80%9C,section%20of%20the%20public%2C%20and
Thomas TL (2003) Al Qaeda and the Internet: the danger of ‘cyber planning’. Foreign Military Studies Office (ARMY) Fort Leavenworth Ks
Torok R (2013) Developing an explanatory model for the process of online radicalisation and terrorism. Secur Inform 2(1):6
Trip S, Bora CH, Marian M, Halmajan A, Drugas MI (2019) Psychological mechanisms involved in radicalization and extremism. A rational emotive behavioral conceptualization. Fronti Psychol 10:437
Tzezana R (2016) Scenarios for crime and terrorist attacks using the Internet of Things. Eur J Futures Res 4(1):18
United Nations Office on Drugs and Crime (2012) Use of the Internet for terrorist purposes
Van den Bos K (2018) Why people radicalize: how unfairness judgments are used to fuel radical beliefs, extremist behaviors, and terrorism. Oxford University Press
Villasenor J (2020) How to deal with AI-enabled disinformation. Brookers
Vincent J (2019) Facebook bans UK’s biggest far-right organizations, including EDL, BNP, and Britain First [Blog]. https://www.theverge.com/2019/4/18/18484623/facebook-bans-uk-far-right-groups-leaders-edl-bnp-britain-first
Weimann G (2004) www.terror.net: how modern terrorism uses the Internet, vol 31. United States Institute of Peace
Weimann G (2006) Virtual disputes: the use of the Internet for terrorist debates. Stud Confl Terror 29(7):623–639
Weimann G (2014) New terrorism and new media, vol 2. Commons Lab of the Woodrow Wilson International Center for Scholars, Washington, DC
Weimann G (2016) Going dark: terrorism on the dark web. Stud Confl Terror 39(3):195–206
Wibisono S, Louis WR, Jetten J (2019) A multi-dimensional analysis of religious extremism. Front Psychol 10:2560
Wiktorowicz Q (ed) (2004) Islamic activism: a social movement theory approach. Indiana University Press
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Bamsey, O., Montasari, R. (2023). The Role of the Internet in Radicalisation to Violent Extremism. In: Montasari, R., Carpenter, V., Masys, A.J. (eds) Digital Transformation in Policing: The Promise, Perils and Solutions. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-09691-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-031-09691-4_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-09690-7
Online ISBN: 978-3-031-09691-4
eBook Packages: Computer ScienceComputer Science (R0)