Abstract
This review will examine the academic literature over which role the internet has in the evolution of extremism and terrorism since its advent. It will compare two different approaches. The first claims that the internet is a major factor that facilitates ideas and narratives, which can lead to the rise of extremism and terrorism. The second, which in its turn contradicts this approach, argues that prior the advent of the internet extremists and terrorists where more successful into achieving their goals. For that reason, the review will be split into 3 sections. The first section will be examining some needed key definitions of what constitutes terrorism and extremism. Afterwards the essay will shift its approach towards the main debate of whether the internet has a causal link with extremism and terrorism or not. Therefore Sect. 2 brings forth the ways, in which the internet has helped terrorism to advance its goals. Moving on to the third section, this piece of work will discuss the approach in which the internet does not assist extremist narratives but, in the contrary helps the advancement of better research around it and its prevention. Lastly, the review will sum up over the literature that has been discussed and conclude that there is always space for future research.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Aly A, Macdonald S, Jarvis L, Chen T (2016) Introduction. In: Aly A, MacDonald S, Jarvis L, Chen T (eds) Terrorism online: politics, law and technology. Routledge, Abingdon, Oxon, pp 1–7
Archetti C (2015) Terrorism, Communication and New Media: explaining radicalization in the digital age, Perspectives On Terrorism, 9(1), 49–56
Atwan AB (2015) Islamic state: the digital caliphate. University of California Press
Bandura A (2002) Selective moral disengagement in the exercise of moral agency. J Moral Educ 31(2):101–119. https://doi.org/10.1080/0305724022014322
Benson DC (2014) Why the Internet is not increasing terrorism. Secur Stud 23(2):293–328. https://doi.org/10.1080/09636412.2014.905353
Brooking E (2014) The ISIS propaganda machine is horrifying and effective. How does it work? Council on Foreign Relations Blog. http://blogs.cfr.org/davidson/2014/08/21/the-isis-propaganda-machine-is-horrifying-and-effective-how-does-it-work/. Accessed 20 Dec 2021
Camstoll Group (2016) Use of social media by terrorist fundraisers and financiers. Los Angeles and Washington, D.C. https://www.camstoll.com/wpcontent/uploads/2016/04/Social-Media-Report4.22.16.pdf. Accessed 29 Nov 2021
Conway M (2017) Determining the role of the Internet in violent extremism and terrorism: six suggestions for progressing research. Stud Confl Terror 40(1):77–98. https://doi.org/10.1080/1057610X.2016.1157408
Conway M (2012) From Al-Zarqawi to Al-Awlaki: the emergence of the internet as a new form of violent radical milieu
Crenshaw M (1981) The causes of terrorism. Comp Polit 13(4):379–399. https://doi.org/10.2307/421717
Frissen T (2021) Internet, the great radicalizer? Exploring relationships between seeking for online extremist materials and cognitive radicalization in young adults. Comput Human Behav 114:1–10. https://doi.org/10.1016/j.chb.2020.106549
Goldman ZK, Maruyama E, Rosenberg E, Saravalle E, Solomon-Strauss J (2017) Terrorist use of virtual currencies: containing the potential threat. Washington, DC. http://www.lawandsecurity.org/wp-content/uploads/2017/05/CLSCNASReportTerroristFinancing-Final.pdf. Accessed 29 Dec 2021
Helfstein S (2009) Governance of terror: new institutionalism and the evolution of terrorist organizations. Public Adm Rev 69(4):727–739
Holbrook D (2013) Far right and islamist extremist discourses: shifting patterns of enmity. In: Max Taylor PMC, Donald H (eds) extreme right wing political violence and terrorism, London: Bloomsbury Academic, 215–37
Hughes S, Meleagrou-Hitchens A (2017) The threat to the United States from the Islamic State’s virtual entrepreneurs. Combat Terror Center Sentin 10(31):1–8
Jacobson M (2009) Terrorist financing on the internet. Combating terrorism center sentinel 2(6):17–20. https://www.washingtoninstitute.org/uploads/Documents/opeds/4a438817e3a3c.pdf.
Klausen J, Libretti R, Hung BWK, Jayasumana AP (2018) Radicalization trajectories: an evidence-based computational approach to dynamic risk assessment of ‘homegrown’ jihadists. Stud Confl Terror 1–28. https://doi.org/10.1080/1057610X.2018.1492819
Ljujic V, van Prooijen JW, Weerman F (2017) Beyond the crime-terror nexus: socio-economic status, violent crimes and terrorism. J Criminol Res Policy Pract 3(3):158–172. https://doi.org/10.1108/JCRPP-02-2017-0010
Mozes T, Weimann G (2010) The E-marketing strategy of Hamas. Stud Confl Terror 33(3):211–225
Nacos BL (2016) Mass-mediated terrorism. In: Mainstream and digital media in terrorism and counterterrorism. Rowman & Littlefield, Plymouth
Neumann P (2013) The trouble with radicalization. Int Aff 89(4):873–893
Rapoport D (2002) The four waves of rebel terror and September 11. Anthropoetics 8(1)
Reed A, Ingram HJ (2017) Exploring the role of instructional material in AQAP’s inspire and ISIS’s Rumiyah. Europol, The Hague. https://www.europol.europa.eu/publications-documents/exploring-role-ofinstructional-material-in-aqaps-inspire-and-isis-rumiyah. Accessed 03 Jan 2022
Schmid A (2014) Violent and non-violent extremism: two sides of the same coin? International Centre for Counter-Terrorism, The Hague. https://www.icct.nl/download/file/ICCT-Schmid-Violent-Non-Violent-Extremism-May2014.pdf. Accessed 15 Dec 2021
Seib P, Janbek DM (2010) High tech terror: Al Qaeda and beyond. In: Global terrorism and new media: the post-Al Qaeda generation. Routledge, Abingdon-on-Thames
Sheikh J (2016) “I just said it. The state”: examining the motivations for Danish foreign fighters in Syria. Perspect Terror 10(6):3–11
Shinn D (2016) Poverty and terrorism in Africa: the debate continues. Georget J Int Aff 17(2):16–22. https://doi.org/10.1353/gia.2016.0020
Terrorism Act 2000 (2009) Part 1. https://www.legislation.gov.uk/ukpga/2000/11/section/1. Accessed 3 Jan 2022
Timothy LT (2003) Al Qaeda and the Internet: the danger of ‘cyberplanning.’ Parameters 23(1):112–123
Walker W, Conway M (2015) Online terrorism and online laws. Dyn Asymmetr Confl 8(2):156–175
Weimann G (2006) Virtual disputes: the use of the Internet for terrorist debates. Stud Confl Terror 29(7):623–639
Wibtrope R (2012) Rational extremism: the political economy of radicalism. Cambridge University Press, Cambridge
Winter C, Neumann P, Meleagrou-Hitchens A, Ranstorp M, Vidino L, Fürst J (2020) Online extremism: research trends in Internet activism, radicalization, and counter-strategies. Int J Confl Viol 14(2):1–20. https://doi.org/10.4119/ijcv-3809
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Locaj, K. (2023). Exploring the Extent to Which Extremism and Terrorism Have Changed Since the Advent of the Internet. In: Montasari, R., Carpenter, V., Masys, A.J. (eds) Digital Transformation in Policing: The Promise, Perils and Solutions. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-09691-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-09691-4_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-09690-7
Online ISBN: 978-3-031-09691-4
eBook Packages: Computer ScienceComputer Science (R0)