Skip to main content

Cultural Violence and Peace in Social Media

  • Chapter
  • First Online:
Information Technology for Peace and Security

Abstract

Over the last decade, social media services had an enormous impact on modern culture. They are nowadays widely established in everyday life, but also during natural and manmade crises and conflicts. For instance, Facebook was part of the Arabic Spring, in which the tool facilitated the communication and interaction between participants of political protests. On the contrary, terrorists may recruit new members and disseminate ideologies, and social bots may influence social and political processes. Based on the notions of cultural violence and cultural peace as well as the phenomena of fake news, terrorism and social bots, this exploratory review firstly presents human cultural interventions in social media (e.g. dissemination of fake news and terroristic propaganda) and respective countermeasures (e.g. fake news detection and counter-narratives). Secondly, it discusses automatic cultural interventions realised via social bots (e.g. astroturfing, misdirection and smoke screening) and countermeasures (e.g. crowdsourcing and social bot detection). Finally, this chapter concludes with a range of cultural interventions and information and communication technology (ICT) in terms of actors and intentions to identify future research potential for supporting situational assessments during conflicts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Reference

Recommended Reading

  • Cheong, M., & Lee, V. C. S. (2011). A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Information Systems Frontiers, 13(1), 45–59. https://doi.org/10.1007/s10796-010-9273-x.

  • Reuter, C., Hartwig, K., Kirchner, J., & Schlegel, N. (2019). Fake News Perception in Germany: A Representative Study of People’s Attitudes and Approaches to Counteract Disinformation. In Proceedings of the International Conference on Wirtschaftsinformatik (WI). Siegen.

    Google Scholar 

  • Stieglitz, S., Brachten, F., Ross, B., & Jung, A.-K. (2017). Do Social Bots Dream of Electric Sheep? A Categorisation of Social Media Bot Accounts. Proceedings of the Australasian Conference on Information Systems, 1–11.

    Google Scholar 

Bibliography

  • Abokhodair, N., Yoo, D., & McDonald, D. W. (2015). Dissecting a Social Botnet. Proceedings of the Conference on Computer Supported Cooperative Work & Social Computing (CSCW), 839–851. https://doi.org/10.1145/2675133.2675208

  • Al-Rawi, A. (2016). Anti-ISIS Humor: Cultural Resistance of Radical Ideology. Politics, Religion & Ideology, 7689(May), 1–17. https://doi.org/10.1080/21567689.2016.1157076

  • Allcott, H., & Gentzkow, M. (2017). Social Media and Fake News in the 2016 Election. Journal of Economic Perspectives, 31(2), 211–236. https://doi.org/10.1257/jep.31.2.211

  • Almaatouq, A., Shmueli, E., Nouh, M., Alabdulkareem, A., Singh, V. K., Alsaleh, M., … Pentland, A. (2016). If it looks like a spammer and behaves like a spammer, it must be a spammer: analysis and detection of microblogging spam accounts. International Journal of Information Security, 15(5), 475–491. https://doi.org/10.1007/s10207-016-0321-5

  • Appling, D. S., & Briscoe, E. J. (2017). The Perception of Social Bots by Human and Machine. In Proceedings of the Thirtieth International Florida Artificial Intelligence Research Society Conference (pp. 20–25).

    Google Scholar 

  • Barzilai-Nahon, K. (2009). Gatekeeping: A critical review. Annual Review of Information Science and Technology, 43(1), 1–79. https://doi.org/10.1002/aris.2009.1440430117

  • Becker, B. W. (2016). The Librarian’s Information War. Behavioral & Social Sciences Librarian, 35(4), 188–191. https://doi.org/10.1080/01639269.2016.1284525

  • Campbell, P. J., MacKinnon, A. S., & Stevens, C. (2010). An Introduction to Global Studies. Wiley-Blackwell.

    Google Scholar 

  • Cheong, M., & Lee, V. C. S. (2011). A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Information Systems Frontiers, 13(1), 45–59. https://doi.org/10.1007/s10796-010-9273-x

  • Cho, C. H., Martens, M. L., Kim, H., Rodrigue, M., Journal, S., December, N., … Rodrigue, M. (2011). Astroturfing Global Warming: It Isn’t Always Greener on the Other Side of the Fence. Journal of Business Ethics, 104(4), 571–587. https://doi.org/10.1007/s10551-011-0950-6

  • Christoph, S. (2015). Funktionslogik terroristischer Propaganda im bewegten Bild. Journal for Deradicalization, Fall/15(4), 145–205.

    Google Scholar 

  • Cooke, N. A. (2017). Posttruth, Truthiness, and Alternative Facts: Information Behavior and Critical Information Consumption for a New Age. The Library Quarterly, 87(3), 211–221. https://doi.org/10.1086/692298

  • Faktenfinder. (2017). AfD spokesman Christian Lüth in an interview with Faktenfinder. Retrieved from http://faktenfinder.tagesschau.de/inland/falsches-antifa-foto-101.html

  • Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The Rise of Social Bots. Communications of the ACM, 59(7), 96–104.

    Google Scholar 

  • Freedman, L. (2006). The Transformation of Strategic Affairs. Routledge.

    Google Scholar 

  • Galtung, J. (1969). Violence, Peace, and Peace Research. Journal of Peace Research, 6(3), 167–191.

    Google Scholar 

  • Galtung, J. (2007). Frieden mit friedlichen Mitteln. Friede und Konflikt, Entwicklung und Kultur. Münster: Agenda Verlag.

    Google Scholar 

  • Gao, P., Gong, N. Z., Kulkarni, S., Thomas, K., & Mittal, P. (2015). SybilFrame: A Defense-in-Depth Framework for Structure-Based Sybil Detection. In Computing Research Repository.

    Google Scholar 

  • Gartenstein-Ross, D. (2015). Social Media in the Next Evolution of Terrorist Recruitment. Hearing before the Senate Committee on Homeland Security & Governmental Affairs, Foundation for Defense of Democracies, 1–11.

    Google Scholar 

  • Gates, S., & Podder, S. (2015). Social Media, Recruitment, Allegiance and the Islamic State. Perspectives on Terrorism, 9(4), 107–116.

    Google Scholar 

  • Gundelach, P. (1979). Grass Roots Organizations. Acta Sociologica, 22(2), 187–189. https://doi.org/10.1177/000169937902200206

  • Hancock, J. T., Curry, L. E., Goorha, S., & Woodworth, M. (2008). On lying and being lied to: A linguistic analysis of deception in computer-mediated communication. Discourse Processes, 45(1), 1–23. https://doi.org/10.1080/01638530701739181

  • Hartwig, K., & Reuter, C. (2019). TrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter. In Proceedings of the International Conference on Wirtschaftsinformatik (WI). Siegen.

    Google Scholar 

  • Hügel, S. (2017). Forum InformatikerInnen für Frieden und gesellschaftliche Verantwortung e.V. Retrieved from https://www.fiff.de/

  • Hussain, G., & Saltman, E. M. (2014). Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter it. Quilliam. Retrieved from https://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/jihad-trending-quilliam-report.pdf

  • Jaho, E., Tzoannos, E., Papadopoulos, A., & Sarris, N. (2014). Alethiometer: A Framework for Assessing Trustworthiness and Content Validity in Social Media. In Proceedings of the 23rd International Conference on World Wide Web - WWW ’14 Companion (pp. 749–752). New York, NY: ACM Press. https://doi.org/10.1145/2567948.2579324

  • Jeberson, W., & Sharma, L. (2015). Survey on counter Web Terrorism. COMPUSOFT, An International Journal of Advanced Computer Technology, 4(5), 1744–1747.

    Google Scholar 

  • Jiang, M., Cui, P., Beutel, A., Faloutsos, C., & Yang, S. (2016). Catching Synchronized Behaviors in Large Networks: A Graph Mining Approach. ACM Trans. Knowl. Discov. Data, 10(4), 35:1----35:27. https://doi.org/10.1145/2746403

  • Kang, C. (2016). Fake News Onslaught Targets Pizzeria as Nest of Child-Trafficking. Retrieved from https://www.nytimes.com/2016/11/21/technology/fact-check-this-pizzeria-is-not-a-child-trafficking-site.html

  • Kaplan, A. M., & Haenlein, M. (2010). Users of the world, unite! The challenges and opportunities of Social Media. Business Horizons, 53(1), 59–68. https://doi.org/10.1016/j.bushor.2009.09.003

  • Kaufhold, M.-A., Gizikis, A., Reuter, C., Habdank, M., & Grinko, M. (2019). Avoiding Chaotic Use of Social Media during Emergencies: Evaluation of Citizens’ Guidelines. Journal of Contingencies and Crisis Management (JCCM), 1–16. https://doi.org/10.1111/1468-5973.12249

  • Kaufhold, M.-A., & Reuter, C. (2016). The Self-Organization of Digital Volunteers across Social Media: The Case of the 2013 European Floods in Germany. Journal of Homeland Security and Emergency Management (JHSEM), 13(1), 137–166.

    Google Scholar 

  • Kaufhold, M.-A., Reuter, C., Ludwig, T., & Scholl, S. (2017). Social Media Analytics: Eine Marktstudie im Krisenmanagement. In M. Eibl & M. Gaedke (Eds.), INFORMATIK 2017, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik. Bonn.

    Google Scholar 

  • Khayat, M. (2013). Jihadis’ responses to widespread decline in participation on jihadi forums, increased use of Twitter. MEMRI Inquiry & Analysis, 955.

    Google Scholar 

  • Klausen, J., Barbieri, E. T., Reichlin-Melnick, A., & Zelin, A. Y. (2012). The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign. Perspectives on Terrorism, 6(1), 36–53.

    Google Scholar 

  • Klein, D. O., & Wueller, J. R. (2017). Fake news: A legal perspective. Journal Of Internet Law, 20(10), 6–13.

    Google Scholar 

  • Mihailidis, P., & Viotty, S. (2017). Spreadable Spectacle in Digital Culture: Civic Expression, Fake News, and the Role of Media Literacies in “Post-Fact” Society. American Behavioral Scientist, 61(4), 441–454. https://doi.org/10.1177/0002764217701217

  • Müller, P. D., & Denner, N. (2017). Was tun gegen “Fake News”? Retrieved from https://www.freiheit.org/sites/default/files/uploads/2017/06/16/a4fakenews.pdf

  • Narwal, V., Salih, M. H., Lopez, J. A., Ortega, A., O’Donovan, J., Höllerer, T., & Savage, S. (2017). Automated Assistants to Identify and Prompt Action on Visual News Bias. In Proceedings of the CHI Conference Extended Abstracts on Human Factors in Computing Systems (pp. 2796–2801). New York, NY: ACM Press. https://doi.org/10.1145/3027063.3053227

  • Neer, T., & O’Toole, M. E. (2014). The Violence of the Islamic State of Syria (ISIS): A Behavioral Perspective. Violence and Gender, 1(4), 145–156. https://doi.org/10.1089/vio.2014.0037

  • Neue Wege des Lernens e.V. (2017). Fake News Check. Retrieved from https://www.neue-wege-deslernens.de/2017/03/19/fake-news-check-mit-dem-smartphone/

  • Newman, M. L., Pennebaker, J. W., Berry, D. S., & Richards, J. M. (2003). Lying Words: Predicting Deception From Linguistic Styles. Society for Personality and Social Psychology, Inc., 29(5), 665–675. https://doi.org/10.1177/0146167203251529

  • Palen, L., & Hughes, A. L. (2018). Social Media in Disaster Communication. In H. Rodríguez, W. Donner, & J. E. Trainor (Eds.), Handbook of Disaster Research (pp. 497–518). Cham, Germany: Springer International Publishing. https://doi.org/10.1007/978-3-319-63254-4_24

  • Pew Research Center. (2018). Social Media Bots Draw Public’s Attention and Concern. Retrieved from http://www.journalism.org/2018/10/15/social-media-bots-draw-publics-attention-and-concern/

  • Potter, W. J. (2010). The state of media literacy. Journal of Broadcasting and Electronic Media, 54(4), 675–696. https://doi.org/10.1080/08838151.2011.521462

  • Ramalingam, D., & Chinnaiah, V. (2018). Fake profile detection techniques in large-scale online social networks: A comprehensive review. Computers & Electrical Engineering, 65, 165–177. https://doi.org/10.1016/j.compeleceng.2017.05.020

  • Reuter, C., Hartwig, K., Kirchner, J., & Schlegel, N. (2019). Fake News Perception in Germany: A Representative Study of People’s Attitudes and Approaches to Counteract Disinformation. In Proceedings of the International Conference on Wirtschaftsinformatik (WI). Siegen.

    Google Scholar 

  • Reuter, C., Hughes, A. L., & Kaufhold, M.-A. (2018). Social Media in Crisis Management: An Evaluation and Analysis of Crisis Informatics Research. International Journal on Human-Computer Interaction (IJHCI), 34(4), 280–294. https://doi.org/10.1080/10447318.2018.1427832

  • Reuter, C., & Kaufhold, M.-A. (2018). Fifteen Years of Social Media in Emergencies: A Retrospective Review and Future Directions for Crisis Informatics. Journal of Contingencies and Crisis Management (JCCM), 26, 1–17.

    Google Scholar 

  • Reuter, C., Ludwig, T., Kaufhold, M.-A., & Pipek, V. (2015). XHELP: Design of a Cross-Platform Social-Media Application to Support Volunteer Moderators in Disasters. In Proceedings of the Conference on Human Factors in Computing Systems (CHI) (pp. 4093–4102). Seoul, Korea: ACM Press. http://dx.doi.org/10.1145/2702123.2702171

  • Reuter, C., Pätsch, K., & Runft, E. (2017). IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study. I-Com: Journal of Interactive Media, 16(2), 181–195. Retrieved from http://www.peasec.de/paper/2017/2017_ReuterPaetschRunft_ITforPeaceTerrorismSocialMedia_ICOM.pdf

  • Robinson, T., Callahan, C., Boyle, K., Rivera, E., & Cho, J. K. (2017). I ♥ FB: A Q-Methodology Analysis of Why People ‘Like’’ Facebook.’ International Journal of Virtual Communities and Social Networking (IJVCSN), 9(2), 46–61. https://doi.org/10.4018/IJVCSN.2017040103

  • Rubin, V. L., Chen, Y., & Conroy, N. J. (2015). Deception Detection for News: Three Types of Fake News. Proceedings of the Association for Information Science and Technology, 52(1), 1–4. https://doi.org/10.1002/pra2.2015.145052010083

  • Saez-Trumper, D. (2014). Fake Tweet Buster: A Webtool to identify Users Promoting Fake News Ontwitter. In Proceedings of the ACM conference on Hypertext and social media (pp. 316–317). New York, NY: ACM Press. https://doi.org/10.1145/2631775.2631786

  • Saltman, E. M., & Russell, J. (2014). White Paper – The role of prevent in countering online extremism. Quilliam. Retrieved from https://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/white-paper-the-role-of-prevent-in-countering-online-extremism.pdf

  • Sängerlaub, A. (2017a). Deutschland vor der Bundestagswahl: Überall Fake News?! Berlin, Germany: Stiftung Neue Verantwortung. Retrieved from https://www.stiftung-nv.de/sites/default/files/fakenews.pdf

  • Sängerlaub, A. (2017b). Verzerrte Realitäten: „Fake News“ im Schatten der USA und der Bundestagswahl. Berlin, Germany: Stiftung Neue Verantwortung. Retrieved from https://www.stiftungnv.de/de/publikation/verzerrte-realitaeten-fake-news-im-schatten-der-usa-und-der-bundestagswahl

  • Soden, R., & Palen, L. (2018). Informating Crisis: Expanding Critical Perspectives in Crisis Informatics. In Proceedings of the ACM on Human-Computer Interaction.

    Google Scholar 

  • Stein, T., Chen, E., & Mangla, K. (2011). Facebook immune system. Proceedings of the 4th Workshop on Social Network Systems, m(5), 1–8. https://doi.org/10.1145/1989656.1989664

  • Stieglitz, S., Brachten, F., Ross, B., & Jung, A.-K. (2017). Do Social Bots Dream of Electric Sheep? A Categorisation of Social Media Bot Accounts. Proceedings of the Australasian Conference on Information Systems, 1–11.

    Google Scholar 

  • Stieglitz, S., Mirbabaie, M., Ross, B., & Neuberger, C. (2018). Social media analytics – Challenges in topic discovery, data collection, and data preparation. International Journal of Information Management, 39, 156–168. https://doi.org/10.1016/j.ijinfomgt.2017.12.002

  • Sutton, J., Palen, L., & Shklovski, I. (2008). Backchannels on the Front Lines: Emergent Uses of Social Media in the 2007 Southern California Wildfires. In Proceedings of the 14th International ISCRAM Conference (pp. 624–632). Brussels, Belgium: ISCRAM.

    Google Scholar 

  • Torok, R. (2015). ISIS and the Institution of Online Terrorist Recruitment. Retrieved from https://www.mei.edu/publications/isis-and-institution-online-terrorist-recruitment

  • Trang, D., Johansson, F., & Rosell, M. (2015). Evaluating Algorithms for Detection of Compromised Social Media User Accounts. Proceedings - 2nd European Network Intelligence Conference, ENIC 2015, 75–82. https://doi.org/10.1109/ENIC.2015.19

  • Turk, A. T. (2015). Terrorism and Counterterrorism. In E. Goode (Ed.), The Handbook of Deviance (pp. 537–548). Hoboken, NJ: John Wiley & Sons, Inc. https://doi.org/10.1002/9781118701386.ch30

  • Vieweg, S., Hughes, A. L., Starbird, K., & Palen, L. (2010). Microblogging During Two Natural Hazards Events: What Twitter May Contribute to Situational Awareness. In In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’10) (pp. 1079–1088). New York, NY: ACM. https://doi.org/10.1145/1753326.1753486

  • Viviani, M., & Pasi, G. (2017). Credibility in social media: opinions, news, and health information—a survey. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1209--n/a. https://doi.org/10.1002/widm.1209

  • Wang, G., Wilson, C., Zhao, X., Zhu, Y., Mohanlal, M., Zheng, H., & Zhao, B. Y. (2011). Serf and Turf: Crowdturfing for Fun and Profit. Arxiv Preprint ArXiv:1111.5654, 10. https://doi.org/10.1145/2187836.2187928

  • Webel, C., & Galtung, J. (2007). Negotiation and international conflict. In Handbook of Peace and Conflict (pp. 35–50). Abingdon: Routledge. https://doi.org/10.4324/9780203089163.ch3

  • Weimann, G. (2016). The Emerging Role of Social Media in the Recruitment of Foreign Fighters. In A. de Guttry, F. Capone, & C. Paulussen (Eds.), Foreign Fighters under International Law and Beyond (pp. 77–95). The Hague: T.M.C. Asser Press. https://doi.org/10.1007/978-94-6265-099-2_6

  • Weimann, G., & Jost, J. (2015). Neuer Terrorismus und Neue Medien. Zeitschrift Für Außen- Und Sicherheitspolitik, 8(3), 369–388. https://doi.org/10.1007/s12399-015-0493-5

  • Wendling, M. (2018). The (almost) complete history of “fake news.” Retrieved from https://www.bbc.com/news/blogs-trending-42724320

  • Werkner, I.-J. (2017). Zum Friedensbegriff in der Friedensforschung. In I.-J. Werkner & K. Ebeling (Eds.), Handbuch Friedensethik (pp. 19–32). Springer Fachmedien.

    Google Scholar 

  • Wohn, D. Y., Fiesler, C., Hemphill, L., De Choudhury, M., & Matias, J. N. (2017). How to Handle Online Risks? Discussing Content Curation and Moderation in Social Media. In CHI 2017 Extended Abstracts (pp. 1271–1276). https://doi.org/10.1145/3027063.3051141

  • Wu, X., Fan, W., Gao, J., Feng, Z. M., & Yu, Y. (2015). Detecting Marionette Microblog Users for Improved Information Credibility. Journal of Computer Science and Technology, 30(5), 1082–1096. https://doi.org/10.1007/s11390-015-1584-4

  • Wulf, V., Aal, K., Ktesh, I. A., Atam, M., Schubert, K., Yerousis, G. P., … Rohde, M. (2013). Fighting against the Wall : Social Media use by Political Activists in a Palestinian Village. In Proceedings of the Conference on Human Factors in Computing Systems (CHI). Paris, France: ACM.

    Google Scholar 

  • Yan, G. (2013). Peri-Watchdog: Hunting for hidden botnets in the periphery of online social networks. Computer Networks, 57(2), 540–555. https://doi.org/10.1016/j.comnet.2012.07.016

  • Ziegele, M., Breiner, T., & Quiring, O. (2014). What Creates Interactivity in Online News Discussions? An Exploratory Analysis of Discussion Factors in User Comments on News Items. Journal of Communication, 64(6), 1111–1138. https://doi.org/10.1111/jcom.12123

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Marc-André Kaufhold .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kaufhold, MA., Reuter, C. (2019). Cultural Violence and Peace in Social Media. In: Reuter, C. (eds) Information Technology for Peace and Security. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-25652-4_17

Download citation

Publish with us

Policies and ethics