Many researchers, practitioners, and policy-makers continue to raise questions about the role of the Internet in facilitating violent extremism and terrorism. A surge in research on this issue notwithstanding, relatively few empirically grounded analyses are yet available. This chapter provides researchers with five key suggestions for progressing knowledge on the role of the Internet in facilitating violent extremism and terrorism so that we may be better placed to determine the significance of online content and activity in the latter going forward. These five suggestions relate to (1) collecting primary data across multiple types of populations; (2) making archives of violent extremist online content accessible for use by researchers and on user-friendly platforms; (3) outreaching beyond terrorism studies to become acquainted with, for example, the Internet studies literature and engaging in interdisciplinary research with, for example, computer scientists; (4) including former extremists in research projects, either as study participants or project collaborators; and (5) drawing connections between the on- and offline worlds of violent extremists.
- Violent extremism
- Social media
This is a preview of subscription content, access via your institution.
Abbas, T., & Yigit, I. H. (2016). Perspectives on ethno-national conflict among Kurdish families with members in the PKK. Terrorism and Political Violence, 28(2), 297–315.
Amarasingam, A. (2016, August 11). What Aaron told me: An expert on extremism shares his conversations with the terror suspect. National Post. https://nationalpost.com/news/canada/what-aaron-told-me-an-expert-on-extremism-shares-his-conversations-with-the-terror-suspect
Anti-Defamation League. (1985). Computerized networks of hate: An ADL fact finding report. https://archive.org/details/ComputerizedNetworksOfHate.
Awan, I. (2017). Cyber-extremism: ISIS and the power of social media. Social Science and Public Policy, 54, 138–149.
Baines, P. R., O’Shaughnessy, N. J., Moloney, K., Richards, B., Butler, S., & Gill, M. (2010). The dark side of political marketing: Islamist propaganda, reversal theory and British Muslims. European Journal of Marketing, 44(3/4), 478–495.
Barrelle, K. (2015). Pro-integration: Disengagement from and life after extremism. Behavioral Sciences of Terrorism and Political Aggression, 7(5), 129–142.
Bartlett, J., & Littler, M. (2011). Insight the EDL: Populist politics in the digital era. Demos. https://www.demos.co.uk/files/Inside_the_edl_WEB.pdf?1331035419
Bastos, M., & Walker, S. T. (2018). Facebook’s data lockdown is a disaster for academic researchers. The Conversation. https://theconversation.com/facebooks-data-lockdown-is-a-disaster-for-academic-researchers-94533
Bazex, H., & Mensat, J.-Y. (2016). Who are the French Jihadists? Analysis of 12 cases to help develop profiles and assessment of the risk of acting out. Annales Medico-Psychologiques, 174(4), 257–265.
Berger, J. M., & Morgan, J. (2015). The ISIS Twitter census. Washington: Brookings Institution.
Berger, J. M., & Strathearn, B. (2013). Who matters online: Measuring influence, evaluating content and countering violent extremism in online social networks. London: International Centre for the Study of Radicalisation and Political Violence.
Bjørgo, T., & Horgan, J. (Eds.) (2008). Leaving terrorism behind: Individual and collective disengagement. London: Routledge.
Böckler, N., Hoffmann, J., & Zick, A. (2015). The Frankfurt airport attack: A case study on the radicalization of a lone-actor terrorist. Journal of Threat Assessment and Management, 2(3–4), 153–163.
Bouzar, D., & Martin, M. (2016). Pour quels motifs les jeunes s’engagent-ils dans le djihad? Neuropsychiatrie de l’Enfance et de l’Adolescence, 64(6), 353–359.
Bowen, G., & Bowen, R. (2015). Brand trust in offline and online environments: Lessons for social media. In G. Bowen & W. Ozue (Eds.), Computer-mediated marketing strategies: Social media and online brand communities (pp. 58–82). Hershey: IGI Global.
Bowers, K., Gill, P., Morgan, P., Meiklejohn, S., & Johnson, S. (2018). Challenges for EMMIE as a realist evaluation framework. In G. Farrell & A. Sidebottom (Eds.), Realist evaluation for crime science: Essays in honour of Nick Tilley (pp. 98–118). London: Routledge.
Bowie, N. G. (2018). 30 terrorism databases and data sets: A new inventory. Perspectives on Terrorism, 12(5), 51–61.
Braddock, K., & Horgan, J. (2016). Towards a guide for constructing and disseminating counternarratives to reduce support for terrorism. Studies in Conflict and Terrorism, 39(5), 381–404.
Briggs, R., & Feve, S. (2013). Review of programs to counter narratives of violent extremism: What works and what are the implications for government. London: Institute for Strategic Dialogue.
Bryce, J., & Fraser, J. (2014). The role of disclosure of personal information in the evaluation of risk and trust in young peoples’ online interactions. Computers in Human Behavior, 30, 299–306.
Bubolz, B. F., & Simi, P. (2015). Leaving the world of hate: Life-course transitions and self-change. American Behavioral Scientist, 59(12), 1588–1608.
Capellan, J. A. (2015). Lone wolf terrorist or deranged shooter? A study of ideological active shooter events in the United States, 1970–2014. Studies in Conflict and Terrorism, 38(6), 395–413.
Carter, J., Maher, S., & Neumann, P. (2014). #Greenbirds: Measuring importance and influence in Syrian foreign fighter networks. London: International Centre for the Study of Radicalisation and Political Violence.
Chen, H. (2012). Dark web: Exploring and data mining the dark side of the web. New York: Springer.
Chermak, S. M., Freilich, J. D., Parkin, W. S., & Lynch, J. P. (2012). American terrorism and extremist crime data sources and selectivity bias: An investigation focusing on homicide events committed by far-right extremists. Journal of Quantitative Criminology, 28, 191–218.
Conway, M. (2016). Determining the role of the Internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict and Terrorism, 40(1), 77–98.
Davey, J., Birdwell, J., & Skellett, R. (2018). Counter conversations: A model for direct engagement with individuals showing signs of radicalization online. London: Institute for Strategic Dialogue.
Desmarais, S. L., Simons-Rudolph, J., Brugh, C. S., Schilling, E., & Hoggan, C. (2017). The state of scientific knowledge regarding factors associated with terrorism. Journal of Threat Assessment and Management, 4(4), 180–209.
Drevon, J. (2016). Embracing Salafi Jihadism in Egypt and mobilizing in the Syrian Jihad. Middle East Critique, 25(4), 321–339.
Ducol, B. (2012). Uncovering the French-speaking Jihadisphere: An exploratory analysis. Media, War and Conflict, 5(1), 51–70.
Edwards, C., & Gribbon, L. (2013). Pathways to violent extremism in the digital era. RUSI Journal, 158(5), 40–47.
Ekman, M. (2018). Anti-refugee mobilization in social media: The case of soldiers of Odin. Social Media and Society, 4(1), 1–11.
Freilich, J. D., & Chermak, S. M. (2012). Terrorists use of the Internet: An analysis of strategies, objectives and law responses. In H. S. Yoon (Ed.), Cyberterrorism: Trends and responses (pp. 133–167). Seoul: Korean Institute of Criminology.
Frenett, R., & Dow, M. (2014). One to one interventions: A pilot CVE methodology. London: Institute for Strategic Dialogue and Curtain University.
Gerstenfeld, P. B., Grant, D. R., & Chiang, C.-P. (2003). Hate online: A content analysis of extremist Internet sites. Analyses of Social Issues and Public Policy, 3(1), 29–44.
Gill, P. (2015). Lone-actor terrorists: A behavioural analysis. London: Routledge.
Gill, P., & Corner, E. (2015). Lone-actor terrorist use of the Internet and behavioural correlates. In L. Jarvis, S. Macdonald, & T. M. Chen (Eds.), Terrorism online: Politics, law, technology and unconventional violence (pp. 35–53). London: Routledge.
Gill, P., Horgan, J., & Deckert, P. (2014). Bombing alone: Tracing the motivations and antecedent behaviours of lone-actor terrorists. Journal of Forensic Sciences, 59(2), 425–435.
Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., & Horgan, J. (2017). Terrorist use of the Internet by the numbers: Quantifying behaviors, patterns, and processes. Criminology and Public Policy, 16(1), 99–117.
Gray, D. H., & Head, A. (2009). The importance of the Internet to the post-modern terrorist and its role as a form of safe haven. European Journal of Scientific Research, 25(3), 396–404.
Gruenewald, J., Chermak, S., & Freilich, J. D. (2013). Distinguishing “loner” attacks from other domestic extremist violence: A comparison of far-right homicide incident and offender characteristics. Criminology and Public Policy, 12(1), 65–91.
Harris-Hogan, S., Barrelle, K., & Zammit, A. (2015). What is countering violent extremism? Exploring CVE policy and practice in Australia. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 6–24.
Hassan, G., Brouillette-Alarie, S., Alava, S., Frau-Meigs, D., Lavoie, L., Fetiu, A., …, Sieckelinck, S. (2018). Exposure to extremist online content could lead to violent radicalization: A systematic review of empirical evidence. International Journal of Developmental Science, 12(1–2), 71–88.
Hegghammer, T. (2014). Interpersonal trust on Jihadi Internet forums. http://hegghammer.com/_files/Interpersonal_trust.pdf
Helmus, T. C., & Klein, K. (2018). Assessing outcomes of online campaigns countering violent extremism: A case study of the redirect method. Santa Monica: RAND Corporation.
Holbrook, D. (2017). What types of media do terrorists collect? (International Centre for Counter-Terrorism research paper). https://icct.nl/wp-content/uploads/2017/09/ICCT-Holbrook-What-Types-of-Media-Do-Terrorists-Collect-Sept-2017-2.pdf
Holbrook, D. (2019). The terrorism information environment: Analysing terrorists’ selection of ideological and facilitative material. Terrorism and Political Violence, 1–23.
Holbrook, D., & Taylor, M. (2017). Terrorism as process narratives: A study of pre-arrest media usage and the emergence of pathways to engagement. Terrorism and Political Violence, 1–20.
Holt, T. J. (2012). Exploring the intersections of technology, crime and terror. Terrorism and Political Violence, 24(2), 337–354.
Horgan, J., Shortland, N., Abbasciano, S., & Walsh, S. (2016). Actions speak louder than words: A behavioral analysis of 183 individuals convicted for terrorist offenses in the United States from 1995 to 2012. Journal of Forensic Sciences, 61(5), 1228–1237.
Horgan, J., Altier, M. B., Shortland, N., & Taylor, M. (2017). Walking away: The disengagement and de-radicalization of a violent right-wing extremist. Behavioral Sciences of Terrorism and Political Aggression, 9(2), 63–77.
Ilardi, G. J. (2013). Interviews with Canadian radicals. Studies in Conflict and Terrorism, 36(9), 713–738.
Jackson, R. (2012). Unknown knowns: The subjugated knowledge of terrorism studies. Critical Studies on Terrorism, 5(1), 11–29.
Jacobson, M. (2010). Terrorist drop-outs: One way of promoting a counter-narrative. Perspectives on Terrorism, 3(2), 12–17.
Johnson, N. F., Zheng, M., Vorobyeva, Y., Gabriel, A., Qi, H., Velasquez, N., …, Wuchty, S. (2016). New online ecology of adversarial aggregates: ISIS and beyond. Science, 352(6292), 1459–1463.
King, G., & Persily, N. (2018). A new model for industry-academic partnerships (Working paper). https://gking.harvard.edu/files/gking/files/partnerships.pdf
Klausen, J., Campion, S., Needle, N., Nguyen, G., & Libretti, R. (2016). Toward a behavioral model of “homegrown” radicalization trajectories. Studies in Conflict and Terrorism, 39(1), 67–83.
Kleinmann, S. M. (2012). Radicalization of homegrown Sunni militants in the United States: Comparing converts and non-converts. Studies in Conflict and Terrorism, 35(4), 278–297.
Koehler, D. (2014a). Right-wing extremist radicalization processes: The formers’ perspective. JEX Journal EXIT-Deutschland, 1, 307–377.
Koehler, D. (2014b). The radical online: Individual radicalization processes and the role of the Internet. Journal for Deradicalization, 1, 116–134.
LaFree, G., & Freilich, J. D. (2018). Government policies for counteracting violent extremism. Annual Review of Criminology, 2, 383–404.
Lee, E., & Leets, L. (2002). Persuasive storytelling by hate groups online: Examining its effects on adolescents. American Behavioral Scientist, 45(6), 927–957.
Leimeister, J. M., & Krcmar, H. (2005). Acceptance and utility of a systematically designed virtual community for cancer patients. In P. Van Den Besselaar, G. De Michelis, J. Preece, & C. Simone (Eds.), Communities and technologies 2005: Proceedings of the second communities and technologies conference (pp. 129–148). Dordrecht: Springer.
Macnair, L., & Frank, R. (2017). Voices against extremism: A case study of a community-based CVE counter-narrative campaign. Journal for Deradicalization, 10, 147–174.
Macnair, L., & Frank, R. (2018). The mediums and the messages: Exploring the language of Islamic state media through sentiment analysis. Critical Studies on Terrorism, 11(3), 438–457.
Magdy, W., Darwish, K., Abokhodair, N., Rahimi, A., & Baldwin, T. (2016). #ISISisNotIslam or #DeportAllMuslims? Predicting unspoken views. In Proceedings of the 8th ACM conference on web science, Hannover, Germany (pp. 95–106).
Naquin, C. E., & Paulson, G. D. (2003). Online bargaining and interpersonal trust. Journal of Applied Psychology, 88(1), 113–120.
Nissenbaum, H. (2001). Securing trust online: Wisdom or oxymoron. Boston University Law Review, 81(3), 635–664.
Nouri, L., Lorenzo-Dus, N., & Di-Cristofaro, M. (2017). Extreme far right groups’ use of social media: A focus on Britain first and reclaim Australia (Cyberterrorism Project research report, No. 7). Swansea: Cyberterrorism Project.
Özeren, S., Sever, M., Yilmaz, K., & Sözer, A. (2014). Whom do they recruit? Profiling and recruitment in the PKK/KCK. Studies in Conflict and Terrorism, 37(4), 322–347.
Pauwels, L., & Schils, N. (2016). Differential online exposure to extremist content and political violence: Testing the relative strength of social learning and competing perspectives. Terrorism and Political Violence, 28(1), 1–29.
Porter, L. E., & Kebbell, M. R. (2011). Radicalization in Australia: Examining Australia’s convicted terrorists. Psychiatry, Psychology and Law, 18(2), 212–231.
RAND Corporation. (2017). Dos and don’ts of involving formers in PVE/CVE work. https://ec.europa.eu/home-affairs/sites/homeaffairs/files/what-we-do/networks/radicalisation_awareness_network/ran-papers/docs/dos_and_donts_involving_formers_in_pve_cve_work_bordeaux_27_06_2017_en.pdf
Rapoport, D. (2002). The four waves of rebel terror and September 11. Anthropoetics, 8(1), 1–19.
Reeser, A. M. S. (2011). The tipping point to terrorism: Involvement in right-wing terrorist groups in the United States. Ph.D. thesis. https://digitalcommons.unomaha.edu/cgi/viewcontent.cgi?article=1034andcontext=studentwork
Reuell, P. (2018). Organization set to release massive trove of information, strictly for research purposes. The Harvard Gazette. https://news.harvard.edu/gazette/story/2018/07/mining-facebook-data-for-science/
Reynolds, L., & Tuck, H. (2016). The counter-narrative monitoring and evaluation handbook. London: Institute for Strategic Dialogue.
Riaz, A., & Parvez, S. (2018). Bangladeshi militants: What do we know? Terrorism and Political Violence, 30(6), 944–961.
Rieger, D., Frischlich, L., & Bente, G. (2013). Propaganda 2.0: Psychological effects of right-wing and Islamic extremist Internet videos. Cologne: Wolters Kluwer.
Schmid, A. P., & Jongman, A. J. (1988). Political terrorism: A new guide to actors, authors, concepts, data bases, theories and literature. New Brunswick: Transaction Books.
Schuurman, B. (2018). Research on terrorism, 2007–2016: A review of data, methods, and authorship. Terrorism and Political Violence. 1–16.
Scrivens, R., Davies, G., & Frank, R. (2017). Searching for signs of extremism on the web: An introduction to sentiment-based identification of radical authors. Behavioral Sciences of Terrorism and Political Aggression, 10(1), 39–59.
Scrivens, R., Davies, G., & Frank, R. (2018). Measuring the evolution of radical right-wing posting behaviors online. Deviant Behavior, 1–17.
Sieckelinck, S., Sikkens, E., van San, M., Kotnis, S., & De Winter, M. (2017). Transitional journeys into and out of extremism. A biographical approach. Studies in Conflict and Terrorism,42(7), 662–682.
Sikorskaya, I. (2017). Messages, images and media channels promoting youth radicalization in Kyrgyzstan. Bishkek: Search for Common Ground.
Silke, A. (2001). The devil you know: Continuing problems with research on terrorism. Terrorism and Political Violence, 13(4), 1–14.
Silke, A. (2004). An introduction to terrorism research. In A. Silke (Ed.), Research on terrorism: Trends, achievements and failures (pp. 1–29). London: Routledge.
Silke, A. (2013). Research on terrorism: A review of the impact of 9/11 and the global war on terrorism. In A. Dolnik (Ed.), Conducting terrorism field research: A guide. London: Routledge.
Silverstone, R. (2005). Media, technology and everyday life in Europe: From information to communication. Aldershot: Ashgate.
Simi, P., & Windisch, S. (2018). Why radicalization fails: Barriers to mass casualty terrorism. Terrorism and Political Violence, 1–20.
Simi, P., Sporer, K., & Bubolz, B. F. (2016). Narratives of childhood adversity and adolescent misconduct as precursors to violent extremism: A life-course criminological approach. Journal of Research in Crime and Delinquency, 53(4), 536–563.
Simi, P., Blee, K., DeMichele, M., & Windisch, S. (2017). Addicted to hate: Identity residual among former white supremacists. American Sociological Review, 82(6), 1167–1187.
Society for Terrorism Research. (2018). STR2019 – call for papers. https://www.sv.uio.no/c-rex/english/news-and-events/news/2018/str2019-call-for-papers.html
Southern Poverty Law Center. (2015). Dylann Roof may have been a regular commenter at neo-Nazi website. The Daily Stormer. https://www.splcenter.org/hatewatch/2015/06/21/dylann-roof-may-have-been-regular-commenter-neo-nazi-website-daily-stormer
Statista. (2018). Most famous social network sites worldwide as of October 2018, ranked by number of active users (in millions). https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/
Stenersen, A. (2008). The Internet: A virtual training camp? Terrorism and Political Violence, 20(2), 215–233.
Stier, S., Posch, L., Bleier, A., & Strohmaier, M. (2017). When populists become popular: Comparing Facebook use by the right-wing movement Pegida and German political parties. Information, Communication and Society, 20(9), 1365–1388.
Turpin-Petrosino, C. (2002). Hateful sirens…who hears their song? An examination of student attitudes toward hate groups and affiliation potential. Journal of Social Issues, 58(2), 281–301.
van San, M. (2018). Belgian and Dutch young men and women who joined ISIS: Ethnographic research among the families they left behind. Studies in Conflict and Terrorism, 41(1), 39–58.
von Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalization in the digital era: The use of the Internet in 15 cases of terrorism and extremism. Santa Monica: RAND Corporation.
Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. Computers in Human Behavior, 21(1), 105–125.
Weimann, G. (2010). Terror on Facebook, Twitter, and YouTube. Brown Journal of World Affairs, 16(2), 45–54.
Windisch, S., Ligon, G. S., & Simi, P. (2017). Organizational [dis]trust: Comparing disengagement among former left-wing and right-wing violent extremists. Studies in Conflict and Terrorism, 42(6), 559–580.
Wojcieszak, M. (2009). “Carrying online participation offline” – Mobilization by radical online groups and politically dissimilar offline ties. Journal of Communication, 59(3), 564–586.
Wojcieszak, M. (2010). ‘Don’t talk to me’: Effects of ideologically homogeneous online groups and politically dissimilar offline ties on extremism. New Media and Society, 12(4), 637–655.
Rights and permissions
© 2019 The Author(s), under exclusive licence to Springer Nature Switzerland AG
About this entry
Cite this entry
Scrivens, R., Gill, P., Conway, M. (2019). The Role of the Internet in Facilitating Violent Extremism and Terrorism: Suggestions for Progressing Research. In: The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-90307-1_61-1
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-90307-1
Online ISBN: 978-3-319-90307-1
eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social Sciences