Comparing the Online Posting Behaviors of Violent and Non-Violent Right-Wing Extremists

Despite the ongoing need for researchers, practitioners, and policymakers to identify and assess the online activities of violent extremists prior to their engagement in violence offline, little is empirically known about their online behaviors generally or differences in their posting behaviors com...

Full description

Saved in:  
Bibliographic Details
Authors: Scrivens, Ryan (Author) ; Wojciechowski, Thomas W. (Author) ; Freilich, Joshua D. (Author) ; Chermak, Steven M. 1964- (Author) ; Frank, Richard (Author)
Format: Electronic Article
Language:English
Published: 2023
In: Terrorism and political violence
Year: 2023, Volume: 35, Issue: 1, Pages: 192-209
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:
Description
Summary:Despite the ongoing need for researchers, practitioners, and policymakers to identify and assess the online activities of violent extremists prior to their engagement in violence offline, little is empirically known about their online behaviors generally or differences in their posting behaviors compared to non-violent extremists who share similar ideological beliefs particularly. In this study, we drew from a unique sample of violent and non-violent right-wing extremists to compare their posting behaviors within a sub-forum of the largest white supremacy web-forum. Analyses for the current study proceeded in three phases. First, we plotted the average posting trajectory for users in the sample, followed by an assessment of the rates at which they stayed active or went dormant in the sub-forum. We then used logistic regression to examine whether specific posting behaviors were characteristic of users’ violence status. The results highlight a number of noteworthy differences in the posting behaviors of violent and non-violent right-wing extremists, many of which may inform future risk factor frameworks used by law enforcement and intelligence agencies to identify credible threats online. We conclude with a discussion of the implications of this analysis, its limitations and avenues for future research.
ISSN:1556-1836
DOI:10.1080/09546553.2021.1891893