Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad
This article discusses the reasons why content moderation and control in cyberspace, being a primary means of online countering violent extremism (CVE), does not work as intended. It makes four main arguments. Firstly, despite years of efforts from CVE stakeholders, the propaganda of militant Islami...
Main Author: | |
---|---|
Format: | Electronic Article |
Language: | English |
Published: |
2023
|
In: |
Terrorism and political violence
Year: 2023, Volume: 35, Issue: 6, Pages: 1261-1298 |
Online Access: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000caa a22000002 4500 | ||
---|---|---|---|
001 | 1854429795 | ||
003 | DE-627 | ||
005 | 20230808035455.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230807s2023 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1080/09546553.2022.2038575 |2 doi | |
035 | |a (DE-627)1854429795 | ||
035 | |a (DE-599)KXP1854429795 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Lakomy, Miron |e VerfasserIn |0 (DE-588)1052351875 |0 (DE-627)788429485 |0 (DE-576)408098708 |4 aut | |
245 | 1 | 0 | |a Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad |
264 | 1 | |c 2023 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This article discusses the reasons why content moderation and control in cyberspace, being a primary means of online countering violent extremism (CVE), does not work as intended. It makes four main arguments. Firstly, despite years of efforts from CVE stakeholders, the propaganda of militant Islamist VEOs is still easily accessible on the Internet. This study has mapped hundreds of addresses engaged in digital jihadist activities at the turn of 2020–2021. It effectively proves that the current approach to online CVE brought few tangible effects. Secondly, these programs have been unevenly applied to militant Islamist organizations. There have been groups which represent violent extremist ideology but are not actively combated by stakeholders. As a result, these groups have been able to establish a solid foothold on the surface web. Thirdly, the efficiency of CVE strategies based on content takedowns are decreased by the relative ease of terrorists reestablishing banned communication channels, the availability of vast alternatives for online propaganda dissemination, the introduction of impractical legislation by governments, overlapping jurisdictions on the Internet and the “Streisand effect.” Finally, adequate strategies aimed at curbing digital jihad should be primarily based on offline and online activities which fall outside of the remit of CVE. | ||
650 | 4 | |a Al Qaeda | |
650 | 4 | |a Islamic State | |
650 | 4 | |a Propaganda | |
650 | 4 | |a digital jihad | |
650 | 4 | |a countering violent extremism | |
773 | 0 | 8 | |i Enthalten in |t Terrorism and political violence |d London : Cass, 1989 |g 35(2023), 6, Seite 1261-1298 |h Online-Ressource |w (DE-627)349234795 |w (DE-600)2080322-9 |w (DE-576)113563507 |x 1556-1836 |7 nnns |
773 | 1 | 8 | |g volume:35 |g year:2023 |g number:6 |g pages:1261-1298 |
856 | 4 | 0 | |u https://doi.org/10.1080/09546553.2022.2038575 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4363405961 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1854429795 | ||
LOK | |0 005 20230807043606 | ||
LOK | |0 008 230807||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2023-08-06#6BA18653E15A855FE13208AA5B6B2E924E9404F5 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota |a tiep | ||
ORI | |a SA-MARC-krimdoka001.raw |