Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad

This article discusses the reasons why content moderation and control in cyberspace, being a primary means of online countering violent extremism (CVE), does not work as intended. It makes four main arguments. Firstly, despite years of efforts from CVE stakeholders, the propaganda of militant Islami...

Full description

Saved in:  
Bibliographic Details
Main Author: Lakomy, Miron (Author)
Format: Electronic Article
Language:English
Published: 2023
In: Terrorism and political violence
Year: 2023, Volume: 35, Issue: 6, Pages: 1261-1298
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000caa a22000002 4500
001 1854429795
003 DE-627
005 20230808035455.0
007 cr uuu---uuuuu
008 230807s2023 xx |||||o 00| ||eng c
024 7 |a 10.1080/09546553.2022.2038575  |2 doi 
035 |a (DE-627)1854429795 
035 |a (DE-599)KXP1854429795 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Lakomy, Miron  |e VerfasserIn  |0 (DE-588)1052351875  |0 (DE-627)788429485  |0 (DE-576)408098708  |4 aut 
245 1 0 |a Why Do Online Countering Violent Extremism Strategies Not Work? The Case of Digital Jihad 
264 1 |c 2023 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This article discusses the reasons why content moderation and control in cyberspace, being a primary means of online countering violent extremism (CVE), does not work as intended. It makes four main arguments. Firstly, despite years of efforts from CVE stakeholders, the propaganda of militant Islamist VEOs is still easily accessible on the Internet. This study has mapped hundreds of addresses engaged in digital jihadist activities at the turn of 2020–2021. It effectively proves that the current approach to online CVE brought few tangible effects. Secondly, these programs have been unevenly applied to militant Islamist organizations. There have been groups which represent violent extremist ideology but are not actively combated by stakeholders. As a result, these groups have been able to establish a solid foothold on the surface web. Thirdly, the efficiency of CVE strategies based on content takedowns are decreased by the relative ease of terrorists reestablishing banned communication channels, the availability of vast alternatives for online propaganda dissemination, the introduction of impractical legislation by governments, overlapping jurisdictions on the Internet and the “Streisand effect.” Finally, adequate strategies aimed at curbing digital jihad should be primarily based on offline and online activities which fall outside of the remit of CVE. 
650 4 |a Al Qaeda 
650 4 |a Islamic State 
650 4 |a Propaganda 
650 4 |a digital jihad 
650 4 |a countering violent extremism 
773 0 8 |i Enthalten in  |t Terrorism and political violence  |d London : Cass, 1989  |g 35(2023), 6, Seite 1261-1298  |h Online-Ressource  |w (DE-627)349234795  |w (DE-600)2080322-9  |w (DE-576)113563507  |x 1556-1836  |7 nnns 
773 1 8 |g volume:35  |g year:2023  |g number:6  |g pages:1261-1298 
856 4 0 |u https://doi.org/10.1080/09546553.2022.2038575  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4363405961 
LOK |0 003 DE-627 
LOK |0 004 1854429795 
LOK |0 005 20230807043606 
LOK |0 008 230807||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2023-08-06#6BA18653E15A855FE13208AA5B6B2E924E9404F5 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota  |a tiep 
ORI |a SA-MARC-krimdoka001.raw