More is More: Scaling up Online Extremism and Terrorism Research with Computer Vision

Scholars and practitioners investigating extremist and violent political actors’ online communications face increasingly large information environments containing ever-growing amounts of data to find, collect, organise, and analyse. In this context, this article encourages terrorism and extremism an...

Ausführliche Beschreibung

Gespeichert in:  
Bibliographische Detailangaben
1. VerfasserIn: Baele, Stéphane J. (VerfasserIn)
Beteiligte: Brace, Lewys ; Naserian, Elahe
Medienart: Elektronisch Aufsatz
Sprache:Englisch
Veröffentlicht: 2025
In: Perspectives on terrorism
Jahr: 2025, Band: 19, Heft: 1, Seiten: 34-63
Online-Zugang: Volltext (kostenfrei)
Volltext (kostenfrei)
Journals Online & Print:
Lade...
Verfügbarkeit prüfen: HBZ Gateway
Schlagwörter:

MARC

LEADER 00000caa a22000002c 4500
001 1923867865
003 DE-627
005 20250528162505.0
007 cr uuu---uuuuu
008 250429s2025 xx |||||o 00| ||eng c
024 7 |a 10.19165/2025.1559  |2 doi 
035 |a (DE-627)1923867865 
035 |a (DE-599)KXP1923867865 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Baele, Stéphane J.  |e VerfasserIn  |0 (DE-588)1150539364  |0 (DE-627)1010814842  |0 (DE-576)497068648  |4 aut 
109 |a Baele, Stéphane J. 
245 1 0 |a More is More: Scaling up Online Extremism and Terrorism Research with Computer Vision 
264 1 |c 2025 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Scholars and practitioners investigating extremist and violent political actors’ online communications face increasingly large information environments containing ever-growing amounts of data to find, collect, organise, and analyse. In this context, this article encourages terrorism and extremism analysts to use computational visual methods, mirroring for images what is now routinely done for text. Specifically, we chart how computer vision methods can be successfully applied to strengthen the study of extremist and violent political actors’ online ecosystems. Deploying two such methods - unsupervised deep clustering and supervised object identification - on an illustrative case (an original corpus containing thousands of images collected from incel platforms) allows us to explain the logic of these tools, to identify their specific advantages (and limitations), and to subsequently propose a research workflow associating computational methods with the other visual analysis approaches traditionally leveraged. 
650 4 |a Extremism 
650 4 |a Terrorism 
650 4 |a online communications 
650 4 |a computational visual methods 
650 4 |a online ecosystems 
700 1 |a Brace, Lewys  |e VerfasserIn  |0 (DE-588)1313448656  |0 (DE-627)1874883777  |4 aut 
700 1 |a Naserian, Elahe  |e VerfasserIn  |4 aut 
773 0 8 |i Enthalten in  |t Perspectives on terrorism  |d Vienna : Terrorism Research Initiative (TRI), 2007  |g 19(2025), 1, Seite 34-63  |h Online-Ressource  |w (DE-627)77139988X  |w (DE-600)2741257-X  |w (DE-576)396693253  |x 2334-3745  |7 nnas 
773 1 8 |g volume:19  |g year:2025  |g number:1  |g pages:34-63 
856 4 0 |u https://www.jstor.org/stable/27372136  |x Verlag  |z kostenfrei  |3 Volltext 
856 4 0 |u https://doi.org/10.19165/2025.1559  |x Resolving-System  |z kostenfrei  |3 Volltext 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4715517728 
LOK |0 003 DE-627 
LOK |0 004 1923867865 
LOK |0 005 20250528162505 
LOK |0 008 250429||||||||||||||||ger||||||| 
LOK |0 040   |a DE-21-110  |c DE-627  |d DE-21-110 
LOK |0 092   |o n 
LOK |0 852   |a DE-21-110 
LOK |0 852 1  |9 00 
LOK |0 935   |a krzo 
OAS |a 1 
ORI |a WA-MARC-krimdoka001.raw