Narratives of Risk: Assessing the Discourse of Online Extremism and Measures Proposed to Counter It

Table of contents

Bibliographic information


Cover of Volume: S&F Sicherheit und Frieden Volume 34 (2016), Edition 4
Full access

S&F Sicherheit und Frieden

Volume 34 (2016), Edition 4


Authors:
Publisher
Nomos, Baden-Baden
Copyright year
2016
ISSN-Online
0175-274x
ISSN-Print
0175-274X

Chapter information


Full access

Volume 34 (2016), Edition 4

Narratives of Risk: Assessing the Discourse of Online Extremism and Measures Proposed to Counter It


Authors:
ISSN-Print
0175-274X
ISSN-Online
0175-274x


Preview:

The discourse surrounding digital technologies is rapidly changing, namely from an entity with the potential to generate positive political change to one that can be abused by extremists. In light of this, a new “dispositif” of risk has emerged whereby governments are seeking to address the imagined dangers posed by digital technology through a series of pre-emptive measures. By examining how the relationship between digital technology and violent extremism has been articulated in the EU’s counter-terrorism policy, this article argues that critical distance is now needed from both these utopian and/or dystopian conceptualisations of digital technology and conflict.

Bibliography


  1. Amoore, L. (2008). “Consulting, Culture, the Camp: On the Economies of Exception.” In Risk and the War on Terror, edited by L. Amoore and M. de Goede, 112–129. London: Routledge Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  2. Amoore, L. and M. de Goede. (2008). Risk and the War on Terror. New York: Routledge. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  3. Aradau, C., and R. van Munster. (2008). “Taming the Future: The Dispositif of Risk in the War on Terror.” In Risk and the War on Terror, edited by L. Amoore and M. de Goede, 23–40. London: Routledge Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  4. Archetti , C. (2013). Understanding Terrorism in the Age of Global Media: A Communication Approach, Basingstoke: Palgrave Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  5. Argomaniz, J. (2015). European Union responses to terrorist use of the Internet. Cooperation and Conflict, 50(2), 250-268. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  6. Bartlett, J. and A. Krasodomski-Jones. (2015). “Counter-speech: examining content that challenges extremism online.” Demos. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  7. Beck, U. (1992). Risk Society: Towards a New Modernity. New Delhi: Sage. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  8. Benson, D. (2014). “Why the Internet is Not Increasing Terrorism,” Security Studies 23(2), 293–328 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  9. Briggs, R. (2011). “Radicalisation: The Role of the Internet”, Institute for Strategic Dialogue: A working paper of the PPN Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  10. Bruns, A. et al. (2016). The Routledge Companion to Social Media and Politics. New York: Routledge Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  11. Carter, J., S. Maher, P. Neumann. (2014). #Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks. London: ICSR Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  12. Castells, M. (2013). Networks of outrage and Hope. London: Polity Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  13. Christensen, C. (2011). “Twitter Revolutions? Addressing Social Media and Dissent”, Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  14. The Communication Review. 14: 155-157 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  15. Coleman, P.T. (2003). ‘Characteristics of Protracted, Intractable Conflict: Toward the Development of Metaframework-1’, Peace and Conflict: Journal of Peace Psychology 9:1: 1-37. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  16. Coleman, P.T. (2004). ‘Paradigmatic Framing of Protracted Intractable Conflict: Toward the Development of a Meta Framework-ii’, Peace and Conflict: Journal of Peace Psychology 10(3): 197-235. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  17. Coleman, P.T. (2006). ‘Characteristics of Protracted, Intractable Conflict: Toward the Development of Metaframework-1’, Peace and Conflict: Journal of Peace Psychology 12(4): 325-348. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  18. Conway, M. (2016). ‘Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research, Studies in Conflict & Terrorism,’, Studies in Conflict and Terrorism. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  19. Couldry, N. (2010). ‘Theorising Media as Practice’, in B. Bräuchler and J. Postill) Theorising Media and Practice. New York: Berghann Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  20. Council of the European Union. (2015a). Europol to Standing Committee on operational cooperation on internal security, EU Internet Referral Unit at Europol – Concept note, 7266/15, Brussels, 16 March Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  21. Council of the European Union. (2015b). EU Counter-Terrorism Coordinator to Delegations, EU CTC input for the preparation of the informal meeting of Justice and Home Affairs Ministers in Riga on 29 January 2015, DS 1035/15, Brussels, 17 January Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  22. Council of the European Union. (2005). Presidency and CT Coordinator to Council/European Council, The European Union Counter-Terrorism Strategy, 144469/4/05, Brussels, 30 November Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  23. De Goede, M., and S. Simon. (2013). “Governing Future Radicals in Europe.” Antipode 45 (2): 315–335 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  24. Edwards, C., and L. Gribbon. (2013). “Pathways to violent extremism in the digital era.” The RUSI Journal 158(5), 40-47 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  25. Ericson, R. (2008). “The state of preemption: Managing terrorism risk through counter law” in Risk and the War on Terror. New York: Routledge Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  26. Europol. (2015). TE-SAT 2015: EU Terrorism Situation and Trend Report. Europol Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  27. Europol. (2014). TE-SAT 2014: EU Terrorism Situation and Trend Report. Europol Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  28. Europol. (2013). TE-SAT 2013: EU Terrorism Situation and Trend Report. Europol Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  29. Ferguson, K. (2016). “Countering violent extremism through media and communication strategies: a review of the evidence.” Partnership for Conflict, Crime and Security Research Report. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  30. Gerbaudo, P. (2012). Tweets and Streets: Social Media and Contemporary Acitivism. London: Pluto Press. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  31. Grusin, R. (2010). Premediation: Affect and Mediality After 9/11. New York: Palgrave McMillan. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  32. Ghonim, W. (2012). Revolution 2.0: the Power of the People is Greater Than the People in Power: a Memoir. New York: Houghton Mifflin Harcourt Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  33. Giddens, A. (1999). “Risk and Responsibility” Modern Law Review 62(1): 1-10 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  34. Gill, P. et al. (2015). What Are the Roles of the Internet in Terrorism. VOX-Pol Network of Excellence. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  35. Gray, D and A. Head. (2009). “The Importance of the Internet to the Post-modern Terrorist and its Role as a Form of Safe Haven,” European Journal of Scientific Research 25(3) Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  36. Grusin, R. (2010). Premediation: Affect and Mediality After 9/11. New York: Palgrave McMillan. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  37. Hobart, M. (2010). ‘What Do We Mean By Media Practices?’, p. 55-77 in B. Bräuchler and J. Postill (s) Theorising Media and Practice. New York: Bergham Books Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  38. Johnson, A.G, B. Tudor, H. Nuserbeigh. (2013). “140 Characters or Less: How is the Twitter Medisacape Influencing the Egyptian Revolution.” Middle East Journal of Culture and Communication. 6. 126-148 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  39. Laclau, E. and C. Mouffe. (1985). Hegemony & Socialist Strategy. London: Routledge. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  40. Macquire, T. (2011). ‘New Media and Islamism in the Arab Winter: a Case Study of Huda Tv in Pre-revolutionary Egypt’, Journal of Arab and Muslim Media Research Volume 4, No 2&3: 237-252 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  41. Massumi, B. (2007). “Potential Politics and the Primacy of Pre-Emption.” Theory & Event 10 (2) Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  42. Martin, T. (2014). ‘Governing an Unknowable Future: the Politics of Britain’s Prevent Policy’, Critical Studies on Terrorism 7:1: 62-78. Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  43. Morozov, E. (2012). The Net Delusion: the Dark Side of Internet Freedom. Reprint. edition. PublicAffairs Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  44. Mosco, V. (2005). The Digital Sublime: Myth, Power, and Cyberspace. The MIT Press Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  45. Neumann, P. (2012). “Countering Online Radicalization in America”, Bipartisan Policy Center, Homeland Security Project, USA Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  46. Nouri, L. and A. Whiting. (2014). ‘Prevent and the internet’. In: Baker-Beall, C., C. Heath-Kelly, and L. Jarvis (eds.). Counter-radicalisation: Critical perspectives. London: Routledge, 175-189.Oh, O., Eom, C., and H. R. Rao, (2015). “Research note – Role of social media in social change: An analysis of collective sensemaking during the 2011 Egypt revolution.” Information Systems Research, 26(1), 210–223 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  47. Pauwels, L., and N. Schils. (2016). “Differential online exposure to extremist content and political violence: testing the relative strength of social learning and competing perspectives.” Terrorism and Political Violence 28(1), 1-29 Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  48. Wojcieszak, M. (2010). “‘Don’t talk to me’: effects of ideologically homogeneous online groups and politically dissimilar offline ties on extremism”, New Media and Society Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236
  49. Von Behr, I., A. Reding, C. Edwards, and L. Gribbon. (2013). Radicalisation in the digital era: The use of the Internet in 15 cases of terrorism and extremism. Brussels: Rand Open Google Scholar doi.org/10.5771/0175-274X-2016-4-236

Citation


Download RIS Download BibTex