Results 11 to 20 of about 253 (64)

Content moderation through removal of service: Content delivery networks and extremist websites

open access: yesPolicy &Internet, Volume 15, Issue 4, Page 544-558, December 2023., 2023
Abstract Considerable attention has been paid by researchers to social media platforms, especially the ‘big companies’, and increasingly also messaging applications, and how effectively they moderate extremist and terrorist content on their services. Much less attention has yet been paid to if and how infrastructure and service providers, further down ‘
Seán Looney
wiley   +1 more source

“Highly nuanced policy is very difficult to apply at scale”: Examining researcher account and content takedowns online

open access: yesPolicy &Internet, Volume 15, Issue 4, Page 559-574, December 2023., 2023
Abstract Since 2019, researchers examining, archiving, and collecting extremist and terrorist materials online have increasingly been taken offline. In part a consequence of the automation of content moderation by different technology companies and national governments calling for ever quicker takedowns. Based on an online survey of peers in the field,
Aaron Y. Zelin
wiley   +1 more source

Terror leaves adolescents behind: Identifying risk and protective factors for high‐school completion among survivors of terrorism

open access: yesJournal of Traumatic Stress, Volume 36, Issue 4, Page 750-761, August 2023., 2023
Abstract Terror exposure increases the risk of somatic and psychological health problems in survivors. Yet, knowledge of how such exposure affects survivors’ ability to stay in school is lacking. This study examined whether exposure to the 2011 Utøya terrorist attack in Norway impacted survivors’ ability to complete high school.
Ida F. Strøm   +5 more
wiley   +1 more source

Mobilizing religious differences and terrorism, negotiating civil rights in Egypt

open access: yesDigest of Middle East Studies, Volume 32, Issue 2, Page 84-101, Spring 2023., 2023
Abstract The Egyptian state's publication of its first National Human Rights Strategy 2021–2026 (NHRS) (2021) on the anniversary of the September 11th attacks came at the crossroads of Western pressure to improve human rights and the state's use of counterterrorism to silence voices.
Nevine Abraham
wiley   +1 more source

Considered effective? How policy evaluations and threat perceptions affect support for surveillance in the context of terrorism

open access: yesPolitics &Policy, Volume 50, Issue 5, Page 894-912, October 2022., 2022
Abstract Surveillance policies aimed at combating terrorism and improving public security can also lead to constraints on civil liberties. In view of this trade‐off between the potential benefits and risks of surveillance, it is particularly important to study how effectiveness considerations shape public support for surveillance.
Eva‐Maria Trüdinger, Conrad Ziller
wiley   +1 more source

Political consensus, economic reforms, and democratic transitions in the Middle East: Evidence from voting on Tunisian reform bills

open access: yesPolitics &Policy, Volume 50, Issue 4, Page 851-871, August 2022., 2022
Abstract This study investigates the role of political consensus in accelerating economic reforms and finds a significant negative effect of political consensus on the speed of reform votes in the parliament in Tunisia. We analyze the number of days until a reform bill was adopted in parliament to identify the causal effect of the consensus on ...
Nizar Jouini, Manel Ben Akal
wiley   +1 more source

Prophets and Loss: How “Soft Facts” on Social Media Influenced the Brexit Campaign and Social Reactions to the Murder of Jo Cox MP

open access: yesPolicy &Internet, Volume 12, Issue 2, Page 144-164, June 2020., 2020
This article examines “soft facts” about security issues in the 2016 Brexit referendum campaign. Soft facts arise when information provenance is uncertain, and are forms of malleable and contingent knowledge, such as rumors, conspiracy theories, and propaganda.
Diyana Dobreva   +2 more
wiley   +1 more source

Countering Violent Extremism Online: The Experiences of Informal Counter Messaging Actors

open access: yesPolicy &Internet, Volume 12, Issue 1, Page 66-87, March 2020., 2020
The online space is a haven for extremists of all kinds. Although efforts to remove violent and extremist content are increasing, there is a widely accepted need to also contest extremist messages with counter messages designed to undermine and disrupt extremist narratives.
Benjamin Lee
wiley   +1 more source

Do Machines Replicate Humans? Toward a Unified Understanding of Radicalizing Content on the Open Social Web

open access: yesPolicy &Internet, Volume 12, Issue 1, Page 109-138, March 2020., 2020
The advent of the Internet inadvertently augmented the functioning and success of violent extremist organizations. Terrorist organizations like the Islamic State in Iraq and Syria (ISIS) use the Internet to project their message to a global audience. The majority of research and practice on web‐based terrorist propaganda uses human coders to classify ...
Margeret Hall   +3 more
wiley   +1 more source

How does a focusing event shape public opinion? Natural experimental evidence from the Orlando mass shooting

open access: yesPolicy Studies Journal, Volume 53, Issue 2, Page 463-479, May 2025.
Abstract Policy process theories posit that focusing events can trigger significant shifts in public attention and policy preferences, thereby reshaping public agenda setting. Prior studies, however, have not clearly defined the scope of public opinion changes induced by these focusing events, leading to inconsistent empirical findings. This study aims
Youlang Zhang, Xinsheng Liu
wiley   +1 more source

Home - About - Disclaimer - Privacy