"Though it’s well-known that extremist groups like al-Shabaab use social media to spread fear and recruit susceptible youth, there’s very little evidence-based research that details how at-risk youth use social media and how language is weaponized online by extremists to radicalize and recruit t
...
hese youth. By better understanding language related to violent extremism and utilizing innovative social media monitoring technologies to track radical online narratives, PeaceTech Lab has developed a solid analytical foundation that informs and supports local P/CVE efforts in Mombasa. In partnership with Wasafiri Consulting and with funding from DAI, PeaceTech Lab identified, monitored and analyzed online content and the sources of influence used by extremist groups to radicalize youth in specific communities in Mombasa, Kenya." (Publisher description)
more
"The Center for Media, Data and Society has curated a series of lectures addressing the challenges and the future of public media titled Public Media Institutions at a Crossroads: Visions, Strategies, Tactics. The speakers and themes have included a multi-dimensional outlook on what PSM institutions
...
, and public media more generally, are and can be [...] This white paper is an extended reflection on the theme of the speaker series, focusing on a specific challenge for public service media: “fake news” and disinformation, or more broadly, the current “information disorder”. The paper draws from the outlined problems and threats, as well as opportunities, strategies, and tactics discussed in the above presentations when documenting how PSM institutions around Europe have tackled the challenge. The paper builds on a background report (April 2018) for the ongoing work by the Council of Europe." (Pages 3-5)
more
"This report summarizes the findings from a research study conducted by Love Frankie to inform Search for Common Ground (Search) in developing an implementation strategy for a 24-month project to reduce the influence of violent extremist narratives online, particularly targeted at youth and ex-juven
...
ile offenders in Indonesia via social media." (Page 5)
more
"Richard Moon examines the application of hate speech laws when religion is either the source or target of such speech. Moon describes the various legal restrictions on hate speech, religious insult, and blasphemy in Canada, Europe and elsewhere, and uses cases from different jurisdictions to illust
...
rate the particular challenges raised by religious hate speech. The issues addressed are highly topical: speech that attacks religious communities, specifically anti-Muslim rhetoric, and hateful speech that is based on religious doctrine or scripture, such as anti-gay speech. The book draws on a rich understanding of freedom of expression, the harms of hate speech, and the role of religion in public life." (Publisher description)
more
"Seib traces how terrorism has proliferated and increased significantly in menace in the relatively brief period between the rise of al-Qaeda and the creation of Islamic State. With close attention to the linkages between media, religion, and violence, the book offers incisive analysis of how organi
...
zations such as Islamic State, al-Qaeda, and Boko Haram operate and reflects on how terrorism may continue to evolve. Seib argues that twenty-first-century terrorism is enabled by new media and depends on social networks as connective tissue, while interacting simultaneously with religion and socio-economic and political grievances. As Terrorism Evolves prescribes new measures for counterterrorism efforts, underscores the importance of soft power, and makes a strong case for recognizing that we have entered an era of terrorism of undetermined duration." (Publisher description)
more
"This report provides a new framework for policy-makers, legislators, researchers, technologists and practitioners working on the theoretical and practical challenges related to mis-, dis- and mal-information — the three elements of information disorder. While the historical impact of rumours and
...
fabricated content have been well documented, the complexity and scale of information pollution in our digitally-connected, increasingly polarised world presents an unprecedented challenge. There is an immediate need to work collaboratively on workable solutions and this report provides a framework for the different stakeholders involved in research, policy discussions, and technical innovations connected to this phenomenon of information disorder." (Back cover)
more
"WE CAN! is the latest addition to our toolbox against hate. The most damaging examples of hate speech are often grounded in simple stories, which are repeated over and over again in different forms. The migrants “taking our jobs” narrative, for example. Or the consistent claim, made by radicals
...
, that Islam is “under attack”. Such narratives often remain unchallenged, either because they have become commonplace, or because they are delivered in sophisticated ways. This manual will therefore help young people and educators confront, dismantle and replace hateful narratives. There are no short-cuts: the reader will not find in these pages a single statement, slogan, meme or caricature to counter all hate speech. You will, however, be guided in identifying the dangerous story-telling that chips away at our communities. Even more importantly, you will find tried and tested methods to propose powerful alternatives. Not simply telling different stories, but building and deploying more truthful accounts of the world around us which encourage others to challenge prejudice and think critically, and which deepen our knowledge and understanding of one and other." (Preface)
more
"It is becoming increasingly apparent that fundamental principles underlying democracy—trust, informed dialogue, a shared sense of reality, mutual consent, and participation—are being put to the test by certain features and attributes of social media. As technology companies increasingly achieve
...
financial success by monetizing public attention, it is worth examining some of the key issues and unintended consequences arising as a result. Six key issues: Echo chambers, polarization, and hyper-partisanship [...]; Spread of false and/or misleading information [...]; Conversion of popularity into legitimacy [...]; Manipulation by “populist” leaders, governments, and fringe actors [...]; Personal data capture and targeted messaging/advertising [...]; Disruption of the public square [...]" (Executive summary)
more
"La question des « fakes news » ou de la désinformation - on ne peut plus actuelle - se pose avec d’autant plus de légitimité et d’acuité que les mass media et les réseaux sociaux sont devenus incontournables. Le champ d’action de cette théorie de la désinformation ne relève plus seu
...
lement de l’académie militaire comme alors. On la voit à l’oeuvre dans le domaine socio-politico-économique où elle peut accompagner et entretenir des conflits, surtout à travers les médias, aussi bien entre les individus qu’entre les sociétés, peuples et nations, pour des visées non seulement politiques, mais également économiques. Cet essai se veut une analyse critico-politologique de cette « arme de guerre » ou de conflits, et offre quelques techniques pour s’en préserver, surtout en Afrique où le pourcentage d’analphabètes est très élevé et le sens critique ou l’esprit de tamisage des informations peut s’épanouir." (Dos de couverture)
more
"This guide is driven by the need not to add to the library of information on violent extremism but to underscore a message often missed: to reach young people effectively, we must respect their ability to grasp the reality of injustice, intolerance, and inequity [...] we found that three key messag
...
es emerged from our analysis of all Youth Contributor submissions. For each key message, we have identified a corresponding framework to guide policy support to empower stakeholders.
1. Peace, empathy, and compassion cannot be taught. These are skills that are only fully realized through experiential learning and lived experience.
Policy Action: Provide opportunities for exchange and interaction and create conducive environments in which young people can develop and practice these skills.
2. Start now. Stakeholders can take immediate and important actions, even small actions, to support a culture that prevents violent extremism. No one needs to wait for permission or a comprehensive set of instructions.
Policy Action: Provide resources such as technical support, financing, guidance, and networks to empower actors.
3. This is a long, slow process. Preventing violent extremism requires the development of a resilient culture. It is the work of expanding opportunity. All stakeholders can play critical roles in making this culture a reality." (Preface, page 10-11)
more
"Adama Dieng and Simona Cruciani articulate how hate speech is defined, and draw out its possible consequences. Dieng makes the distinction between hate speech and incitement. Incitement is a very dangerous form of hate speech that can trigger violence and, in some instances, atrocity crimes and eve
...
n genocide. He makes a distinction between a person standing on a street corner who may say vile, racist things, but such invective will not have the same impact as the words spoken by a national leader who calls for violence against a particular group at a time when political tensions are high. The International Covenant on Civil and Political Rights (ICCPR) states that, "Any advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence shall be prohibited by law."' Hate speech and its uses to incite hostility and violence is escalating in many parts of the world, increasingly spread over social media. Dieng and Cruciami discuss the many initiatives within the United Nations system aimed at countering hate speech and incitement, underscoring how seriously the organization takes this form of expression." (Introduction to part 1, page 11)
more
"This report identifies eight basic types of harassment present in Hungary: rhetorical aggression; trolling; bullying; threats; public shaming; violation of personal privacy; cyber attacks and site hacking; and malicious social media activity. The study found that the most common types of online har
...
assment are trolling and rhetorical aggression, which are experienced by Hungarian online journalists on a daily basis through both public and private channels. Overall, comments made through private channels are more severe. Facebook comments are generally the least aggressive in nature, followed by comment sections under individual articles. Abusive messages sent via private channels (email, Facebook messages) are the most aggressive and straightforward. Many journalists agreed that the most disturbing element of online harassment is not necessarily the harshness or explicit nature of comments but the frequency and overwhelming persistence of them." (Executive summary)
more
"The central objective of this volume has been to show that legislation against hate speech in the EU may be an effective first step towards combatting the phenomenon, but it might not be adequate on its own to contain the present situation. This is because hate speech has multiple ways of being exp
...
ressed. In this volume, we have identified several strategies of Othering that can be used to express such an unfavourable position towards members of a minority: categorisation and stereotyping, hate concealed as patriotism, metaphorical language, sarcasm, allusions and constructed dialogue can all be ‘subtle’ ways in which discrimination emerges in public discourse. And while we are not in a position, as linguists, to suggest that such strategies belong to the category of prosecutable hate speech, we think that it is safe to assume that they do form part of what we have dubbed soft hate speech." (Concluding remarks, page 87)
more
"Based on a bibliometric and scientific study of research conducted in Europe, North America, Latin America, the Caribbean, the Arab world, parts of Africa and Asia on the links between the use of social media and the phenomena of radicalization, the Report analyzes more than 550 studies published i
...
n scientific literature and “grey literature”, covering outputs in English (260), French (196) and Arabic (96). It shows that very little research has focused on the effective role of the use of social media in violent radicalization. Although many articles deal with electronic strategies and the use of the Internet and online social media for recruitment, there are very few empirical studies that describe and examine the real effects of these strategies on youth, and they rarely examine gender aspects. The Report examines the specificities of online prevention initiatives: counter/alternative narratives and media information literacy (MIL). Several formal and informal MIL initiatives have been implemented around the world according to MIL as a pedagogical practice with a specific set of skills that can respond to narratives of anger and revenge." (Executive summary, page 5)
more
"Language is one of the main ways that discrimination is enacted. In the discourse of discrimination there is a set of key words that denote the processes of prejudice. This book discusses the lexical semantics of this field of words and how, as a cognitive process, they underlie insults, hate speec
...
h, slurs, derogatory phrases, terms of abuse and other linguistic acts of discrimination. Stollznow presents a semantic analysis employing reductive paraphrase, using data sourced from naturally occurring examples and corpora. Relevant semantic phenomena are also examined, such as synonymy, polysemy, metaphor, euphemism and dysphemism, semantic shift, pejoration, amelioration and reclamation. This book examines the way people enact racism, sexism, ageism and other forms of discrimination in language." (Publisher description)
more
"Although not always consistent, Boko Haram has ensured its narrative is publicly disseminated, which is revealing for a group that is extremely secretive. Messaging creates awareness about the group and its activities, which can tie into recruitment. Messaging demonstrates a clear pattern of expand
...
ed target groups and geographic areas, while outlining group grievances. Boko Haram’s intended audience has shifted over time, but core groups have likely been augmented by expanding dynamics, rather than supplanted. Further research on Boko Haram messaging and its resonance within the local population should be conducted." (Key points, page 2)
more
"Die vorliegende Studie gliedert sich in einen einführenden Teil, in dem das Phänomen Hate Speech dargestellt ist, und einen empirischen Teil, in dem Äußerungen mit thematischen Bezug zu „Gender“, „Homosexualität“ sowie „Flucht und Islam“ im kirchlichen und diakonischen Rahmen analy
...
siert werden. Die anschließenden Kapitel beinhalten eine übergreifende Interpretation der Analyseergebnisse und bieten einen Rahmen zur Einordnung der Hasskommentare und den damit verbundenen Argumentationsstrukturen. Das nun folgende dritte Kapitel beschreibt den Weg vom Phänomen Hate Speech und dem in der Studie zugrunde liegenden Begriffsverständnis bis zu den Zielen und Forschungsanliegen dieses Projekts. Welche Daten zur Beantwortung der Forschungsfragen analysiert werden und welche spezifischen Merkmale sie aufweisen, ist Inhalt des vierten Kapitels. Darauf folgen in Kapitel 5 eine theoretische Einbettung, eine Erläuterung der methodischen Grundlagen und des Forschungsdesigns sowie eine Darstellung der Typisierung des Datenmaterials und des Aufbaus des Kategoriensystems. Im sechsten Kapitel sind in den drei thematischen Abschnitten „Gender“, „Homosexualität“ und „Flucht und Islam“ die zentralen, deskriptiven Befunde der qualitativen Analysen hinsichtlich der unterschiedlichen Formen von Hate Speech systematisch dargestellt. Anschließend ordnen wir diese Resultate im siebten Kapitel in den Bereich Diversität ein, zeichnen die Dynamik von Hate Speech und Kommentar-Verläufen nach, bündeln Erkenntnisse, diskutieren welche Erkenntnisse diese im Hinblick auf Kirche und Diakonie bringen und bieten einige theologische Ansatzpunkte zur Weiterarbeit. Dabei werden die relevanten Argumentationsstrukturen zusammenfassend erläutert. Zudem leiten wir Kriterien zur Einordnung einer degradierenden Sprachhandlung ab und erörtern die Möglichkeiten einer Abgrenzung von Hate Speech. Im Anschluss daran erfolgen in Kapitel 8 sowohl eine Reflexion der Studienergebnisse als auch ein Ausblick auf weiterführende Forschungsfragen." (Seite 17-18)
more