Janvier 2021 Bibliography updated Studies of the process of digital radicalization - Zenodo

Page created by Louise Welch
 
CONTINUE READING
Janvier 2021 Bibliography updated Studies of the process of digital radicalization - Zenodo
1 janvier 2021
                                        Bibliography updated
                  Studies of the process of digital radicalization
                        Séraphin ALAVA University of Toulouse – Member for Unesco Prev

                 {DARING POPULAR EDUCATION & PREVENTING EXTREMISM}

                           Réseaux des Savoirs - France

Knowledge Activists / Militants des savoirs            2021                seraphin.alava@univ-tlse2.fr
Bibliography "Studies of the process
                  of digital radicalization".
                           PR. Séraphin ALAVA 2020 Chair Unesco Prev - https://chaireunesco-
                                                                          prev.ca/en/home/

          Background :

          The selective bibliography presented here focuses on interdisciplinary research developed
          over the past 6 years on three major themes for the prevention of radicalization, violent
          extremism and online hate speech. We wanted to gather in one bibliography at a time:
              • Research that describes and understands the processes of online radicalization,
                 encompassing terrorist propaganda, extremist activism and online recruitment
                 processes.
              • Research that promotes the construction of conceptual, technical, and methodological
                 tools for the analysis and characterization of hate and extremist discourse.
              • Evaluative research on counter-discourse or counter-narrative deployment policies by
                 seeking to take stock of evaluations, impact measures and innovations.
              • Technological research using big datas, datasphere analysis, development of effective
                 action tools to fight online terrorism and online extremism.

          We are aware that this list is dated from 2015 to 2021. We strive to describe each result and
          provide a comprehensive literature review that selects the best research advances.
          We hope you find this bibliography useful in answering the three key social questions when
          addressing these areas:
             A) Are you sure that the digital world has become a space for radicalization and extremist
                 recruitment?
             B) But how can we limit, on a regular basis, these dangers on the Internet?
             C) But is the fight possible? How to act on a daily basis.

          Liste des références :

             [1] Agarwal S. (2015). Applying Social Media Intelligence for Predicting and
                 Identifying On-line Radicalization and         Civil    Unrest   Oriented   Threats.
                 arXiv:1511.06858v1 [cs.CY] 21 Nov 2015
             [2] Gaudette T., Scrivens R. et Venkatesh V. (2020). The Role of the Internet in
                 Facilitating Violent Extremism: Insights               from Former      Right-Wing
                 Extremists. Terrorism         and                      Political          Violence.
                 DOI: 10.1080/09546553.2020.1784147

Knowledge Activists / Militants des savoirs           2021                seraphin.alava@univ-tlse2.fr
[3] Agarwal, I., Xie, O.,Vovsha, R., Rambow, R. Passonneau, “Sentiment Analysis of
                 Twitter Data", In Proceedings of the ACL 2011Workshop on Languages in Social
                 Media,2011 , pp. 30-38, 2011
             [4] Agarwal, S., & Sureka, A. (2015, February). Using knn and svm based one-class
                 classifier for detecting online radicalization on twitter. In International
                 Conference on Distributed Computing and Internet Technology (pp. 431-442).
                 Springer, Cham.
             [5] Aggarwal, Neil Krishan. 2016. The Taliban’s Virtual Emirate: The Culture and Psychology
                 of an Online Militant Com- munity. New York: Columbia University Press.
             [6] Akemi Takeoka Chatfield et al. (2015). Tweeting propaganda, radicalization and
                 recruitment: Islamic state supporters multi-sided twitter networks. Proceedings
                 of the 16th Annual International Conference on Digital Government
                 ResearchMay 2015 Pages 239–249
             [7] Alava S., D Frau-Meigs, G Hassan. (2017). Youth and violent extremism on social
                 media: mapping the research. Unesco
             [8] Alava Séraphin, Frau-Meigs Divina, Hassan Ghayda, "How to qualify the
                 relationship between social media and radicalization processes leading to
                 violence? . Note de synthèse internationale", Quaderni, 2018/1 (n° 95), p. 39-52
             [9] Alexander, Audrey. 2017. Digital Decay: Tracing Change Over Time among English-
                 Language Islamic State Sympathizers on Twitter. Washington, D.C.: George
                 Washington Uni- versity Program on Extremism. https://extremism.g-
                 wu.edu/sites/g/files/zaxdzs2191/f/DigitalDecayFinal_- 0.pdf.
             [10] Allendorfer, W. H., & Herring, S. C. (2015). ISIS vs. the US government: A war of
                 online video propaganda. First Monday, 20(12).
             [11] Al-Rawi, Ahmed. 2016. Video Games, Terrorism, and ISIS’s Jihad 3.0. Terrorism and
                  Political Violence 30 (4): 740–60. http://www.tandfonline.com/doi/full/
                  10.1080/09546553.2016.1207633.
             [12] Al-Saud, Abdullah bin Khaled. 2017. The Tranquillity Cam- paign: A Beacon of Light in
                  the Dark World Wide Web. Perspectives on Terrorism 11 (2): 58–64.
             [13] Al-Shishani, Murad Batal. 2010. Taking Al-Qaeda’s Jihad to Facebook. Jamestown
                  Terrorism Monitor 5 (4): 3–4.
             [14] Amarasingam, Amarnath. 2015. Elton “Ibrahim” Simpson’s Path to Jihad in Garland,
                  Texas. War on the Rocks, May 14. https://warontherocks.com/2015/05/elton-
                  ibrahim- simpsons-path-to-jihad-in-garland-texas/.
             [15] Anzalone, Christopher. 2010. From “Martyrdom” Videos to Jihadi Journalism in
                  Somalia.         Informed           Comment,           25          Au-          gust.
                  https://www.juancole.com/2010/08/anzalone-from-
                  %E2%80%98martyrdom%E2%80%99-videos-to-jihadi- journalism-in-somalia.html.
             [16] Anzalone, Christopher. 2016. Continuity and Change: The Evolution and Resilience of
                  Al-Shabab’s Media Insur- gency, 2006–2016. Hate Speech International, 9 November.
                  https://www.hate-speech.org/new-report-on-al-shabab- media/.

Knowledge Activists / Militants des savoirs           2021               seraphin.alava@univ-tlse2.fr
[17] Archetti, Christina. 2013. Understanding Terrorism in the Age of Global Media: A
                 Communication Approach. New York: Palgrave Macmillan.
             [18] Archetti, Christina. 2018. The Unbearable Thinness of Strategic Communication. In
                 Countering Online Propaganda and Violent Extremism: The Dark Side of Digital Dip-
                 lomacy, ed. Comeliu Bjola and James Pamment, 81–96. Abingdon-on-Thames:
                 Routledge.
             [19] Ascone, L., & Longhi, J. (2017). The expression of threat in jihadist propaganda.
                 Fragmentum, (50), 85-98. [58]
             [20] Ashcroft, M., Fisher, A., Kaati, L., Omer, E., & Prucha, N. (2015, September).
                 Detecting jihadist messages on twitter. In Intelligence and Security
                 Informatics Conference (EISIC), 2015 European (pp. 161-164). IEEE.
             [21] Atton, Christina. 2006. Far-Right Media on the Internet: Culture, Discourse and Power.
                  New Media and Society 8 (4): 573–87.
             [22] Awan, Imran. 2017. Cyber-Extremism: Isis and the Power of Social Media. Society 54
                  (2): 138–49.
             [23] Badawy, A., & Ferrara, E. (2017). The Rise of Jihadist Propaganda on Social
                 Networks. arXiv preprint arXiv:1702.02263.
             [24] Bartlett, Jamie, and Alex Krasomdomski-Jones. 2016. Counter-speech on Facebook.
                  London: DEMOS. https:// www.Demos.co.uk/wp-content/uploads/2016/09/ Counter-
                  speech-on-facebook-report.pdf.
             [25] Bean, Hamilton, and Amanda Edgar. 2017. A Genosonic Analysis of ISIL and US
                  Counter-Extremism Video Mes- sages. Media, War, and Conflict 10 (3): 327–44.
             [26] Benson, David C. 2014. Why the Internet Is Not Increasing Terrorism. Security Studies
                  23 (2): 293–328.
             [27] Bergen, Peter, Bruce Hoffmann, Michael Hurley, and Erroll Suthers. 2013. Jihadist
                  Terrorism: A Threat Assessment. Washington, DC: Bipartisan Policy Centre.
             [28] Bergen, Peter. 2016. ISIS Online: Countering Terrorist Radicalization and Recruitment
                  on the Internet and Social Media. [Prepared testimony]. Washington, DC: Committee
                  on Homeland Security. https://www.hsgac.senate.gov/down- load/bergen-
                  testimony_psi-2016-07-05.
             [29] Berger, J. M. (2015). Tailored online interventions: The islamic state’s recruitment
                 strategy. CTC Sentinel, 8(10), 19- 23.
             [30] Berger, J. M. 2015. How Terrorists Recruit Online (and How to Stop It). Brookings
                  Institution,         Markaz             blog,         9           Novem-           ber.
                  https://www.brookings.edu/blog/markaz/2015/11/09/ how-terrorists-recruit-online-
                  and-how-to-stop-it/.
             [31] Berger, J. M. 2016. Nazis vs. ISIS on Twitter: A Comparative Study of White Nationalist
                  and ISIS Online Social Media Networks. Washington, DC: George Washington Univer-
                  sity         Program          on         Extremism.         https://cchs.gwu.edu/files/
                  downloads/Nazis%2520v.%2520ISIS%2520Final_0.pdf.
             [32] Berger, J. M. 2017. Deconstruction of Identity Concepts in Is- lamic State Propaganda:
                  A Linkage-Based Approach to Counter-Terrorism Strategic Communications. The

Knowledge Activists / Militants des savoirs           2021                seraphin.alava@univ-tlse2.fr
Hague:          EUROPOL.              https://icct.nl/wp-content/uploads/2017/06/
                 bergerjm_deconstructionofislamicstatetexts.pdf.
             [33] Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and describing
                 the population of ISIS supporters on Twitter. The Brookings Project on US Relations
                 with the Islamic World, 3(20), 4-1.
             [34] Berger, J. M., & Perez, H. (2016). The Islamic State's Diminishing Returns on
                 Twitter: How Suspensions are Limiting the Social Networks of English-speaking
                 ISIS Supporters. George Washington University.
             [35] Berger, J. M., & Strathearn, B. (2013). Who Matters Online: Measuring
                 Influence, Evaluating Content and Countering Violent Exremism in Online
                 Social Networks. International Centre for the Study of Radicalisation and
                 Political Violence.
             [36] Berger, J. M., and Heather Perez. 2016. The Islamic State’s Di- minishing Returns on
                  Twitter: How Suspensions are Limit- ing the Social Networks of English-Speaking ISIS
                  Support- ers. Washington, DC: George Washington University Program on
                  Extremism.                                              https://cchs.gwu.edu/sites/cch-
                  s.gwu.edu/files/downloads/Berger_Occasional%20Paper-pdf.
             [37] Berger, J. M., and Jessica Stern. 2015. Isis: The State of Terror.New York: HarperCollins.
             [38] Berger, J. M., and Jonathon Morgan. 2015. The ISIS Twitter Census: Defining and
                  Describing the Population of ISIS Supporters on Twitter. Washington, DC: Brookings
                  Insti-            tution.            https://www.brookings.edu/wp-content/uploads/
                  2016/06/isis_twitter_census_berger_morgan.pdf.
             [39] Bermingham, A., Conway, M., McInerney, L., O'Hare, N., & Smeaton, A. F. (2009,
                 July). Combining social network analysis and sentiment analysis to explore the
                 potential for online radicalisation. In Social Network Analysis and Mining, 2009.
                 ASONAM'09. International Conference on Advances in (pp. 231-236). IEEE.
             [40] Bermingham, Adam, Maura Conway, Lisa McInerny, Neil O’Hare, and Alan
                 Smeaton. 2009. Combining Social Net- work Analysis and Sentiment Analysis to
                 Explore the Po- tential for Online Radicalisation: In Proceedings of the 2009
                 International Conference on Advances in Social Net- work Analysis and Mining, 231–
                 36. http://doras.dcu.ie/ 4554/.
             [41] Bloom, M., & Daymon, C. (2018). Assessing the Future Threat: ISIS's Virtual
                 Caliphate. Orbis.
             [42] Bloom, Mia, Hicham Tiflati, and John Horgan. 2017. Navig- ating ISIS’s Preferred
                  Platform:    Telegram.      Terrorism      and    Political   Violence, July, 1–13.
                  http://www.tandfonline.- com/doi/full/10.1080/09546553.2017.1339695.
             [43] Bonanate, Luigi. 1979. Some Unanticipated Consequences of Terrorism. Journal of
                  Peace Research 3 (16): 197–211.
             [44] Bowman-Grieve, Lorraine. 2009. Exploring “Stormfront”: A Virtual Community of the
                  Radical Right. Studies in Con- flict and Terrorism 32 (11): 989–1007.
             [45] Brantly, Aaron. 2017. Banning Encryption to Stop Terrorists: A Worse Than Futile
                  Exercise. Combating Terrorism Cen- ter Sentinel 10 (5): 29–33.

Knowledge Activists / Militants des savoirs            2021                 seraphin.alava@univ-tlse2.fr
[46] Briggs, Rachel, and Sebastien Feve. 2014. Counter the Appeal of Extremism Online.
                  London:           Institute           for      Strategic        Dia-          logue.
                  https://www.dhs.gov/sites/default/files/publica-
                  tions/Countering%20the%20Appeal%20of%20Extremism%20Online-
                  ISD%20Report.pdf.
             [47] Burris, Val, Eemery Smith, and Ann Strahm. 2000. White Su- premacist Networks on the
                  Internet. Sociological Focus 33 (2): 215–35.
             [48] Cabrera L., R., Pardo, A. G., Benouaret, K., Faci, N., Benslimane, D., & Camacho, D.
                 (2017). Measuring the radicalisation risk in social networks. IEEE Access, 5, 10892-
                 10900.
             [49] Callimachi, Rukmini. 2015. ISIS and the Lonely Young American. New York Times,
                  27 June. https:// www.nytimes.com/2015/06/28/world/americas/isis-on- line-
                  recruiting-american.html.
             [50] Callimachi, Rukmini. 2017. Not “Lone Wolves” After All: How ISIS Guides World’s
                  Terror Plots from Afar. New York Times, 4 February. https://www.nytimes.com/
                  2017/02/04/world/asia/isis-messaging-app-terror- plot.html.
             [51] Camacho, D., Gilpérez-López, I., Gonzalez-Pardo, A., Ortigosa, A., & Urruela, C.
                 (2016, November). RiskTrack: a new approach for risk assessment of radicalisation
                 based on social media data. In CEUR Workshop Proceedings.
             [52] Camstoll Group. 2016. Use of Social Media by Terrorist Fun- draisers and Financiers.
                 Los Angeles and Washington, D.C.: Camstoll Group. https://www.camstoll.com/wp-
                 content/uploads/2016/04/Social-Media-Report- 4.22.16.pdf.
             [53] Cano Basave, A. E., He, Y., Liu, K., & Zhao, J. (2013). A weakly supervised bayesian
                 model for violence detection in social media.
             [54] Caren, Neal, Kay Jowers, and Sarah Gaby. 2012. A Social Movement Online
                  Community: Stormfront and the White Nationalist Movement. In Media,
                  Movements, and Political Change, ed. Jennifer Earl and Deana A. Rohlinger, 163–93
                  . Bingley, UK: Emerald Group.
             [55] Carter Center. 2016. Countering Daesh Propaganda: Action- Oriented Research for
                  Practical      Policy      Outcomes.      Atlanta,     GA:     Carter      Center.
                  https://www.cartercenter.org/re-
                  sources/pdfs/peace/conflict_resolution/countering-isis/
                  counteringdaeshpropaganda-feb2016.pdf.
             [56] Carter, Joseph A., Shiraz Maher, and Peter R. Neumann. 2014. #Greenbirds:
                  Measuring Importance and Influence in Syrian Foreign Fighter Networks. London:
                  International Centre for the Study of Radicalisation. https://icsr.info/ wp-
                  content/uploads/2014/04/ICSR-Report-Greenbirds-         Measuring-Importance-and-
                  Influence-in-Syrian-Foreign- Fighter-Networks.pdf.
             [57] Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting
                 propaganda, radicalization and recruitment: Islamic state supporters multi-
                 sided twitter networks. In Proceedings of the 16th Annual International
                 Conference on Digital Government Research (pp. 239-249). ACM.

Knowledge Activists / Militants des savoirs          2021                seraphin.alava@univ-tlse2.fr
[58] Chen, H., Chung, W., Qin, J., Reid, E., Sageman, M., & Weimann, G. (2008).
                 Uncovering the dark Web: A case study of Jihad on the Web. Journal of the
                 Association for Information Science and Technology, 59(8), 1347-1359.
             [59] Chouliaraki, Lilie, and Angelos Kissas. 2017. The Communic- ation of Horrorism: A
                  Typology of ISIS Online Death Videos. Critical Studies in Media Communication 35 (1):
                  24–39.
             [60] Conway, Maura, and Lisa McInierney. 2008. Jihadi Video and Auto-Radicalisation:
                  Evidence from an Exploratory Youtube Study. In Intelligence and Security
                  Informatics, ed. Daniel Ortiz-Arroyo, Henrik Legind Larsen, Daniel Dajun Zeng, David
                  Hicks, and Gerhard Wagner, 108–18. Esbjerg: EuroISI.
             [61] Conway, Maura, Moign Khawaja, Suraj Lakhani, Jeremy Reffin, Andrew Robertson, and
                  David Weir. 2017. Disrupt- ing Daesh: Measuring Takedown of Online Terrorist Mater-
                  ial and its Impacts. N.p.: VOX-Pol. http://www.voxpol.eu/ download/vox-
                  pol_publication/DCUJ5528-Disrupting- DAESH-1706-WEB-v2.pdf.
             [62] Conway, Maura. 2005. Terrorist Web Sites: Their Contents, Functioning, and
                  Effectiveness. In New Media and the New Middle East, ed. Philip Seib, 235–58. New
                  York: Pal- grave Macmillan.
             [63] Conway, Maura. 2012. From Al-Zarqawi to Al-Awlaki: The Emergence and Development
                  of an Online Radical Mi- lieu. CTX: Combating Terrorism Exchange 2 (4): 12–22.
             [64] Correa, D., & Sureka, A. (2013). Solutions to detect and analyze online
                 radicalization: a survey. arXiv preprint arXiv:1301.4916.
             [65] De Koster, Willem, and Dick Houtman. 2008. “Stormfront Is Like a Second Home to
                 Me”: On Virtual Community Formation by Right-Wing Extremists. Information, Com-
                 munication and Society 11 (8): 1155–76.
             [66] De Smedt, T., De Pauw, G., & Van Ostaeyen, P. (2018). Automatic Detection of
                 Online Jihadist Hate Speech. arXiv preprint arXiv:1803.04596.
             [67] Della Porta, Donatella, and Gary LaFree. 2012. Processes of Radicalization and De-
                 Radicalization. International Journal of Conflict and Violence 6 (1): 4–10.
             [68] Derbas, N., Segond, F., Padró, M., Dusserre, E., Dobre, T., Monaci, S., &
                 Mastrobuoni, G. (2017, August). Semantic analysis supporting de-radicalisation. In
                 Database and Expert Systems Applications (DEXA), 2017 28th International
                 Workshop on (pp. 17-21). IEEE.
             [69] Diaz, Alexandro R., Jongeun Choi, Thomas J. Holt, Steven Chermak, and Joshua D.
                  Freilich. 2016. Data-driven Sys- tem Identification of the Social Network Dynamics
                  in Online Postings of an Extremist Group. In 2016 IEEE In- ternational Conference on
                  Cybercrime and Computer Forensic, ed. Barry Cartwright, George Weir and Laurie
                  Yiu-Chung Lau, n.p. N.p.: IEEE.
             [70] Donelan, Helen. 2009. Online Communication and Collabora- tion: A Reader. Abingdon-
                  on-Thames: Routledge.
             [71] Douglas, Karen, Graig McGarty, Ana-Maria Bliuc, and Gir- ish Lala. 2005.
                  Understanding Cyberhate: Social Compet- ition and Social Creativity in Online White
                  Supremacist Groups. Social Science Computer Review 23 (1): 68–76.

Knowledge Activists / Militants des savoirs          2021                seraphin.alava@univ-tlse2.fr
[72] Elga Sikkens, Marion van San, Stijn Sieckelinck. (2016). Participant Recruitment
                 through Social Media: Lessons Learned from a Qualitative Radicalization Study
                 Using Facebook. Sagejournals, Volume: 29 issue: 2, page(s): 130-139
             [73] Emma Morris (2016) Children: extremism and online radicalization, Journal of
                 Children and Media, 10:4, 508-514
             [74] Farwell, James P. 2014. The Media Strategy of ISIS. Survival 56 (6): 49–55.
             [75] Fernandez, M., Asif, M., & Alani, H. (2018). Understanding the Roots of
                 Radicalisation on Twitter.
             [76] Ferrara, E. (2017). Contagion dynamics of extremist propaganda in social
                 networks. Information Sciences, 418, 1- 12
             [77] Ferrara, E., Wang, W. Q., Varol, O., Flammini, A., & Galstyan, A. (2016,
                 November). Predicting online extremism, content adopters, and interaction
                 reciprocity. In International conference on social informatics (pp. 22-39). Springer,
                 Cham.
             [78] Feuer, Alan. 2018. One Brooklyn Man’s Lonely Journey to Ji- had. New York Times, 3
                  January. https://www.nytimes.- com/2018/01/03/nyregion/akhror-saidakhmetov-
                  terror- brooklyn-nyc.html.
             [79] Fioretti, Julia. 2017. Social Media Giants Step Up to Join Fight Against Extremist
                  Content. Reuters, 26 June. https://www.reuters.com/article/us-internet-extremism/
                  social-media-giants-step-up-joint-fight-against-extrem- ist-content-idUSKBN19H20A.
             [80] Frampton, Martyn, Ali Fisher, and Nico Prucha. 2017. The New Netwar: Countering
                  Extremism Online. London: Policy Exchange. https://policyexchange.org.uk/wp-con-
                  tent/uploads/2017/09/The-New-Netwar-1.pdf.
             [81] Freiburger, Tina, and Jeffrey Crane. 2008. A Systematic Ex- amination of Terrorist Use
                  of the Internet. International Journal of Cyber Criminology 2 (1): 309–19.
             [82] Fu, T., Abbasi, A., & Chen, H. (2010). A focused crawler for Dark Web forums.
                 Journal of the Association for Information Science and Technology, 61(6), 1213-
                 1231.
             [83] Gambhir, Harleen. 2016. The Virtual Caliphate: ISIS’s Inform- ation Warfare.
                  Washington,        DC:       Institute    for     the      Study         of       War.
                  http://www.understandingwar.org/backgrounder/                 virtual-caliphate-isiss-
                  information-warfare.
             [84] Gartenstein-Ross, Daveed, and Madeleine Blackman. 2017. ISIL’s Virtual Planners: A
                  Critical   Terrorist     Innovation.    War    on    the    Rocks,      4     January.
                  https://warontherocks.com/ 2017/01/isils-virtual-planners-a-critical-terrorist-innova-
                  tion/.
             [85] Gartenstein-Ross, Daveed, and Nathaniel Barr. 2016. The Myth of Lone-Wolf
                  Terrorism.      Foreign     Affairs.   http://   www.defenddemocracy.org/media-
                  hit/gartenstein-ross- daveed-the-myth-of-lone-wolf-terrorism/.
             [86] Gartenstein-Ross, Daveed, Nathaniel Barr, and Bridget Moreng. 2016. The Islamic
                  State’s Global Propaganda Strategy. The Hague: International Centre for Counter-

Knowledge Activists / Militants des savoirs           2021               seraphin.alava@univ-tlse2.fr
Terrorism. https://www.icct.nl/wp-content/uploads/ 2016/03/ICCT-Gartenstein-Ross-
                  IS-Global-Propaganda- Strategy-March2016.pdf.
             [87] Gates, Scott, and Sukanya Podder. 2015. Social Media, Re- cruitment, Allegiance
                  and the Islamic State. Perspectives on Terrorism 9 (4): 107–16.
                  http://www.terrorismanalysts.- com/pt/index.php/pot/article/view/446.
             [88] Geeraerts, Sanne B. 2012. Digital Radicalization of Youth. Social Cosmos 3 (1): 25–
                  32.
             [89] Gendron, Angela. 2017. The Call to Jihad: Charismatic Preachers and the Internet.
                  Studies in Conflict and Terror- ism 40 (1): 44–61.
             [90] Gerstenfeld, Phyllis B., Diana R. Grant, and Chau-Pu Chi- ang. 2003. Hate Online: A
                  Content Analysis of Extremist Internet Sites. Analyses of Social Issues and Public Policy
                  3 (1): 29–44.
             [91] G Hassan, S Brouillette-Alarie, S Alava, D Frau-Meigs, L Lavoie, A Fetiu (2019).Exposure
                  to extremist online content could lead to violent radicalization: A systematic review of
                  empirical evidence. International journal of developmental science 12 (1-2), 71-88
             [92] Ghajar-Khosravi, S., Kwantes, P., Derbentseva, N., & Huey, L. (2016). Quantifying
                 salient concepts discussed in social media content: An analysis of tweets posted
                 by ISIS fangirls. Journal of Terrorism Research, 7(2), 79-90.
             [93] Gill, Paul, Emily Corner, Maura Conway, Amy Thornton, Mia Bloom, and John
                  Horgan. 2017. Terrorist Use of the Internet by the Numbers: Quantifying
                  Behaviours, Pat- terns, and Processes. Criminology and Public Policy 16 (1): 99–117.
             [94] Gill, Paul, John Horgan, and Paige Deckert. 2014. Bombing Alone: Tracing the
                  Motivations and Antecedent Behavi- ors of Lone-Actor Terrorists. Journal of Forensic
                  Sciences 59 (2): 425–35.
             [95] Goldman, Zachary K., Elli Maruyama, Elizabeth Rosenberg, Edoardo Saravalle, and Julia
                  Solomon-Strauss. 2017. Ter- rorist Use of Virtual Currencies: Containing the Potential
                  Threat.     Washington,    DC:     CNAS.     http://www.lawandse-      curity.org/wp-
                  content/uploads/2017/05/CLSCNASReport- TerroristFinancing-Final.pdf.
             [96] Gomes, B. G., Holanda, P. H., Couto da Silva, A. P., & Goussevskaia, O. (2017,
                 October). Profiling ISIS Supporters on Twitter. In Proceedings of the 23rd
                 Brazillian Symposium on Multimedia and the Web (pp. 457-460). ACM.
             [97] Guidère Mathieu, "Internet, High Place of Radicalization", Pouvoirs, 2016/3 (No.
                 158), pp. 115-123. URL: https://www.cairn.info/revue-pouvoirs-2016-3-page-
                 115.htm
             [98] Hartung, M., Klinger, R., Schmidtke, F., & Vogel, L. (2017, June). Identifying Right-
                 Wing Extremism in German Twitter Profiles: a Classification Approach. In
                 International Conference on Applications of Natural Language to Information
                 Systems (pp. 320-325). Springer, Cham.
             [99] Hegghammer, Thomas. n.d. Interpersonal Trust on Jihadi In- ternet Forums.
                 Unpublished manuscript.
             [100]      Hoffman, Bruce. 2006. Using the Web as a Weapon: The Inter- net as a Tool for
                 Violent Radicalization and Homegrown Terrorism. [Prepared Testimony]. Washington,

Knowledge Activists / Militants des savoirs            2021                seraphin.alava@univ-tlse2.fr
DC:     Com-       mittee      on     Homeland       Security.    https://fas.org/irp/con-
                 gress/2007_hr/web.pdf.
             [101]       Hoffman, Bruce. 2008. The Myth of Grass-Roots Terrorism: Why Osama bin
                 Laden Still Matters. Foreign Affairs 87 (3): 133–38.
             [102]       Hoffman, Bruce. 2017. Inside Terrorism. New York: Columbia University Press.
             [103]       Holbrook, Donald. 2013. Far Right and Islamist Extremist Discourses: Shifting
                 Patterns of Enmity. In Extreme Right Wing Political Violence and Terrorism, ed. Max
                 Taylor, P.
             [104]       Holbrook, Donald. 2015. A Critical Analysis of the Role of the Internet in the
                 Preparation and Planning of Acts of Terrorism. Dynamics of Asymmetric Conflict 8
                 (2): 121–33.
             [105]       Holbrook, Donald. 2017. What Types of Media Do Terrorists Collect? An Analysis
                 of Religious, Political, and Ideological Publications Found in Terrorism Investigations in
                 the UK. The Hague: International Centre for Counter-Terrorism. https://icct.nl/wp-
                 content/uploads/2017/09/ICCT-Hol-             brook-What-Types-of-Media-Do-Terrorists-
                 Collect-Sept- 2017-2.pdf.
             [106]       Hoskins, Andrew, and Ben O’Loughlin. 2009. Media and the Myth of
                 Radicalisation. Media, War, and Conflict 2 (2): 107–10.
             [107]       Hoyle, Carolyn, Alexandra Bradford, and Ross Frenett. 2015. Becoming Mulan?
                 Female Western Migrants to ISIS. Lon- don: Institute for Strategic Dialogue.
                 https://www.isdg-             lobal.org/wp-content/uploads/2016/02/ISDJ2969_Becom-
                 ing_Mulan_01.15_WEB.pdf.
             [108]       Huey, Laura, and Hillary Peladeau. 2016. Cheering on the Ji- had: An Exploration
                 of Women’s Participation in Online Pro-Jihadist Networks. Waterloo, Ontario: The
                 Canadian Network for Research on Terrorism, Security and Society. http://tsas.ca/wp-
                 content/uploads/2016/05/TSASWP16- 07_Huey-Peladeau.pdf.
             [109]     Huey, Laura. (2015). This is Not Your Mother's Terrorism: Social Media,
                 Online Radicalization and the Practice of Political Jamming. Journal of Terrorism
                 Research . May 2015, Vol. 6 Issue 2, p1-16. 16p
             [110]       Hughes, Seamus, and Alexander Meleagrou-Hitchens. 2017. The Threat to
                 the United States from the Islamic State’s Virtual Entrepreneurs. Combating
                 Terrorism Center Sen- tinel 10 (31): 1–8.
             [111]       Iannaccone, Laurence, and Eli Berman. 2006. Religious Ex- tremism: The
                 Good, The Bad, and the Deadly. Public Choice 128 (1): 109–29.
             [112]       Ingram, Haroro J. 2016a. A “Linkage-Based” Approach to Combating
                 Militant Islamist Propaganda: A Two-Tiered Framework for Practitioners. The
                 Hague: International Centre for Counter-Terrorism. https://icct.nl/wp-content/
                 uploads/2016/11/ICCT-Ingram-A-Linkage-Based-Ap- proach-Nov2016.pdf.
             [113]       Ingram, Haroro J. 2016b. An Analysis of Inspire and Dabiq: Lessons from AQAP
                 and Islamic State’s Propaganda War. Studies in Conflict & Terrorism 40 (5): 357–375.
             [114]       Ingram, Haroro J., and Craig Whiteside. 2017. The Yemen Raid and the Ghost
                 of         Anwar        al-Awlaki.        Atlantic,         9         Febru-     ary.
                 https://www.theatlantic.com/international/archive/ 2017/02/yemen-raid-trump-
                 awlaki-al-qaeda-isis/516180/.
             [115]       Ingram, Haroro J.. 2015. The Strategic Logic of Islamic State Information
                 Operations. Australian Journal of Interna- tional Affairs 69 (6): 729–52.

Knowledge Activists / Militants des savoirs            2021                seraphin.alava@univ-tlse2.fr
[116]      Jacobson, Michael. 2009. Terrorist Financing on the Internet. Combating
                 Terrorism      Center       Sentinel      2       (6):     17–20.      https://
                 www.washingtoninstitute.org/uploads/Documents/ opeds/4a438817e3a3c.pdf.
             [117]     Jessica Johnson. (2018). White men's self-radicalization: the "false news"
                 and emotional networking of paranoia. Communication, Culture and Criticism,
                 Volume 11, Number 1, March 2018, Pages 100-115.
             [118]       Johanson, Anna. 2017. ISIS-Chan – The Meanings of the Manga Girl in Image
                 Warfare Against the Islamic Staritical Studies on Terrorism 11 (1): 1–25. http://
                 www.tandfonline.com/doi/full/10.1080/17539153.2017.1348889?scroll=top&needA
                 ccess=true.
             [119]       Johnson, Neil, Minzhang Zheng, Yulia Vorobyeva, Andrew Gabriel, Houliang
                 Qi, Nicolas Velasquez, Pedro Man- rique, Darnell Johnson, Eduardo Restrepo,
                 Chaoming Song, and Stefan Wuchty. 2016. New Online Ecology of Adversarial
                 Aggregates: ISIS and Beyond. Science 352 (6292): 1459–63.
             [120]       Kamolnick, Paul. 2017. How Muslim Defenders Became “Blood Spilling”
                 Crusaders: Adam Gadahn’s Critique of the “Jihadist” Subversion of Al Qaeda’s Media
                 Warfare Strategy. Terrorism and Political Violence 29 (3): 444–63.
             [121]       Katz, Rita. 2016. Almost Any Messaging App Will Do – If You’re ISIS. Vice
                 Motherboard, July 14. https://mother- board.vice.com/en_us/article/kb7n4a/isis-
                 messaging- apps.
             [122]       Kenney, Michael. 2010. Beyond the Internet: Metis, Techne and the Limitations
                 of Online Artifacts for Islamist Ter- rorists. Terrorism and Political Violence 22 (2): 177–
                 97.
             [123]       Khatib, Lina. 2013. Image Politics in the Middle East: The Role of the Visual in
                 Political Struggle. London: I. B. Tauris.
             [124]       Kimmage, Daniel. 2008. The Al-Qaeda Media Nexus. Wash- ington, DC: Radio
                 Free Europe Radio Liberty. https://doc- s.rferl.org/en-US/AQ_Media_Nexus.pdf.
             [125]       Kimmage, Daniel. 2010. Al-Qaeda Central and the Internet. Washington, DC:
                 New                   America                    Foundation.                   https://cch-
                 s.gwu.edu/sites/cchs.gwu.edu/files/downloads/HSPI_Re- port_15.pdf.
             [126]       Klausen, Jytte. 2015. Tweeting the Jihad. Studies in Conflict and Terrorism 38
                 (1): 1–22.
             [127]       Klein, Susan, and Crystal Flinn. 2017. Social Media Compli- ance Programs
                 and the War against Terrorism. Harvard National Security Journal 8: 53–112.
             [128]       Koehler, Daniel. 2015. The Radical Online: Individual Radic- alization Processes
                 and the Role of the Internet. Journal for Deradicalization 1 (winter 2014/15): 116–34.
             [129] Lara-Cabrera, R., Gonzalez-Pardo, A., Barhamgi, M., & Camacho, D. (2017,
                 August). Extracting radicalisation behavioural patterns from social network data.
                 In Database and Expert Systems Applications (DEXA), 2017 28th International
                 Workshop on (pp. 6-10). IEEE.
             [130]      Laurene Renaut. (2019). Jihadist Radicalization and Victim-Discourse on
                 social Media: From Victim to Executioner. Argumentation et analyse du discours
                 N°23/2019, P. 1-32

Knowledge Activists / Militants des savoirs             2021                 seraphin.alava@univ-tlse2.fr
[131]      Lia, Brynjar, and Thomas Hegghammer. 2010. Jihadi Stra- tegic Studies: The
                 Alleged Al Qaida Policy Study Preced- ing the Madrid Bombings. Studies in Conflict
                 and Terror- ism 27 (5): 355–75.
             [132]      Liang, S. (2015). Cyber Jihad : Understanding and Countering Islamic
                 State     Propaganda.      Retrieved       from    http://www.gcsp.ch/News-
                 Knowledge/Publications/Cyber-Jihad-Understanding-and-Countering-Islamic-
                 State-Propaganda
             [133]      M. Currie, and Donald Holbrook, 215–37. London: Bloomsbury Academic.
             [134] Macnair, L., & Frank, R. (2018). The mediums and the messages: exploring the
                 language of Islamic State media through sentiment analysis. Critical Studies on
                 Terrorism, 1-20.
             [135] Magdy, W., Darwish, K., & Weber, I. (2015). # FailedRevolutions: Using Twitter
                 to study the antecedents of ISIS support. arXiv preprint arXiv:1503.02401.
             [136]      Magdy, W., Darwish, K., & Weber, I. (2015). # FailedRevolutions: Using
                 Twitter to study the antecedents of ISIS support. arXiv preprint arXiv:1503.02401.
             [137]       Magdy, Walid, Kareem Darwish, and Ingmar Weber. 2015.
                 #Failedrevolutions: Using Twitter to Study the Antecedents of ISIS Support. N.p.:
                 Association for the Advancement of Artificial Intelligence. https://arxiv.org/pdf/
                 1503.02401.pdf.
             [138]       Manrique, Pedro, Zhenfeng Cao, Andrew Gabriel, John Hor- gan, Paul Gill,
                 Hong Qi, Elvira Restrepo, Daniela John- son, Stefan Wuchty, Chaoming Song, and
                 Neil Johnson. 2016. Women’s Connectivity in Extreme Networks. Sci- ence Advances
                 2                  (6):                  e1501742.               http://advances.sci-
                 encemag.org/content/advances/2/6/e1501742.full.pdf.
             [139]       McCauley, Clark, and Sophia Moskalenko. 2008. Mechan- isms of Political
                 Radicalization: Pathways toward Terror- ism. Terrorism and Political Violence 20 (3):
                 415–33.
             [140]       McDowell-Smith, Allison, Anne Speckhard, and Ahmet S. Yayla. 2017.
                 Beating ISIS in the Digital Space: Focus Test- ing ISIS Defector Counter-Narrative
                 Videos with Amer- ican College Students. Journal for Deradicalization 1 (10).
                 http://journals.sfu.ca/jd/index.php/jd/article/view/83.
             [141]       Meleagrou-Hitchens, Alexander. 2012. As American as Apple Pie: How Anwar
                 al-Awlaki Became the Face of Western Ji- had. London: International Centre for the
                 Study of Radic- alisation. https://icsr.info/wp-content/uploads/2011/09/ ICSR-Report-
                 As-American-As-Apple-Pie-How-Anwar-al-            Awlaki-Became-the-Face-of-Western-
                 Jihad.pdf.
             [142]       Milton, Daniel. 2016. Communication Breakdown: Unravelling the Islamic
                 State’s Media Efforts. West Point: Combating Terrorism Center.
             [143] Mirani, T. B., & Sasi, S. (2016, December). Sentiment analysis of ISIS related
                 Tweets using Absolute location. In Computational Science and Computational
                 Intelligence (CSCI), 2016 International Conference on (pp. 1140-1145). IEEE.
             [144]      Moriarty, B. (2015). Defeating ISIS on Twitter. Technology Science.

Knowledge Activists / Militants des savoirs          2021               seraphin.alava@univ-tlse2.fr
[145]       Mozes, Tomer, and Gabriel Weimann. 2010. The E-Market- ing Strategy of
                 Hamas. Studies in Conflict and Terrorism 33 (3): 211–25.
             [146]       Neumann, Peter, and Brooke Rogers. 2011. Recruitment and Mobilisation for
                 the Islamist Militant Movement in Europe. London: International Centre for the Study
                 of Radicalisa- tion. http://icsr.info/2008/10/recruitment-and-mobilisa- tion-for-
                 the-islamist-militant-movement-in-europe/.
             [147]       Neumann, Peter. 2013a. Radikalisierung, Deradikalisierung und
                 Extremismus. Aus Politik und Zeitgeschichte 63: 3–10.
             [148]       Neumann, Peter. 2013b. Options and Strategies for Counter- ing Online
                 Radicalization in the United States. Studies in Conflict and Terrorism 36 (6): 431–59.
             [149]       Neumann, Peter. 2013c. The Trouble with Radicalization. In- ternational Affairs
                 89 (4): 873–93.
             [150] Nockleby, J. T. (1994). Hate Speech in Context: The Case of Verbal Threats. Buff.
                 L. Rev., 42, 653.
             [151]      O’Halloran, Kay, Sabine Tan, Peter Wignell, John Bateman, Ducson Pham,
                 Michele Grossman, and Andrew Vande Moere. 2016. Interpreting Text and Image
                 Relations in Vi- olent Extremist Discourse: A Mixed Methods Approach for Big Data
                 Analytics.      Terrorism    and     Political   Violence    31    (3):   454–74.
                 http://www.tandfonline.com/doi/pdf/
                 10.1080/09546553.2016.1233871?needAccess=true.
             [152]      O’Hara, Kieron, and David Stevens. 2015. Echo Chambers and Online
                 Radicalism: Assessing the Internet’s Compli- city in Violent Extremism. Policy and
                 Internet 7 (4): 401– 22.
             [153] O'Callaghan, D., Greene, D., Conway, M., Carthy, J., & Cunningham, P. (2013,
                 May). Uncovering the wider structure of extreme right communities spanning
                 popular online networks. In Proceedings of the 5th Annual ACM Web Science
                 Conference (pp. 276-285). ACM.
             [154] O'Callaghan, D., Prucha, N., Greene, D., Conway, M., Carthy, J., & Cunningham,
                 P. (2014, August). Online social media in the Syria conflict: Encompassing the
                 extremes and the in-betweens. In Advances in Social Networks Analysis and
                 Mining (ASONAM), 2014 IEEE/ACM International Conference on (pp. 409-416).
                 IEEE.
             [155]       Pauwels, Lieven, and Nele Schils. 2016. Differential Online Exposure to
                 Extremist Content and Political Violence: Testing the Relative Strength of Social
                 Learning and Competing Perspectives. Terrorism and Political Violence 28 (1): 1–29.
             [156]       Pearson, Elizabeth. 2015. The Case of Roshonara Choudhry: Implications for
                 Theory on Online Radicalization, ISIS Women, and the Gendered Jihad. Policy and
                 Internet 8 (1): 5–34.
             [157]       Phillips, Vaughan. 2017. The Islamic State’s Strategy: Bur- eaucratizing the
                 Apocalypse through Strategic Commu- nication. Studies in Conflict and Terrorism 40
                 (9): 731–57.
             [158]     Prucha, N., & Fisher, A. (2013). Tweeting for the caliphate: Twitter as the
                 new frontier for jihadist propaganda. CTC Sentinel, 6(6), 19-23.

Knowledge Activists / Militants des savoirs           2021               seraphin.alava@univ-tlse2.fr
[159]       Prus, Robert. 2005. Terrorism, Tyranny, and Religious Ex- tremism as Collective
                 Activity: Beyond the Deviant, Psy- chological and Power Mystiques. American
                 Sociologist 36: (1): 47–74.
             [160]      Qi, X., Christensen, K., Duval, R., Fuller, E., Spahiu, A., Wu, Q., & Zhang,
                 C. Q. (2010, August). A hierarchical algorithm for clustering extremist web
                 pages. In Advances in Social Networks Analysis and Mining (ASONAM), 2010
                 International Conference on (pp. 458-463). IEEE.
             [161]      Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror
                 campaigns on the internet: Technical sophistication, content richness, and Web
                 interactivity. International Journal of Human-Computer Studies, 65(1), 71-84.
                 [71]Qin, J., Zhou, Y., & Chen, H. (2011). A multi-region empirical study on the
                 internet presence of global extremist organizations. Information Systems
                 Frontiers, 13(1), 75-88.
             [162]     Ramsay, Gilbert. 2013. Jihadi Culture on the World Wide Web. London:
                 Bloomsbury.
             [163]      Raphael Ottoni, Robert West, Virgilio A F Almeida, Wagner Meira. (2020).
                 Auditing radicalization pathways on YouTube. FAT* '20: Proceedings of the 2020
                 Conference on Fairness, Accountability, and Transparency, January 2020 Pages
                 131–141
             [164]       Ravndal, Jacob Aasland. 2013. Anders Behring Breivik’s Use of the Internet
                 and Social Media. Journal EXIT-Deutsch- land, 2013, no. 2, 172–85.
                 http://journals.sfu.ca/jed/in- dex.php/jex/article/view/28/0.
             [165]       Reed, Alastair, and Haroro J. Ingram. 2017. Exploring the Role of Instructional
                 Material in AQAP’s Inspire and ISIS’s Rumiyah. The Hague: Europol. https://www.euro-
                 pol.europa.eu/publications-documents/exploring-role-of-         instructional-material-in-
                 aqaps-inspire-and-isis-rumiyah.
             [166]       Reiger, Diana, Lary Frischlich, and Gary Bente. 2013. Propa- ganda 2.0:
                 Psychological Effects of Right-Wing and Islamic Extremist Internet Videos. Munich:
                 Luchterhand Literat- urverlag.
             [167]       Renfer, Marc, and Henriette Haas. 2008. Systematic Analysis in
                 Counterterrorism: Messages on an Islamist Internet- Forum. International Journal of
                 Intelligence and Counterin- telligence 21 (2): 314–36.
             [168]       Research Perspectives on Online Radicalisation: A Literature Review, 2006–2016.
                 N.p.: VOX-Pol. http://icsr.info/ 2017/05/icsr-vox-pol-paper-research-perspectives-
                 online- radicalisation-literature-review-2006-2016/.
             [169]      Reuter, C., Pätsch, K., & Runft, E. (2017). IT for Peace? Fighting Against
                 Terrorism in Social Media–An Explorative Twitter Study. i-com, 16(2), 181-193.
             [170]     Reynolds, Louis, and Mohammed Hafez. 2017. Social Net- work Analysis of
                 German Foreign Fighters in Syria and Iraq. Terrorism and Political Violence 31 (4):
                 661–86.                  http://                 www.tandfonline.com/doi/abs/
                 10.1080/09546553.2016.1272456.

Knowledge Activists / Militants des savoirs            2021                seraphin.alava@univ-tlse2.fr
[171]       Reynolds, Louis, and Ralph Scott. 2016. Digital Citizens: Countering Extremism
                 Online.         London:         Demos.         https://         www.Demos.co.uk/wp-
                 content/uploads/2016/12/Digital- Citizenship-web.pdf.
             [172]       Riebe, Thea, Katja Patsch, Marc-Andre Kaufhold, and Chris- tian Reuter. 2018.
                 From Conspiracies to Insults: A Case Study of Radicalisation in Social Media
                 Discourse.
             [173]      Robin Thompson. (2011). Radicalization and use of social media. Strategic
                 Security Journal, Vol. 4, n ° 4 (hiver 2011), pp. 167-190 (26 pages)
             [174]      Rogan, Hanna. 2006. Jihadism Online: A Study of How Al- Qaida and Radical
                 Islamist Groups Use the Internet for Ter- rorist Purposes. Kjeller, Norway: Norwegian
                 Defence Re- search Establishment.
             [175] Rowe, M., & Saif, H. (2016, May). Mining Pro-ISIS Radicalisation Signals from
                 Social Media Users. In ICWSM (pp. 329-338).
             [176]       Rudner, Martin. 2016. “Electronic Jihad”: The Internet as Al Qaeda’s Catalyst
                 for Global Terror. Studies in Conflict and Terrorism 40 (1): 10–23.
             [177]       Sageman, Marc. 2004. Understanding Jihadi Networks. Phil- adelphia:
                 University of Pennsylvania Press.
             [178]       Sageman, Marc. 2005. Understanding Jihadi Networks. Stra- tegic Insights 4
                 (4): n.p.
             [179]       Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First
                 Century. Philadelphia: University of Pennsylvania Press.
             [180]     Saif, H., Dickinson, T., Kastler, L., Fernandez, M., & Alani, H. (2017, May). A
                 semantic graph-based approach for radicalisation detection on social media. In
                 European Semantic Web Conference (pp. 571-587). Springer, Cham.
             [181] Saif, H., Fernández, M., Rowe, M., & Alani, H. (2016, October). On the role of
                 semantics for detecting pro-isis stances on social media. In CEUR Workshop
                 Proceedings (Vol. 1690).
             [182]       Saif, Hassan, Thomas Dickinson, Leon Kastler, Miriam Fernandez, and Harith
                 Alani. 2017. A Semantic Graph- Based Approach for Radicalisation Detection on Social
                 Media. European Semantic Web Conference 2017: The Se- mantic Web, ed. Eva
                 Blomqvist, Diana Maynard, Aldo Gangemi et al. 571–87. Cham, Germany: Springer
                 Inter- national. https://link.springer.com/chapter/10.1007/978-3- 319-58068-5_35.
             [183]       Salami, Iwa. 2017. Terrorism Financing with Virtual Curren- cies: Can Regulatory
                 Technology Solutions Combat This? Studies in Conflict & Terrorism 41 (12): 968–89.
                 http://                                                 www.tandfonline.com/doi/pdf/
                 10.1080/1057610X.2017.1365464?needAccess=true.
             [184]       Saltman, Erin, and Melanie Smith. 2015. “Till Martyrdom Do Us Part”: Gender
                 and the ISIS Phenomenon. London: Insti- tute for Strategic Dialogue.
                 https://www.isdglobal.org/                                                          wp-
                 content/uploads/2016/02/Till_Martyrdom_Do_Us_Part_Gender_and_the_ISIS_Phen
                 omenon.pdf.

Knowledge Activists / Militants des savoirs           2021                seraphin.alava@univ-tlse2.fr
[185] Scanlon, J. R., & Gerber, M. S. (2014). Automatic detection of cyber-recruitment
                 by violent extremists. Security Informatics, 3(1), 5.
             [186] Scanlon, J. R., & Gerber, M. S. (2014). Automatic detection of cyber-recruitment
                 by violent extremists. Security Informatics, 3(1), 5.
             [187]       Schmid, Alex. 2013. The Definition of Terrorism. In The Rout- ledge Handbook
                 of Terrorism Research, ed. Alex Schmid, 38–98. Abingdon-on-Thames: Routledge.
             [188]       Schmid, Alex. 2014. Violent and Non-Violent Extremism: Two Sides of the Same
                 Coin?       The     Hague:      International    Centre      for     Counter-Terrorism.
                 https://www.icct.nl/download/file/        ICCT-Schmid-Violent-Non-Violent-Extremism-
                 May- 2014.pdf.
             [189]       Scrivens, Ryan, Garth Davies, and Richard Frank. 2016.
             [190]       Searching for Signs of Extremism on the Web: An Intro- duction to Sentiment-
                 Based Identification of Radical Au- thors. Behavioural Sciences of Terrorism and
                 Political Ag- gression 10 (1): 39–59.
             [191]       Seib, Philip, and Dana M. Janbek. 2010. Global Terrorism and New Media: The
                 Post-Al Qaeda Generation. Abingdon-on- Thames: Routledge.
             [192]       Selepak, Andrew. 2010. Skinhead Super Mario Brothers: An Examination of
                 Racist and Violent Games on White Su- premacist Web Sites. Journal of Criminal
                 Justice and Pop- ular Culture 17 (1): 1–47.
             [193]       Shane, Scott. 2016. The Enduring Influence of Anwar Al-Aw- laki in the Age of
                 the Islamic State. Combating Terrorism Center Sentinel 9 (7): 15–20.
             [194]       Sheikh, Jakob. 2016. “I Just Said It. The State”: Examining the Motivations
                 for Danish Foreign Fighters in Syria. Per- spectives on Terrorism 10 (6).
                 http://www.terrorismana- lysts.com/pt/index.php/pot/article/view/557.
             [195]       Shortland, Neil D. 2016. “On the Internet, Nobody Knows You’re a Dog”: The
                 Online Risk Assessment of Violent Extremists. In Violence and Society: Breakthroughs
                 in Re- search and Practice, 591–615. Hershey, PA: Information Science Reference.
             [196]       Silverman, Tanya, Christopher J. Stewart, Zahed Amanalluh, and Jonathan
                 Birdwell. 2016. The Impact of Counter-Nar- ratives: Insights from a Year-Long Cross-
                 Platform Pilot Study of Counter-Narrative Curation, Targeting, Evaluation and Impact.
                 London: Institute for Strategic Dialogue. ht- tps://www.Demos.co.uk/wp-
                 content/uploads/2016/09/ Counter-speech-on-facebook-report.pdf.
             [197]       Simi, Pete, and Robert Futrell. 2006. Cyberculture and the Endurance of White
                 Power Activism. Journal of Political and Military Sociology 34 (1): 115–42.
             [198]       Smith, Laura. 2017. In the Early 1980s, White Supremacist Groups Were Early
                 Adopters (and Masters) of the Inter- net. Timeline, 11 October.
                 https://timeline.com/white-su- premacist-early-internet-5e91676eb847.
             [199]       Stalinsky, Steven, and R. Sosnow. 2017. Germany-Based En- crypted
                 Messaging App Telegram Emerges as Jihadis’ Preferred Communications Platform.
                 MEMRI website, Lab Projects, 3 January. https://www.memri.org/cjlab/ germany-
                 based-encrypted-messaging-app-telegram-emerges-as-jihadis-preferred-
                 communications-platform-          part-v-of-memri-series-encryption-technology-em-
                 braced-by-isis-al-qaeda-other-jihadis.
             [200]       Stenerson, Anne. 2013. “Bomb-Making for Beginners”: In- side an Al-Qaeda
                 E-Learning Course. Perspectives on Ter-                   rorism     7   (1):   25–37.
                 http://www.terrorismanalysts.com/pt/ index.php/pot/article/view/241/html.

Knowledge Activists / Militants des savoirs           2021               seraphin.alava@univ-tlse2.fr
[201]       Stevens, David, and Kieron O’Hara. 2015. The Devil’s Long Tail: Religious and
                 Other Radicals in the Internet Market- place. London: Hurst.
             [202]       Stevens, Tim, and Peter Neumann. 2012. Countering Online Radicalisation: A
                 Strategy for Action. London: Interna- tional Centre for the Study of Radicalisation.
                 http://ic-                  sr.info/wp-content/uploads/2012/10/1236768491ICSROn-
                 lineRadicalisationReport.pdf.
             [203]       Sullivan, Rachel. 2014. Live-Tweeting Terror: A Rhetorical Analysis of
                 @Hsmpress_ Twitter Updates during the 2013 Nairobi Hostage Crisis. Critical
                 Studies on Terrorism 7 (3): 422–33.
             [204] Sureka, A., & Agarwal, S. (2014, September). Learning to classify hate and
                 extremism promoting tweets. In Intelligence and Security Informatics Conference
                 (JISIC), 2014 IEEE Joint (pp. 320-320). IEEE.
             [205]       Taub, Ben. 2015. Journey to Jihad: Why are teenagers join- ing ISIS? New
                 Yorker, May 25. https://www.newyorker.- com/magazine/2015/06/01/journey-to-
                 jihad.
             [206]       Torres-Soriano, Manuel Ricardo. 2012. The Dynamics of the Creation,
                 Evolution, and Disappearance of Terrorist In- ternet Forums. International Journal of
                 Conflict and Viol- ence 7 (1): 1–14.
             [207]       Torres-Soriano, Manuel Ricardo. 2016. The Hidden Face of Jihadist Internet
                 Forum Management: The Case of Ansar Al Mujahideen. Terrorism and Political
                 Violence 28 (4): 735–49.
             [208]       Tuck, Henry, and Tanya Silverman. 2016. The Counter-Nar- rative Handbook.
                 London: Institute for Strategic Dialogue. http://www.isdglobal.org/wp-
                 content/uploads/2016/06/ Counter-narrative-Handbook_1.pdf.
             [209] Varanese, J. A. (2016). “Follow Me So I Can DM You Back”: An Exploratory
                 Analysis of a Female Pro-ISIS Twitter Network.
             [210] Vera Mironova and Karam Alhamad, “The Names of Jihad: A Guide to ISIS' Noms
                 de       Guerre,”       Foreign        Affairs,     July     14,               2017,
                 https://www.foreignaffairs.com/articles/syria/2017-07-14/names-jihad
             [211]     Vermeulen, Floris, and Frank Bovenkerk. 2012. Engaging with Violent Islamic
                 Extremism. The Hague: Eleven Interna- tional.
             [212] Von Behr, I., Reding, A., Edwards, C., & Gribbon, L. (2013). Radicalisation in the
                 digital era.
             [213]      Von Behr, Ines, Charlie Edwards, Luke Gribbon, and Anais Reding. 2013.
                 Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and
                 Extremism. Brus- sels: RAND Europe. https://www.rand.org/content/dam/
                 rand/pubs/research_reports/RR400/RR453/ RAND_RR453.pdf.
             [214]      Wagemakers, Joas. 2011. Al-Qa’ida’s Editor: Abu Jandal Al- Azdi’s Online Jihadi
                 Activism. Politics, Religion, and Ideo- logy 12 (4): 355–69.
             [215] Wei, Y., & Singh, L. (2017, May). Using network flows to identify users sharing
                 extremist content on social media. In Pacific-Asia Conference on Knowledge
                 Discovery and Data Mining (pp. 330-342). Springer, Cham.

Knowledge Activists / Militants des savoirs           2021               seraphin.alava@univ-tlse2.fr
[216]      Weimann, G. (2016). Going dark: Terrorism on the dark Web. Studies in
                 Conflict & Terrorism, 39(3), 195-206. [78]Burris, V., Smith, E., and Strahm, A.
                 White Supremacist Networks on the Internet. Sociological Focus 33, 2 (2000),
                 215–235.
             [217]       Weimann, Gabriel, and Katharina von Knop. 2008. Applying the Notion of Noise
                 to Countering Online Terrorism.
             [218]       Weimann, Gabriel. 2004. www.terror.net: How Modern Ter- rorism Uses the
                 Internet. Washington, DC: United States Institute of Peace.
             [219]       Weimann, Gabriel. 2006. Virtual Disputes: The Use of the In- ternet for Terrorist
                 Debates. Studies in Conflict and Ter- rorism 29 (7): 623–39.
             [220]       Weimann, Gabriel. 2010. Terror on Facebook, Twitter, and Youtube. Brown
                 Journal of World Affairs 16 (2): 45–54.
             [221]       Weimann, Gabriel. 2016. Terrorist Migration to the Dark Web. Perspectives on
                 Terrorism              10              (3):            40–44.             http://www.-
                 terrorismanalysts.com/pt/index.php/pot/article/view/513.
             [222]       Weisburd, Aaron A. 2009. Comparison of Visual Motifs in Ji- hadi and Cholo
                 Videos on YouTube. Studies in Conflict and Terrorism 32 (12): 1066–74.
             [223]       Wibtrope, Ronald. 2012. Rational Extremism: The Political Economy of
                 Radicalism. Cambridge, UK: Cambridge Uni- versity Press.
             [224]       Wiktorowicz, Quintan. 2003. Islamic Activism: A Social Move- ment Theory
                 Approach. Bloomington: Indiana University Press.
             [225]       Wiktorowicz, Quintan. 2005. Radical Islam Rising: Muslim Extremism in the
                 West. Oxford: Rowman and Littlefield.
             [226]    William Grenier-Chalifoux. (2017). Offline radicalization: the role of social
                 networks in the passage to the Islamist terrorist act (1990-2016). Université de
                 Quebec à Montreal UQAM
             [227]      Winkler, Carol K. 2016. Visual Images: Distinguishing Daesh’s Internal and
                 External Communication Strategies. In Countering Daesh Propaganda: Action-Ori-
                 ented Research for Practical Policy Outcomes, 15–20. At- lanta: Carter Center.
             [228]      Winkler, Carol K., Kareem El Damanhoury, Aaron Dicker, and Anthony F.
                 Lemieux. 2016. The Medium is Terrorism: Transformation of the About to Die Trope
                 in Dabiq. Terrorism and Political Violence 31 (2): 224–43. http://
                 www.tandfonline.com/doi/abs/ 10.1080/09546553.2016.1211526.
             [229] Winter, C. (2015). Documenting the virtual ‘caliphate’. Quilliam Foundation, 33.

             [230]      Winter, Charlie. 2015a. The Virtual “Caliphate”: Understand- ing the Islamic
                 State’s Propaganda Strategy. N.p.: Quilliam. https://www.stratcomcoe.org/charlie-
                 winter-virtual-ca- liphate-understanding-islamicstates-propaganda-         strategy;
                 accessed 10 January 2018.
             [231]      Winter, Charlie. 2015b. Documenting the Virtual “Caliphate”. Quilliam.
                 http://www.quilliaminternational.com/wp-con-           tent/uploads/2015/10/FINAL-
                 documenting-the-virtual- caliphate.pdf.
             [232]      Winter, Charlie. 2016. An Integrated Approach to Islamic State Recruitment.
                 Barton,        Australia:     Australian       Strategic      Policy      Institute.
                 https://www.aspi.org.au/report/integ- rated-approach-islamic-state-recruitment.

Knowledge Activists / Militants des savoirs           2021                 seraphin.alava@univ-tlse2.fr
[233]      Wright, S. , Dorman, N. and Cortbus, C., “Twitter shuts down isis supporters
                 and jihadists as mi5 launch anti−terror social media crackdown,” in Mirror UK
                 News, 2015.
             [234] Xu, J., & Lu, T. C. (2016, December). Automated classification of extremist
                 Twitter accounts using content-based and network-based features. In Big Data
                 (Big Data), 2016 IEEE International Conference on (pp. 2545-2549). IEEE.
             [235]      Zelin, Aaron Y. 2013. The State of Global Jihad Online. Wash- ington, DC: New
                 America                          Foundation.                       http://www.wash-
                 ingtoninstitute.org/uploads/Documents/opeds/                           Zelin20130201-
                 NewAmericaFoundation.pdf.
             [236]      Zelin, Aaron Y. 2015. Picture or It Didn’t Happen: A Snap- shot of the Islamic
                 State’s Official Media Output. Perspectives on Terrorism 9 (4): 85–97.
                 http://www.terroris- manalysts.com/pt/index.php/pot/article/view/445/html.
             [237]      Zelizer, Barbie. 2010. About to Die: How News Images Move the Public. Oxford:
                 Oxford University Press.
             [238]      Zhang, Y., Zeng, S., Fan, L., Dang, Y., Larson, C. A., & Chen, H. (2009, June).
                 Dark web forums portal: searching and analyzing jihadist forums. In Intelligence
                 and Security Informatics, 2009. ISI'09. IEEE International Conference on (pp. 71- 76).
                 IEEE.

           For more information on preventing radicalization and countering
                                 violent extremism

                                https://chaireunesco-prev.ca/en/home/

Knowledge Activists / Militants des savoirs          2021                seraphin.alava@univ-tlse2.fr
You can also read