Skip to main content
Top
Published in:

2020 | OriginalPaper | Chapter

1. Introduction

Authors : Mark Littler, Benjamin Lee

Published in: Digital Extremisms

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

From the standpoint of two thirty-something academics writing in the Summer of 2019, it is possible to argue that contemporary social life cannot be understood without a thorough appreciation of the two phenomena that have had the greatest impact on social structure over the last 20 years: the return of violent extremism and the rapid rise of the internet. These same academics could argue that each phenomenon has posed significant challenges to twenty-first century life, disrupting traditional behavioural norms and triggering un-envisaged shifts in patterns of social and political engagement. Moreover, they could suggest that together these forces have amplified and interacted with each other, birthing a social and political environment that is so markedly different from all that came before that it cannot be understood through recourse to established scholarship. Indeed, they could suggest that these changes represent a realignment of such magnitude that comparator cases arise only once in several generations, for example, the coming of the printing press or the arrival of the industrial revolution.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Business + Economics & Engineering + Technology"

Online-Abonnement

Springer Professional "Business + Economics & Engineering + Technology" gives you access to:

  • more than 102.000 books
  • more than 537 journals

from the following subject areas:

  • Automotive
  • Construction + Real Estate
  • Business IT + Informatics
  • Electrical Engineering + Electronics
  • Energy + Sustainability
  • Finance + Banking
  • Management + Leadership
  • Marketing + Sales
  • Mechanical Engineering + Materials
  • Insurance + Risk


Secure your knowledge advantage now!

Springer Professional "Engineering + Technology"

Online-Abonnement

Springer Professional "Engineering + Technology" gives you access to:

  • more than 67.000 books
  • more than 390 journals

from the following specialised fileds:

  • Automotive
  • Business IT + Informatics
  • Construction + Real Estate
  • Electrical Engineering + Electronics
  • Energy + Sustainability
  • Mechanical Engineering + Materials





 

Secure your knowledge advantage now!

Springer Professional "Business + Economics"

Online-Abonnement

Springer Professional "Business + Economics" gives you access to:

  • more than 67.000 books
  • more than 340 journals

from the following specialised fileds:

  • Construction + Real Estate
  • Business IT + Informatics
  • Finance + Banking
  • Management + Leadership
  • Marketing + Sales
  • Insurance + Risk



Secure your knowledge advantage now!

Literature
go back to reference Altheide, D. L. (2006). The Mass Media, Crime and Terrorism. Journal of International Criminal Justice, 4(5), 982–997.CrossRef Altheide, D. L. (2006). The Mass Media, Crime and Terrorism. Journal of International Criminal Justice, 4(5), 982–997.CrossRef
go back to reference Aly, A., Macdonald, S., Jarvis, L., & Chen, T. (2016). Violent Extremism Online: New Perspectives on Terrorism and the Internet. London: Routledge.CrossRef Aly, A., Macdonald, S., Jarvis, L., & Chen, T. (2016). Violent Extremism Online: New Perspectives on Terrorism and the Internet. London: Routledge.CrossRef
go back to reference Bartlett, J., & Krasodomski-Jones, A. (2015, October). Counter-Speech Examining Content that Challenges Extremism Online. DEMOS. Bartlett, J., & Krasodomski-Jones, A. (2015, October). Counter-Speech Examining Content that Challenges Extremism Online. DEMOS.
go back to reference Berlet, C. (2001, April). When Hate Went Online. In Northeast Sociological Association Spring Conference in April (pp. 1–20). Berlet, C. (2001, April). When Hate Went Online. In Northeast Sociological Association Spring Conference in April (pp. 1–20).
go back to reference Burkhardt, J. M. (2017). History of Fake News. Library Technology Reports, 53(8), 5–9. Burkhardt, J. M. (2017). History of Fake News. Library Technology Reports, 53(8), 5–9.
go back to reference Burton, S. (2014). Anti-terrorism Control Orders: A Human Rights Analysis (Doctoral dissertation), Sheffield Hallam University. Burton, S. (2014). Anti-terrorism Control Orders: A Human Rights Analysis (Doctoral dissertation), Sheffield Hallam University.
go back to reference Coady, C. T. (2004). Defining Terrorism. In Terrorism (pp. 3–14). London: Palgrave Macmillan. Coady, C. T. (2004). Defining Terrorism. In Terrorism (pp. 3–14). London: Palgrave Macmillan.
go back to reference Conway, M. (2017). Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research. Studies in Conflict & Terrorism, 40(1), 77–98.CrossRef Conway, M. (2017). Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research. Studies in Conflict & Terrorism, 40(1), 77–98.CrossRef
go back to reference Dahlberg, L. (2009). Libertarian Cyber-Utopianism and Global Digital Networks. In Globalization and Utopia (pp. 176–189). London: Palgrave Macmillan.CrossRef Dahlberg, L. (2009). Libertarian Cyber-Utopianism and Global Digital Networks. In Globalization and Utopia (pp. 176–189). London: Palgrave Macmillan.CrossRef
go back to reference Dudenhoefer, A. (2018). Resisting Radicalisation: A Critical Analysis of the UK Prevent Duty. Journal for Deradicalisation, 14, 153–191. Dudenhoefer, A. (2018). Resisting Radicalisation: A Critical Analysis of the UK Prevent Duty. Journal for Deradicalisation, 14, 153–191.
go back to reference Eurobarometer. (2017). Standard Eurobarometer 88. Brussels: European Commission. Eurobarometer. (2017). Standard Eurobarometer 88. Brussels: European Commission.
go back to reference Eysenbach, G., Powell, J., Englesakis, M., Rizo, C., & Stern, A. (2004). Health Related Virtual Communities and Electronic Support Groups: Systematic Review of the Effects of Online Peer to Peer Interactions. British Medical Journal, 328(7449), 1166.CrossRef Eysenbach, G., Powell, J., Englesakis, M., Rizo, C., & Stern, A. (2004). Health Related Virtual Communities and Electronic Support Groups: Systematic Review of the Effects of Online Peer to Peer Interactions. British Medical Journal, 328(7449), 1166.CrossRef
go back to reference George, L. M. (2008). The Internet and the Market for Daily Newspapers. The BE Journal of Economic Analysis & Policy, 8(1), 1–33. George, L. M. (2008). The Internet and the Market for Daily Newspapers. The BE Journal of Economic Analysis & Policy, 8(1), 1–33.
go back to reference Hunt, A. (2014). From Control Orders to TPIMs: Variations on a Number of Themes in British Legal Responses to Terrorism. Crime, Law and Social Change, 62(3), 289–321.CrossRef Hunt, A. (2014). From Control Orders to TPIMs: Variations on a Number of Themes in British Legal Responses to Terrorism. Crime, Law and Social Change, 62(3), 289–321.CrossRef
go back to reference Hussain, G., & Saltman, E. M. (2014). Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter It. Quilliam Foundation, The United Kingdom. Hussain, G., & Saltman, E. M. (2014). Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter It. Quilliam Foundation, The United Kingdom.
go back to reference Intelligence and Security Committee. (2018). The 2017 Attacks: What Needs to Change? Report. Intelligence and Security Committee. (2018). The 2017 Attacks: What Needs to Change? Report.
go back to reference Khader, M., Neo, L. S., One, G., Mingyl, E. T., & Chin, J. (2016). Combating Violent Extremism and Radicalization in the Digital Era. Hershey, PA: IGI Global.CrossRef Khader, M., Neo, L. S., One, G., Mingyl, E. T., & Chin, J. (2016). Combating Violent Extremism and Radicalization in the Digital Era. Hershey, PA: IGI Global.CrossRef
go back to reference Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., et al. (2009). A Brief History of the Internet. ACM SIGCOMM Computer Communication Review, 39(5), 22–31.CrossRef Leiner, B. M., Cerf, V. G., Clark, D. D., Kahn, R. E., Kleinrock, L., Lynch, D. C., et al. (2009). A Brief History of the Internet. ACM SIGCOMM Computer Communication Review, 39(5), 22–31.CrossRef
go back to reference Littler, M. (2018). Online Radicalization, Risk and Terrorism in the Digital Space. In A. Kallis, S. Zeiger, & B. Osturk (Eds.), Violent Radicalization and Far-Right Extremism in Europe. Ankara, TR: SETA Publications. Littler, M. (2018). Online Radicalization, Risk and Terrorism in the Digital Space. In A. Kallis, S. Zeiger, & B. Osturk (Eds.), Violent Radicalization and Far-Right Extremism in Europe. Ankara, TR: SETA Publications.
go back to reference McGarrity, N. (2011). Fourth Estate or Government Lapdog? The Role of the Australian Media in the Counter-Terrorism Context. Continuum: Journal of Media & Cultural Studies, 25(02), 273–283.CrossRef McGarrity, N. (2011). Fourth Estate or Government Lapdog? The Role of the Australian Media in the Counter-Terrorism Context. Continuum: Journal of Media & Cultural Studies, 25(02), 273–283.CrossRef
go back to reference Meeker, M., & Wu, L. (2013, May). Internet Trends. In Proceedings of the D11 Conference. Rancho Palos Verdes. Meeker, M., & Wu, L. (2013, May). Internet Trends. In Proceedings of the D11 Conference. Rancho Palos Verdes.
go back to reference Norris, C., McCahill, M., & Wood, D. (2004). The Growth of CCTV: A Global Perspective on the International Diffusion of Video Surveillance in Publicly Accessible Space. Surveillance and Society, 2(2/3), 110–135. Norris, C., McCahill, M., & Wood, D. (2004). The Growth of CCTV: A Global Perspective on the International Diffusion of Video Surveillance in Publicly Accessible Space. Surveillance and Society, 2(2/3), 110–135.
go back to reference Paye, J. C. (2005). The End of Habeas Corpus in Great Britain. Monthly Review, 57(6), 34.CrossRef Paye, J. C. (2005). The End of Habeas Corpus in Great Britain. Monthly Review, 57(6), 34.CrossRef
go back to reference Sadat, L. N. (2006). Extraordinary Rendition, Torture, and Other Nightmares from the War on Terror. The George Washington Law Review, 75, 1200. Sadat, L. N. (2006). Extraordinary Rendition, Torture, and Other Nightmares from the War on Terror. The George Washington Law Review, 75, 1200.
go back to reference Schils, N., & Pauwels, L. (2014). Explaining Violent Extremism for Subgroups by Gender and Immigrant Background, Using SAT as a Framework. Journal of Strategic Security, 7(3), 27–47.CrossRef Schils, N., & Pauwels, L. (2014). Explaining Violent Extremism for Subgroups by Gender and Immigrant Background, Using SAT as a Framework. Journal of Strategic Security, 7(3), 27–47.CrossRef
go back to reference Stern, J., & Berger, J. M. (2015). ISIS: State of Terror. London: William Collins. Stern, J., & Berger, J. M. (2015). ISIS: State of Terror. London: William Collins.
go back to reference Weimann, G. (2006). Terror on the Internet: The New Arena, the New Challenges. Washington, DC: US Institute of Peace Press. Weimann, G. (2006). Terror on the Internet: The New Arena, the New Challenges. Washington, DC: US Institute of Peace Press.
go back to reference Weimann, G. (2015). Terrorism in Cyberspace: The Next Generation. New York: Columbia University Press. Weimann, G. (2015). Terrorism in Cyberspace: The Next Generation. New York: Columbia University Press.
go back to reference Wilkinson, P., & Jenkins, B. (2013). Aviation Terrorism and Security. London: Routledge.CrossRef Wilkinson, P., & Jenkins, B. (2013). Aviation Terrorism and Security. London: Routledge.CrossRef
Metadata
Title
Introduction
Authors
Mark Littler
Benjamin Lee
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-30138-5_1

Premium Partner