Skip to main content
Top

2023 | OriginalPaper | Chapter

5. Social Media and Vernacular Security in the Digital Age

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This chapter has set out to contribute to one of the most exciting developments in the critical security studies field in recent years—the emergence of vernacular security studies that seeks to give voice to the experiences and constructions of security to those who inhabit non-elite. The vernacular studies open commitment to theoretical “emptiness” (Jarvis in Int Stud Rev 21(1):107–126, 2019, p. 110) “allows for greater fidelity to the diversity of everyday stories” (Jarvis in Int Stud Rev 21(1):107–126, 2019, p. 110) and thus offers significant potential to offer a way to examine the plurality of articulations of security on social media.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
go back to reference Adamson, F. (2020). Pushing the boundaries: Can we “decolonize” security studies? Journal of Global Security Studies, 5(1), 129–135. Adamson, F. (2020). Pushing the boundaries: Can we “decolonize” security studies? Journal of Global Security Studies, 5(1), 129–135.
go back to reference Alavi, S. et al. (2010). Building participation, reciprocity and trust: Netnography of an online community of APPLE using regression analysis for prediction. Apeejay Business Review, 11, 82–96. Alavi, S. et al. (2010). Building participation, reciprocity and trust: Netnography of an online community of APPLE using regression analysis for prediction. Apeejay Business Review, 11, 82–96.
go back to reference Alexandrou, A. (2021). Google-Books-ID: mZhFEAAAQBAJ. Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices. CRC Press. Alexandrou, A. (2021). Google-Books-ID: mZhFEAAAQBAJ. Cybercrime and information technology: The computer network infrastructure and computer security, cybersecurity laws, internet of things (IoT), and mobile devices. CRC Press.
go back to reference Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220. Ali, A. H. (2011). The power of social media in developing nations: New tools for closing the global digital divide and beyond note. Harvard Human Rights Journal, 24(1), 185–220.
go back to reference Allington, D., & Joshi, T. (2020). “What others dare not say”: An antisemitic conspiracy fantasy and its YouTube audience. Journal of Contemporary Antisemitism, 3(1), 35–54. Allington, D., & Joshi, T. (2020). “What others dare not say”: An antisemitic conspiracy fantasy and its YouTube audience. Journal of Contemporary Antisemitism, 3(1), 35–54.
go back to reference Allington, D. et al. (2021). Antisemitic conspiracy fantasy in the age of digital media: Three ‘conspiracy theorists’ and their YouTube audiences. Language and Literature, 30(1), 78–102. Allington, D. et al. (2021). Antisemitic conspiracy fantasy in the age of digital media: Three ‘conspiracy theorists’ and their YouTube audiences. Language and Literature, 30(1), 78–102.
go back to reference Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 26.CrossRef Aradau, C. (2004). Security and the democratic scene: Desecuritization and emancipation. Journal of International Relations and Development, 7(4), 26.CrossRef
go back to reference Aradau, C. et al. (2015). Discourse/materiality. Critical security methods: New framework for analysis (pp. 57–84). Routledge. Aradau, C. et al. (2015). Discourse/materiality. Critical security methods: New framework for analysis (pp. 57–84). Routledge.
go back to reference Auger, G. A. (2013). Fostering democracy through social media: Evaluating diametrically opposed nonprofit advocacy organizations’ use of Facebook, Twitter, and YouTube. Public Relations Review, 39(4), 369–376. Auger, G. A. (2013). Fostering democracy through social media: Evaluating diametrically opposed nonprofit advocacy organizations’ use of Facebook, Twitter, and YouTube. Public Relations Review, 39(4), 369–376.
go back to reference Awan, I. (2017). Cyber-extremism: Isis and the power of social media. Society, 54(2), 138–149. Awan, I. (2017). Cyber-extremism: Isis and the power of social media. Society, 54(2), 138–149.
go back to reference Bakalaki, A. (2016). Chemtrails, crisis, and loss in an interconnected world. Visual Anthropology Review, 32(1), 12–23. Bakalaki, A. (2016). Chemtrails, crisis, and loss in an interconnected world. Visual Anthropology Review, 32(1), 12–23.
go back to reference Bakken, S. A. (2021). Drug dealers gone digital: Using signalling theory to analyse criminal online personas and trust. Global Crime, 22(1), 51–73. Bakken, S. A. (2021). Drug dealers gone digital: Using signalling theory to analyse criminal online personas and trust. Global Crime, 22(1), 51–73.
go back to reference Bayer, J. B. et al. (2016). Sharing the small moments: Ephemeral social interaction on Snapchat. Information, Communication & Society, 19(7), 956–977. Bayer, J. B. et al. (2016). Sharing the small moments: Ephemeral social interaction on Snapchat. Information, Communication & Society, 19(7), 956–977.
go back to reference Bigo, D. (2008). Security studies: An introduction. In P. Williams (Ed.), International political sociology. Routledge. Bigo, D. (2008). Security studies: An introduction. In P. Williams (Ed.), International political sociology. Routledge.
go back to reference Bubandt, N. (2005). Vernacular security: The politics of feeling safe in global, national and local worlds. Security Dialogue, 36(3), 275–296. Bubandt, N. (2005). Vernacular security: The politics of feeling safe in global, national and local worlds. Security Dialogue, 36(3), 275–296.
go back to reference Burgess, J. (2008). All your chocolate rain are belong to us? Viral video, YouTube and the dynamics of participatory culture. In Video vortex reader: Responses to YouTube (p. 10). Institute of Network Cultures. Burgess, J. (2008). All your chocolate rain are belong to us? Viral video, YouTube and the dynamics of participatory culture. In Video vortex reader: Responses to YouTube (p. 10). Institute of Network Cultures.
go back to reference Buzan, B., Weaver, O. et al. (1997). Security: A new framework for analysis. Lynne Rienner Publishers. Buzan, B., Weaver, O. et al. (1997). Security: A new framework for analysis. Lynne Rienner Publishers.
go back to reference Byman, D. (2016). ISIS goes global: Fight the Islamic state by targeting its affiliates. Foreign Affairs, 95(2), 76–85. Byman, D. (2016). ISIS goes global: Fight the Islamic state by targeting its affiliates. Foreign Affairs, 95(2), 76–85.
go back to reference Condie, J. et al. (2017). The trouble with tinder: The ethical complexities of researching location-aware social discovery apps. In K. Woodfield (Ed.), The ethics of online research. Advances in research ethics and integrity (pp. 135–158). Emerald Publishing Limited. Available from: https://doi.org/10.1108/S2398-601820180000002006 (Accessed 28 October 2020). Condie, J. et al. (2017). The trouble with tinder: The ethical complexities of researching location-aware social discovery apps. In K. Woodfield (Ed.), The ethics of online research. Advances in research ethics and integrity (pp. 135–158). Emerald Publishing Limited. Available from: https://​doi.​org/​10.​1108/​S2398-6018201800000020​06 (Accessed 28 October 2020).
go back to reference Corrêa, S. C. H. et al. (2020). The influence of YouTubers on followers’ use intention. Journal of Research in Interactive Marketing, 14(2), 173–194. Corrêa, S. C. H. et al. (2020). The influence of YouTubers on followers’ use intention. Journal of Research in Interactive Marketing, 14(2), 173–194.
go back to reference Croft, S., & Vaughan-Williams, N. (2017) Fit for purpose? Fitting ontological security studies ‘into’ the discipline of international relations: Towards a vernacular turn. Cooperation and Conflict, 52(1), 12–30. Croft, S., & Vaughan-Williams, N. (2017) Fit for purpose? Fitting ontological security studies ‘into’ the discipline of international relations: Towards a vernacular turn. Cooperation and Conflict, 52(1), 12–30.
go back to reference Cullen, R. (2001). Addressing the digital divide. Online Information Review, 25(5), 311–320. Cullen, R. (2001). Addressing the digital divide. Online Information Review, 25(5), 311–320.
go back to reference Dean, G., & Bell, P. (2012). The dark side of social media: Review of online terrorism. Pakistan Journal of Criminology, 3(4), 191–210. Dean, G., & Bell, P. (2012). The dark side of social media: Review of online terrorism. Pakistan Journal of Criminology, 3(4), 191–210.
go back to reference Dencik, L., & Leistert, O. (2015). Google-Books-ID: iOHaDwAAQBAJ. Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield. Dencik, L., & Leistert, O. (2015). Google-Books-ID: iOHaDwAAQBAJ. Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield.
go back to reference van Dijk, J. A. G. M. (2006). Digital divide research, achievements and shortcomings. Poetics, 34(4), 221–235. van Dijk, J. A. G. M. (2006). Digital divide research, achievements and shortcomings. Poetics, 34(4), 221–235.
go back to reference Dikeç. (2007). Badlands of the Republic: Space, politics and urban policy. Dikeç. (2007). Badlands of the Republic: Space, politics and urban policy.
go back to reference Donald, J. (1992). Metropolis: The city as text in Bocock. Polity Press. Donald, J. (1992). Metropolis: The city as text in Bocock. Polity Press.
go back to reference Downing, J. (2019) Blurring European and Islamic values or brightening the good—Bad Muslim dichotomy? A critical analysis of French Muslim victims of Jihadi terror online on twitter and in Le Monde newspaper. Critical Studies on Terrorism, 12(2), 250–272. Downing, J. (2019) Blurring European and Islamic values or brightening the good—Bad Muslim dichotomy? A critical analysis of French Muslim victims of Jihadi terror online on twitter and in Le Monde newspaper. Critical Studies on Terrorism, 12(2), 250–272.
go back to reference Enikolopov, R. et al. (2018). Social media and corruption. American Economic Journal: Applied Economics, 10(1), 150–174. Enikolopov, R. et al. (2018). Social media and corruption. American Economic Journal: Applied Economics, 10(1), 150–174.
go back to reference Foltz, K. E., & Simpson, W. R. (2020). Google-Books-ID: B4X3DwAAQBAJ. Enterprise level security 2: Advanced techniques for information technology in an uncertain world. CRC Press. Foltz, K. E., & Simpson, W. R. (2020). Google-Books-ID: B4X3DwAAQBAJ. Enterprise level security 2: Advanced techniques for information technology in an uncertain world. CRC Press.
go back to reference Gall, N. et al. (2015). “It gets better”: Internet memes and the construction of collective identity. New Media and Society, 18(8), 1698–1714. Gall, N. et al. (2015). “It gets better”: Internet memes and the construction of collective identity. New Media and Society, 18(8), 1698–1714.
go back to reference George, N. (2017). Policing “conjugal order”: Gender, hybridity and vernacular security in Fiji. International Feminist Journal of Politics, 19(1), 55–70. George, N. (2017). Policing “conjugal order”: Gender, hybridity and vernacular security in Fiji. International Feminist Journal of Politics, 19(1), 55–70.
go back to reference Giles, M., & Ben, O. (2008). Convincing claims? Democracy and representation in post-9/11 Britain. Political Studies, 56(3), 705–724. Giles, M., & Ben, O. (2008). Convincing claims? Democracy and representation in post-9/11 Britain. Political Studies, 56(3), 705–724.
go back to reference Gillespie, M., & O’Loughlin, B. (2009). News media, threats and insecurities: an ethnographic approach. Cambridge Review of International Affairs, 22(4), 667–685. Gillespie, M., & O’Loughlin, B. (2009). News media, threats and insecurities: an ethnographic approach. Cambridge Review of International Affairs, 22(4), 667–685.
go back to reference Hansen, L. (2011). Theorizing the image for security studies: Visual securitization and the Muhammad cartoon crisis*. European Journal of International Relations, 17(1), 51–74. Hansen, L. (2011). Theorizing the image for security studies: Visual securitization and the Muhammad cartoon crisis*. European Journal of International Relations, 17(1), 51–74.
go back to reference Heilbrunn, J. R. (2005). Oil and water? Elite politicians and corruption in France on JSTOR. Comparative Politics, 37(3), 277–296. Heilbrunn, J. R. (2005). Oil and water? Elite politicians and corruption in France on JSTOR. Comparative Politics, 37(3), 277–296.
go back to reference Hessler, M., & Zimmermann, C. (2008). Google-Books-ID: MInQkvnq2H8C. Creative urban milieus: Historical perspectives on culture, economy, and the city. Campus Verlag. Hessler, M., & Zimmermann, C. (2008). Google-Books-ID: MInQkvnq2H8C. Creative urban milieus: Historical perspectives on culture, economy, and the city. Campus Verlag.
go back to reference Hoffman, A. M. (2010). Voice and silence: Why groups take credit for acts of terror. Journal of Peace Research, 47(5), 615–626. Hoffman, A. M. (2010). Voice and silence: Why groups take credit for acts of terror. Journal of Peace Research, 47(5), 615–626.
go back to reference Hourmat, M. (2016). Victim-perpetrator in transitional justice: The case of post-genocide Rwanda. Narrative and Conflict: Explorations in Theory and Practice, 1(4), 43–67. Hourmat, M. (2016). Victim-perpetrator in transitional justice: The case of post-genocide Rwanda. Narrative and Conflict: Explorations in Theory and Practice, 1(4), 43–67.
go back to reference Hultin, N. (2010). Repositioning the front lines? Reflections on the ethnography of African securityscapes. African Security, 3(2), 104–125. Hultin, N. (2010). Repositioning the front lines? Reflections on the ethnography of African securityscapes. African Security, 3(2), 104–125.
go back to reference Huysmans, J. (2011). What’s in an act? On security speech acts and little security nothings. Security Dialogue, 42(4–5), 371–383. Huysmans, J. (2011). What’s in an act? On security speech acts and little security nothings. Security Dialogue, 42(4–5), 371–383.
go back to reference Hynek, N., & Chandler, D. (2013). No emancipatory alternative, no critical security studies. Critical Studies on Security, 1(1), 46–63. Hynek, N., & Chandler, D. (2013). No emancipatory alternative, no critical security studies. Critical Studies on Security, 1(1), 46–63.
go back to reference Jarvis, L. (2019). Toward a vernacular security studies: Origins, interlocutors, contributions, and challenges. International Studies Review, 21(1), 107–126. Jarvis, L. (2019). Toward a vernacular security studies: Origins, interlocutors, contributions, and challenges. International Studies Review, 21(1), 107–126.
go back to reference Jarvis, L., & Lister, M. (2012). Vernacular securities and their study: A qualitative analysis and research agenda. International Relations, 27(2), 158–179. Jarvis, L., & Lister, M. (2012). Vernacular securities and their study: A qualitative analysis and research agenda. International Relations, 27(2), 158–179.
go back to reference Jha, C. K., & Sarangi, S. (2017). Does social media reduce corruption? Information Economics and Policy, 39, 60–71. Jha, C. K., & Sarangi, S. (2017). Does social media reduce corruption? Information Economics and Policy, 39, 60–71.
go back to reference Jolley, D. et al. (2019). Belief in conspiracy theories and intentions to engage in everyday crime. British Journal of Social Psychology, 58(3), 534–549. Jolley, D. et al. (2019). Belief in conspiracy theories and intentions to engage in everyday crime. British Journal of Social Psychology, 58(3), 534–549.
go back to reference Kayode-Adedeji, T. et al. (2019). Dataset on online mass media engagements on YouTube for terrorism related discussions. Data in Brief, 23, 103581. Kayode-Adedeji, T. et al. (2019). Dataset on online mass media engagements on YouTube for terrorism related discussions. Data in Brief, 23, 103581.
go back to reference Klausen, J. et al. (2012). The YouTube jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53. Klausen, J. et al. (2012). The YouTube jihadists: A social network analysis of Al-Muhajiroun’s propaganda campaign. Perspectives on Terrorism, 6(1), 36–53.
go back to reference Kozinets, R. V. (2002). The field behind the screen: Using netnography for marketing research in online communities. Journal of Marketing Research, 39(1), 61–72. Kozinets, R. V. (2002). The field behind the screen: Using netnography for marketing research in online communities. Journal of Marketing Research, 39(1), 61–72.
go back to reference Kumar, A. (2015). Place branding: A way to correct the negative image of sex tourism. International Journal of Business Research and Development, 3(1), 1–7. Kumar, A. (2015). Place branding: A way to correct the negative image of sex tourism. International Journal of Business Research and Development, 3(1), 1–7.
go back to reference Leistert, O. (2015). The revolution will not be liked: On the systemic constraints of corporate social media platforms for protests. In Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield. Leistert, O. (2015). The revolution will not be liked: On the systemic constraints of corporate social media platforms for protests. In Critical perspectives on social media and protest: Between control and emancipation. Rowman & Littlefield.
go back to reference Light, B. et al. (2018). The walkthrough method: An approach to the study of apps. New Media & Society, 20(3), 881–900. Light, B. et al. (2018). The walkthrough method: An approach to the study of apps. New Media & Society, 20(3), 881–900.
go back to reference Luckham, R. (2017). Whose violence, whose security? Can violence reduction and security work for poor, excluded and vulnerable people? Peacebuilding, 5(2), 99–117. Luckham, R. (2017). Whose violence, whose security? Can violence reduction and security work for poor, excluded and vulnerable people? Peacebuilding, 5(2), 99–117.
go back to reference Lynch, K. (1960). The image of the city, Harvard-MIT Joint Centre for Urban Studies. MIT Press. Lynch, K. (1960). The image of the city, Harvard-MIT Joint Centre for Urban Studies. MIT Press.
go back to reference Maira, S. (2009). ‘Good’ and ‘bad’ Muslim citizens: Feminists, terrorists, and U S. orientalisms. Feminist Studies, 35(3), 631–656. Maira, S. (2009). ‘Good’ and ‘bad’ Muslim citizens: Feminists, terrorists, and U S. orientalisms. Feminist Studies, 35(3), 631–656.
go back to reference Makki, M., & Tahir, M. (2021). Mapping normalcy through vernacular security-development in post-conflict North Waziristan. Conflict, Security & Development, 21(5), 565–592. Makki, M., & Tahir, M. (2021). Mapping normalcy through vernacular security-development in post-conflict North Waziristan. Conflict, Security & Development, 21(5), 565–592.
go back to reference Mamdani, M. (2008). Good Muslim, bad Muslim: A political perspective on culture and terrorism. American Anthropologist, 104(3), 766–775. Mamdani, M. (2008). Good Muslim, bad Muslim: A political perspective on culture and terrorism. American Anthropologist, 104(3), 766–775.
go back to reference Mosemghvdlishvili, L., & Jansz, J. (2013). Framing and praising Allah on YouTube: Exploring user-created videos about Islam and the motivations for producing them. New Media & Society, 15(4), 482–500. Mosemghvdlishvili, L., & Jansz, J. (2013). Framing and praising Allah on YouTube: Exploring user-created videos about Islam and the motivations for producing them. New Media & Society, 15(4), 482–500.
go back to reference Moyle, L. et al. (2019). #Drugsforsale: An exploration of the use of social media and encrypted messaging apps to supply and access drugs. International Journal of Drug Policy, 63, 101–110. Moyle, L. et al. (2019). #Drugsforsale: An exploration of the use of social media and encrypted messaging apps to supply and access drugs. International Journal of Drug Policy, 63, 101–110.
go back to reference Oliver, J. E., & Wood, T. J. (2014). Conspiracy theories and the paranoid style(s) of mass opinion. American Journal of Political Science, 58(4), 952–966.CrossRef Oliver, J. E., & Wood, T. J. (2014). Conspiracy theories and the paranoid style(s) of mass opinion. American Journal of Political Science, 58(4), 952–966.CrossRef
go back to reference Pereira, S. (2018). The YouTubers phenomenon: What makes YouTube stars so popular for young people? The YouTubers phenomenon: What makes YouTube stars so popular for young people? 107–123. Pereira, S. (2018). The YouTubers phenomenon: What makes YouTube stars so popular for young people? The YouTubers phenomenon: What makes YouTube stars so popular for young people? 107–123.
go back to reference Persily, N., & Tucker, J. A. (2020). Introduction. In Social media and democracy, the state of the field and prospects for reform (pp. 1–9). Cambridge University Press. Persily, N., & Tucker, J. A. (2020). Introduction. In Social media and democracy, the state of the field and prospects for reform (pp. 1–9). Cambridge University Press.
go back to reference Poltash, N. A. (2012). Snapchat and sexting: A snapshot of baring your bare essentials. Richmond Journal of Law & Technology, 19(4), 1–24. Poltash, N. A. (2012). Snapchat and sexting: A snapshot of baring your bare essentials. Richmond Journal of Law & Technology, 19(4), 1–24.
go back to reference Pujol, P. (2014). French deconnection. R. Laffont/Wildproject. Pujol, P. (2014). French deconnection. R. Laffont/Wildproject.
go back to reference Pujol, P. (2016). La Fabrique du monstre. Les Arènes. Pujol, P. (2016). La Fabrique du monstre. Les Arènes.
go back to reference Sellami, S. (2016). Le vrai visage du narco-banditisme. Marseille, Le Parisien. Sellami, S. (2016). Le vrai visage du narco-banditisme. Marseille, Le Parisien.
go back to reference Tingley, D., & Wagner, G. (2017). Solar geoengineering and the chemtrails conspiracy on social media. Palgrave Communications, 3(1), 1–7. Tingley, D., & Wagner, G. (2017). Solar geoengineering and the chemtrails conspiracy on social media. Palgrave Communications, 3(1), 1–7.
go back to reference Tufekci, Z. (2018). Opinion | YouTube, the great radicalizer—The New York Times. The New York Times, 5. Tufekci, Z. (2018). Opinion | YouTube, the great radicalizer—The New York Times. The New York Times, 5.
go back to reference Uscinski, J. E. (Ed.). (2018). Conspiracy theories and the people who believe them. Oxford University Press. Uscinski, J. E. (Ed.). (2018). Conspiracy theories and the people who believe them. Oxford University Press.
go back to reference Vaterlaus, J. M. et al. (2016). “Snapchat is more personal”: An exploratory study on Snapchat behaviors and young adult interpersonal relationships. Computers in Human Behavior, 62, 594–601. Vaterlaus, J. M. et al. (2016). “Snapchat is more personal”: An exploratory study on Snapchat behaviors and young adult interpersonal relationships. Computers in Human Behavior, 62, 594–601.
go back to reference Vaughan-Williams, N., & Stevens, D. (2016). Vernacular theories of everyday (in)security: The disruptive potential of non-elite knowledge. Security Dialogue, 47(1), 40–58. Vaughan-Williams, N., & Stevens, D. (2016). Vernacular theories of everyday (in)security: The disruptive potential of non-elite knowledge. Security Dialogue, 47(1), 40–58.
go back to reference Viard, J. (1995). Marseille: Une ville impossible. Documents Payot. Viard, J. (1995). Marseille: Une ville impossible. Documents Payot.
go back to reference Viard, J. (2014). Marseille, le réveil violent d’une ville impossible, Editions de l’Aube. France. Viard, J. (2014). Marseille, le réveil violent d’une ville impossible, Editions de l’Aube. France.
go back to reference Wolfsfeld, G. et al. (2013). Social media and the Arab Spring: Politics comes first. The International Journal of Press/Politics, 18(2), 115–137. Wolfsfeld, G. et al. (2013). Social media and the Arab Spring: Politics comes first. The International Journal of Press/Politics, 18(2), 115–137.
go back to reference Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner Publishers Inc.CrossRef Wyn Jones, R. (1999). Security, strategy and critical theory. Lynne Rienner Publishers Inc.CrossRef
go back to reference Yusha’u, M. J. (2015). Extremism or terrorism: Communicating Islamophobia on YouTube in the Norwegian attacks. Journal of Arab & Muslim Media Research, 8(2), 171–191. Yusha’u, M. J. (2015). Extremism or terrorism: Communicating Islamophobia on YouTube in the Norwegian attacks. Journal of Arab & Muslim Media Research, 8(2), 171–191.
Metadata
Title
Social Media and Vernacular Security in the Digital Age
Author
Joseph Downing
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-20734-1_5

Premium Partner