We are pleased to announce a second call for papers. In this call, we particularly welcome submissions:
– From those who have not already been accepted to present
– On novel, innovative and interdisciplinary methodological approaches
– On the ethics of inter-mediated terrorism research
– On forms of terrorism other than jihadism and the radical right
– On African, Asian and South American groups
– On the role of algorithms and machine learning in content regulation
– On the monitoring, measurement and evaluation of online CVE campaigns
To submit your proposal, please send: (1) the title of your presentation; (2) an abstract of up to 250 words; and, (3) a brief (one paragraph) biography to TASMConf@swansea.ac.uk no later than Friday 8th March 2019.
Following the conference, selected papers will be published in a special issue of Studies in Conflict & Terrorism. To be considered for inclusion in the special issue, authors should submit the full text of their article to TASMConf@swansea.ac.uk no later than Friday 21st June 2019. (Please do not submit the article via the journal’s online portal)
The first day of the conference will focus on terrorists’ use of social media. The following are illustrative examples of the topics that will be considered:
- What can we learn about terrorist groups and lone actors from their use of social media?
- Is it possible to track the release and dissemination of terroristic content on social media – and, if so, what do these insights tell us?
- To what extent do terrorist groups engage in hashtag hijacking to propagate their messages?
- Has Twitter had its day? What other social network platforms are being used by terrorist groups online? How – if at all – are multiple platforms used in combination?
- How social is social media? Can individuals be radicalized online?
- How do terrorist groups regulate conversation and communication within their social network platforms?
- What is the role, and effect, of user generated content?
- How – if at all – are social media platforms being used by terrorist groups for fund-raising purposes?
- What is the effect of a terrorist attack on online social media posts by terrorist and extremist actors?
The second day of the conference will focus on our responses to terrorists’ use of social media. The following are illustrative examples of the topics that will be considered:
- How effective are global, national and local strategies, and how should these types of strategy interact?
- How effective are hard and soft forms of response? How should the effectiveness of counterterrorism laws/policies and countering violent extremism campaigns be measured?
- Are social media companies doing enough to regulate terrorist content on their platforms? Are their efforts at regulation satisfactory?
- Do state responses show sufficient regard for the privacy of citizens and other basic principles?
- Has the suspension of terrorist social media accounts pushed them onto other platforms?
- Should we look past anonymity on social media and identify extremist actors online – and, if so, how?
- Can data from social media be used to identify individuals who are at risk of radicalization and to predict future terrorist activity?