We are pleased to invite submissions for papers to be presented at the Terrorism and Social Media conference. Submissions on all aspects of terrorism and social media (widely construed) will be considered, including ones focusing on methodological issues. Submissions on the ethical issues surrounding research into terrorism and social media are also encouraged.
The first day of the conference will focus on terrorists’ use of social media. The following are illustrative examples of the topics that will be considered:
- What can we learn about terrorist groups and lone actors from their use of social media?
- Is it possible to track the release and dissemination of terroristic content on social media – and, if so, what do these insights tell us?
- To what extent do terrorist groups engage in hashtag hijacking to propagate their messages?
- Has Twitter had its day? What other social network platforms are being used by terrorist groups online? How – if at all – are multiple platforms used in combination?
- How social is social media? Can individuals be radicalized online?
- How do terrorist groups regulate conversation and communication within their social network platforms?
- What is the role, and effect, of user generated content?
- How – if at all – are social media platforms being used by terrorist groups for fund-raising purposes?
- What is the effect of a terrorist attack on online social media posts by terrorist and extremist actors?
The second day of the conference will focus on our responses to terrorists’ use of social media. The following are illustrative examples of the topics that will be considered:
- How effective are global, national and local strategies, and how should these types of strategy interact?
- How effective are hard and soft forms of response? How should the effectiveness of counterterrorism laws/policies and countering violent extremism campaigns be measured?
- Are social media companies doing enough to regulate terrorist content on their platforms? Are their efforts at regulation satisfactory?
- Do state responses show sufficient regard for the privacy of citizens and other basic principles?
- Has the suspension of terrorist social media accounts pushed them onto other platforms?
- Should we look past anonymity on social media and identify extremist actors online – and, if so, how?
- Can data from social media be used to identify individuals who are at risk of radicalization and to predict future terrorist activity?
We are particularly keen to receive proposals that:
· Consider the issues above from an empirical basis.
· Utilise innovative methodologies for the analysis of both text and images
· Consider forms of violent extremism besides jihadism and the Radical Right
· Consider issues related to gender, including issues beyond simply “women”
· Consider smaller social media platforms and/or draw cross-platform comparisons
· Examine geographical areas beyond the U.K., Australia and North America, e.g., Africa and South-East Asia
· Examine non-English language materials and draw cross-language comparisons
To submit your proposal, please send: (1) the title of your presentation; (2) an abstract of up to 250 words; and, (3) a brief (one paragraph) biography to no later than Friday 28th September 2018.
Following the conference, selected papers will be published in a special issue of Studies in Conflict & Terrorism. To be considered for inclusion in the special issue, authors should submit the full text of their article to no later than Friday 21st June 2019. (Please do not submit the article via the journal’s online portal)