Reference Hub1
From “Cyberterrorism” to “Online Radicalism”

From “Cyberterrorism” to “Online Radicalism”

Maura Conway
ISBN13: 9781466657762|ISBN10: 1466657766|EISBN13: 9781466657779
DOI: 10.4018/978-1-4666-5776-2.ch014
Cite Chapter Cite Chapter

MLA

Conway, Maura. "From “Cyberterrorism” to “Online Radicalism”." Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia, edited by Mahmoud Eid, IGI Global, 2014, pp. 198-217. https://doi.org/10.4018/978-1-4666-5776-2.ch014

APA

Conway, M. (2014). From “Cyberterrorism” to “Online Radicalism”. In M. Eid (Ed.), Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia (pp. 198-217). IGI Global. https://doi.org/10.4018/978-1-4666-5776-2.ch014

Chicago

Conway, Maura. "From “Cyberterrorism” to “Online Radicalism”." In Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia, edited by Mahmoud Eid, 198-217. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5776-2.ch014

Export Reference

Mendeley
Favorite

Abstract

This chapter explores the changes that have taken place in the role and functioning of the Internet in terrorism and counter-terrorism in the past decade. It traces the shift in focus from a preoccupation with the threat of so-called “cyberterrorism” in the period pre- and immediately post-9/11 to the contemporary emphasis on the role of the Internet in processes of violent radicalization. The cyberterrorism threat is explained as over-hyped herein, and the contemporary focus, by researchers and policymakers, on the potential of the Internet as a vehicle for violent radicalization viewed as more appropriate albeit not without its difficulties. This change in emphasis is at least partially predicated, it is argued, on the significant changes that occurred in the nature and functioning of the Internet in the last decade: the advent of Web 2.0, with its emphasis on social networking, user generated content, and digital video is treated as particularly salient in this regard. Description and analysis of both “negative” and “positive” Internet-based Counter Violent Extremism (CVE) and online counterterrorism measures and their evolutions are also supplied.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.