Strategic communications for the purpose of countering violent extremism have become widespread in recent years, especially given the communications revolution which has amplified the messages of violent extremists and those that wish to counter them. Despite this, there is little-to-no research which collects message data and analyses its design in a systematic way. In this article, we collect data from 10 social media multi-message campaigns and undertake an exploratory analysis of their design using a methodology developed from Ingram’s “Linkage-based” framework for countering militant Islamist propaganda. Our findings include: a prevalence towards highlighting the atrocities of violent extremist groups rather than strategies which chall...
The present paper concerns studies on innovative communication and propaganda strategies of the main...
This article describes and discusses a comparative semiotic analysis of online text collected from e...
Within studies of extremism, extremist and non-extremist messages are generally treated as two sets ...
Strategic communications for the purpose of countering violent extremism have become widespread in r...
The research conducted by the ECTC Advisory Group on Online Terrorist Propaganda between October 201...
In response to the threats posed by jihadist online propaganda, multiple countering violent extremis...
The study examines the application of the post-World War II U.S. Armed Forces propaganda analysis me...
The ICCT Policy Brief titled ‘A “Linkage-Based” Approach to Combating Militant Islamist Propaganda’ ...
A consideration of terrorism as communication necessarily draws attention to the development of coun...
Terrorism researchers have long sought to identify methods for challenging terrorist ideologies. The...
The Islamic State’s recent losses on the battlefield, including significant casualties within its me...
The rise to prominence of Daesh and its expert exploitation of extremist propaganda has brought in t...
With the Syrian civil war entering its third year, drawing an increasing number of young Westerners ...
While terrorism informatics research has examined the technical composition of extremist media, ther...
Counter-extremism (P/CVE) policies have shot to global prominence rapidly, yet there are large discr...
The present paper concerns studies on innovative communication and propaganda strategies of the main...
This article describes and discusses a comparative semiotic analysis of online text collected from e...
Within studies of extremism, extremist and non-extremist messages are generally treated as two sets ...
Strategic communications for the purpose of countering violent extremism have become widespread in r...
The research conducted by the ECTC Advisory Group on Online Terrorist Propaganda between October 201...
In response to the threats posed by jihadist online propaganda, multiple countering violent extremis...
The study examines the application of the post-World War II U.S. Armed Forces propaganda analysis me...
The ICCT Policy Brief titled ‘A “Linkage-Based” Approach to Combating Militant Islamist Propaganda’ ...
A consideration of terrorism as communication necessarily draws attention to the development of coun...
Terrorism researchers have long sought to identify methods for challenging terrorist ideologies. The...
The Islamic State’s recent losses on the battlefield, including significant casualties within its me...
The rise to prominence of Daesh and its expert exploitation of extremist propaganda has brought in t...
With the Syrian civil war entering its third year, drawing an increasing number of young Westerners ...
While terrorism informatics research has examined the technical composition of extremist media, ther...
Counter-extremism (P/CVE) policies have shot to global prominence rapidly, yet there are large discr...
The present paper concerns studies on innovative communication and propaganda strategies of the main...
This article describes and discusses a comparative semiotic analysis of online text collected from e...
Within studies of extremism, extremist and non-extremist messages are generally treated as two sets ...