Obtaining accurate information from social media during a crisis can be difficult, but should all information really be disseminated? Social media platforms actively filter out terrorist and violent extremist content (TVEC), but how are users themselves counteracting its spread? This paper aims to connect the research on media events with studies currently being conducted in information science and digital media research through a case study of tweets during the Vienna terror attack in late 2020. These tweets were manually coded in accordance with Braun and Clarke’s reflexive thematic analysis. This study shows that during the 2020 Vienna attack, GIFs shared on Twitter served three functions: amplification, personalisation and ethical pract...
The project explored and analyzed the use of the social media tool Twitter in the immediate aftermat...
Terrorism and violence are used by miscreant groups and individuals to disrupt the normal course of ...
The Author(s) 2014. This article is published with open access at Springerlink.com Abstract Little i...
Obtaining accurate information from social media during a crisis can be difficult, but should all in...
Social media, and Twitter in particular, have become important sources for journalists in times of c...
Social media, and Twitter in particular, have become important sources for journalists in times of c...
<p>This study attempted to further the literature by showing how crisis communication and social med...
The Internet and especially social media are not only used for supposedly good purposes. For example...
Background. This thesis explores digital public reactions to terrorist attacks, and specifically how...
abstract: Social media has become a direct and effective means of transmitting personal opinions int...
This chapter examines the question of critical approaches to terrorism and social media, literature ...
The 2019 terror attack in Christchurch, New Zealand shocked the world as a lone gunman claimed the l...
On 22 July 2011, a lone wolf terrorist attacked Norway. At the island of Utøya, he killed 69 people....
This study is an analysis of the spread of information through Twitter contrasted with the reporting...
Abstract When a terror-related event occurs, there is a surge of traffic on social media comprising...
The project explored and analyzed the use of the social media tool Twitter in the immediate aftermat...
Terrorism and violence are used by miscreant groups and individuals to disrupt the normal course of ...
The Author(s) 2014. This article is published with open access at Springerlink.com Abstract Little i...
Obtaining accurate information from social media during a crisis can be difficult, but should all in...
Social media, and Twitter in particular, have become important sources for journalists in times of c...
Social media, and Twitter in particular, have become important sources for journalists in times of c...
<p>This study attempted to further the literature by showing how crisis communication and social med...
The Internet and especially social media are not only used for supposedly good purposes. For example...
Background. This thesis explores digital public reactions to terrorist attacks, and specifically how...
abstract: Social media has become a direct and effective means of transmitting personal opinions int...
This chapter examines the question of critical approaches to terrorism and social media, literature ...
The 2019 terror attack in Christchurch, New Zealand shocked the world as a lone gunman claimed the l...
On 22 July 2011, a lone wolf terrorist attacked Norway. At the island of Utøya, he killed 69 people....
This study is an analysis of the spread of information through Twitter contrasted with the reporting...
Abstract When a terror-related event occurs, there is a surge of traffic on social media comprising...
The project explored and analyzed the use of the social media tool Twitter in the immediate aftermat...
Terrorism and violence are used by miscreant groups and individuals to disrupt the normal course of ...
The Author(s) 2014. This article is published with open access at Springerlink.com Abstract Little i...