Research Article
BibTex RIS Cite

Online Fight Against Online Radicalization: Using the Internet for Counter Radicalization

Year 2024, Volume: 11 Issue: 2, 485 - 514, 25.07.2024
https://doi.org/10.30626/tesamakademi.1409425

Abstract

This study is planned to draw a framework on how to benefit from online space and tools in the fight against online radicalization. While combating and reversing radicalization is a significant responsibility of security forces today, online radicalization poses a special challenge since it is quite dynamic and complex, although it is not a new phenomenon. The facilitating effect of the online environment in all kinds of searches and sharing is very decisive in the realization of radicalization. For this reason, today's use of online environments more intensely and effectively than traditional face-to-face and in-group radicalization requires a comprehensive examination. In addition, while there are many strategies implemented to prevent and combat radicalization, the main trend of this study is to conduct an analysis based on the online dimension. The fact that online radicalization has very different characteristics from traditional radicalization requires that relevant prevention and combat activities have their characteristics. In particular, suggestions for using online platforms and tools to combat online radicalization will reflect the special aspect of this study. The study will first begin with an informative section on online radicalization, and the following section will present a discussion on online strategies to combat radicalization and online radicalization. In the conclusion section, a risk assessment will be made regarding how the developments in the internet and technology will continue to be used by radical groups. Thus, it is aimed to contribute to the radicalization literature, specifically on online radicalization and deradicalization.

References

  • Aistrope, T. (2015). Social media and counterterrorism strateg,. Australian Journal of International Affairs, 70(2) 1-17.
  • Anderson, R. A. (2020). Online utilization for terrorist self-radicalization purposes. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 3–33). CRC Press. Archetti, C. (2015). Terrorism, communication and new media: Explaining radicalization in the digital age. Perspectives on Terrorism, 9(1), 49-59.
  • Ashour, O. (2010). Online de-radicalization? Countering violent extremist narratives: Message, messenger and media. Perspectives on Terrorism, 4(6), 15-19.
  • Balboni, P. ve Macenaite, M. (2020). The relationship between personal data protection and use of information to fight online terrorist propaganda, recruitment, and radicalization. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 239-266). CRC Press.
  • Barlett, J. ve Miller, C. (2012). The edge of violance: Towards telling the difference between violent and non-violent radicalization. Terrorism and Political Violence, 24, 1-21.
  • Berger, J. M. ve Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of the ISIS supporters on Twitter. Analysis Paper, No: 20, Center for Middle East Policy at Brookings.
  • Bianchi, S., Ladu, M. ve Bianchi, S. (2020). Radicalisation: No prevention without ‘juridicalisation’, B. Akhgar vd. (Ed.), Investigating Radicalization Trends: Cases Studies in Europe and Asia (ss. 123-178), Springer International Publisher.
  • Bjorgo, T. ve Horgan, J. (2009). Introduction. İçinde T. Bjorge ve J. Horgan (Ed.), Leaving terrorism behind: Individual and collective disengagement. Routledge.
  • Blanco, J. M., Cohen, J. ve Nitsch, H. (2020). Cyber intelligence against radicalization and violent extremism. B. Akhgar vd. (Ed.), Investigating Radicalization Trends: Cases Studies in Europe and Asia (ss. 55-81), Springer International Publisher.
  • Bloom, M. vd. (2019). Navigating ISIS’s preferred platform: Telegram. Terrorism and Political Violence, 31(6), 1242-1254.
  • Braddock, K. (2020). Weaponized words: The strategic role of persuasion in violent radicalization and counter-radicalization. Cambridge University Press.
  • Briggs, R. (2014). Radicalisation: The role of the internet. Policy Brief, Institute for Strategic Dialogue.
  • Charvat, J. (2010). Radicalization on the internet. Defence Against Terrorism Review- DATR, 3(2), 75-86.
  • Conway, M. (2006). Terrorists ‘use’ of the internet and fighting back. Information and Security, 19, 9-30.
  • Conway, M. (2012). From al-Zarqawi to al-Awlaki: The emregence and development of an online radical milieu. Combating Terrorism Exchange, 2(4), 1-10.
  • Conway, M. (2017). Determining the role of the internet in violent extremisim and terrorism: Six suggestions for progressing research. Studies in Conflict and Terrorism, 40(1), 77-98.
  • Conway, M. vd. (2019). Distrupting DAESH: Measuring takedown of online terrorist material and its impacts. Studies in Coflict&Terrorism, 42(1-2), 141-160.
  • Dauber, C. E. ve Ilter, K. (2020). The relationship between social media and radicalization. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 46-63). CRC Press.
  • Dauber, C. E. ve Robinson, M. D. (2020). How homegrown violent extremism will likely continue to evolve as a significant threat. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 81-102). CRC Press.
  • Dizboni, A. ve Leuprecht, C. (2020). Instruments and arrangements against online terrorism relating to international cooperation. İçinde J.R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 373-387). CRC Press.
  • Furnell, S. M. ve Warren, M. J. (1999). Computer hacking and cyber terrorism: the real threats in the new millennium? Computers&Security, 18 (1), 28-34.
  • Gill, P. vd. (2017). Terrorist use of the internet by the numbers: Quantifying behaviors, patterns, and processes. Criminology&Public Policy, 16(1), 99-117.
  • Gonzales, D. (2022). Its getting harder to do: Countering terrosit use of the internet. İçinde K. Larers ve T. Hos (Ed.), Terrorism and Transatlantic Relations: Threats and Challanges (ss.165-190), Palgrave Macmillian.
  • Greenberg, K. J. (2016). Counter-radicalization via internet. The Annals of the American Academy of Political and Social Science, 668, 165-179.
  • Mølmen, G. N. ve Ravndal, J. A. (2021). Mechanisms of online radicalisation: How the internet affects the radicalisation of extreme-right lone actor terrorists. Behavioral Sciences of Terrorism and Political Aggression, 1-25.
  • Haig, Z. ve Kovacs, L. (2007). New way of terrorism: Internet and cyber terrorism. AARMS, 6(4), 659-671.
  • Holt, T. vd. (2015). Political radicalization on the internet: Extremist content, government control, and the power of victim and jihad videos. Dynamics of Asymmetric Conflict, 8(2), 107-120.
  • Horgan, J. (2009). Walking away from terrorism: Accounts of disengagement from radical and extremist movements. Routledge.
  • Huey, L. (2015). This is not your mother’s terrorism: Social media, online radicalization and the practice of political jamming. Journal of Terrorism Research, 6(2), 1-16.
  • Jurczak, J., Lachacz, T. ve Nitsch, H. (2020). The so-called “lone-wolf” phenomenon. İçinde B. Akhgar vd. (Ed.), Investigating Radicalization Trends: Cases Studies in Europe and Asia (ss. 39-53), Springer International Publisher.
  • Klausen, J. (2015). Tweeting the jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict&Terrorism, 38(1), 1-22.
  • Klausen, J. vd. (2012). The youtube jihadists: A social network analysis of Al-Muhajiroun’s propoganda campaign. Perspectives on Terrorism, 6(1), 36-53.
  • Koehler, D. (2014/2015). The radical online: Individual radicalization processes and role of the internet. Journal for Deredacalization, 1, 116-134.
  • Koomen, W. ve van der Plight, J. (2016). The psychology of radicalization and terrorism. Routledge.
  • Kruglanski, A. W. vd. (2014). The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Advances in Political Psychology, 35(1), 69-93.
  • Macdonald, S. vd. (2019). Deash, Twitter and the social media ecosystem: A study of outlinks contained in tweets mentioning Rumiyan. The RUSI Journal, 164(4), 60-72.
  • Macdonald, S. ve Mair, D. (2015). Terrorism online: A new strategic environment. İçinde L. Jarvis, S. Macdonald ve T. M. Chen (Ed.), Terrorism online: Politics, law and technology. Routledge.
  • Macdonald, S. ve Whittake, J. (2020). Online radicalization: Contested words and conceptual clarity, İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 33-46). CRC Press.
  • Mccauley, C ve Moskalenko, S. (2008). Mechanism of political radicalization: Pathways towards terrorism. Terrorism and Political Violance, 20(3), 415-433.
  • Miller, A. ve Stivachtis, Y. A. (2020). Public–private partnerships and the private sector’s role in countering the use of the internet for terrorist purposes. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 443-456). CRC Press.
  • Molmen, G. N. ve Ravndal, J. A. (2021). Mechanism of online radicalisation: How the internet affects the radicalization of extreme-right lone actor terrorists. Behavioral Sciences of Terrorism and Political Aggression, 15(4), 463-487.
  • Muro, D. (2016). What does radicalization look like: Four visualisations of socialisation into violent extremisim. Notes Internacionals CIDOB, 163, 1-5.
  • Neumann, P. R. (2013a). The trouble with radicalization. International Affairs, 89(4), 873-893.
  • Neumann, P. R. (2013b). Options and strategies for countering online radicalization in the United States. Studies in Conflict&Terrorism, 36(6), 431-459.
  • Neumann, P. R. ve Smith, M.L.R. (2007). The strategy of terrorism: How it works, and why it fails. Routledge.
  • Oman, S. D. (2012). Introducing social media intelligence (SOCMINT). Intelligence and National Security, 27(6), 801-823.
  • Payne, K. (2009). Winning the battle of ideas: Propaganda, ideology, and terror. Studies in Conflict and Terrorism, 32(2), 109-128.
  • Pilkington, H. (2023). Radicalization as and in process: Tracing journeys through an “extreme-right” milieu. Studies in Conflict&Terrorism.
  • Pressman, D. E. (2009). Risk assessment decisions for violent political extremism. Public Safety, Canada.
  • Rash, W. (1997). Politics on the net: wiring the political process. W. H. Freeman.
  • Rusumanov, V. (2016). The use of internet by terrorist organization. Information and Security: An International Journal, 34(2), 137-150.
  • Schmid, A. P. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper, The Hague.
  • Schmid, A. P. (2016). Research on Radicalisation: Topics and themes. Perspectives on Terrorism. 10(3), 26-32.
  • Sedgwick, M. (2010). The concept of radicalization as a source of confusion. Terrorism and Political Violance, 22(4), 479-494.
  • Smelser, N. J. (2007). The faces of terrorism: Social and psychological dimensions. Princeton University Press.
  • Smith, J. M. ve Alarid, M. (2020). Terrorism recruitment and radicalization into 21st century. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 179-195). CRC Press.
  • Twitter, (18 August 2016). An update on our efforts to combat violent extremisim, Twitter Blog, Access date: 20.12.2022 , https://blog.twitter.com/en_us/a/2016/an-update-on-our-efforts-to-combat-violent-extremism.
  • Twitter, (25 January 2022), An update to the Twitter transparancy center, Access date: 20.12.2022, https://blog.twitter.com/en_us/topics/company/2021/transparency-19.
  • United Nations (2012). The use of the internet for terrorist purposes. United Nations Office on Drugs and Crime, United Nations Office at Vienna.
  • Von Behr, I. vd. (2013). Radicalization in digital era: The use of internet in 15 case of terrorism and extremism. RAND Europe.
  • Weimann, G. (2012), Lone wolfs in cyberspace. Journal of Terrorism Research, 3(2), 75-90.
  • Weimann, G. (2015). Terrorist migration to social media. Georgetown Journal of International Affairs, 16(1), 180-187.

Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması

Year 2024, Volume: 11 Issue: 2, 485 - 514, 25.07.2024
https://doi.org/10.30626/tesamakademi.1409425

Abstract

Bu çalışmada çevrimiçi radikalleşmeyle mücadelede çevrimiçi ortamdan ve araçlardan nasıl yaralanabileceği üzerine bir çerçeve çizilmesi planlanmaktadır. Günümüzde radikalleşmeyle mücadele ve radikalleşmenin tersine döndürülmesi güvenlik güçlerinin önemli bir sorumluluğuyken, her ne kadar yeni bir olgu olmasa da oldukça dinamik ve karmaşık bir nitelikte olması nedeniyle çevrimiçi radikalleşme özel bir meydan okuma muhteva etmektedir. Çevrimiçi ortamın her türlü arayışı ve paylaşımı kolaylaştırıcı etkisi, radikalleşmenin gerçekleşmesinde oldukça belirleyicidir. Bu nedenle günümüzde geleneksel yüz yüze ve grup içi radikalleşmeden daha yoğun ve etkili şekilde çevrimiçi ortamların kullanılması kapsamlı bir inceleme yapılmasını gerekli kılmaktadır. Bunun yanında radikalleşmenin önlenmesi ve ilgili mücadele için uygulanan pek çok strateji bulunurken, çevrimiçi boyutun temele alındığı bir analizin yapılması bu çalışmanın temel eğilim noktasıdır. Çevrimiçi radikalleşmenin geleneksel radikalleşmeden oldukça farklı özellikler göstermesi, ilgili önleme ve mücadele faaliyetlerinin de kendine has özelliklerinin olmasını gerektirmektedir. Özellikle çevrimiçi platformların ve araçların çevrimiçi radikalleşmeyle mücadele kullanılmasına yönelik öneriler bu çalışmanın özel yönünü yansıtacaktır. Çalışma öncelikle çevrimiçi radikalleşme üzerine bilgilendirici bir bölümle başlayacak, izleyen bölümde radikalleşme ve çevrimiçi radikalleşmeyle mücadelede çevrimiçi stratejiler üzerine bir tartışma ortaya konulacaktır. Sonuç bölümünde ise internet ve teknolojideki gelişimin radikal gruplar tarafından ne şekilde kullanılmaya devam edeceğine yönelik bir risk değerlendirmesi yapılacaktır. Böylece çevrimiçi radikalleşme ve deradikalleşme özelinde, radikalleşme literatürüne katkı sağlanması amaçlanmaktadır.

References

  • Aistrope, T. (2015). Social media and counterterrorism strateg,. Australian Journal of International Affairs, 70(2) 1-17.
  • Anderson, R. A. (2020). Online utilization for terrorist self-radicalization purposes. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 3–33). CRC Press. Archetti, C. (2015). Terrorism, communication and new media: Explaining radicalization in the digital age. Perspectives on Terrorism, 9(1), 49-59.
  • Ashour, O. (2010). Online de-radicalization? Countering violent extremist narratives: Message, messenger and media. Perspectives on Terrorism, 4(6), 15-19.
  • Balboni, P. ve Macenaite, M. (2020). The relationship between personal data protection and use of information to fight online terrorist propaganda, recruitment, and radicalization. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 239-266). CRC Press.
  • Barlett, J. ve Miller, C. (2012). The edge of violance: Towards telling the difference between violent and non-violent radicalization. Terrorism and Political Violence, 24, 1-21.
  • Berger, J. M. ve Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of the ISIS supporters on Twitter. Analysis Paper, No: 20, Center for Middle East Policy at Brookings.
  • Bianchi, S., Ladu, M. ve Bianchi, S. (2020). Radicalisation: No prevention without ‘juridicalisation’, B. Akhgar vd. (Ed.), Investigating Radicalization Trends: Cases Studies in Europe and Asia (ss. 123-178), Springer International Publisher.
  • Bjorgo, T. ve Horgan, J. (2009). Introduction. İçinde T. Bjorge ve J. Horgan (Ed.), Leaving terrorism behind: Individual and collective disengagement. Routledge.
  • Blanco, J. M., Cohen, J. ve Nitsch, H. (2020). Cyber intelligence against radicalization and violent extremism. B. Akhgar vd. (Ed.), Investigating Radicalization Trends: Cases Studies in Europe and Asia (ss. 55-81), Springer International Publisher.
  • Bloom, M. vd. (2019). Navigating ISIS’s preferred platform: Telegram. Terrorism and Political Violence, 31(6), 1242-1254.
  • Braddock, K. (2020). Weaponized words: The strategic role of persuasion in violent radicalization and counter-radicalization. Cambridge University Press.
  • Briggs, R. (2014). Radicalisation: The role of the internet. Policy Brief, Institute for Strategic Dialogue.
  • Charvat, J. (2010). Radicalization on the internet. Defence Against Terrorism Review- DATR, 3(2), 75-86.
  • Conway, M. (2006). Terrorists ‘use’ of the internet and fighting back. Information and Security, 19, 9-30.
  • Conway, M. (2012). From al-Zarqawi to al-Awlaki: The emregence and development of an online radical milieu. Combating Terrorism Exchange, 2(4), 1-10.
  • Conway, M. (2017). Determining the role of the internet in violent extremisim and terrorism: Six suggestions for progressing research. Studies in Conflict and Terrorism, 40(1), 77-98.
  • Conway, M. vd. (2019). Distrupting DAESH: Measuring takedown of online terrorist material and its impacts. Studies in Coflict&Terrorism, 42(1-2), 141-160.
  • Dauber, C. E. ve Ilter, K. (2020). The relationship between social media and radicalization. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 46-63). CRC Press.
  • Dauber, C. E. ve Robinson, M. D. (2020). How homegrown violent extremism will likely continue to evolve as a significant threat. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 81-102). CRC Press.
  • Dizboni, A. ve Leuprecht, C. (2020). Instruments and arrangements against online terrorism relating to international cooperation. İçinde J.R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 373-387). CRC Press.
  • Furnell, S. M. ve Warren, M. J. (1999). Computer hacking and cyber terrorism: the real threats in the new millennium? Computers&Security, 18 (1), 28-34.
  • Gill, P. vd. (2017). Terrorist use of the internet by the numbers: Quantifying behaviors, patterns, and processes. Criminology&Public Policy, 16(1), 99-117.
  • Gonzales, D. (2022). Its getting harder to do: Countering terrosit use of the internet. İçinde K. Larers ve T. Hos (Ed.), Terrorism and Transatlantic Relations: Threats and Challanges (ss.165-190), Palgrave Macmillian.
  • Greenberg, K. J. (2016). Counter-radicalization via internet. The Annals of the American Academy of Political and Social Science, 668, 165-179.
  • Mølmen, G. N. ve Ravndal, J. A. (2021). Mechanisms of online radicalisation: How the internet affects the radicalisation of extreme-right lone actor terrorists. Behavioral Sciences of Terrorism and Political Aggression, 1-25.
  • Haig, Z. ve Kovacs, L. (2007). New way of terrorism: Internet and cyber terrorism. AARMS, 6(4), 659-671.
  • Holt, T. vd. (2015). Political radicalization on the internet: Extremist content, government control, and the power of victim and jihad videos. Dynamics of Asymmetric Conflict, 8(2), 107-120.
  • Horgan, J. (2009). Walking away from terrorism: Accounts of disengagement from radical and extremist movements. Routledge.
  • Huey, L. (2015). This is not your mother’s terrorism: Social media, online radicalization and the practice of political jamming. Journal of Terrorism Research, 6(2), 1-16.
  • Jurczak, J., Lachacz, T. ve Nitsch, H. (2020). The so-called “lone-wolf” phenomenon. İçinde B. Akhgar vd. (Ed.), Investigating Radicalization Trends: Cases Studies in Europe and Asia (ss. 39-53), Springer International Publisher.
  • Klausen, J. (2015). Tweeting the jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict&Terrorism, 38(1), 1-22.
  • Klausen, J. vd. (2012). The youtube jihadists: A social network analysis of Al-Muhajiroun’s propoganda campaign. Perspectives on Terrorism, 6(1), 36-53.
  • Koehler, D. (2014/2015). The radical online: Individual radicalization processes and role of the internet. Journal for Deredacalization, 1, 116-134.
  • Koomen, W. ve van der Plight, J. (2016). The psychology of radicalization and terrorism. Routledge.
  • Kruglanski, A. W. vd. (2014). The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Advances in Political Psychology, 35(1), 69-93.
  • Macdonald, S. vd. (2019). Deash, Twitter and the social media ecosystem: A study of outlinks contained in tweets mentioning Rumiyan. The RUSI Journal, 164(4), 60-72.
  • Macdonald, S. ve Mair, D. (2015). Terrorism online: A new strategic environment. İçinde L. Jarvis, S. Macdonald ve T. M. Chen (Ed.), Terrorism online: Politics, law and technology. Routledge.
  • Macdonald, S. ve Whittake, J. (2020). Online radicalization: Contested words and conceptual clarity, İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 33-46). CRC Press.
  • Mccauley, C ve Moskalenko, S. (2008). Mechanism of political radicalization: Pathways towards terrorism. Terrorism and Political Violance, 20(3), 415-433.
  • Miller, A. ve Stivachtis, Y. A. (2020). Public–private partnerships and the private sector’s role in countering the use of the internet for terrorist purposes. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 443-456). CRC Press.
  • Molmen, G. N. ve Ravndal, J. A. (2021). Mechanism of online radicalisation: How the internet affects the radicalization of extreme-right lone actor terrorists. Behavioral Sciences of Terrorism and Political Aggression, 15(4), 463-487.
  • Muro, D. (2016). What does radicalization look like: Four visualisations of socialisation into violent extremisim. Notes Internacionals CIDOB, 163, 1-5.
  • Neumann, P. R. (2013a). The trouble with radicalization. International Affairs, 89(4), 873-893.
  • Neumann, P. R. (2013b). Options and strategies for countering online radicalization in the United States. Studies in Conflict&Terrorism, 36(6), 431-459.
  • Neumann, P. R. ve Smith, M.L.R. (2007). The strategy of terrorism: How it works, and why it fails. Routledge.
  • Oman, S. D. (2012). Introducing social media intelligence (SOCMINT). Intelligence and National Security, 27(6), 801-823.
  • Payne, K. (2009). Winning the battle of ideas: Propaganda, ideology, and terror. Studies in Conflict and Terrorism, 32(2), 109-128.
  • Pilkington, H. (2023). Radicalization as and in process: Tracing journeys through an “extreme-right” milieu. Studies in Conflict&Terrorism.
  • Pressman, D. E. (2009). Risk assessment decisions for violent political extremism. Public Safety, Canada.
  • Rash, W. (1997). Politics on the net: wiring the political process. W. H. Freeman.
  • Rusumanov, V. (2016). The use of internet by terrorist organization. Information and Security: An International Journal, 34(2), 137-150.
  • Schmid, A. P. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper, The Hague.
  • Schmid, A. P. (2016). Research on Radicalisation: Topics and themes. Perspectives on Terrorism. 10(3), 26-32.
  • Sedgwick, M. (2010). The concept of radicalization as a source of confusion. Terrorism and Political Violance, 22(4), 479-494.
  • Smelser, N. J. (2007). The faces of terrorism: Social and psychological dimensions. Princeton University Press.
  • Smith, J. M. ve Alarid, M. (2020). Terrorism recruitment and radicalization into 21st century. İçinde J. R. Vacca (Ed.), Online terrorist propaganda, recruitment, and radicalization (ss. 179-195). CRC Press.
  • Twitter, (18 August 2016). An update on our efforts to combat violent extremisim, Twitter Blog, Access date: 20.12.2022 , https://blog.twitter.com/en_us/a/2016/an-update-on-our-efforts-to-combat-violent-extremism.
  • Twitter, (25 January 2022), An update to the Twitter transparancy center, Access date: 20.12.2022, https://blog.twitter.com/en_us/topics/company/2021/transparency-19.
  • United Nations (2012). The use of the internet for terrorist purposes. United Nations Office on Drugs and Crime, United Nations Office at Vienna.
  • Von Behr, I. vd. (2013). Radicalization in digital era: The use of internet in 15 case of terrorism and extremism. RAND Europe.
  • Weimann, G. (2012), Lone wolfs in cyberspace. Journal of Terrorism Research, 3(2), 75-90.
  • Weimann, G. (2015). Terrorist migration to social media. Georgetown Journal of International Affairs, 16(1), 180-187.
There are 62 citations in total.

Details

Primary Language Turkish
Subjects International Security, Terrorism in International Relations
Journal Section Articles
Authors

Emre Çıtak 0000-0002-8704-6495

Publication Date July 25, 2024
Submission Date December 25, 2023
Acceptance Date June 11, 2024
Published in Issue Year 2024 Volume: 11 Issue: 2

Cite

APA Çıtak, E. (2024). Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması. TESAM Akademi Dergisi, 11(2), 485-514. https://doi.org/10.30626/tesamakademi.1409425
AMA Çıtak E. Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması. TESAM Akademi Dergisi. July 2024;11(2):485-514. doi:10.30626/tesamakademi.1409425
Chicago Çıtak, Emre. “Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması”. TESAM Akademi Dergisi 11, no. 2 (July 2024): 485-514. https://doi.org/10.30626/tesamakademi.1409425.
EndNote Çıtak E (July 1, 2024) Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması. TESAM Akademi Dergisi 11 2 485–514.
IEEE E. Çıtak, “Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması”, TESAM Akademi Dergisi, vol. 11, no. 2, pp. 485–514, 2024, doi: 10.30626/tesamakademi.1409425.
ISNAD Çıtak, Emre. “Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması”. TESAM Akademi Dergisi 11/2 (July 2024), 485-514. https://doi.org/10.30626/tesamakademi.1409425.
JAMA Çıtak E. Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması. TESAM Akademi Dergisi. 2024;11:485–514.
MLA Çıtak, Emre. “Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması”. TESAM Akademi Dergisi, vol. 11, no. 2, 2024, pp. 485-14, doi:10.30626/tesamakademi.1409425.
Vancouver Çıtak E. Çevrimiçi Radikalleşmeye Karşı Çevrimiçi Mücadele: İnternetin Radikalleşmeyle Mücadelede Kullanılması. TESAM Akademi Dergisi. 2024;11(2):485-514.