Extremism Content in Social Media: A Model of Young Followers Extremism Behavior

Extremism Content in Social Media: A Model of Young Followers Extremism Behavior

  IJETT-book-cover           
  
© 2024 by IJETT Journal
Volume-72 Issue-2
Year of Publication : 2024
Author : Abdulwahab Ali Almazroi, Fathey Mohammed
DOI : 10.14445/22315381/IJETT-V72I2P111

How to Cite?

Abdulwahab Ali Almazroi, Fathey Mohammed, "Extremism Content in Social Media: A Model of Young Followers Extremism Behavior," International Journal of Engineering Trends and Technology, vol. 72, no. 2, pp. 92-98, 2024. Crossref, https://doi.org/10.14445/22315381/IJETT-V72I2P111

Abstract
Recently, a lot of attention has been paid to radicalization, which may lead to extremism, more specifically, the technological advances that bear the potential for easier communication and networking. Radicals, violent extremists, and terrorists can reach a wider audience due to their narratives and the technologies available, such as social media networks. They use such them to extremist ideology, promote radicalized views, and recruit new members worldwide, and young people are especially at risk. Researchers and policymakers are increasingly concerned with understanding the processes of extremism to be able to control youth violent extremism. Empirical studies have been conducted to address the topic of social media and violent extremism. However, most of the related studies focused on analyzing content on social media to detect extremism using AI and machine learning techniques narratives. Less attention has been given to understanding the extremism behavior of the extremists' followers in social media groups, pages, and forums. This research aims to propose a model of extremist behavior among the young followers of radicalism, extremism, or terrorism content in social media. By exploring extremist behavior in the context of social media and revisiting the related theories, an integrated model is proposed to identify the factors influencing young people's extremist behavior in the context of social media. The proposed model may promote a general understanding of the extremism behavior among young followers of radical content on social media platforms. It also may provide new insights for policymakers to create more effective counter-radicalization programs to protect young people from being dragged into extremism acts.

Keywords
Social Media, Extremism Content, Young People, Behaviour, Radicalism, Counter-radicalization.

References
[1] Jad Melki, and May Jabado, “Mediated Public Diplomacy of the Islamic State in Iraq and Syria: The Synergistic Use of Terrorism, Social Media and Branding,” Media Communication, vol. 4, no. 2, pp. 92-103, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Fatimah Alkomah, Sanaz Salati, and Xiaogang Ma, “A New Hate Speech Detection System Based on Textual and Psychological Features,” International Journal of Advanced Computer Science and Applications, vol. 13, no. 8, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Gabrielle Blanquart, and David M. Cook, “Twitter Influence and Cumulative Perceptions of Extremist Support: A Case Study of Geert Wilders,” 4 th Australian Counter Terrorism Conference, Perth, Western Australia, pp. 1-11, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[4] A.I. Abalian, and A. Bijan, “Youth as an Object of Online Extremist Propaganda: The Case of the IS,” RUDN Journal of Political Science, vol. 23, no. 1, pp. 78-96, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Šiňanská Katarína, Tóthová Lucia, and Žiaková Tatiana, “Radicalization and Extremism as Adolescent Risky Behaviours,” Journal of Interdisciplinary Research, vol. 8, no. 2, pp. 239-245, 2018.
[Google Scholar] [Publisher Link]
[6] Stijn Sieckelinck et al., “Transitional Journeys Into and Out of Extremism. A Biographical Approach,” Studies in Conflict Terrorism, vol. 42, no. 7, pp. 662-682, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Alex P. Schmid, “Radicalisation, De-Radicalisation, Counter-Radicalisation: A Conceptual Discussion and Literature Review,” ICCT-The Hague Research Paper, vol. 97, no. 1, pp. 1-105, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Andrew Silke, “Holy Warriors: Exploring the Psychological Processes of Jihadi Radicalization,” European Journal of Criminology, vol. 5, no. 1, pp. 99-123, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Abdulfattah Omar, and Mohamed Elarabawy Hashem, “An Evaluation of the Automatic Detection of Hate Speech in Social Media Networks,” International Journal of Advanced Computer Science Applications, vol. 13, no. 2, pp. 228-233, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Anthony H. Richmond, “Social Exclusion: Belonging and not Belonging in the World System,” Refuge, vol. 21, no. 1, pp. 40-48, 2002.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Jamie Bartlett, Jonathan Birdwell, and Michael King, The Edge of Violence: A Radical Approach to Extremism, Demos, pp. 1-247, 2011.
[Google Scholar] [Publisher Link]
[12] Barbara D. Adams, et al., “Understanding the Process of Radicalization: Review of the Empirical Literature,” Defence Research and Development Canada, Report, pp. 1-89, 2011.
[Google Scholar] [Publisher Link]
[13] Randy Borum, Understanding Terrorist Psychology, The Psychology of Counter-Terrorism, Routledge, pp. 19-33, 2010.
[Google Scholar] [Publisher Link]
[14] Marisa L. Porges, “The Saudi Deradicalization Experiment,” Council on Foreign Relations, 2010.
[Google Scholar] [Publisher Link]
[15] Mansour Mohammed Sarhan Al Ameri, “Understanding Radicalization and Counter-Radicalization Communication in Social Media: A Twitter Analysis,” PhD Thesis, United Arab Emirates University, 2020.
[Google Scholar] [Publisher Link]
[16] Daniel M. Pak, “Social Media Networking: New Challenges and Strategies for Counterterrorism,” M.A. Thesis, Dartmouth College, 2018.
[Google Scholar] [Publisher Link]
[17] Ryan Fertakos, “Social Media and Extremist Groups Online: An Examination of Methods of Radicalization and Its Implications,” M.A. Thesis, The University of North Carolina at Charlotte, pp. 1-10, 2019.
[Google Scholar] [Publisher Link]
[18] Yanais Garcia, “Twitter, Tumblr, and Terrorist: How Terrorists Advanced Through the Use of Cyberspace,” M.S.C. Thesis, Utica College, pp. 1-10, 2020.
[Google Scholar] [Publisher Link]
[19] Tanvir Ahammad et al., “Identification of Abusive Behavior Towards Religious Beliefs and Practices on Social Media Platforms,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 6, pp. 850-860, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Alava Séraphin, Frau-Meigs Divina, and Hassan Ghayda, Youth and Violent Extremism on Social Media: Mapping the Research, UNESCO Publishing, pp. 1-81, 2017.
[Google Scholar] [Publisher Link]
[21] Trisha T.C. Lin, Li Li, and John Robert Bautista, “Examining how Communication and Knowledge Relate to Singaporean Youths’ Perceived Risk of Haze and Intentions to take Preventive Behaviors,” Health Communication, vol. 32, no. 6, pp. 749-758, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Lieven Pauwels, Explaining and Understanding the Role of Exposure to New Social Media on Violent Extremism, Academia Press, pp. 1-233, 2014.
[Google Scholar] [Publisher Link]
[23] James Hawdon, Atte Oksanen, and Pekka Räsänen, “Online Extremism and Online Hate: Exposure among Adolescents and Young Adults in Four Nations,” Nordicom-Information, vol. 37, no. 3-4, pp. 29-37, 2015.
[Google Scholar] [Publisher Link]
[24] Imran Awan, “Cyber-Extremism: Isis and the Power of Social Media,” Society, vol. 54, no. 2, pp. 138-149, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Matthew Costello, James Hawdon, and Amanda Cross, “Virtually Standing Up or Standing By? Correlates of Enacting Social Control Online,” International Journal of Criminology and Sociology, vol. 6, pp. 16-28, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[26] Ariel Merari, Driven to Death Psychological and Social Aspects of Suicide Terrorism, OUP USA, pp. 1-315, 2010.
[Google Scholar] [Publisher Link]
[27] A. Kruglanski et al., “Terrorism-A (Self) Love Story: Redirecting the Significance Quest can end Violence,” American Psychologist, vol. 68, no. 7, pp. 559-575, 2013.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Jeff Victoroff et al., “Support for Religio‐Political Aggression among Teenaged Boys in Gaza: Part I: Psychological Findings,” Aggressive Behavior, vol. 36, no. 4, pp. 219-231, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Angela McGilloway, Priyo Ghosh, and Kamaldeep Bhui, “A Systematic Review of Pathways to and Processes Associated with Radicalization and Extremism amongst Muslims in Western Societies,” International Review of Psychiatry, vol. 27, no. 1, pp. 39-50, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[30] Clark McCauley, and Sarah Scheckter, “What's Special about US Muslims? The War on Terrorism as Seen by Muslims in the United States, Morocco, Egypt, Pakistan, and Indonesia,” Studies in Conflict & Terrorism, vol. 31, no. 11, pp. 1024-1031, 2008.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Arie W. Kruglanski et al., “Fully Committed: Suicide Bombers' Motivation and the Quest for Personal Significance,” Political psychology, vol. 30, no. 3, pp. 331-357, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[32] Tore Bjørgo, and Yngve Carlsson, “Early Intervention with Violent and Racist Youth Groups,” Norsk Utenrikspolitisk Institutt, Working Paper, pp. 1-112, 2005.
[Google Scholar] [Publisher Link]
[33] Spencer Byron Nicholls, and Ronald E. Rice, “A Dual-Identity Model of Responses to Deviance in Online Groups: Integrating Social Identity Theory and Expectancy Violations Theory,” Communication Theory, vol. 27, no. 3, pp. 243-268, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[34] Zuoming Wang, “Anonymity Effects and Implications in the Virtual Environment: from Crowd to Computer-Mediated Communication,” Social Networking, vol. 7, no. 1, pp. 45-62, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[35] Felipe Vilanova et al., “Deindividuation: From Le Bon to the Social Identity Model of Deindividuation Effects,” Cogent Psychology, vol. 4, no. 1, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[36] Jude P. Mikal et al., “Common Voice: Analysis of Behavior Modification and Content Convergence in a Popular Online Community,” Computers in Human Behavior, vol. 35, pp. 506-515, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[37] Benjamin Ducol, A Radical Sociability: In Defense of an Online/Offline Multidimensional Approach to Radicalization in Social Networks, Terrorism and Counter-Terrorism, Routledge, pp. 82-104, 2015.
[Google Scholar] [Publisher Link]
[38] Cristina Archetti, “Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age,” Perspectives on Terrorism, vol. 9, no. 1, pp. 49-59, 2015.
[Google Scholar] [Publisher Link]
[39] Kate Barrelle, “Pro-Integration: Disengagement from and Life after Extremism,” Behavioral Sciences of Terrorism Political Aggression, vol. 7, no. 2, pp. 129-142, 2015.
[CrossRef] [Google Scholar] [Publisher Link]
[40] Debra Smith, and Steven Talbot, “How to make Enemies and Influence People: a Social Influence Model of Violent Extremism (SIM-VE),” Journal of Policing, Intelligence Counter Terrorism, vol. 14, no. 2, pp. 99-114, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[41] Joseph P. Forgas, and Kipling D. Williams, Social Influence: Direct and Indirect Processes, 1 st ed., Psychology Press, pp. 1-392, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[42] Jessica Stern, “Radicalization to Extremism and Mobilization to Violence: What have we Learned and what can we do About it?,” The Annals of the American Academy of political social science, vol. 668, no. 1, pp. 102-117, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[43] Ching-Chang Lee, Sam Tung-Hsiang Chou, and Yi-Ru Huang, “A Study on Personality Traits and Social Media Fatigue-Example of Facebook Users,” Lecture Notes on Information Theory, vol. 2, no. 3, pp. 249-253, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[44] Kuo-Chung Shang, Ching-Cheng Chao, and Taih-Cherng Lirn, “The Application of Personality Traits Model on the Freight Forwarding Service Industry,” Maritime Business Review, vol. 1, no. 3, pp. 231-252, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[45] Gordon Willard Allport, Pattern and Growth in Personality, Holt, Rinehart and Winston, pp. 1-593,1961.
[Google Scholar] [Publisher Link]
[46] Jose Maria Balmaceda, Silvia Schiaffino, and Daniela Godoy, “How do Personality Traits Affect Communication among Users in Online Social Networks?,” Online Information Review, vol. 38, no. 1, pp. 136-153, 2014.
[CrossRef] [Google Scholar] [Publisher Link]
[47] Oluyinka Ojedokun, “Associations of the Five-Factor Personality Traits with Environmental Citizenship Behavior of Youth in a Nigerian University Community,” Management of Environmental Quality, vol. 29, no. 6, pp. 1135-1155, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[48] Cameron Brick, and Gary J. Lewis, “Unearthing the “Green” Personality: Core Traits Predict Environmentally Friendly Behavior,” Environment Behavioral Sciences of Terrorism Political Aggression, vol. 48, no. 5, pp. 635-658, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[49] Marc H. Bornstein, The SAGE Encyclopedia of Lifespan Human Development, SAGE Publications, pp. 1-2616, 2018.
[Google Scholar] [Publisher Link]
[50] Robert R. McCrae, and Paul T. Costa, The Five-Factor Theory of Personality, in Handbook of Personality: Theory and Research, Guilford Press, pp. 159-181, 2008.
[Google Scholar] [Publisher Link]
[51] Long‐Yi Lin, “The Relationship of Consumer Personality Trait, Brand Personality and Brand Loyalty: an Empirical Study of Toys and Video Games Buyers,” Journal of Product Brand Management, vol. 19, no. 1, pp. 4-17, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[52] Lai-Ying Leong, Noor Ismawati Jaafar, and Ainin Sulaiman, “Understanding Impulse Purchase in Facebook Commerce: Does Big Five Matter?,” Internet Research, vol. 27, no. 4, pp. 786-818, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[53] Mary Agnes Wambui Kiarie, Loice C. Maru, and Thomas Kimeli Cheruiyot, “Leader Personality Traits and Employee Job Satisfaction in the Media Sector, Kenya,” The TQM Journal, vol. 29, no. 1, pp. 133-146, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[54] Suha Fouad Salem, and Alshaimaa Bahagat Alanadoly, “Personality Traits and Social Media as Drivers of Word-of-Mouth Towards Sustainable Fashion,” Journal of Fashion Marketing Management: An International Journal, vol. 25, no. 1, pp. 24-44, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[55] Utpal M. Dholakia, Richard P. Bagozzi, and Lisa Klein Pearo, “A Social Influence Model of Consumer Participation in Network-and Small-Group-Based Virtual Communities,” International Journal of Research in Marketing, vol. 21, no. 3, pp. 241-263, 2004.
[CrossRef] [Google Scholar] [Publisher Link]
[56] Zuoming Wang, Joseph B. Walther, and Jeffrey T. Hancock, “Social Identification and Interpersonal Communication in Computer-Mediated Communication: What You Do Versus Who You Are in Virtual Groups,” Human Communication Research, vol. 35, no. 1, pp. 59-85, 2009.
[CrossRef] [Google Scholar] [Publisher Link]
[57] Paul T. Costa, and Robert R. McCrae, The Revised Neo Personality Inventory (NEO-PI-R), The SAGE Handbook of Personality Theory and Assessment, SAGE Publications, vol. 2, no. 2, pp. 179-198, 2008.
[Google Scholar] [Publisher Link]
[58] Teresa Correa, Amber Willard Hinsley, and Homero Gil de Zúñiga, “Who Interacts on the Web?: The Intersection of Users’ Personality and Social Media Use,” Computers in Human Behavior, vol. 26, no. 2, pp. 247-253, 2010.
[CrossRef] [Google Scholar] [Publisher Link]
[59] Kelly Moore, and James C. McElroy, “The Influence of Personality on Facebook Usage, Wall Postings, and Regret,” Computers in Human Behavior, vol. 28, no. 1, pp. 267-274, 2012.
[CrossRef] [Google Scholar] [Publisher Link]
[60] Yair Amichai-Hamburger, and Gideon Vinitzky, “Social Network Use and Personality,” Computers in Human Behavior, vol. 26, no. 6, pp. 1289-1295, 2010.
[CrossRef] [Google Scholar] [Publisher Link]