Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-dnltx Total loading time: 0 Render date: 2024-04-19T06:00:13.634Z Has data issue: false hasContentIssue false

Feeling Terrified?

The Emotions of Online Violent Extremism

Published online by Cambridge University Press:  12 November 2021

Lise Waldek
Affiliation:
Macquarie University, Sydney
Julian Droogan
Affiliation:
Macquarie University, Sydney
Catharine Lumby
Affiliation:
Macquarie University, Sydney

Summary

This Element presents original research into how young people interact with violent extremist material, including terrorist propaganda, when online. It explores a series of emotional and behavioural responses that challenge assumptions that terror or trauma are the primary emotional responses to these online environments. It situates young people's emotional responses within a social framework, revealing them to have a relatively sophisticated relationship with violent extremism on social media that challenges simplistic concerns about processes of radicalisation. The Element draws on four years of research, including quantitative surveys and qualitative focus groups with young people, and presents a unique perspective drawn from young people's experiences.
Get access
Type
Element
Information
Online ISBN: 9781108886369
Publisher: Cambridge University Press
Print publication: 09 December 2021

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

Ahmed, Sara. 2014. Cultural Politics of Emotion. Edinburgh: Edinburgh University Press.Google Scholar
Ahn, Dohyun, and Shin, Dong-Hee. 2013. “Is the Social Use of Media for Seeking Connectedness or for Avoiding Social Isolation? Mechanisms Underlying Media Use and Subjective Well-Being.” Computers in Human Behavior 29 (6): 2453–62.CrossRefGoogle Scholar
Al-Rawi, Ahmed. 2016. “Anti-ISIS Humor: Cultural Resistance of Radical Ideology.” Politics, Religion & Ideology 17 (1): 5268.Google Scholar
Altheide, David L. 2006. “Terrorism and the Politics of Fear.” Cultural Studies ↔ Critical Methodologies 6 (4): 415–39.Google Scholar
Aly, Anne. 2017. “Brothers, Believers, Brave Mujahideen: Focusing Attention on the Audience of Violent Jihadist Preachers.” Studies in Conflict and Terrorism 40 (1): 6276.Google Scholar
Aly, Anne, Macdonald, Stuart, Jarvis, Lee, and Chen, Thomas M.. 2017. “Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization.” Studies in Conflict and Terrorism 40 (1): 19.Google ScholarGoogle Scholar
Atran, Scott. 2011a. “Who Becomes a Terrorist Today?” In The Ethics and Efficacy of the Global War on Terrorism: Fighting Terror with Terror, edited by Webel, Charles P. and Arnaldi, John A., 4558. New York: Palgrave Macmillan US.Google Scholar
Atran, Scott 2011b. Talking to the Enemy: Religion, Brotherhood, and the (Un)Making of Terrorists. Reprint edition. Scranton, PA: Ecco.Google Scholar
Atran, Scott 2015. “Why ISIS Has the Potential to Be a World-Altering Revolution.” Aeon. December 15, 2015. https://aeon.co/essays/why-isis-has-the-potential-to-be-a-world-altering-revolution.Google Scholar
Baumann, Fabian, Philipp Lorenz-Spreen, Igor M. Sokolov, and Starnini, Michele. 2020. “Modeling Echo Chambers and Polarization Dynamics in Social Networks.” Physical Review Letters 124 (4): 048301.CrossRefGoogle Scholar
Berger, J. M. 2018. Extremism. Essential Knowledge Series. Cambridge, MA: The MIT Press.CrossRefGoogle Scholar
Berger, Jonah, and Milkman, Katherine L.. 2012. “What Makes Online Content Viral?Journal of Marketing Research 49 (2): 192205.CrossRefGoogle Scholar
Bergin, Anthony, Michael Clifford, David Connery, Peter Jennings, David Lang, Amelia Long, Clare Murphy, Simone Roworth, Rosalyn Turner, and Samina Yasmeen et al. 2015. “Gen Y Jihadists: Preventing Radicalisation in Australia.” www.aspi.org.au/report/gen-y-jihadists-preventing-radicalisation-australia.Google Scholar
Bogle, Ariel. 2019. “Social Media Deserves Blame for Spreading the Christchurch Video, but so Do We.” ABC News, March 18, 2019. www.abc.net.au/news/science/2019-03-19/facebook-to-blame-for-christchurch-live-video-but-so-are-we/10911238.Google Scholar
boyd, danah. 2015. It’s Complicated: The Social Lives of Networked Teens. New Haven, CT: Yale University Press.Google Scholar
boyd, danah. , and Ellison, Nicole B.. 2007. “Social Network Sites: Definition, History, and Scholarship.” Journal of Computer-Mediated Communication: JCMC 13 (1): 210–30.CrossRefGoogle Scholar
Brandtzæg, P. B. 2012. “Social Networking Sites: Their Users and Social implications – A Longitudinal Study.” Journal of Computer-Mediated Communication 17 (4): 467–88. https://academic.oup.com/jcmc/article-abstract/17/4/467/4067681.CrossRefGoogle Scholar
Brewin, C. R. 1996. “Theoretical Foundations of Cognitive-Behavior Therapy for Anxiety and Depression.” Annual Review of Psychology 47: 3357.CrossRefGoogle ScholarPubMed
Brown, Ian, and Cowls, Josh. 2015. “Check the Web: Assessing the Ethics and Politics of Policing the Internet for Extremist Material.” In VOX-Pol. https://doi.org/APO-58979.Google Scholar
Bruns, Axel. 2007. “Produsage: Towards a Broader Framework for User-Led Content Creation.” In Proceedings of 6th ACM SIGCHI Conference on Creativity and Cognition 2007, edited by Ben Shneiderman, 99–105. Washington, DC: Association for Computing Machinery.Google Scholar
Burke, Jason. 2015. The New Threat: The Past, Present, and Future of Islamic Militancy. New York: The New Press.Google Scholar
Burke, Jason 2017. “The Myth of the ‘Lone Wolf’ Terrorist.” The Guardian, March 30, 2017. www.theguardian.com/news/2017/mar/30/myth-lone-wolf-terrorist.Google Scholar
Cantor, Joanne. 1998. “Children’s Attraction to Violent Television Programming.” In Why We Watch: The Attractions of Violent Entertainment, New York: Oxford University Press, 88115.Google Scholar
Carnagey, Nicholas L., Anderson, Craig A., and Bartholow, Bruce D.. 2007. “Media Violence and Social Neuroscience: New Questions and New Opportunities.” Current Directions in Psychological Science 16 (4): 178–82.Google Scholar
Carver, Charles S., Scheier, Michael F., and Weintraub, Jagdish K.. 1989. “Assessing Coping Strategies: A Theoretically Based Approach.” Journal of Personality and Social Psychology 56 (2): 267–83.Google Scholar
Call, Christchurch. n.d. Accessed February 26, 2021. www.christchurchcall.com/call.html.Google Scholar
Conway, Maura. 2017. “Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research.” Studies in Conflict and Terrorism 40 (1): 7798.CrossRefGoogle Scholar
Conway, Maura 2020. “Routing the Extreme Right.” The RUSI Journal 165 (1): 108–13.CrossRefGoogle Scholar
Corbu, Nicoleta, Oprea, Denisa-Adriana, Negrea-Busuioc, Elena, and Radu, Loredana. 2020. “‘They Can’t Fool Me, but They Can Fool the Others!’ Third Person Effect and Fake News Detection.” European Journal of Disorders of Communication: The Journal of the College of Speech and Language Therapists, London 35 (2): 165–80.Google Scholar
Cottee, Simon. 2015. “Jihadi Cool: Why ISIS Propaganda Is So Powerful.” The Atlantic, December 24, 2015. www.theatlantic.com/international/archive/2015/12/isis-jihadi-cool/421776/.Google Scholar
Cottee, Simon, and Hayward, Keith. 2011. “Terrorist (E)motives: The Existential Attractions of Terrorism.” Studies in Conflict and Terrorism 34 (12): 963–86.Google Scholar
Crawford, Neta C. 2000. “The Passion of World Politics: Propositions on Emotion and Emotional Relationships.” International Security 24 (4): 116–56.CrossRefGoogle Scholar
Crawford, Neta C. 2013. “Emotions and International Security: Cave! Hic Libido.” Critical Studies on Security 1 (1): 121–3.CrossRefGoogle Scholar
Davies, Garth, Neudecker, Christine, Ouellet, Marie, Bouchard, Martin, and Ducol, Benjamin. 2016. “Toward a Framework Understanding of Online Programs for Countering Violent Extremism.” Journal for Deradicalization 0 (6): 5186.Google Scholar
DeLisi, Matt, Vaughn, Michael G., Gentile, Douglas A., Anderson, Craig A., and Shook, Jeffrey J.. 2013. “Violent Video Games, Delinquency, and Youth Violence: New Evidence.” Youth Violence and Juvenile Justice 11 (2): 132–42.Google Scholar
Dickson, EJ. 2019. “Why Did the Christchurch Shooter Name-Drop YouTube Phenom PewDiePie?” Rolling Stone. 2019. www.rollingstone.com/culture/culture-news/pewdie-pie-new-zealand-mosque-shooting-youtube-808633/.Google Scholar
Droogan, Julian, and Peattie, Shane. 2017. “Mapping the Thematic Landscape of Dabiq Magazine.” Australian Journal of International Affairs 71 (6): 591620.Google Scholar
Droogan, Julian, and Peattie, Shane 2018. “Reading Jihad: Mapping the Shifting Themes of Inspire Magazine.” Terrorism and Political Violence 30 (4): 684717.CrossRefGoogle Scholar
Droogan, Julian, and Waldek, Lise. 2019. “Social Media and Terrorism in the Asia Pacific.” In Terrorism and Insurgency in Asia: A Contemporary Examination of Terrorist and Separatist Movements, edited by Ben Schreer and Andrew Tan. New York: Routledge, 3144.Google Scholar
Droogan, Julian, and Peattie, Shane. 2017. “Mapping the Thematic Landscape of Dabiq Magazine.” Australian Journal of International Affairs 71 (6): 591620.CrossRefGoogle Scholar
Droogan, Julian, and Peattie, Shane 2018. “Reading Jihad: Mapping the Shifting Themes of Inspire Magazine.” Terrorism and Political Violence 30 (4): 684717.CrossRefGoogle Scholar
Eder, Jens. 2018. “Collateral Emotions: Political Web Videos and Divergent Audience Responses.” In Cognitive Theory and Documentary Film, edited by Brylla, Catalin and Kramer, Mette, 183203. Cham, Switzerland: Springer International Publishing.Google Scholar
Eisend, Martin. 2017. “The Third-Person Effect in Advertising: A Meta-Analysis.” Journal of Advertising 46 (3): 377–94.Google Scholar
Elzain, Carol. 2008. “Modern Islamic Terrorism, Jihad and the Perceptions of Melbourne’s Muslim Leaders.” Citeseer. https://citeseerx.ist.psu.edu/viewdoc/download?=10.1.1.994.2532&rep=rep1&type=pdf.Google Scholar
Ferguson, Kate. 2016. “Countering Violent Extremism through Media and Communication Strategies: A Review of the Evidence.” Partnership for Conflict, Crime & Security Research. www.paccsresearch.org.uk/wp-content/uploads/2016/03/Countering-Violent-Extremism-Through-Media-and-Communication-Strategies-.pdf.Google Scholar
Fingas, J. 2019. “Australian Bill Could Imprison Social Network Execs over Violent Content.” Engadget. www.engadget.com/2019-03-30-australia-laws-could-imprison-internet-execs.html.Google Scholar
Flores, Andrea, and James, Carrie. 2013. “Morality and Ethics behind the Screen: Young People’s Perspectives on Digital Life.” New Media & Society 15 (6): 834–52.Google Scholar
Freedman, Lawrence Zelic. 1983. “Why Does Terrorism Terrorize?Terrorism 6 (3): 389401.Google Scholar
Frissen, Thomas. 2021. “Internet, the Great Radicalizer? Exploring Relationships between Seeking for Online Extremist Materials and Cognitive Radicalization in Young Adults.” Computers in Human Behavior 114 (January): 106549.Google Scholar
Funk, Jeanne B., Baldacci, Heidi Bechtoldt, Pasold, Tracie, and Baumgardner, Jennifer. 2004. “Violence Exposure in Real-Life, Video Games, Television, Movies, and the Internet: Is There Desensitization?Journal of Adolescence 27 (1): 2339.CrossRefGoogle ScholarPubMed
Gadarian, Shana Kushner. 2010. “The Politics of Threat: How Terrorism News Shapes Foreign Policy Attitudes.” The Journal of Politics 72 (2): 469–83.Google Scholar
Gadarian, Shana Kushner 2014. “Scary Pictures: How Terrorism Imagery Affects Voter Evaluations.” Political Communication 31 (2): 282302.Google Scholar
Gauntlett, David. 1998. “Ten Things Wrong with the Media ‘Effects’ Model.” In Approaches to Audiences: A Reader, edited by Dickinson, Roger, Harindranath, Ramaswani, and Linne, Olga, 120–30. London: Arnold.Google Scholar
Gibson, Kerry, and Trnka, Susanna. 2020. “Young People’s Priorities for Support on Social Media: ‘It Takes Trust to Talk about These Issues.’” Computers in Human Behavior 102 (January): 238–47.Google Scholar
Gielen, Amy-Jane. 2019. “Countering Violent Extremism: A Realist Review for Assessing What Works, for Whom, in What Circumstances, and How?Terrorism and Political Violence 31 (6): 1149–67.CrossRefGoogle Scholar
Gill, Paul, Corner, Emily, Conway, Maura, Thornton, Amy, Bloom, Mia, and Horgan, John. 2017. “Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes.” Criminology & Public Policy 16 (1): 99117.Google Scholar
Gillespie, Tarleton. 2018. Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. New Haven, CT: Yale University Press.Google Scholar
Grieve, Rachel, Indian, Michaelle, Kate Witteveen, G. Tolan, Anne, and Marrington, Jessica. 2013. “Face-to-Face or Facebook: Can Social Connectedness Be Derived Online?Computers in Human Behavior 29 (3): 604–9.Google Scholar
Grimmelmann, James. 2015. “The Virtues of Moderation.” Yale Journal of Law & Technology 17: 42.Google Scholar
Grossman, Michele, Hadfield, Kristin, Jefferies, Philip, Gerrand, Vivian, and Ungar, Michael. 2020. “Youth Resilience to Violent Extremism: Development and Validation of the BRAVE Measure.” Terrorism and Political Violence, January, 121.Google Scholar
Hsee, Christopher K., and Ruan, Bowen. 2016. “The Pandora Effect: The Power and Peril of Curiosity.” Psychological Science 27 (5): 659–66.CrossRefGoogle ScholarPubMed
Ilascu, Ionut. 2019. “New Zealand Mobile Carriers Block 8chan, 4chan, and LiveLeak.” BleepingComputer. March 16, 2019. www.bleepingcomputer.com/news/security/new-zealand-mobile-carriers-block-8chan-4chan-and-liveleak/.Google Scholar
Iyer, Aarti, Hornsey, Matthew J., Vanman, Eric J., Esposo, Sarah, and Ale, Shalini. 2015. “Fight and Flight: Evidence of Aggressive Capitulation in the Face of Fear Messages from Terrorists: Responses to Terrorist Persuasion Appeals.” Political Psychology 36 (6): 631–48.CrossRefGoogle Scholar
Iyer, Aarti, and Oldmeadow, Julian. 2006. “Picture This: Emotional and Political Responses to Photographs of the Kenneth Bigley Kidnapping.” European Journal of Social Psychology 36 (5): 635–47.CrossRefGoogle Scholar
James, Carrie, Davis, Katie, Charmaraman, Linda, Konrath, Sara, Slovak, Petr, Weinstein, Emily, and Yarosh, Lana. 2017. “Digital Life and Youth Well-Being, Social Connectedness, Empathy, and Narcissism.” Pediatrics 140 (Suppl 2): S7175.Google Scholar
Jenkins, Brian Michael. 1974. “Will Terrorists Go Nuclear?” RAND Corporation. www.rand.org/pubs/papers/P5541.html.Google Scholar
Johnston, Nicolas. 2019. “Christchurch Attack: The Dark Web of Terrorism as Entertainment.” The Interpreter. March 19, 2019. www.lowyinstitute.org/the-interpreter/christchurch-attack-dark-web-terrorism-entertainment.Google Scholar
Jovanovic, Veljko, and Brdaric, Dragana. 2012. “Did Curiosity Kill the Cat? Evidence from Subjective Well-Being in Adolescents.” Personality and Individual Differences 52 (3): 380–4.Google Scholar
Kiper, J., and Sosis, R.. 2015. “Why Terrorism Terrifies Us.” https://doi.org/10.4324/9781315772424-11.CrossRefGoogle Scholar
Kirby, Aidan. 2007. “The London Bombers as ‘Self-Starters’: A Case Study in Indigenous Radicalization and the Emergence of Autonomous Cliques.” Studies in Conflict and Terrorism 30 (5): 415–28.CrossRefGoogle Scholar
Koehler, Daniel. 2017. Understanding Deradicalization: Methods, Tools and Programs for Countering Violent Extremism. London: Routledge.Google Scholar
Krieger, Tim, and Meierrieks, Daniel. 2011. “What Causes Terrorism?Public Choice 147 (1/2): 327.Google Scholar
Kruglanski, Arie W., Gelfand, Michele J., Bélanger, Jocelyn J., Sheveland, Anna, Hetiarachchi, Malkanthi, and Gunaratna, Rohan. 2014. “The Psychology of Radicalization and Deradicalization: How Significance Quest Impacts Violent Extremism.” Political Psychology 35: 6993.Google Scholar
Lane, Daniel S., and Cin, Sonya Dal. 2018. “Sharing beyond Slacktivism: The Effect of Socially Observable Prosocial Media Sharing on Subsequent Offline Helping Behavior.” Information, Communication and Society 21 (11): 1523–40.Google Scholar
Laqueur, Walter. 2001. A History of Terrorism. New Brunswick, NJ: Transaction Publishers.Google Scholar
Lima, Lucas, Reis, Julio C.S., Melo, Philipe, Murai, Fabricio, Araujo, Leandro, Vikatos, Pantelis, and Benevenuto, Fabricio. 2018. “Inside the Right-Leaning Echo Chambers: Characterizing Gab, an Unmoderated Social System.” In 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), 515–22.Google Scholar
Lindgren, Simon. 2017. Digital Media and Society. Los Angeles: Sage.Google Scholar
Litman, Jordan A., and Jimerson, Tiffany L.. 2004. “The Measurement of Curiosity as a Feeling of Deprivation.” Journal of Personality Assessment 82 (2): 147–57.CrossRefGoogle ScholarPubMed
Livingstone, Sonia, Kirwil, Lucyna, Ponte, Cristina, and Staksrud, Elisabeth. 2014. “In Their Own Words: What Bothers Children Online?European Journal of Disorders of Communication: The Journal of the College of Speech and Language Therapists, London 29 (3): 271–88.Google Scholar
Lowe, D. 2019. “Christchurch Terrorist Attack, The Far-Right and Social Media: What Can We Learn?” The New Jurist, April. http://eprints.leedsbeckett.ac.uk/id/eprint/5822/.Google Scholar
Lupinacci, Ludmila. 2020. “‘Absentmindedly Scrolling through Nothing’: Liveness and Compulsory Continuous Connectedness in Social Media.” Media Culture & Society 43 (2): 273–90. https://doi.org/10.1177/0163443720939454.Google Scholar
Lyons, L. 2005. “What Frightens America’s Youth?” 2005. https://news.gallup.com/poll/15439/what-frightens-americas-youth.aspx.Google Scholar
Malthaner, Stefan, and Waldmann, Peter. 2014. “The Radical Milieu: Conceptualizing the Supportive Social Environment of Terrorist Groups.” Studies in Conflict and Terrorism 37 (12): 979–98.CrossRefGoogle Scholar
Marres, Noortje and Gerlitz, Carolin. 2018. “Social Media as Experiments in Sociality.” In Marres, Noortje and Guggenheim, Michael and Wilkie, Alex, (eds.) Inventing the Social. Manchester, UK: Mattering Press, pp. 253-286CrossRefGoogle Scholar
Matusitz, Jonathan. 2012. Terrorism and Communication: A Critical Introduction. 1st ed. Thousand Oaks, CA: Sage.Google Scholar
McHugh, Bridget Christine, Wisniewski, Pamela, Beth, Rosson Mary, and Carroll, John M.. 2018. “When Social Media Traumatizes Teens: The Roles of Online Risk Exposure, Coping, and Post-Traumatic Stress.” Internet Research 28 (5): 1169–88.Google Scholar
Meleagrou-Hitchens, Alexander, Alexander, Audrey, and Kaderbhai, Nick. 2017. “Literature Review The Impact of Digital Communications Technology on Radicalization and Recruitment.” International Affairs 93 (5): 1233–49.CrossRefGoogle Scholar
Midlarsky, Manus I. 2011. Origins of Political Extremism: Mass Violence in the Twentieth Century and Beyond. New York: Cambridge University Press.Google Scholar
Miles, Tim. 2015. “Halal? Ha! LOL: An Examination of Muslim Online Comedy as Counter-Narrative.” Comedy Studies 6 (2): 167–78.Google Scholar
Möller-Leimkühler, Anne Maria. 2018. “Why Is Terrorism a Man’s Business?CNS Spectrums 23 (2): 119–28.Google Scholar
Mrug, Sylvie, Madan, Anjana, Cook, Edwin W. 3rd, and Wright, Rex A.. 2015. “Emotional and Physiological Desensitization to Real-Life and Movie Violence.” Journal of Youth and Adolescence 44 (5): 10921108.Google Scholar
Muniesa, F. 2018. “How to Spot the Behavioral Shibboleth and What to Do about It.” Inventing the Social. https://core.ac.uk/download/pdf/159067873.pdf#page=195.Google Scholar
Murrell, Colleen. 2019. “The Christchurch Shooting Was Streamed Live, but Think Twice about Watching It.” ABC News, March 15, 2019. www.abc.net.au/news/2019-03-15/christchurch-shooting-live-stream-think-twice-about-watching-it/10907258.Google Scholar
Nabi, Robin L. 2010. “The Case for Emphasizing Discrete Emotions in Communication Research.” Communication Monographs 77 (2): 153–9.CrossRefGoogle Scholar
Nacos, Brigitte L. 2016. Terrorism and Counterterrorism. 5th ed. New York: Routledge.CrossRefGoogle Scholar
Nahon, Karine. 2015. “Where There Is Social Media There Is Politics.” In The Routledge Companion to Social Media and Politics, 3955. New York: Routledge.CrossRefGoogle Scholar
Naji, Abu Bakr, McCants, William F., Combating Terrorism Center (U.S.), and John M. Olin Institute for Strategic Studies. 2006. “The Management of Savagery: The Most Critical Stage through Which the Umma Will Pass.” Cambridge, MA: John M. Olin Institute for Strategic Studies, Harvard University.Google Scholar
Nasser-Eddine, Minerva, Garnham, Bridget, Agostino, Katerina, and Caluya, Gilbert. 2011. “Countering Violent Extremism (CVE) Literature Review.” https://apps.dtic.mil/sti/citations/ADA543686.Google Scholar
Nellis, Ashley Marie, and Savage, Joanne. 2012. “Does Watching the News Affect Fear of Terrorism? The Importance of Media Exposure on Terrorism Fear.” Crime & Delinquency 58 (5): 748–68.Google Scholar
Nesser, Petter, Stenersen, Anne, and Oftedal, Emilie. 2016. “Jihadi Terrorism in Europe: The IS-Effect.” Perspectives on Terrorism 10 (6): 324.Google Scholar
Neumann, Peter R. 2013. “The Trouble with Radicalization.” International Affairs 89 (4): 873–93.CrossRefGoogle Scholar
New Zealand Classification Office. n.d. “Classification Decision: Christchurch Mosque Attack Livestream.” Accessed February 26, 2021. www.classificationoffice.govt.nz/news/featured-classification-decisions/christchurch-mosque-attack-livestream/.Google Scholar
Niehoff, Esther, and Oosterwijk, Suzanne. 2020. “To Know, to Feel, to Share? Exploring the Motives That Drive Curiosity for Negative Content.” Current Opinion in Behavioral Sciences 35 (October): 5661.Google Scholar
Norris, Pippa, Just, Marion, and Kern, Montague. 2003. Framing Terrorism: The News Media, the Government and the Public. London: Routledge.Google Scholar
Office of the eSafety Commissioner. “State of Play – Youth, Kids and Digital Dangers.” 2018. Office of the eSafety Commissioner. www.esafety.gov.au/sites/default/files/2019-10/State%20of%20Play%20-%20Youth%20kids%20and%20digital%20dangers.pdf.Google Scholar
O’Hara, Kieron, and Stevens, David. 2015. “Echo Chambers and Online Radicalism: Assessing the Internet’s Complicity in Violent Extremism: The Internet’s Complicity in Violent Extremism.” Policy and Internet 7 (4). https://doi.org/10.1002/poi3.88.Google Scholar
Oxford English Dictionary. n.d. Oxford English Dictionary. Accessed March 17, 2021. www.oed.com/search?searchType=dictionary&q=Terror&_searchBtn=Search.Google Scholar
Pape, Robert A. 2003. “The Strategic Logic of Suicide Terrorism.” The American Political Science Review 97 (3): 343–61.CrossRefGoogle Scholar
Pascoe, C. J. 2011. “Resource and Risk: Youth Sexuality and New Media Use.” Sexuality Research & Social Policy: Journal of NSRC: SR & SP 8 (1): 517.Google Scholar
Pfefferbaum, Betty, Seale, Thomas W., Brandt, Edward N. Jr, Pfefferbaum, Rose L., Doughty, Debby E., and Rainwater, Scott M.. 2003. “Media Exposure in Children One Hundred Miles from a Terrorist Bombing.” Annals of Clinical Psychiatry: Official Journal of the American Academy of Clinical Psychiatrists 15 (1): 18.Google Scholar
Post, Jerrold M., McGinnis, Cody, and Moody, Kristen. 2014. “The Changing Face of Terrorism in the 21st Century: The Communications Revolution and the Virtual Community of Hatred.” Behavioral Sciences & the Law 32 (3): 306–34.CrossRefGoogle ScholarPubMed
Prot, Sara, and Gentile, Douglas A.. 2014. “Chapter Eight – Applying Risk and Resilience Models to Predicting the Effects of Media Violence on Development.” In Advances in Child Development and Behavior, edited by Benson, Janette B., 46: 215–44. Waltham, MA: Elsevier.Google Scholar
Rapoport, David C. 2001. “The Fourth Wave: September 11 in the History of Terrorism.” Current History 100 (650): 419–24.Google Scholar
Reed, Alastair. 2018. “An Inconvenient Truth: Countering Terrorist Narratives – Fighting a Threat We Do Not Understand,” July. https://icct.nl/publication/an-inconvenient-truth-countering-terrorist-narratives-fighting-a-threat-we-do-not-understand/.Google Scholar
Rimé, Bernard. 2009. “Emotion Elicits the Social Sharing of Emotion: Theory and Empirical Review.” Emotion Review: Journal of the International Society for Research on Emotion 1 (1): 6085.Google Scholar
Ritzer, George, and Jurgenson, Nathan. 2010. “Production, Consumption, Prosumption: The Nature of Capitalism in the Age of the Digital ‘Prosumer.’” Journal of Consumer Culture 10 (1): 1336.Google Scholar
Ryan, Tracii, Allen, Kelly A., Gray, Deleon L., and McInerney, Dennis M.. 2017. “How Social Are Social Media? A Review of Online Social Behaviour and Connectedness.” Journal of Relationships Research 8. E8. https://doi.org/10.1017/jrr.2017.13.Google Scholar
Sageman, Marc. 2008. Leaderless Jihad: Terror Networks in the Twenty-First Century. 1st Edition. Philadelphia: University of Pennsylvania Press.Google Scholar
Sageman, Marc 2014. “The Stagnation in Terrorism Research.” Terrorism and Political Violence 26 (4): 565–80.Google Scholar
Schlegel, Linda. 2019. “Chambers of Secrets? Cognitive Echo Chambers and the Role of Social Media in Facilitating Them. – VOX – Pol.” VOX – Pol. October 2, 2019. www.voxpol.eu/chambers-of-secrets-cognitive-echo-chambers-and-the-role-of-social-media-in-facilitating-them/.Google Scholar
Schmid, Alex. 2005. “Terrorism as Psychological Warfare.” Democracy and Security 1 (2): 137–46.Google Scholar
Schmid, Alex (ed.), 2013. The Routledge Handbook of Terrorism Research. Reprint edition. London: Routledge.Google Scholar
Schuurman, Bart, Lindekilde, Lasse, Malthaner, Stefan, Francis O’Connor, Gill, Paul, and Bouhana, Noémie. 2019. “End of the Lone Wolf: The Typology That Should Not Have Been.” Studies in Conflict and Terrorism 42 (8): 771–8.CrossRefGoogle Scholar
Scrivens, Ryan, Gill, Paul, and Conway, Maura. 2020. “The Role of the Internet in Facilitating Violent Extremism and Terrorism: Suggestions for Progressing Research.” In The Palgrave Handbook of International Cybercrime and Cyberdeviance, edited by Holt, Thomas J. and Bossler, Adam M., 1417–35. Cham, Switzerland: Springer International Publishing.Google Scholar
Scrivner, Coltan. 2020. “The Psychology of Morbid Curiosity.” Psychological Bulletin. https://doi.org/10.31234/osf.io/xug34.CrossRefGoogle Scholar
Shoshani, Anat, and Slone, Michelle. 2008. “The Drama of Media Coverage of Terrorism: Emotional and Attitudinal Impact on the Audience.” Studies in Conflict and Terrorism 31 (7): 627–40.Google Scholar
Sinclair, Samuel Justin, and Antonius, Daniel. 2012. The Psychology of Terrorism Fears.Oxford: Oxford University Press. https://doi.org/10.1093/acprof:oso/9780195388114.001.0001.Google Scholar
Solomon, Robert C., ed. 2008. “Myth Six: Two Flavours of Emotion, Positive and Negative.” In True to Our Feelings: What Emotions Are Really Telling Us, 170–77. Oxford: Oxford University Press.Google Scholar
Staksrud, Elisabeth, and Livingstone, Sonia. 2009. “Children and Online Risk.” Information, Communication and Society 12 (3): 364–87.Google Scholar
Stenersen, Anne. 2008. “The Internet: A Virtual Training Camp?Terrorism and Political Violence 20 (2): 215–33.Google Scholar
Stephan, Maria J. 2015. “Civil Resistance vs. ISIS.” Journal of Resistance Studies 1 (2): 127–50.Google Scholar
Stetten, Moritz von. 2009. “Recent Literature on the Red Army Faction in Germany: A Critical Overview.” Critical Studies on Terrorism 2 (3): 546–54.Google Scholar
Tang, Lijun. 2013. “The Politics of Flies: Mocking News in Chinese Cyberspace.” Chinese Journal of Communication 6 (4): 482–96.Google Scholar
Third, Amanda, Delphine Bellerose, Juliano D. Oliveira, D., Lala, Girish, and Theakstone, Georgina. 2017. “Young and Online: Children’s Perspectives on Life in the Digital Age.” Sydney, Australia: Western Sydney University. www.end-violence.org/sites/default/files/paragraphs/download/Young_and_Online_Children_perspectives_Dec_2017.pdf.Google Scholar
Thomas, Elise. 2020. “Manifestos, Memetic Mobilisation and the Chan Boards in the Christchurch Shooting.” In Counterterrorism Yearbook 2020, edited by Isaac Kfir and John Coyne, 19–22. Canberra: Australian Strategic Policy Institute.Google Scholar
Urbis. 2018. “Evaluation of the COMPACT Program.” Melbourne: Urbis PTY Ltd.Google Scholar
Vandoninck, Sofie, Leen d’Haenens, and Roe, Keith. 2013. “Online Risks.” Journal of Children and Media 7 (1): 6078.CrossRefGoogle Scholar
Vergani, Matteo. 2018. How Is Terrorism Changing Us? Threat Perception and Political Attitudes in the Age of Terror. Singapore: Palgrave Macmillan.Google Scholar
Von Behr, Ines, Reding, Anaïs, Edwards, Charlie, and Luke Gribbon, L. 2013. “Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism.” Rand. www.rand.org/content/dam/rand/pubs/research_reports/RR400/RR453/RAND_RR453.pdf.Google Scholar
Vossen, Helen G. M., and Fikkers, Karin M.. 2020. “The Mediating Role of Sympathy in the Relationship between Media Violence and Dutch Adolescents’ Social Behaviors.” Journal of Children and Media, September, 121. https://doi.org/10.1080/17482798.2020.1828118.Google Scholar
Waldek, Lise, Ballsun-Stanton, Brian, and Droogan, Julian. 2020. “After Christchurch: Mapping Online Right-Wing Extremists,” November. https://doi.org/10.5281/zenodo.4071472.Google Scholar
Walden, Max. 2021. “Singaporean Teenager Arrested for Allegedly Planning Christchurch-Inspired Machete Attack on Mosques.” ABC News, January 28, 2021. www.abc.net.au/news/2021-01-28/singapore-teen-arrested-planning-christchurch-inspired-attacks/13098244.Google Scholar
Warzel, Charlie. 2019. “The New Zealand Massacre Was Made to Go Viral.” The New York Times, March 15, 2019. www.nytimes.com/2019/03/15/opinion/new-zealand-shooting.html.Google Scholar
Weimann, Gabriel, and Ben, Ari Am. 2020. “Digital Dog Whistles: The New Online Language of Extremism.” International Journal of Security Studies 2 (1): 124.Google Scholar
Weimann, Gabriel, and Hoffman, Bruce. 2015. Terrorism in Cyberspace: The Next Generation. Washington, DC: Woodrow Wilson Center Press /Columbia University Press.Google Scholar
Weine, Stevan, Horgan, John, Robertson, Cheryl, Loue, Sana, Mohamed, Amin, and Noor, Sahra. 2009. “Community and Family Approaches to Combating the Radicalization and Recruitment of Somali-American Youth and Young Adults: A Psychosocial Perspective.” Dynamics of Asymmetric Conflict 2 (3): 181200.Google Scholar
Williams, Michael J., and Kleinman, Steven M.. 2014. “A Utilization-Focused Guide for Conducting Terrorism Risk Reduction Program Evaluations.” Behavioral Sciences of Terrorism and Political Aggression 6 (2): 102–46.Google Scholar
Winner, Langdon. 1996. “Who Will We Be in Cyberspace?The Information Society 12 (1): 6372.Google Scholar
Winter, Charlie. 2015. “The Virtual ‘Caliphate’: Understanding Islamic State’s Propaganda Strategy.” 2015. www.stratcomcoe.org/charlie-winter-virtual-caliphate-understanding-islamic-states-propaganda-strategy.Google Scholar
Wolfowicz, Michael, Litmanovitz, Yael, Weisburd, David, and Hasisi, Badi. 2020. “A Field-Wide Systematic Review and Meta-Analysis of Putative Risk and Protective Factors for Radicalization Outcomes.” Journal of Quantitative Criminology 36 (3): 407–47.Google Scholar
Wright, Joanne. 1991. Terrorist Propaganda: The Red Army Faction and the Provisional IRA, 1968–86. London: Palgrave Macmillan.Google Scholar
Wright-Neville, David, and Smith, Debra. 2009. “Political Rage: Terrorism and the Politics of Emotion.” Global Change, Peace & Security 21 (1): 8598.Google Scholar
Zekulin, Michael G. 2019. “The Internationalisation of White Nationalism: From Christchurch to El Paso and Beyond – Australian Institute of International Affairs.” 2019. www.internationalaffairs.org.au/australianoutlook/the-internationalisation-of-white-nationalism-from-christchurch-to-el-paso-and-beyond/.Google Scholar
Zhang, Yin, and Leung, Louis. 2015. “A Review of Social Networking Service (SNS) Research in Communication Journals from 2006 to 2011.” New Media & Society 17 (7): 1007–24.Google Scholar

Save element to Kindle

To save this element to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Feeling Terrified?
Available formats
×

Save element to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Feeling Terrified?
Available formats
×

Save element to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Feeling Terrified?
Available formats
×