Skip to main content Accessibility help
Hostname: page-component-8bbf57454-jcfbx Total loading time: 0.297 Render date: 2022-01-24T01:07:18.878Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "metricsAbstractViews": false, "figures": true, "newCiteModal": false, "newCitedByModal": true, "newEcommerce": true, "newUsageEvents": true }

Technological Seduction and Self-Radicalization

Published online by Cambridge University Press:  20 December 2018



Many scholars agree that the Internet plays a pivotal role in self-radicalization, which can lead to behaviors ranging from lone-wolf terrorism to participation in white nationalist rallies to mundane bigotry and voting for extremist candidates. However, the mechanisms by which the Internet facilitates self-radicalization are disputed; some fault the individuals who end up self-radicalized, while others lay the blame on the technology itself. In this paper, we explore the role played by technological design decisions in online self-radicalization in its myriad guises, encompassing extreme as well as more mundane forms. We begin by characterizing the phenomenon of technological seduction. Next, we distinguish between top-down seduction and bottom-up seduction. We then situate both forms of technological seduction within the theoretical model of dynamical systems theory. We conclude by articulating strategies for combating online self-radicalization.

Copyright © American Philosophical Association 2018 

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)


Abraham, F. D., Abraham, R. H., and Shaw, C. D.. (1990) A Visual Introduction to Dynamical Systems Theory for Psychology. Santa Cruz, CA: Aerial Press.Google Scholar
Abrahams, Max. (2002) ‘What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy’. International Security, 32, 8689.Google Scholar
Alemanno, Alberto. (2012) ‘Nudging Smokers: The Behavioural Turn of Tobacco Risk Regulation’. European Journal of Risk Regulation, 3, 3242.CrossRefGoogle Scholar
Alfano, M. (2013) Character as Moral Fiction. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
Alfano, M. (2018) ‘The Nietzschean Precedent for Anti-reflective, Dialogical Agency’. Behavioral & Brain Sciences, e37, 1213.Google Scholar
Alfano, M., and Skorburg, G.. (2018) ‘Extended Knowledge, the Recognition Heuristic, and Epistemic Injustice’. In Carter, J. A., Clark, A., Kallestrup, J., Palermos, O., and Pritchard, D. (eds.), Extended Knowledge (New York: Oxford University Press), 239–65.Google Scholar
Alfano, M., Higgins, A., and Levernier, J.. (2018) ‘Identifying Virtues and Values through Obituary Data-mining’. Journal of Value Inquiry, 52, 5979.CrossRefGoogle Scholar
Beer, R. D. (1995) ‘A Dynamical Systems Perspective on Agent-environment Interaction’. Artificial Intelligence, 72, 173215.CrossRefGoogle Scholar
Benkler, Yochai, Faris, Robert, Roberts, Hal, and Zuckerman, Ethan. (2017) ‘Study: Breitbart-led Right-wing Media Ecosystem Altered Broader Media Agenda’. Columbia Journalism Review, March 3. Scholar
Berman, Mark. (2016) ‘Prosecutors Say Dylann Roof “Self-Radicalized” Online, Wrote Another Manifesto in Jail’. Washington Post, August 22. Scholar
Bisantz, A. M., Burns, C. M., and Fairbanks, R. J., eds. (2014) Cognitive Systems Engineering in Health Care. Boca Raton, FL: CRC Press.CrossRefGoogle Scholar
Bjelopera, Jerome P. (2010) ‘American Jihadist Terrorism: Combating a Complex Threat’. CRS Report for Congress. Scholar
Byrne, Joanne, and Cheong, Marc. (2017) ‘The Algorithm as Human: A Cross-disciplinary Discussion of Anthropology in an Increasingly Data-driven World’. Talk given at the AAS/ASA/ASAANZ Shifting States Anthropology Conference. University of Adelaide.Google Scholar
Card, Stuart K., Moran, Thomas P., and Newell, Allen. (1980) ‘The Keystroke-level Model for User Performance Time with Interactive Systems’. Communications of the ACM, 23, 396410.CrossRefGoogle Scholar
Carter, J. A. (2017) ‘Intellectual Autonomy, Epistemic Dependence and Cognitive Enhancement’. Synthese. doi: 10.1007/s11229-017-1549-y.CrossRefGoogle Scholar
Conly, Sarah. (2004) ‘Seduction, Rape, and Coercion’. Ethics, 115, 96121.CrossRefGoogle Scholar
Dayan, Eran, and Bar-Hillel, Maya. (2011) ‘Nudge to Nobesity II: Menu Positions Influence Food Orders’. Judgment and Decision Making, 6, 333–42.Google Scholar
Dillahunt, T. R., Brooks, C. A., and Gulati, S.. (2015) ‘Detecting and Visualizing Filter Bubbles in Google and Bing’. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (New York: Association for Computing Machinery), 1851–56.CrossRefGoogle Scholar
Doris, John. (2015) Talking to Ourselves: Reflection, Ignorance, and Agency. New York: Oxford University Press.CrossRefGoogle Scholar
Feldman, Brian. (2018) ‘Posts Indicate Suspect in Toronto Attack Was Radicalized on 4chan’. New York Magazine, April 24. Scholar
Flaxman, Seth, Goel, Sharad, and Rao, Justin M.. (2016) ‘Filter Bubbles, Echo Chambers, and Online News Consumption’. Public Opinion Quarterly, 80, 298320.CrossRefGoogle Scholar
Floridi, Luciano, and Sanders, Jeff W.. (2014) ‘On the Morality of Artificial Agents’. Minds and Machines, 14, 349–79.CrossRefGoogle Scholar
Forrester, John. (1990) The Seductions of Psychoanalysis: Freud, Lacan, and Derrida. New York: Cambridge University Press.Google Scholar
Harris, Tristan. (2014) ‘How Technology Hijacks People's Minds’. Scholar
Heersmink, Richard. (2016) ‘The Internet, Cognitive Enhancement, and the Values of Cognition’. Minds and Machines, 26, 389407.CrossRefGoogle Scholar
Heersmink, Richard. (2017) ‘A Virtue Epistemology of the Internet: Search Engines, Intellectual Virtues, and Education’. Social Epistemology. doi: 10.1080/02691728.2017.1383530.Google Scholar
Holley, P. (2017) ‘YouTube is Tricking People who Search for ISIS Videos’. Washington Post, July 24. Scholar
Hollingshead, A. B. (1998) ‘Retrieval Processes in Transactive memory Mystems’. Journal of Personality and Social Psychology, 74, 659.CrossRefGoogle Scholar
Hollnagel, E., and Woods, D. D.. (1983) ‘Cognitive Systems Engineering: New Wine in New Bottles’. International Journal of Man-Machine Studies, 18, 583600.CrossRefGoogle Scholar
Hollnagel, E., and Woods, D. D.. (2005) Joint Cognitive Systems: Foundations of Cognitive Systems Engineering. Boca Raton, FL: CRC Press.CrossRefGoogle Scholar
Holroyd, Jules, and Sweetman, Joseph. (2015) ‘The Heterogeneity of Implicit Bias’. In Brownstein, Michael and Saul, Jennifer (eds.), Implicit Bias and Philosophy (Oxford: Oxford University Press), 80103.Google Scholar
Kahneman, Daniel. (2011) Thinking, Fast and Slow. London: Macmillan.Google Scholar
Kant, Immanuel. ([1781] 1958) Critique of Pure Reason. Translated by Smith, Norman Kemp. London: Macmillan.Google Scholar
Koralus, P., and Alfano, M.. (2017) ‘Reasons-based Moral Judgment and the Erotetic Theory’. In Bonnefon, J.-F. and Trémolière, B. (eds.), Moral Inferences (New York: Routledge), 77106.Google Scholar
Koralus, P., and Mascarenhas, S.. (2013) ‘The Erotetic Theory of Reasoning: Bridges between Formal Semantics and the Psychology of Propositional Deductive Inference.’ Philosophical Perspectives, 27, 312–65.CrossRefGoogle Scholar
Levy, N. (2017) ‘The Bad News about Fake News’. Social Epistemology Review and Reply Collective, 6, 2036.Google Scholar
Lewis, P. (2018) ‘“Fiction is Outperforming Reality”: How YouTube's Algorithm Distorts Truth’. The Guardian, February 2. Scholar
Majeed, Khader, Neo, Loo Seng, Ong, Gabriel, Mingyi, Eunice Tan, and Chin, Jeffrey, eds. (2016) Combating Violent Extremism and Radicalization in the Digital Era. Hershey, PA: IGI Global.Google Scholar
Manjoo, F. (2017) ‘A Hunt for Ways to Combat Online Radicalization’. New York Times, August 23. Scholar
McCombs, Maxwell. (2000) ‘The Agenda-Setting Role of the Mass Media in the Shaping of Public Opinion’. Unpublished manuscript. Scholar
Miller, Boaz, and Record, Isaac. (2013) ‘Justified Belief in a Digital Age: On the Epistemic Implications of Secret Internet Technologies’. Episteme, 10, 117134.CrossRefGoogle Scholar
Miller, Boaz, and Record, Isaac. (2016) ‘Responsible Epistemic Technologies: A Social-Epistemological Analysis of Autocompleted Web Search’. New Media & Society. doi:10.1177/1461444816644805.CrossRefGoogle Scholar
Ndili, Alex. (2016) ‘The Role Of Community Policing In The Prevention Of Youth Radicalization in the Eastleigh Area of Nairobi County’. University of Nairobi. Scholar
Neumann, Peter R. (2013) ‘Options and Strategies for Countering Online Radicalization in the United States’. Studies in Conflict & Terrorism, 36, 431–59.CrossRefGoogle Scholar
Omotoyinbo, Femi Richard. (2014) ‘Online Radicalization: The Net or the Netizen?Socialnės Technologijos, 1, 5161.CrossRefGoogle Scholar
Palermos, S. O. (2016) ‘The Dynamics of Group Cognition’. Minds and Machines, 26, 409–40.CrossRefGoogle Scholar
Pariser, Eli. (2011) The Filter Bubble: What the Internet is Hiding from You. New York: Penguin.Google Scholar
Peterson, J. (2018) 12 Rules for Life: An Antidote to Chaos. New York: Random House.Google Scholar
Pettit, P. (2015) The Robust Demands of the Good: Ethics with Attachment, Virtue, and Respect. Oxford: Oxford University Press.CrossRefGoogle Scholar
Pilkington, Ed, and Roberts, Dan. (2016) ‘FBI and Obama Confirm Omar Mateen Was Radicalized on the Internet’. The Guardian, June 14. Scholar
Ritter, F. E., Baxter, G. D., and Churchill, E. F.. (2014) ‘User-centered Systems Design: A Brief History. In Foundations for Designing User-centered Systems (London: Springer), 33–54.CrossRefGoogle Scholar
Roberts, Robert, and Wood, Jay. (2007) Intellectual Virtues: An Essay in Regulative Epistemology. Oxford: Oxford University Press.CrossRefGoogle Scholar
Rogers, Y., Sharp, H., and Preece, J.. (2012) Interaction Design: Beyond Human-Computer Interaction. New York: Wiley.Google Scholar
Silber, Mitchell D., and Bhatt, Arvin. (2007) ‘Radicalization in the West: The Homegrown Threat’. Scholar
Strohminger, Nina, and Nichols, Shaun. (2014) ‘The Essential Moral Self’. Cognition, 131, 159–71.CrossRefGoogle ScholarPubMed
Su., S. (2017). ‘New Test with Related Articles’. Facebook Newsroom, April 25. Scholar
Sunstein, Cass R. (2011) Going to Extremes: How Like Minds Unite and Divide. Oxford: Oxford University Press.Google Scholar
Sunstein, Cass R. (2015) ‘The Ethics of Nudging’. Yale Journal on Regulation, 32(2), 413–15.Google Scholar
Sunstein, Cass R. (2017) Republic: Divided Democracy in the Age of Social Media. Princeton, NJ: Princeton University Press.CrossRefGoogle Scholar
Tanesini, A. (2016) ‘Teaching Virtue: Changing Attitudes’. Logos & Episteme, 7, 503–27.CrossRefGoogle Scholar
Thaler, Richard H., and Sunstein, Cass R.. (2003a) ‘Libertarian Paternalism is not an Oxymoron’. The University of Chicago Law Review, 70, 1159–1202.Google Scholar
Thaler, Richard, and Sunstein, Cass. (2003b) ‘Libertarian Paternalism’. The American Economic Review, 93, 175–79.CrossRefGoogle Scholar
Thaler, Richard H., and Benartzi, Shlomo. (2004) ‘Save More Tomorrow: Using Behavioral Economics to Increase Employee Saving’. Journal of Political Economy, 112, S164S187.CrossRefGoogle Scholar
Thaler, Richard H., and Sunstein, Cass R.. (2008) Nudge: Improving Decisions about Health, Wealth, and Happiness. New Haven, CT: Yale University Press.Google Scholar
Thaler, Richard H., Sunstein, Cass R., and Balz, John P.. (2014) ‘Choice Architecture’. In Shafir, Eldar (ed.), The Behavioral Foundations of Public Policy (Princeton, NJ: Princeton University Press), 428–39.Google Scholar
Troumbley, Rex. (2015) ‘Coercive Cyberspaces and Governing Internet Futures’. In Winter, Jenifer and Ono, Ryota (eds.), The Future Internet: Alternative Visions (Cham: Springer International Publishing), 1740.CrossRefGoogle Scholar
Tufekci, Zeynep. (2018) ‘YouTube, the Great Radicalizer’. New York Times, March 10. Scholar
Vallor, Shannon. (2016) Technology and the Virtues: A Philosophical Guide to a Future Worth Wanting. Oxford: Oxford University Press.CrossRefGoogle Scholar
Van Hoboken, J. V. J. (2012) Search Engine Freedom: On the Implications of the Right to Freedom of Expression for the Legal Governance of Search Engines. Alphen aan den Rijn, Netherlands: Kluwer Law International.Google Scholar
Vinokur, Amiram, and Burnstein, Eugene. (1978) ‘Depolarization of Attitudes in Groups.’ Journal of Personality and Social Psychology, 36, 872.CrossRefGoogle Scholar
Von Behr, Ines, Reding, Anaïs, Edwards, Charlie, and Gribbon, Luke. (2013) ‘Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism’. Scholar
Wegner, D. M. (1987) ‘Transactive Memory: A Contemporary Analysis of the Group Mind’. In Mullen, Brian and Goethals, George R (eds.), Theories of Group behavior (New York: Springer), 185208.CrossRefGoogle Scholar
Wegner, D. M., Erber, R., and Raymond, P.. (1991) ‘Transactive Memory in Close Relationships’. Journal of Personality and Social Psychology, 61, 923.CrossRefGoogle ScholarPubMed
Weimann, Gabriel. (2012) ‘Lone Wolves in Cyberspace’. Journal of Terrorism Research, 3. doi:10.15664/jtr.405.CrossRefGoogle Scholar
White, Mark. (2013) The Manipulation of Choice: Ethics and Libertarian Paternalism. Dordrecht: Springer.CrossRefGoogle Scholar
Winner, Langdon. (1986) The Whale and the Reactor. Chicago: University of Chicago Press.Google Scholar
Wong, David. (2006) Natural Moralities. Oxford: Oxford University Press.CrossRefGoogle Scholar
Zagzebski, L. (2017) Exemplarist Moral Theory. Oxford: Oxford University Press.CrossRefGoogle Scholar
Cited by

Send article to Kindle

To send this article to your Kindle, first ensure is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about sending to your Kindle. Find out more about sending to your Kindle.

Note you can select to send to either the or variations. ‘’ emails are free but can only be sent to your device when it is connected to wi-fi. ‘’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Technological Seduction and Self-Radicalization
Available formats

Send article to Dropbox

To send this article to your Dropbox account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your <service> account. Find out more about sending content to Dropbox.

Technological Seduction and Self-Radicalization
Available formats

Send article to Google Drive

To send this article to your Google Drive account, please select one or more formats and confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your <service> account. Find out more about sending content to Google Drive.

Technological Seduction and Self-Radicalization
Available formats

Reply to: Submit a response

Please enter your response.

Your details

Please enter a valid email address.

Conflicting interests

Do you have any conflicting interests? *