Skip to main content Accessibility help

Technological Seduction and Self-Radicalization

  • MARK ALFANO (a1), J. ADAM CARTER (a2) and MARC CHEONG (a3)


Many scholars agree that the Internet plays a pivotal role in self-radicalization, which can lead to behaviors ranging from lone-wolf terrorism to participation in white nationalist rallies to mundane bigotry and voting for extremist candidates. However, the mechanisms by which the Internet facilitates self-radicalization are disputed; some fault the individuals who end up self-radicalized, while others lay the blame on the technology itself. In this paper, we explore the role played by technological design decisions in online self-radicalization in its myriad guises, encompassing extreme as well as more mundane forms. We begin by characterizing the phenomenon of technological seduction. Next, we distinguish between top-down seduction and bottom-up seduction. We then situate both forms of technological seduction within the theoretical model of dynamical systems theory. We conclude by articulating strategies for combating online self-radicalization.



Hide All
Abraham, F. D., Abraham, R. H., and Shaw, C. D.. (1990) A Visual Introduction to Dynamical Systems Theory for Psychology. Santa Cruz, CA: Aerial Press.
Abrahams, Max. (2002) ‘What Terrorists Really Want: Terrorist Motives and Counterterrorism Strategy’. International Security, 32, 8689.
Alemanno, Alberto. (2012) ‘Nudging Smokers: The Behavioural Turn of Tobacco Risk Regulation’. European Journal of Risk Regulation, 3, 3242.
Alfano, M. (2013) Character as Moral Fiction. Cambridge: Cambridge University Press.
Alfano, M. (2018) ‘The Nietzschean Precedent for Anti-reflective, Dialogical Agency’. Behavioral & Brain Sciences, e37, 1213.
Alfano, M., and Skorburg, G.. (2018) ‘Extended Knowledge, the Recognition Heuristic, and Epistemic Injustice’. In Carter, J. A., Clark, A., Kallestrup, J., Palermos, O., and Pritchard, D. (eds.), Extended Knowledge (New York: Oxford University Press), 239–65.
Alfano, M., Higgins, A., and Levernier, J.. (2018) ‘Identifying Virtues and Values through Obituary Data-mining’. Journal of Value Inquiry, 52, 5979.
Beer, R. D. (1995) ‘A Dynamical Systems Perspective on Agent-environment Interaction’. Artificial Intelligence, 72, 173215.
Benkler, Yochai, Faris, Robert, Roberts, Hal, and Zuckerman, Ethan. (2017) ‘Study: Breitbart-led Right-wing Media Ecosystem Altered Broader Media Agenda’. Columbia Journalism Review, March 3.
Berman, Mark. (2016) ‘Prosecutors Say Dylann Roof “Self-Radicalized” Online, Wrote Another Manifesto in Jail’. Washington Post, August 22.
Bisantz, A. M., Burns, C. M., and Fairbanks, R. J., eds. (2014) Cognitive Systems Engineering in Health Care. Boca Raton, FL: CRC Press.
Bjelopera, Jerome P. (2010) ‘American Jihadist Terrorism: Combating a Complex Threat’. CRS Report for Congress.
Byrne, Joanne, and Cheong, Marc. (2017) ‘The Algorithm as Human: A Cross-disciplinary Discussion of Anthropology in an Increasingly Data-driven World’. Talk given at the AAS/ASA/ASAANZ Shifting States Anthropology Conference. University of Adelaide.
Card, Stuart K., Moran, Thomas P., and Newell, Allen. (1980) ‘The Keystroke-level Model for User Performance Time with Interactive Systems’. Communications of the ACM, 23, 396410.
Carter, J. A. (2017) ‘Intellectual Autonomy, Epistemic Dependence and Cognitive Enhancement’. Synthese. doi: 10.1007/s11229-017-1549-y.
Conly, Sarah. (2004) ‘Seduction, Rape, and Coercion’. Ethics, 115, 96121.
Dayan, Eran, and Bar-Hillel, Maya. (2011) ‘Nudge to Nobesity II: Menu Positions Influence Food Orders’. Judgment and Decision Making, 6, 333–42.
Dillahunt, T. R., Brooks, C. A., and Gulati, S.. (2015) ‘Detecting and Visualizing Filter Bubbles in Google and Bing’. In Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems (New York: Association for Computing Machinery), 1851–56.
Doris, John. (2015) Talking to Ourselves: Reflection, Ignorance, and Agency. New York: Oxford University Press.
Feldman, Brian. (2018) ‘Posts Indicate Suspect in Toronto Attack Was Radicalized on 4chan’. New York Magazine, April 24.
Flaxman, Seth, Goel, Sharad, and Rao, Justin M.. (2016) ‘Filter Bubbles, Echo Chambers, and Online News Consumption’. Public Opinion Quarterly, 80, 298320.
Floridi, Luciano, and Sanders, Jeff W.. (2014) ‘On the Morality of Artificial Agents’. Minds and Machines, 14, 349–79.
Forrester, John. (1990) The Seductions of Psychoanalysis: Freud, Lacan, and Derrida. New York: Cambridge University Press.
Harris, Tristan. (2014) ‘How Technology Hijacks People's Minds’.
Heersmink, Richard. (2016) ‘The Internet, Cognitive Enhancement, and the Values of Cognition’. Minds and Machines, 26, 389407.
Heersmink, Richard. (2017) ‘A Virtue Epistemology of the Internet: Search Engines, Intellectual Virtues, and Education’. Social Epistemology. doi: 10.1080/02691728.2017.1383530.
Holley, P. (2017) ‘YouTube is Tricking People who Search for ISIS Videos’. Washington Post, July 24.
Hollingshead, A. B. (1998) ‘Retrieval Processes in Transactive memory Mystems’. Journal of Personality and Social Psychology, 74, 659.
Hollnagel, E., and Woods, D. D.. (1983) ‘Cognitive Systems Engineering: New Wine in New Bottles’. International Journal of Man-Machine Studies, 18, 583600.
Hollnagel, E., and Woods, D. D.. (2005) Joint Cognitive Systems: Foundations of Cognitive Systems Engineering. Boca Raton, FL: CRC Press.
Holroyd, Jules, and Sweetman, Joseph. (2015) ‘The Heterogeneity of Implicit Bias’. In Brownstein, Michael and Saul, Jennifer (eds.), Implicit Bias and Philosophy (Oxford: Oxford University Press), 80103.
Kahneman, Daniel. (2011) Thinking, Fast and Slow. London: Macmillan.
Kant, Immanuel. ([1781] 1958) Critique of Pure Reason. Translated by Smith, Norman Kemp. London: Macmillan.
Koralus, P., and Alfano, M.. (2017) ‘Reasons-based Moral Judgment and the Erotetic Theory’. In Bonnefon, J.-F. and Trémolière, B. (eds.), Moral Inferences (New York: Routledge), 77106.
Koralus, P., and Mascarenhas, S.. (2013) ‘The Erotetic Theory of Reasoning: Bridges between Formal Semantics and the Psychology of Propositional Deductive Inference.’ Philosophical Perspectives, 27, 312–65.
Levy, N. (2017) ‘The Bad News about Fake News’. Social Epistemology Review and Reply Collective, 6, 2036.
Lewis, P. (2018) ‘“Fiction is Outperforming Reality”: How YouTube's Algorithm Distorts Truth’. The Guardian, February 2.
Majeed, Khader, Neo, Loo Seng, Ong, Gabriel, Mingyi, Eunice Tan, and Chin, Jeffrey, eds. (2016) Combating Violent Extremism and Radicalization in the Digital Era. Hershey, PA: IGI Global.
Manjoo, F. (2017) ‘A Hunt for Ways to Combat Online Radicalization’. New York Times, August 23.
McCombs, Maxwell. (2000) ‘The Agenda-Setting Role of the Mass Media in the Shaping of Public Opinion’. Unpublished manuscript.
Miller, Boaz, and Record, Isaac. (2013) ‘Justified Belief in a Digital Age: On the Epistemic Implications of Secret Internet Technologies’. Episteme, 10, 117134.
Miller, Boaz, and Record, Isaac. (2016) ‘Responsible Epistemic Technologies: A Social-Epistemological Analysis of Autocompleted Web Search’. New Media & Society. doi:10.1177/1461444816644805.
Ndili, Alex. (2016) ‘The Role Of Community Policing In The Prevention Of Youth Radicalization in the Eastleigh Area of Nairobi County’. University of Nairobi.
Neumann, Peter R. (2013) ‘Options and Strategies for Countering Online Radicalization in the United States’. Studies in Conflict & Terrorism, 36, 431–59.
Newton, C. (2017) ‘How YouTube Perfected the Feed’. The Verge, August 30.
Omotoyinbo, Femi Richard. (2014) ‘Online Radicalization: The Net or the Netizen?Socialnės Technologijos, 1, 5161.
Palermos, S. O. (2016) ‘The Dynamics of Group Cognition’. Minds and Machines, 26, 409–40.
Pariser, Eli. (2011) The Filter Bubble: What the Internet is Hiding from You. New York: Penguin.
Peterson, J. (2018) 12 Rules for Life: An Antidote to Chaos. New York: Random House.
Pettit, P. (2015) The Robust Demands of the Good: Ethics with Attachment, Virtue, and Respect. Oxford: Oxford University Press.
Pilkington, Ed, and Roberts, Dan. (2016) ‘FBI and Obama Confirm Omar Mateen Was Radicalized on the Internet’. The Guardian, June 14.
Ritter, F. E., Baxter, G. D., and Churchill, E. F.. (2014) ‘User-centered Systems Design: A Brief History. In Foundations for Designing User-centered Systems (London: Springer), 33–54.
Roberts, Robert, and Wood, Jay. (2007) Intellectual Virtues: An Essay in Regulative Epistemology. Oxford: Oxford University Press.
Rogers, Y., Sharp, H., and Preece, J.. (2012) Interaction Design: Beyond Human-Computer Interaction. New York: Wiley.
Silber, Mitchell D., and Bhatt, Arvin. (2007) ‘Radicalization in the West: The Homegrown Threat’.
Strohminger, Nina, and Nichols, Shaun. (2014) ‘The Essential Moral Self’. Cognition, 131, 159–71.
Su., S. (2017). ‘New Test with Related Articles’. Facebook Newsroom, April 25.
Sunstein, Cass R. (2011) Going to Extremes: How Like Minds Unite and Divide. Oxford: Oxford University Press.
Sunstein, Cass R. (2015) ‘The Ethics of Nudging’. Yale Journal on Regulation, 32(2), 413–15.
Sunstein, Cass R. (2017) Republic: Divided Democracy in the Age of Social Media. Princeton, NJ: Princeton University Press.
Tanesini, A. (2016) ‘Teaching Virtue: Changing Attitudes’. Logos & Episteme, 7, 503–27.
Thaler, Richard H., and Sunstein, Cass R.. (2003a) ‘Libertarian Paternalism is not an Oxymoron’. The University of Chicago Law Review, 70, 1159–1202.
Thaler, Richard, and Sunstein, Cass. (2003b) ‘Libertarian Paternalism’. The American Economic Review, 93, 175–79.
Thaler, Richard H., and Benartzi, Shlomo. (2004) ‘Save More Tomorrow: Using Behavioral Economics to Increase Employee Saving’. Journal of Political Economy, 112, S164S187.
Thaler, Richard H., and Sunstein, Cass R.. (2008) Nudge: Improving Decisions about Health, Wealth, and Happiness. New Haven, CT: Yale University Press.
Thaler, Richard H., Sunstein, Cass R., and Balz, John P.. (2014) ‘Choice Architecture’. In Shafir, Eldar (ed.), The Behavioral Foundations of Public Policy (Princeton, NJ: Princeton University Press), 428–39.
Troumbley, Rex. (2015) ‘Coercive Cyberspaces and Governing Internet Futures’. In Winter, Jenifer and Ono, Ryota (eds.), The Future Internet: Alternative Visions (Cham: Springer International Publishing), 1740.
Tufekci, Zeynep. (2018) ‘YouTube, the Great Radicalizer’. New York Times, March 10.
Vallor, Shannon. (2016) Technology and the Virtues: A Philosophical Guide to a Future Worth Wanting. Oxford: Oxford University Press.
Van Hoboken, J. V. J. (2012) Search Engine Freedom: On the Implications of the Right to Freedom of Expression for the Legal Governance of Search Engines. Alphen aan den Rijn, Netherlands: Kluwer Law International.
Vinokur, Amiram, and Burnstein, Eugene. (1978) ‘Depolarization of Attitudes in Groups.’ Journal of Personality and Social Psychology, 36, 872.
Von Behr, Ines, Reding, Anaïs, Edwards, Charlie, and Gribbon, Luke. (2013) ‘Radicalisation in the Digital Era: The Use of the Internet in 15 Cases of Terrorism and Extremism’.
Wegner, D. M. (1987) ‘Transactive Memory: A Contemporary Analysis of the Group Mind’. In Mullen, Brian and Goethals, George R (eds.), Theories of Group behavior (New York: Springer), 185208.
Wegner, D. M., Erber, R., and Raymond, P.. (1991) ‘Transactive Memory in Close Relationships’. Journal of Personality and Social Psychology, 61, 923.
Weimann, Gabriel. (2012) ‘Lone Wolves in Cyberspace’. Journal of Terrorism Research, 3. doi:10.15664/jtr.405.
White, Mark. (2013) The Manipulation of Choice: Ethics and Libertarian Paternalism. Dordrecht: Springer.
Winner, Langdon. (1986) The Whale and the Reactor. Chicago: University of Chicago Press.
Wong, David. (2006) Natural Moralities. Oxford: Oxford University Press.
Zagzebski, L. (2017) Exemplarist Moral Theory. Oxford: Oxford University Press.


Technological Seduction and Self-Radicalization

  • MARK ALFANO (a1), J. ADAM CARTER (a2) and MARC CHEONG (a3)


Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Abstract views

Total abstract views: 0 *
Loading metrics...

* Views captured on Cambridge Core between <date>. This data will be updated every 24 hours.

Usage data cannot currently be displayed