Institutions
|
About Us
|
Help
|
Gaeilge
0
1000
Home
Browse
Advanced Search
Search History
Marked List
Statistics
A
A
A
Author(s)
Institution
Publication types
Funder
Year
Limited By:
Author = Conway, Maura;
48 items found
Sort by
Title
Author
Item type
Date
Institution
Peer review status
Language
Order
Ascending
Descending
25
50
100
per page
1
2
Bibtex
CSV
EndNote
RefWorks
RIS
XML
Displaying Results 1 - 25 of 48 on page 1 of 2
Marked
Mark
A snapshot of the Syrian jihadi online ecology: differential disruption, community strength, and preferred other platforms
(2021)
Conway, Maura; Khawaja, Moign; Lakhani, Suraj; Reffin, Jeremy
A snapshot of the Syrian jihadi online ecology: differential disruption, community strength, and preferred other platforms
(2021)
Conway, Maura; Khawaja, Moign; Lakhani, Suraj; Reffin, Jeremy
Abstract:
This article contributes to the growing literature on extremist and terrorist online ecologies and approaches to snapshotting these. It opens by measuring Twitter’s differential disruption of so-called “Islamic State” versus other jihadi parties to the Syria conflict, showing that while Twitter became increasingly inhospitable to IS in 2017 and 2018, Hay’at Tahrir al-Sham and Ahrar al-Sham retained strong communities on the platform during the same period. An analysis of the same groups’ Twitter out-linking activity has the twofold purpose of determining the reach of groups’ content by quantifying the number of platforms it was available on and analyzing the nature and functionalities of the online spaces out-linked to.
http://doras.dcu.ie/25398/
Marked
Mark
Against Cyberterrorism: Why cyber-based terrorist attacks are unlikely to occur
(2011)
Conway, Maura
Against Cyberterrorism: Why cyber-based terrorist attacks are unlikely to occur
(2011)
Conway, Maura
http://doras.dcu.ie/16237/
Marked
Mark
An analysis of interactions within and between extreme right communities in social media
(2012)
O'Callaghan, Derek; Greene, Derek; Conway, Maura; Carthy, Joe; Cunningham, Padraig
An analysis of interactions within and between extreme right communities in social media
(2012)
O'Callaghan, Derek; Greene, Derek; Conway, Maura; Carthy, Joe; Cunningham, Padraig
Abstract:
Many extreme right groups have had an online presence for some time through the use of dedicated websites. This has been accompanied by increased activity in social media websites in recent years, which may enable the dissemination of extreme right content to a wider audience. In this paper, we present exploratory analysis of the activity of a selection of such groups on Twitter, using network representations based on reciprocal follower and mentions interactions. We find that stable communities of related users are present within individual country networks, where these communities are usually associated with variants of extreme right ideology. Furthermore, we also identify the presence of international relationships between certain groups across geopolitical boundaries.
http://doras.dcu.ie/17746/
Marked
Mark
Book review: Des Freedman and Daya Kishan Thussu (eds), media and terrorism: global perspectives
(2014)
Conway, Maura
Book review: Des Freedman and Daya Kishan Thussu (eds), media and terrorism: global perspectives
(2014)
Conway, Maura
Abstract:
Book Review
http://doras.dcu.ie/19975/
Marked
Mark
Code wars: steganography, signals intelligence, and terrorism
(2003)
Conway, Maura
Code wars: steganography, signals intelligence, and terrorism
(2003)
Conway, Maura
Abstract:
This paper describes and discusses the process of secret communication known as steganography. The argument advanced here is that terrorists are unlikely to be employing digital steganography to facilitate secret intra-group communication as has been claimed. This is because terrorist use of digital steganography is both technically and operationally implausible. The position adopted in this paper is that terrorists are likely to employ low-tech steganography such as semagrams and null ciphers instead.
http://doras.dcu.ie/494/
Marked
Mark
Combining social network analysis and sentiment analysis to explore the potential for online radicalisation
(2009)
Bermingham, Adam; Conway, Maura; McInerney, Lisa; O'Hare, Neil; Smeaton, Alan F.
Combining social network analysis and sentiment analysis to explore the potential for online radicalisation
(2009)
Bermingham, Adam; Conway, Maura; McInerney, Lisa; O'Hare, Neil; Smeaton, Alan F.
Abstract:
The increased online presence of jihadists has raised the possibility of individuals being radicalised via the Internet. To date, the study of violent radicalisation has focused on dedicated jihadist websites and forums. This may not be the ideal starting point for such research, as participants in these venues may be described as “already madeup minds”. Crawling a global social networking platform, such as YouTube, on the other hand, has the potential to unearth content and interaction aimed at radicalisation of those with little or no apparent prior interest in violent jihadism. This research explores whether such an approach is indeed fruitful. We collected a large dataset from a group within YouTube that we identified as potentially having a radicalising agenda. We analysed this data using social network analysis and sentiment analysis tools, examining the topics discussed and what the sentiment polarity (positive or negative) is towards these topics. In particular, we focus on ...
http://doras.dcu.ie/4554/
Marked
Mark
Countering terrorism via the Internet
(2015)
Conway, Maura; Waker, Clive
Countering terrorism via the Internet
(2015)
Conway, Maura; Waker, Clive
http://doras.dcu.ie/20676/
Marked
Mark
Cybercortical warfare: Hizbollah's internet strategy
(2005)
Conway, Maura
Cybercortical warfare: Hizbollah's internet strategy
(2005)
Conway, Maura
Abstract:
The major focus of this chapter is the way in which Hizbollah have wielded the Internet as a weapon in their information war. As will be demonstrated, the group’s collection of Web sites is targeted not at Lebanese or Palestinian audiences, but at the Israeli population and global publics. For this reason, the chapter represents a case study of the possibilities of the new technology, discussed and defined by this chapter as ‘cybercortical warfare’.
http://doras.dcu.ie/2105/
Marked
Mark
Cyberterrorism: hype and reality
(2007)
Conway, Maura
Cyberterrorism: hype and reality
(2007)
Conway, Maura
http://doras.dcu.ie/501/
Marked
Mark
Cyberterrorism: media myth or clear and present danger?
(2004)
Conway, Maura
Cyberterrorism: media myth or clear and present danger?
(2004)
Conway, Maura
http://doras.dcu.ie/505/
Marked
Mark
Cyberterrorism: the story so far
(2003)
Conway, Maura
Cyberterrorism: the story so far
(2003)
Conway, Maura
Abstract:
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same. The contention here is not that cyberterrorism cannot happen or will not happen, but that, contrary to popular perception, it has not happened yet.
http://doras.dcu.ie/496/
Marked
Mark
Determining the role of the Internet in violent extremism and terrorism: six suggestions for progressing research
(2016)
Conway, Maura
Determining the role of the Internet in violent extremism and terrorism: six suggestions for progressing research
(2016)
Conway, Maura
Abstract:
Some scholars and others are skeptical of a significant role for the Internet in processes of violent radicalization. There is increasing concern on the part of other scholars, and increasingly also policymakers and publics, that easy availability of violent extremist content online may have violent radicalizing effects. This article identifies a number of core questions regarding the interaction of violent extremism and terrorism and the Internet, particularly social media, that have yet to be adequately addressed and supplies a series of six follow-up suggestions, flowing from these questions, for progressing research in this area. These suggestions relate to (1) widening the range of types of violent online extremism being studied beyond violent jihadis; (2) engaging in more comparative research, not just across ideologies, but also groups, countries, languages, and social media platforms; (3) deepening our analyses to include interviewing and virtual ethnographic approaches; (4)...
http://doras.dcu.ie/21238/
Marked
Mark
Disrupting Daesh: measuring takedown of online terrorist material and it's impacts
(2017)
Conway, Maura; Khawaja, Moign; Lakhani, Suraj; Reffin, Jeremy; Robertson, Andrew; Weir,...
Disrupting Daesh: measuring takedown of online terrorist material and it's impacts
(2017)
Conway, Maura; Khawaja, Moign; Lakhani, Suraj; Reffin, Jeremy; Robertson, Andrew; Weir, David
Abstract:
This report seeks to contribute to public and policy debates on the value of social media disruption activity with respect to terrorist material. We look in particular at aggressive account and content takedown, with the aim of accurately measuring this activity and its impacts. Our findings challenge the notion that Twitter remains a conducive space for Islamic State (IS) accounts and communities to flourish, although IS continues to distribute propaganda through this channel. However, not all jihadists on Twitter are subject to the same high levels of disruption as IS, and we show that there is differential disruption taking place. IS’s and other jihadists’ online activity was never solely restricted to Twitter. Twitter is just one node in a wider jihadist social media ecology. We describe and discuss this, and supply some preliminary analysis of disruption trends in this area.
http://doras.dcu.ie/21961/
Marked
Mark
Down the (white) rabbit hole: the extreme right and online recommender systems
(2015)
O'Callaghan, Derek; Greene, Derek; Conway, Maura; Carthy, Joe; Cunningham, Padraig
Down the (white) rabbit hole: the extreme right and online recommender systems
(2015)
O'Callaghan, Derek; Greene, Derek; Conway, Maura; Carthy, Joe; Cunningham, Padraig
Abstract:
In addition to hosting user-generated video content, YouTube provides recommendation services, where sets of related and recommended videos are presented to users, based on factors such as co-visitation count and prior viewing history. This article is specifically concerned with extreme right (ER) video content, portions of which contravene hate laws and are thus illegal in certain countries, which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTube’s recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTube’s related video service. A process is observable whereby users accessing an ER YouTube vid...
http://doras.dcu.ie/20280/
Marked
Mark
Down the (White) Rabbit Hole: The Extreme Right and Online Recommender Systems
(2017)
O'Callaghan, Derek; Greene, Derek; Conway, Maura; Carthy, Joe; Cunningham, Pádraig
Down the (White) Rabbit Hole: The Extreme Right and Online Recommender Systems
(2017)
O'Callaghan, Derek; Greene, Derek; Conway, Maura; Carthy, Joe; Cunningham, Pádraig
Abstract:
In addition to hosting user-generated video content, YouTube provides recommendation services,where sets of related and recommended videos are presented to users, based on factors such as covisitation count and prior viewing history. This article is specifically concerned with extreme right(ER) video content, portions of which contravene hate laws and are thus illegal in certain countries,which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTubes recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTubes related video service. A process is observable whereby users accessing an ER YouTube video are...
http://hdl.handle.net/10197/8439
Marked
Mark
Exploring the form and function of dissident Irish republican online discourses
(2012)
Conway, Maura; Bowman-Grieve, Lorraine
Exploring the form and function of dissident Irish republican online discourses
(2012)
Conway, Maura; Bowman-Grieve, Lorraine
Abstract:
This article seeks to contribute to broadening the focus of research in the area of violent online political extremism by examining the use of the internet by dissident Irish Republicans and their supporters. The argument here is not that the internet substitutes face-to-face contacts amongst Irish Republicans, including violent dissidents, nor that it currently plays a central role in processes of radicalisation into violent dissident groups, but that it has an important support function in terms of providing an ‘always-on’ space for discussion, consumption, and production of Irish Republicanism and thus a potentially educative role in terms of introducing ‘newbies’ to violent dissident Republicanism while also acting as a ‘maintenance’ space for the already committed. This exploratory study considers the importance of these functions in the context of repeated suggestions that the dissidents have no significant support base or constituency as internet activity certainly gives the ...
http://doras.dcu.ie/17637/
Marked
Mark
From al-Zarqawi to al-Awlaki: The emergence and development of an online radical milieu
(2012)
Conway, Maura
From al-Zarqawi to al-Awlaki: The emergence and development of an online radical milieu
(2012)
Conway, Maura
Abstract:
Radical milieus have been described as specific social environ¬ments whose culture, narratives, and symbols shape both individuals and groups, and the social networks and relationships out of which those individuals and groups develop and emerge. Researcher Peter Waldmann and his co-authors attribute distinct and independent qualities to these environments, portraying them as social entities in their own right, that is, a collective of people sharing certain perspectives and a unitary identity: a “subculture” or a “community.” This does not mean that conflict is absent between any given radical milieu and the violent extremist or terrorist group(s) that emerges from within it. Milieus have their own interests that lead them not just to interact with, but oftentimes to criticise and sometimes even confront their violent offshoots. Perhaps most importantly, Waldmann’s conception of radical milieus appears not merely to have social relationships as a core characteristic, but necessitat...
http://doras.dcu.ie/17596/
Marked
Mark
Hackers as terrorists? Why it doesn't compute
(2003)
Conway, Maura
Hackers as terrorists? Why it doesn't compute
(2003)
Conway, Maura
Abstract:
The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either
http://doras.dcu.ie/493/
Marked
Mark
Is cyberterrorism a real threat? Yes: why we should start from this assumption
(2018)
Conway, Maura
Is cyberterrorism a real threat? Yes: why we should start from this assumption
(2018)
Conway, Maura
http://doras.dcu.ie/22241/
Marked
Mark
Jihadi video and auto-radicalisation: evidence from an exploratory YouTube study
(2008)
Conway, Maura; McInerney, Lisa
Jihadi video and auto-radicalisation: evidence from an exploratory YouTube study
(2008)
Conway, Maura; McInerney, Lisa
Abstract:
Large amounts of jihadi video content on YouTube along with the vast array of relational data that can be gathered opens up innovative avenues for exploration of the support base for political violence. This exploratory study analyses the online supporters of jihad-promoting video content on YouTube, focusing on those posting and commenting upon martyr-promoting material from Iraq. Findings suggest that a majority are under 35 years of age and resident outside the region of the Middle East and North Africa (MENA) with the largest percentage of supporters located in the United States. Evidence to support the potential for online radicalisation is presented. Findings relating to newly formed virtual relationships involving a YouTube user with no apparent prior links to jihadists are discussed.
http://doras.dcu.ie/2253/
Marked
Mark
Le cyber-terrorisme: le discours des médias Américains et ses impacts
(2009)
Conway, Maura
Le cyber-terrorisme: le discours des médias Américains et ses impacts
(2009)
Conway, Maura
http://doras.dcu.ie/15756/
Marked
Mark
Mass communication - nitro to the Net
(2004)
Conway, Maura
Mass communication - nitro to the Net
(2004)
Conway, Maura
Abstract:
In their seminal contribution to the study of terrorism and the media, Violence as Communication (1982), Alex Schmid and Jenny De Graaf point out that before technology made possible the amplification and multiplication of speech, the maximum number of people that could be reached simultaneously was determined by the range of the human voice and was around 20,000 people. In the nineteenth century, the size of an audience was expanded twenty-five to fifty times. In 1839 the New York Sun published a record 39,000 copies; in 1896, on the occasion of President McKinley’s election, two US papers, belonging to Pulitzer and Hearst, for the first time printed a million copies. William McKinley paid a high price for this publicity. In 1901 he was killed by an anarchist, Leon Czolgosz, who explained his deed with the words: ‘For a man should not claim so much attention, while others receive none.’ Historically, access to the communication structure was intimately related to power. With the g...
http://doras.dcu.ie/513/
Marked
Mark
Media, fear and the hyperreal: the construction of cyberterrorism as the ultimate threat to critical infrastructures
(2008)
Conway, Maura
Media, fear and the hyperreal: the construction of cyberterrorism as the ultimate threat to critical infrastructures
(2008)
Conway, Maura
http://doras.dcu.ie/2142/
Marked
Mark
Online jihadi instructional content: the role of magazines
(2017)
Conway, Maura; Parker, Jodie; Looney, Sean
Online jihadi instructional content: the role of magazines
(2017)
Conway, Maura; Parker, Jodie; Looney, Sean
Abstract:
This chapter focuses on the instructional content, both text and images, published in 26 issues of three jihadi magazines: Al-Qaeda in the Arabian Peninsula’s Inspire, Inspire’s forerunner Jihad Recollections, and Somali Al-Shabab’s Gaidi M’taani. Instruction was found to be a core component of Inspire as distinct from the varying types and levels of instruction appearing in Jihad Recollections and Gaidi M’taani. Noticeable too was that the text and images composing bomb-making instructional guides were not only the commonest, but also the most detailed types of guides contained in Inspire, with both a high number of images and lengthy supporting text. A clear finding is thus that the purpose of AQAP’s Inspire was not just to inspire readers, in the sense of infusing them with some thought or feeling, but also to supply them with instructions on how these thoughts or feelings could be violently actuated.
http://doras.dcu.ie/21841/
Marked
Mark
Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-Betweens
(2015)
O'Callaghan, Derek; Prucha, Nico; Greene, Derek; Conway, Maura; Carthy, Joe; Cunni...
Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-Betweens
(2015)
O'Callaghan, Derek; Prucha, Nico; Greene, Derek; Conway, Maura; Carthy, Joe; Cunningham, Pádraig
Abstract:
The 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM'14), 17-20 August, Beijing, China
The Syria conflict has been described as the most socially mediated in history, with online social media playing a particularly important role. At the same time, the ever-changing landscape of the conflict leads to difficulties in applying analysis approaches taken by other studies of online political activism. In this paper, we propose an approach motivated by the Grounded Theory method, which is used within the social sciences to perform analysis in situations where key prior assumptions or the proposal of an advance hypothesis may not be possible. We apply this method to analyze Twitter and YouTube activity of a range of protagonists to the conflict in an attempt to reveal additional insights into the relationships between them. By means of a network representation that combines multiple data views, we uncover communities of accounts fal...
http://hdl.handle.net/10197/6684
Displaying Results 1 - 25 of 48 on page 1 of 2
1
2
Bibtex
CSV
EndNote
RefWorks
RIS
XML
Institution
Dublin City University (45)
Trinity College Dublin (1)
University College Dublin (2)
Item Type
Doctoral thesis (1)
Journal article (1)
Working paper (1)
Other (45)
Year
2021 (1)
2020 (2)
2019 (1)
2018 (1)
2017 (4)
2016 (1)
2015 (5)
2014 (3)
2013 (1)
2012 (6)
2011 (1)
2010 (1)
2009 (2)
2008 (2)
2007 (6)
2006 (2)
2005 (2)
2004 (2)
2003 (4)
2002 (1)
Language
English (47)
German (1)
built by Enovation Solutions