Skip to main content
Log in

A multi-region empirical study on the internet presence of global extremist organizations

  • Published:
Information Systems Frontiers Aims and scope Submit manuscript

Abstract

Extremist organizations are heavily utilizing Internet technologies to increase their abilities to influence the world. Studying those global extremist organizations’ Internet presence would allow us to better understand extremist organizations’ technical sophistication and their propaganda plans. In this work, we explore an integrated approach for collecting and analyzing extremist Internet presence. We employed automatic Web crawling techniques to build a comprehensive international extremist Web collection. We then used a systematic content analysis tool called the Dark Web Attribute System to analyze and compare these extremist organizations’ Internet usage from three perspectives: technical sophistication, content richness, and Web interactivity. By studying 1.7 million multimedia Web documents from around 224 Web sites of extremist organizations, we found that while all extremist organizations covered in this study demonstrate high level of technical sophistication in their Web presence, Middle Eastern extremists are among the most sophisticated groups in both technical sophistication and media richness. US groups are the most active in supporting Internet communications. Our analysis results will help domain experts deepen their understanding on the global extremism movements and make better counter-extremism measures on the Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • 9/11 Commision Report. (2004). Published by the National Commission on Terrorist Attacks Upon the United States, available at http://govinfo.library.unt.edu/911/report/911Report.pdf

  • Albertsen, K. (2003). The Paradigma Web Harvesting Environment. In Proc. of 3rd European Conference of Research and Advanced Technology for Digital Libraries (ECDL) Workshop on Web Archives 2003.

  • Armstrong, H. L., & Forde, P. J. (2003). Internet anonymity practices in computer crime. Information Management & Computer Security, 11(5), 209–215.

    Article  Google Scholar 

  • Bowers, F. (2004). Terrorists spread their messages online. Christian Science Monitor, July 28, 2004, available at http://www.csmonitor.com/2004/0728/p03s01-usgn.htm.

  • Bunt, G. R. (2003). Islam in the Digital Age: E-jihad, Online Fatwas and Cyber Islamic Environments. London: Pluto Press.

  • Burris, V., Smith, E., & Strahm, A. (2000). White supremacist networks on the Internet. Sociological focus, 33(2), 215-234.

    Google Scholar 

  • Chau, M., & Chen, H. (2003). Comparison of three vertical search spiders. IEEE Computer, 36, 56–62.

    Google Scholar 

  • Chau, M., Qin, J., Zhou, Y., Tseng, C., & Chen, H. (2008). SpidersRUs: creating specialized search engines in multiple languages. Decision Support Systems, 45, 621–640.

    Article  Google Scholar 

  • Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., et al. (2004). The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web. In Proc. of International IEEE Conference on Intelligent Transportation Systems.

  • Chou, C. (2003). Interactivity and interactive functions in web-based learning systems: a technical framework for designers. British Journal of Educational Technology, 34(3), 265–279.

    Article  Google Scholar 

  • Coll, S. & Glasser, S. B. (2005). Terrorists Turn to the Web as Base of Operations. Washington Post, Aug 7, 2005.

  • Demchak, C., Friis, C., & La Porte, T. M. (2001). Webbing governance: National differences in constructing the face of public organizations. Handbook of public information systems. G. D. Garson. NYC: Marcel Dekker.

    Google Scholar 

  • Denning, D. E. (2004). Information Operations and Terrorism,” Journal of Information Warfare (draft), 2004, available at http://www.jinfowar.com.

  • Gerstenfeld, P. B., Grant, D. R., & Chiang, C. (2003). Hate Online: A Content Analysis of Extremist Internet Sites. Analyses of Social Issues and Public Policy, 3(1), 29-44.

    Article  Google Scholar 

  • Internet Haganah, Internet Haganah report, 2005, available at http://en.wikipedia.org/wiki/Internet_Haganah.

  • ISTS (2004). Examining the Cyber Capabilities of Islamic Terrorist Groups”. Report, Institute for Security Technology Studies, 2004. http://www.ists.dartmouth.edu/

  • Jenkins, B. M. (2004). World becomes the hostage of media-savvy terrorists: Commentary. USA Today, August 22, 2004. http://www.rand.org/.

  • Kleinberg, J. (1999). Authoritative Sources in a Hyperlinked Environment. Journal of the ACM, 46(5), 604-632.

    Article  Google Scholar 

  • Muriel, D. (2004). Terror Moves to the Virtual World. CNN News, April 8, 2004, available at http://edition.cnn.com/2004/TECH/04/08/internet.terror/.

  • Nunnelly, J. (1978). Psychometric theory. New York: McGraw Hill.

    Google Scholar 

  • Palmer, J. W., & Griffith, D. A. (1998). An emerging model of Web site design for marketing. Communications of the ACM, 41(3), 45–51.

    Article  Google Scholar 

  • Qin, J., Zhou, Y., Reid, E., Lai, G., & Chen, H. (2007). Analyzing terror campaigns on the internet: technical sophistication, content richness, and Web interactivity. International Journal on Human Computer Studies, 65(1), 71–84.

    Article  Google Scholar 

  • Schneider, S. M., Foot, K., Kimpton, M., & Jones, G. (2003). Building thematic web collections: Challenges and experiences from the September 11 Web Archive and the Election 2002 Web Archive. In Proc. of the 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.

  • SITE (2004). Special report published by SITE Institute, http://siteinstitute.org.

  • Thomas, T. L. (2003). Al Qaeda and the Internet: The Danger of ‘Cyberplanning’. Parameters, Spring 2003, pp. 112–23, available at http://carlisle-www.army.mil/usawc/Parameters/03spring/thomas.htm.

  • Tsfati, Y., & Weimann, G. (2002). www.terrorism.com: terror on the internet. Studies in Conflict & Terrorism, 25, 317–332.

    Article  Google Scholar 

  • Weimann, G. (2004). www.terror.net: How modern terrorism use the internet. Special Report, U.S. Institute of Peace. Available at http://www.usip.org/pubs/specialreports/sr116.pdf.

  • Whine, M. (1999). Cyberspace: A new medium for communication, command and control by extremists. Available at http://www.ict.org.il/articles/cyberspace.htm

  • Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (2005). U.S. domestic extremist groups on the Web: link and content analysis. IEEE Intelligent Systems Special Issue on Homeland Security, 20(5), 44–51.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jialun Qin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Qin, J., Zhou, Y. & Chen, H. A multi-region empirical study on the internet presence of global extremist organizations. Inf Syst Front 13, 75–88 (2011). https://doi.org/10.1007/s10796-010-9277-6

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10796-010-9277-6

Keywords

Navigation