Skip to main content
Originalarbeit

Big Data in der Radikalisierungsforschung

Eine systematische Übersichtsarbeit

Published Online:https://doi.org/10.1026/0033-3042/a000480

Zusammenfassung. Die Erforschung extremistischer Radikalisierung hat durch digitale Verhaltensspurdaten, wie z. B. Social-Media-Posts oder öffentlich zugänglichen Medien, einen neuen Auftrieb erfahren. Vor dem Hintergrund, dass Big Data als „epistemologische Revolution“ angesehen wird, liefert die vorliegende systematische Literaturübersicht einen Überblick darüber, (i) welche Ziele, Datenquellen und Methoden im Rahmen von Spurdatenstudien in der Radikalisierungsforschung gewählt werden, illustriert exemplarisch einige Ergebnisse dieser Studien und (ii) analysiert welche Gemeinsamkeiten und Unterschiede zu traditionellen Studien wie Fragebogen- oder Experimentalstudien bestehen. Grundlage für den Überblick liefern 63 Studien, von denen allerdings nur eine geringe Anzahl (k = 18) digitale Verhaltensspurdaten nutzten, während der Großteil aus traditionellen Zugängen (k = 52) besteht. Die Ergebnisse zeigen, dass Spurdatenstudien größtenteils darauf abzielten, Personen mit radikalen Einstellungen zu identifizieren und die Entwicklung radikaler Ansichten vorherzusagen. Insgesamt eröffnen sich durch Verhaltensspurdaten bisher ungenutzte Potentiale für die Analyse von Persönlichkeitsprofilen und die Untersuchung dynamischer sozialer Interaktionen derjenigen, die anfällig für extremistische Rekrutierung sind.Eine englische Übersetzung als Rohfassung dieses Artikels finden Sie als Elektronisches Supplement 1.


Big Data in Radicalization Research. A Systematic Review

Abstract. Research into extremist radicalisation has been given a new momentum by digital traces of behaviour, such as social media posts or publicly accessible media. Against the background that Big Data is seen as an ‚epistemological revolution‘, this systematic literature review provides an overview of (i) the goals, data sources, and methods of trace data analysis chosen in radicalization research, as well as exemplifies some of the results of these studies, and (ii) analyzes the similarities and differences with traditional studies such as questionnaires or experimental studies. This overview is based on 63 studies, of which, however, only a small proportion (k = 18) used digital behavioural trace data, while the majority consist of traditional approaches (k = 52). The results show that trace data studies were largely aimed at identifying individuals with radical attitudes and predicting the development of radical views. Overall, behavioural trace data open up previously untapped potential for the analysis of personality profiles and the investigation of dynamic social interactions of those susceptible to extremist recruitment.

Literatur

  • Anm. (*). kennzeichnet Studien, die in der Überblicksarbeit enthalten sind First citation in articleGoogle Scholar

  • *Alizadeh, M., Weber, I., Cioffi-Revilla, C., Fortunato, S. & Macy, M. (2019). Psychology and morality of political extremists: evidence from Twitter language analysis of alt-right and Antifa. EPJ Data Science, 8 (1), 17. First citation in articleCrossrefGoogle Scholar

  • *Bäck, E. A., Bäck, H., Altermark, N. & Knapton, H. (2018). The quest for significance: Attitude adaption to a radical group following social exclusion. International Journal of Developmental Science, 12 (5), 1 – 12. First citation in articleGoogle Scholar

  • *Bail, C. A., Merhout, F. & Ding, P. (2018). Using Internet search data to examine the relationship between anti-Muslim and pro-ISIS sentiment in US counties. Science Advances, 4 (6), eaao5948. First citation in articleCrossrefGoogle Scholar

  • *Dahl, V. (2017). Reducing adolescents’ approval of political violence: The social influence of universalistic and immigrant-friendly peers. Zeitschrift für Psychologie, 225, 302 – 312. First citation in articleLinkGoogle Scholar

  • Ebner, J. (2019). Radikalisierungsmaschinen. Wie Extremisten die neuen Technologien nutzen und uns manipulieren. Berlin: Suhrkamp. First citation in articleGoogle Scholar

  • Fernandez, M., Asif, M. & Alani, H. (2018). Understanding the Roots of Radicalisation on Twitter. Paper presented at the Proceedings of the 10th ACM Conference on Web Science, Amsterdam, Netherlands. http://dx.doi.org/10.1145/3201064.3201082 First citation in articleGoogle Scholar

  • *Jasko, K., LaFree, G. & Kruglanski, A. (2017). Quest for significance and violent extremism: The case of domestic radicalization. Political Psychology, 38, 815 – 831. First citation in articleCrossrefGoogle Scholar

  • Johnson, N. F., Leahy, R., Restrepo, N. J., Velasquez, N., Zheng, M., Manrique, P. et al. (2019). Hidden resilience and adaptive dynamics of the global online hate ecology. Nature, 573, 261 – 265. First citation in articleCrossrefGoogle Scholar

  • Kern, M. L., Park, G., Eichstaedt, J. C., Schwartz, H. A., Sap, M., Smith, L. K. & Ungar, L. H. (2016). Gaining insights from social media language: Methodologies and challenges. Psychological Methods, 21, 507 – 525. https://doi.org/10.1037/met0000091 First citation in articleCrossrefGoogle Scholar

  • Kosinski, M., Wang, Y., Lakkaraju, H. & Leskovec, J. (2016). Mining big data to extract patterns and predict real-life outcomes. Psychological Methods, 21, 493. https://doi.org/10.1037/met0000105 First citation in articleGoogle Scholar

  • Kramer, A. D., Guillory, J. E. & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111, 8788 – 8790. https://doi.org/10.1073/pnas.1320040111 First citation in articleCrossrefGoogle Scholar

  • *LaFree, G., Jensen, M. A., James, P. A. & Safer‐Lichtenstein, A. (2018). Correlates of violent political extremism in the United States. Criminology, 56, 233 – 268. First citation in articleCrossrefGoogle Scholar

  • Landers, R. N., Brusso, R. C., Cavanaugh, K. J. & Collmus, A. B. (2016). A primer on theory-driven web scraping: Automatic extraction of big data from the Internet for use in psychological research. Psychological Methods, 21, 475. https://doi.org/10.1037/met0000081 First citation in articleGoogle Scholar

  • *Lara-Cabrera, R., González-Pardo, A. & Camacho, D. (2019). Statistical analysis of risk assessment factors and metrics to evaluate radicalisation in Twitter. Future Generation Computer Systems, 93, 971 – 978. First citation in articleCrossrefGoogle Scholar

  • Marres, N. (2015). Why map issues? On controversy analysis as a digital method. Science, Technology & Human Values, 40, 1 – 32. http://doi.org/10.1177/0162243915574602 First citation in articleCrossrefGoogle Scholar

  • *Mitts, T. (2019). From Isolation to Radicalization: Anti-Muslim Hostility and Support for ISIS in the West. American Political Science Review, 113, 173 – 194. First citation in articleCrossrefGoogle Scholar

  • Moher, D., Liberati, A., Tetzlaff, J. & Altman, D. G. (2009). Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Annals of internal medicine, 151, 264 – 269. http:/doi.org//10.7326/0003-4819-151-4-200908180-00135 First citation in articleCrossrefGoogle Scholar

  • Munn, L. (2019). Alt-right pipeline: Individual journeys to extremism online. First Monday, 24 (6) https://doi.org/10.5210/fm.v24i6.10108 First citation in articleGoogle Scholar

  • Pape, R. A. (2009). Introduction: What is New About Research on Terrorism, Security Studies, 18, 643 – 650. https://doi.org/10.1080/09636410903369100 First citation in articleCrossrefGoogle Scholar

  • Parekh, D., Amarasingam, A., Dawson, L. & Ruths, D. (2018). Studying Jihadists on Social Media: A Critique of Data Collection Methodologies. Perspectives on Terrorism, 12 (3), 5 – 23. First citation in articleGoogle Scholar

  • Pelzer, R. (2018). Policing of terrorism using data from social media. European Journal for Security Research, 3, 163 – 179. https://doi.org/10.1007/s41125-018-0029-9 First citation in articleCrossrefGoogle Scholar

  • *Pyrooz, D. C., LaFree, G., Decker, S. H. & James, P. A. (2018). Cut from the same cloth? A comparative study of domestic extremists and gang members in the United States. Justice Quarterly, 35 (1), 1 – 32. https://doi.org/10.1080/07418825.2017.1311357 First citation in articleCrossrefGoogle Scholar

  • Reganti, A. N., Maheshwari, T., Das, A., Chakraborthy, T. & Kumaraguru, P. (2017). Understanding Psycho-Sociological Vulnerability of ISIS Patronizers in Twitter. Paper presented at the Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia. First citation in articleGoogle Scholar

  • Rowe, M. & Saif, H. (2016). Mining Pro-ISIS Radicalisation Signals from Social Media Users. In Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016) 329 – 338. First citation in articleGoogle Scholar

  • Schmid, A. P. & Forest, J. J. (2018). Research Desiderata: 150 Un-and Under-Researched Topics and Themes in the Field of (Counter–) Terrorism Studies–a New List. Perspectives on Terrorism, 12 (4), 68 – 76. First citation in articleGoogle Scholar

  • Schuurman, B. (2018). Research on terrorism, 2007 – 2016: a review of data, methods, and authorship. Terrorism and Political Violence, 1 – 16. First citation in articleCrossrefGoogle Scholar