Abstract
Zusammenfassung. Die Erforschung extremistischer Radikalisierung hat durch digitale Verhaltensspurdaten, wie z. B. Social-Media-Posts oder öffentlich zugänglichen Medien, einen neuen Auftrieb erfahren. Vor dem Hintergrund, dass Big Data als „epistemologische Revolution“ angesehen wird, liefert die vorliegende systematische Literaturübersicht einen Überblick darüber, (i) welche Ziele, Datenquellen und Methoden im Rahmen von Spurdatenstudien in der Radikalisierungsforschung gewählt werden, illustriert exemplarisch einige Ergebnisse dieser Studien und (ii) analysiert welche Gemeinsamkeiten und Unterschiede zu traditionellen Studien wie Fragebogen- oder Experimentalstudien bestehen. Grundlage für den Überblick liefern 63 Studien, von denen allerdings nur eine geringe Anzahl (k = 18) digitale Verhaltensspurdaten nutzten, während der Großteil aus traditionellen Zugängen (k = 52) besteht. Die Ergebnisse zeigen, dass Spurdatenstudien größtenteils darauf abzielten, Personen mit radikalen Einstellungen zu identifizieren und die Entwicklung radikaler Ansichten vorherzusagen. Insgesamt eröffnen sich durch Verhaltensspurdaten bisher ungenutzte Potentiale für die Analyse von Persönlichkeitsprofilen und die Untersuchung dynamischer sozialer Interaktionen derjenigen, die anfällig für extremistische Rekrutierung sind.Eine englische Übersetzung als Rohfassung dieses Artikels finden Sie als Elektronisches Supplement 1.
Abstract. Research into extremist radicalisation has been given a new momentum by digital traces of behaviour, such as social media posts or publicly accessible media. Against the background that Big Data is seen as an ‚epistemological revolution‘, this systematic literature review provides an overview of (i) the goals, data sources, and methods of trace data analysis chosen in radicalization research, as well as exemplifies some of the results of these studies, and (ii) analyzes the similarities and differences with traditional studies such as questionnaires or experimental studies. This overview is based on 63 studies, of which, however, only a small proportion (k = 18) used digital behavioural trace data, while the majority consist of traditional approaches (k = 52). The results show that trace data studies were largely aimed at identifying individuals with radical attitudes and predicting the development of radical views. Overall, behavioural trace data open up previously untapped potential for the analysis of personality profiles and the investigation of dynamic social interactions of those susceptible to extremist recruitment.
Literatur
*). kennzeichnet Studien, die in der Überblicksarbeit enthalten sind
(*2019). Psychology and morality of political extremists: evidence from Twitter language analysis of alt-right and Antifa. EPJ Data Science, 8 (1), 17.
(*2018). The quest for significance: Attitude adaption to a radical group following social exclusion. International Journal of Developmental Science, 12 (5), 1 – 12.
(*2018). Using Internet search data to examine the relationship between anti-Muslim and pro-ISIS sentiment in US counties. Science Advances, 4 (6), eaao5948.
(*2017). Reducing adolescents’ approval of political violence: The social influence of universalistic and immigrant-friendly peers. Zeitschrift für Psychologie, 225, 302 – 312.
(2019). Radikalisierungsmaschinen. Wie Extremisten die neuen Technologien nutzen und uns manipulieren. Berlin: Suhrkamp.
(2018). Understanding the Roots of Radicalisation on Twitter. Paper presented at the Proceedings of the 10th ACM Conference on Web Science, Amsterdam, Netherlands. http://dx.doi.org/10.1145/3201064.3201082
(*2017). Quest for significance and violent extremism: The case of domestic radicalization. Political Psychology, 38, 815 – 831.
(2019). Hidden resilience and adaptive dynamics of the global online hate ecology. Nature, 573, 261 – 265.
(2016). Gaining insights from social media language: Methodologies and challenges. Psychological Methods, 21, 507 – 525. https://doi.org/10.1037/met0000091
(2016). Mining big data to extract patterns and predict real-life outcomes. Psychological Methods, 21, 493. https://doi.org/10.1037/met0000105
(2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111, 8788 – 8790. https://doi.org/10.1073/pnas.1320040111
(*2018). Correlates of violent political extremism in the United States. Criminology, 56, 233 – 268.
(2016). A primer on theory-driven web scraping: Automatic extraction of big data from the Internet for use in psychological research. Psychological Methods, 21, 475. https://doi.org/10.1037/met0000081
(*2019). Statistical analysis of risk assessment factors and metrics to evaluate radicalisation in Twitter. Future Generation Computer Systems, 93, 971 – 978.
(2015). Why map issues? On controversy analysis as a digital method. Science, Technology & Human Values, 40, 1 – 32. http://doi.org/10.1177/0162243915574602
(*2019). From Isolation to Radicalization: Anti-Muslim Hostility and Support for ISIS in the West. American Political Science Review, 113, 173 – 194.
(2009). Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Annals of internal medicine, 151, 264 – 269. http:/doi.org//10.7326/0003-4819-151-4-200908180-00135
(2019). Alt-right pipeline: Individual journeys to extremism online. First Monday, 24 (6) https://doi.org/10.5210/fm.v24i6.10108
(2009). Introduction: What is New About Research on Terrorism, Security Studies, 18, 643 – 650. https://doi.org/10.1080/09636410903369100
(2018). Studying Jihadists on Social Media: A Critique of Data Collection Methodologies. Perspectives on Terrorism, 12 (3), 5 – 23.
(2018). Policing of terrorism using data from social media. European Journal for Security Research, 3, 163 – 179. https://doi.org/10.1007/s41125-018-0029-9
(*2018). Cut from the same cloth? A comparative study of domestic extremists and gang members in the United States. Justice Quarterly, 35 (1), 1 – 32. https://doi.org/10.1080/07418825.2017.1311357
(2017). Understanding Psycho-Sociological Vulnerability of ISIS Patronizers in Twitter. Paper presented at the Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia.
(2016). Mining Pro-ISIS Radicalisation Signals from Social Media Users. In Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016) 329 – 338.
(2018). Research Desiderata: 150 Un-and Under-Researched Topics and Themes in the Field of (Counter–) Terrorism Studies–a New List. Perspectives on Terrorism, 12 (4), 68 – 76.
(2018). Research on terrorism, 2007 – 2016: a review of data, methods, and authorship. Terrorism and Political Violence, 1 – 16.
(