{"id":9103,"date":"2015-10-30T14:06:28","date_gmt":"2015-10-30T19:06:28","guid":{"rendered":"http:\/\/hcstx.org\/?p=9103"},"modified":"2015-10-30T14:06:28","modified_gmt":"2015-10-30T19:06:28","slug":"the-social-science-of-online-radicalization","status":"publish","type":"post","link":"https:\/\/thetacticalhermit.com\/index.php\/2015\/10\/30\/the-social-science-of-online-radicalization\/","title":{"rendered":"The Social Science of Online Radicalization"},"content":{"rendered":"<p class=\"selectionShareable\"><a href=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/10\/keyboard.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-large wp-image-9104\" src=\"https:\/\/hcsblogdotorg.files.wordpress.com\/2015\/10\/keyboard.jpg?w=620\" alt=\"keyboard\" width=\"620\" height=\"373\" \/><\/a><\/p>\n<p class=\"selectionShareable\">As Charlie Winter <a href=\"http:\/\/warontherocks.com\/2015\/10\/more-than-just-beheadings-how-the-islamic-state-sells-itself\/\">noted<\/a> recently at <em>War on the Rocks<\/em>, the Islamic State\u2019s robust social media apparatus has been propagating a remarkably effective, multi-faceted communications strategy that incorporates narratives of statehood, military success, and religious legitimacy. The Islamic State\u2019s success in using social media to <a href=\"http:\/\/www.brookings.edu\/~\/media\/research\/files\/papers\/2015\/03\/isis-twitter-census-berger-morgan\/isis_twitter_census_berger_morgan.pdf\">disseminate<\/a>its extremist ideas and <a href=\"http:\/\/www.nytimes.com\/2015\/09\/27\/world\/middleeast\/thousands-enter-syria-to-join-isis-despite-global-efforts.html?hp&amp;action=click&amp;pgtype=Homepage&amp;module=first-column-region&amp;region=top-news&amp;WT.nav=top-news&amp;_r=0\">mobilize<\/a> tens of thousands of foreign fighters to join the caliphate has raised many questions about the relative efficacy of online radicalization and recruitment. Can social networking sites <a href=\"http:\/\/warontherocks.com\/2014\/10\/what-does-the-recent-spate-of-lone-wolf-terrorist-attacks-mean\/\">replace face-to-face communications<\/a> in fostering the group dynamic that is so important to spurring people to engage in terrorist acts? How do online group dynamics differ from those of face-to-face networks? Does social media accelerate the process of radicalization, so that individuals may be ready to illegally support violent causes more quickly after exposure to extremist ideas than in the past? It is vital that we seek to understand these questions in order to counter the Islamic State\u2019s social media outreach and more effectively respond to other groups that seek to emulate its successes.<\/p>\n<p class=\"selectionShareable\">Public discussion and debate about these issues has tended to overlook the rich body of research produced by psychologists, sociologists, and communication scholars. Academics have been studying the impact of online or \u201ccomputer-mediated\u201d communication (CMC) on human behavior since the 1960s, and the literature on the subject, especially three concepts from the field of social psychology \u2014\u00a0identity demarginalization, group polarization, and the social identity model of de-individuation effects \u2014 can do much to inform our exploration of online radicalization.<\/p>\n<p class=\"selectionShareable\"><strong>Identity Demarginalization and Group Polarization: Validating Fringe Identities<\/strong><\/p>\n<p class=\"selectionShareable\"><em>Identity demarginalization<\/em> theory, as <a href=\"http:\/\/www.yale.edu\/acmelab\/articles\/mckenna_bargh_1998.pdf\">articulated<\/a> by Katelyn McKenna and John Bargh in a 1998 study, explores why some social groups are more drawn to online communication than others. McKenna and Bargh found that individuals with \u201cconcealable and culturally devalued identities\u201d were more likely to participate in and value online communities than individuals with mainstream identities. Specifically, their study found that people who posted in online forums dedicated to concealable identities such as homosexuality or drug usage valued the feedback and opinions of other group members more strongly than did members of forums focused on marginalized identities that are easier to perceive, such as obesity and stuttering. \u201cFor the first time,\u201d the authors wrote, an individual exploring his or her marginalized identity in an online environment \u201ccan reap the benefits of joining a group of similar others: feeling less isolated and different, disclosing a long secret part of oneself, sharing one\u2019s own experiences and learning from those of others, and gaining emotional and motivational support.\u201d<\/p>\n<p class=\"selectionShareable\">Read the Remainder at <strong><a href=\"http:\/\/warontherocks.com\/2015\/10\/the-social-science-of-online-radicalization\/?utm_source=WOTR+Newsletter&amp;utm_campaign=089f698af4-WOTR_Newsletter_8_17_158_15_2015&amp;utm_medium=email&amp;utm_term=0_8375be81e9-089f698af4-82918357\">War on the Rocks<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As Charlie Winter noted recently at War on the Rocks, the Islamic State\u2019s robust social media apparatus has been propagating a remarkably effective, multi-faceted communications strategy that incorporates narratives of statehood, military success, and religious legitimacy. The Islamic State\u2019s success in using social media to disseminateits extremist ideas and mobilize tens of thousands of foreign&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[2280,2122,1704,74,883,1814,2413,1189,272],"tags":[2097,1083,2731,2732,2403],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/9103"}],"collection":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/comments?post=9103"}],"version-history":[{"count":0,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/posts\/9103\/revisions"}],"wp:attachment":[{"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/media?parent=9103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/categories?post=9103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thetacticalhermit.com\/index.php\/wp-json\/wp\/v2\/tags?post=9103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}