Complexity in Individual Trajectories toward Online Extremism

Z. Cao, M. Zheng, Y. Vorobyeva, C. Song, N. F. Johnson

Research output: Contribution to journalArticlepeer-review

1 Scopus citations

Abstract

Society faces a fundamental global problem of understanding which individuals are currently developing strong support for some extremist entity such as ISIS (Islamic State), even if they never end up doing anything in the real world. The importance of online connectivity in developing intent has been confirmed by recent case studies of already convicted terrorists. Here we use ideas from Complexity to identify dynamical patterns in the online trajectories that individuals take toward developing a high level of extremist support, specifically, for ISIS. Strong memory effects emerge among individuals whose transition is fastest and hence may become "out of the blue" threats in the real world. A generalization of diagrammatic expansion theory helps quantify these characteristics, including the impact of changes in geographical location, and can facilitate prediction of future risks. By quantifying the trajectories that individuals follow on their journey toward expressing high levels of pro-ISIS support - irrespective of whether they then carry out a real-world attack or not - our findings can help move safety debates beyond reliance on static watch-list identifiers such as ethnic background or immigration status and/or postfact interviews with already convicted individuals. Given the broad commonality of social media platforms, our results likely apply quite generally; for example, even on Telegram where (like Twitter) there is no built-in group feature as in our study, individuals tend to collectively build and pass through the so-called super-group accounts.

Original languageEnglish (US)
Article number3929583
JournalComplexity
Volume2018
DOIs
StatePublished - 2018

ASJC Scopus subject areas

  • Computer Science(all)
  • General

Fingerprint Dive into the research topics of 'Complexity in Individual Trajectories toward Online Extremism'. Together they form a unique fingerprint.

Cite this