Online youth radicalization

Online youth radicalization is the action in which a young individual or a group of people come to adopt increasingly extreme political, social, or religious ideals and aspirations that reject, or undermine the status quo or undermine contemporary ideas and expressions of a state, which they may or may not reside in.[1] Online youth radicalization can be both violent or non-violent.

The phenomenon, often referred to as "incitement to radicalization towards violent extremism" (or "violent radicalization") has grown in recent years, due to the Internet and social media in particular. In response to the increased attention on online "incitement to extremism and violence", attempts to prevent this phenomenon have created challenges for freedom of expression. These range from indiscriminate blocking, censorship over-reach (affecting both journalists and bloggers), and privacy intrusions—right through to the suppression or instrumentalization of media at the expense of independent credibility.[2]

After terrorist attacks, political pressure is often put on social media companies to do more to prevent online radicalization of young people leading to violent extremism.[3] UNESCO calls for "a policy that is constructed on the basis of facts and evidence, and not founded on hunches—or driven by panic and fearmongering."[2][4]

Cyberspace is used to denote the Internet, as a network of networks, and social media as a social network that may combine various Internet platforms and applications to exchange and publish online: the online production of radical (political, social, religious) resources or content, the presence of terrorist or radicalized groups within the social networks, and the participation of young people in radical conversations.[2]

Definitions and approaches

While there is no consensus definition, broadly speaking "radicalization" refers to a process in which individuals are moved towards beliefs deemed "extreme" by the status quo. Not all processes of radicalization, however, have acts of violence as either their goal or their outcome. Concern is with radicalization processes which intentionally result in violence, and particularly when that violence is terroristic in targeting civilians. Communications—online and offline—play a part in radicalization processes, along with events and how individuals interpret their life experiences.[2]

Yet distinctions need to be made between communications that may be perceived as "extreme", but which do not rise to the level of constituting criminal incitement or recruitment, and those which advocate for violent acts to be committed. Although scholars emphasize different aspects, there are three main recurring characteristics in the way that they conceptualize specifically violent radicalization.[2]

In this sense, the concept of violent radicalization (or radicalization leading to violent acts) covers an observable process involving the individual person's[5] search for fundamental meaning, origin and return to a root ideology, the polarization of the social space and the collective construction of a threatened ideal "us" against "them", where others are dehumanized by a process of scapegoating, a group's adoption of violence as a legitimate means for the expansion of root ideologies and related oppositional objectives.[2]

Two major schools of theory can be discerned in the reception of the Internet and social media. These schools largely originate in pre-digital media, but are still being applied (usually implicitly) to the Internet era. The effects-based school perceives the Internet and social media as highly powerful means of communication and propaganda that over-determine other communication tools and processes. Social media are seen as highly effective drivers of propaganda, conspiracy theories and the rise of extremism through de-sensitization which leads to individuals accepting the use of violence. The uses-based school sheds doubts on the structuring effects of social media by empirically identifying only indirect and limited effects. In this paradigm, "the role of social media in violent radicalization and extremism constitutes a reflection of real offline social ruptures".[6]

Algorithmic radicalization

Algorithmic radicalization is the concept that recommender algorithms on popular social media sites such as YouTube and Facebook drive users toward progressively more extreme content over time, leading to them developing radicalized extremist political views. Algorithms record user interactions, from likes/dislikes to amount of time spent on posts, to generate endless media aimed to keep users engaged. Through echo chamber channels, the consumer is driven to be more polarized through preferences in media and self-confirmation.[7][8][9][10]

Algorithmic radicalization remains a controversial phenomenon as it is often not in the best interest of social media companies to remove echo chamber channels.[11][12] To what extent recommender algorithms are actually responsible for radicalization remains controversial; studies have found contradictory results as to whether algorithms have promoted extremist content.

Youth and violent extremism

Specificities of social media

The Internet has remained a medium for the spread of narratives. It has often been mistaken as a driver of violent extremism rather than the medium that it is. Unfortunately, social media has not only been used to bring people closer, to share thoughts and opinions, but also to spread false information. Additionally, the application of privacy rules has made it easier for closing the niche and advancing the targeting of vulnerable individuals. These privacy rules though welcomed, have made the process of analysis for prevention; challenging.[13]

Chatrooms

Chatrooms can be embedded within most Internet-based media. Reports that have looked into the use of chatrooms by violent extremist groups describe these as the space where at-risk youth without previous exposure would be likely to come across radicalizing religious narratives.[14][15] This falls in line with Sageman's emphasis on the role of chatrooms and forums, based on his distinction between websites as passive sources of news and chat rooms as active sources of interaction.[16] According to Sageman, "networking is facilitated by discussion forums because they develop communication among followers of the same ideas (experiences, ideas, values), reinforce interpersonal relationships and provide information about actions (tactics, objectives, tutorials)". Chatrooms can also include spaces where extremist people share information such as photos, videos, guides, and manuals.[17][2] Discussion forums such as Reddit, 4chan, and 8chan have become focal points on internet meme-based and other forms of radicalization.[18][19][20]

Facebook

Many extremist groups are ideologically and strategically anti-Facebook, but a strong presence still exists on this platform either directly or through supporters.[14] Facebook does not seem to be used for direct recruitment or planning, possibly because it has mechanisms of tracking and can link users with real places and specific times. Facebook appears to have been more often used by extremists as a decentralized center for the distribution of information and videos or a way to find like-minded supporters and show support rather than direct recruitment.[14][15] This may be on the possibility that young sympathizers can share information and images and create Facebook groups in a decentralized way.[2]

The terrorist perpetrator of the Christchurch mosque shootings live-streamed, on Facebook, a video of the attacks which resulted in the deaths of 51 people; this was then extensively shared on social media. In the wake of this tragedy, Facebook and Twitter became more active in banning extremists from their platforms. Facebook pages associated with Future Now Australia have been removed from the platform, including their main page, "Stop the Mosques and Save Australia."[21] On March 28, Facebook announced that they have banned white nationalist and white separatist content along with white supremacy.[22]

Twitter

Micro-blogging sites like Twitter present more advantages for extremist groups because traceability of the identity and the source of the tweets are harder to achieve, thus increasing the communication potential for recruiters.[14][23][24] Analyses of Twitter feeds generated by Islamist violent extremist groups show that they are mostly used for engaging with the opposition and the authorities, in what appear to be tweetclashes that mobilize the two sides, and also used for provocation.[14] Through Twitter, extremists can easily comment publicly on international events or personalities in several languages, enabling the activists to be vocal and timely when mounting campaigns.[14][2]

YouTube and other video platforms

YouTube has the advantage of being difficult to trace the identity of people posting content, while offering the possibility for users to generate comments and share contents.[14] Several researchers have conducted content analyses of YouTube and Facebook extremist discourses and video contents to identify the production features most used, including their modus operandi and intended effects.[25][26] Studies that have focused on the rhetorical strategy of extremist groups show the multifaceted use of online resources by extremist groupsthat is, they produce "hypermedia seduction" via the use of visual motifs that are familiar to young people online,[27][28][29][30] and they provide content in several languages, mostly Arabic, English and French using subtitles or audio dubbing, to increase the recruitment capacity of youth across nations.[31] These videos provide rich media messaging that combines nonverbal cues and vivid images of events that can evoke psychological and emotional responses as well as violent reactions.[25] Terrorists capture their attacks on video and disseminate them though the Internet, communicating an image of effectiveness and success. Such videos in turn are used to mobilize and recruit members and sympathizers. Videos also serve as authentication and archive, as they preserve live footage of actual damage and they validate terrorist performance acts.[32] In 2018, researchers from the Data & Society thinktank identified the YouTube recommendation system as promoting a range of political positions from mainstream libertarianism and conservatism to overt white nationalism.[33][34]

Other areas of the social media scape: video games

Video games can be placed in a similar category as social media because they increasingly have their own forums, chatrooms and microblogging tools. Video games, widely used by young people, are under-researched in relation to extremism and violent radicalization. There is mostly anecdotal evidence that ISIS supporters have proposed the modification of some games to spread propaganda (e.g. Grand Theft Auto V), mods that allow players to act as terrorists attacking Westerners (Arma 3), and provide for hijacking of images and titles to allude to a notion of jihad (e.g. Call of Duty).[2]

Selepack[35] used qualitative textual analysis of hate-based video games found on right-wing religious supremacist groups’ websites to explore the extent to which they advocate violence. The results show that most hate groups were portrayed positively, and that video games promoted extreme violence towards people represented as Black or Jewish people. The games were often modified versions of classic video games in which the original enemies were replaced with religious, racial and/or ethnic minorities. Their main purpose is to indoctrinate players with white supremacist ideology and allow those who already hold racist ideologies to practice aggressive scripts toward minorities online, which may later be acted upon offline.[35] Some experimental social psychologists show that cumulative violent video games can increase hostile expectations and aggressive behavior.[36]

Uses of Internet and social media by extremist groups

The Internet and social media have numerous advantages for extremist groups using religion as part of a radicalization strategy. The advantages stem from the very nature of Internet and social media channels and the way they are used by extremist groups. These include communication channels that are not bound to national jurisdictions and are informal, large, cheap, decentralized, and anonymous.[37][38] This allows terrorists to network across borders and to bypass time and space.[39] Specifically, these channels provide networks of recruiters, working horizontally in all the countries they target due to the transborder nature of the Internet.[2]

Weinmann describes extremist groups’ use of Internet and social media in eight process strategies: "psychological warfare, publicity and propaganda, data mining, fundraising, recruitment and mobilization, networking, information sharing and planning and coordination".[40][41] Conway identifies five-core terrorist uses of the Internet and social media: "information provision, financing, networking, recruitment and information gathering".[41] The ones most relevant to social media and radicalization of young people are information provision, such as profiles of leaders, manifestos, publicity and propaganda, and recruitment.[42] Some studies show that social media enables people to isolate themselves in an ideological niche by seeking and consuming only information consistent with their views (confirmation bias),[43][44] as well as simultaneously self-identifying with geographically distant international groups, which creates a sense of community that transcends geographic borders. This ability to communicate can promote membership and identity quests faster and in more efficient ways than in the "real" social world.[2]

While recruitment is not an instantaneous process, it is seen in the literature as a phase of radicalization, taking the process to a new level of identification and possible action. Indoctrination is easier post-recruitment and often occurs in specific virtual spaces where the extremist rhetoric is characterized by a clear distinction between "them" (described negatively) and "us" (described positively), and where violent actions are legitimized according to the principle of "no other option available".[45][46] These advantages of the Internet and social media open up prospects for extremist groups, by facilitating what used to be referred previously as block recruitment[47] and by substituting group decision to individual decision-making.[48][2]

Political radicalization

Reception and influence on youth

Bouzar, Caupenne and Sulayman (2014) present the results of interviews with 160 French families with radicalized (though not violent) children aged mainly between 15 and 21. The vast majority of the youth interviewed claimed to have been radicalized through the Internet. This held true regardless of their family characteristics and dynamics. The vast majority of the families (80%) did not follow any specific religious beliefs or practices and only 16% belonged to the working class.[49]

Wojcieszak[50] analysed cross-sectional and textual data obtained from respondents in neo-Nazi online discussion forums. The author found that "extremism increases with increased online participation, probably as a result of the informational and normative influences within the online groups". In addition, exposure to different parties/views offline that are dissimilar to the extremist group's values has in some instances reinforced radical beliefs online.[50]

Many authors hypothesize potential causation by associating online radicalization with external factors such as: search for identity and meaning, the growing inequalities in European and other societies, unemployment and fewer opportunities for development especially for minority youth, exclusion, discrimination and inequality that are massively used in extremist discourses.[51][52][53][2]

Social media and violent radicalization

In the Arab World

The analysis of the profiles of researchers and publications on violent radicalization from the Arab world reveals the prominence of specialists on Islamist movements. They are, most often, humanities and social science researchers and some are specialists in media and public opinion, international relations, or even security. Another specificity of research on violent radicalization in the Arabic-speaking region is the involvement of religious researchers in this field. The main objective of this contribution is part of a state strategy to counter faith advocated by violent radical groups. In this logic, radicalization or jihadism are replaced by the term terrorist in referral to these groups. In other regions, experts use terms such as jihadist Salafism or jihadism or violent radicalization. There is a clear tendency among most Arabic-speaking researchers to avoid the use of the word Islam and its semantic field to denote violent radical groups. This is also why researchers from the region prefer to use the Arabic acronym Daesh or the State Organization instead of the ‘Islamic State.’ Most research published from the Arab world does not focus on the relation between violent radicalization and Internet or social media, nor does it evaluate the effect of prevention or intervention cyberinitiatives.[2]

Arab youth are major consumers of social media networks and especially Facebook, which is one of the top ten most used sites by Arab Internet users, a tendency that quickly found its translation into the Arab political realm.[54] According to a study by Mohamed Ibn Rachid Faculty for governance in the United Arab Emirates, the number of Facebook users in 22 Arab countries increased from 54.5 million in 2013 to 81.3 million in 2014 with a majority being young people.[2] The study of literature in the region reveals the role played by social networks, especially Facebook and Twitter, as platforms for collective expression for Arab youth on current issues, conflicts and wars (e.g., Gaza situation in particular).[55] In Iraq, for example, young Internet users and bloggers launched several campaigns on Facebook and Twitter at the beginning of military operations to free the major cities occupied by ISIS (Fallujah and Mosul). In Morocco, other initiatives with the same objective were launched such as the one by Hamzah al-Zabadi on Facebook ( مغاربة_ضد_داعش#; Moroccans against Daesh), which consisted of sharing all kinds of content (images, texts, etc.) to contradict and challenge ISIS's narratives. The involvement of civil society actors on the web in the fight against terrorism and violent radicalization in the Arab region remains modest for many reasons including the lack of media policies dedicated to this struggle.[2]

In Asia

Researchers in Asia have developed a complex understanding of radicalization as being deeply connected to psychosocial and economic grievances such as poverty and unemployment,[56][57] marginalization through illiteracy and lack of education,[57] admiration for charismatic leaders, pursuit of social acceptability, and psychological trauma. These factors are considered by authors to facilitate online radicalization-oriented recruitment, especially among young people, who are more vulnerable and spend more time online.[2]

A 2016 report by "We Are Social" revealed that East Asia, Southeast Asia, and North America were the first, second, and third largest social media markets worldwide respectively. According to the same report, Facebook and Facebook Messenger are the predominant social and communications tools, followed by Twitter, Line and Skype. China is the notable exception as Facebook Messenger is outpaced by far by Chinese social media tools. China presents a very different profile from most countries in its mainstream social media and networks. American platforms such as Google, Yahoo!, Facebook, Twitter and YouTube have very little market penetration due to state restrictions and the strong monopoly of homegrown search engines and Internet platforms in Chinese language.[2]

There is rising interest among Chinese researchers in examining the relationship between social media and violent radicalization.[58] Research into violent radicalization and terrorism in China is mainly focused on radicalization in Xinjiang. This could be linked to the fact that most of the recent terrorist attacks in China were not perpetrated by local residents, but by outsider violent extremist organizations that seek to separate the Xinjiang area from China.[59][60][61] Terrorist organizations spread their messages via TV, radio and the Internet.[62] Though there is no empirical evidence linking youth radicalization to online social media, the anonymity and transborder capacity of such media is seen as a "support for organized terrorist propaganda".[63][64][65] The Chinese government has been responding to terrorist attacks by taking down sites, blocking and filtering content. In return, Chinese government also uses the social media for messaging against terrorism.[66]

Indonesia has an estimated 76 million Indonesians who connect regularly on Facebook, establishing the nation as the fourth largest user of the world, after India, the United States and Brazil. Indonesia is also the fifth largest user of Twitter, after the United States, Brazil, Japan and the United Kingdom. The Institute for Policy Analysis of Conflict (IPAC) examines how Indonesian extremists use Facebook, Twitter and various mobile phone applications such as WhatsApp and Telegram. Social media use by extremists in Indonesia is increasing. They use social media, such as Facebook and Twitter, to communicate with young people, to train and to fundraise online. Recruitment is done through online games, propaganda videos on YouTube and calls to purchase weapons. The proliferation of ISIS propaganda via individual Twitter accounts has raised concerns about the possibility of "lone actor" attacks. That being said, the report points out that such attacks are extremely rare in Indonesia.[2]

In Africa

There is little contemporary research on online radicalization in Sub-Saharan Africa. However, at its heart, Africa carries a powerful extremist group: "Boko Haram", whose real name is Jama’atu Ahlu-Sunna wal Jihad Adda’wa Li («Group of the People of Sunnah for Preaching and Jihad») since 2002 and has pledged allegiance to the Daesh. The network is less resourceful and financed compared to Daesh, but it seems to have entered in a new era of communication by the use of social media networks, more so since its allegiance to Daesh.[67] To spread their principles this terrorist group uses the Internet and adapts Daesh communication strategies to the sub-Saharan African context to spread its propaganda (also in French and English) with more sophisticated videos. By its presence on the most used digital networks (Twitter, Instagram),[68] Boko Haram breaks with traditional forms of communication in the region such as propaganda videos sent to agencies on flash drives or CD-ROM.[69] Video content analyses has also shown a major shift from long monologues from the leader Abubakar Shekau, that had poor editing and translation, to messages and videos that have increased its attractiveness among sub-Saharan youth. Today, Boko-Haram owns a real communications agency called «al-Urwa Wuqta» (literally «the most trustworthy», «the most reliable way»). Moreover, the group multiplies its activities on Twitter especially via their smartphones, as well as through YouTube news channels. Most tweets and comments of the group's supporters denounce the Nigerian government and call for support for Boko Haram movement. The tweets are written in Arabic at first and then translated and passed on into English and French, which reflect the group's desire to place itself in the context of what it sees as global jihad. In a recent study conducted in 2015, researchers have shown how Boko Haram-related tweets include rejection of the movement by non-members of the organisation.[70][2]

In Kenya, and by extension the Horn of Africa, online radicalization and recruitment processes are dependent on narrative formations and dissemination. However, other than one documented case of purely online radicalization and recruitment,[71] evidence shows that the process is cyclic involving both an online-offline-online, process that advances depending on the level of socialization and resonance factors shared with the vulnerable populations. A recent study from Scofield Associates shows that narrative formation depends on three major attributes; having a believable story, actionable plans for those who encounter it, and the need for a religious cover. The third characteristic provides support to the persuasion process and adds to the global whole. The persuasion process plays out very well with an Online platform or audience.[13]

Online prevention initiatives

Alternative narratives

Van Eerten, Doosje, Konijn, De Graaf, and De Goede suggest that counter or alternative narratives could be a promising prevention strategy.[72] Some researchers argue that a strong alternative narrative to violent jihadist groups is to convey the message that they mostly harm Muslims.[73][74][75][76] During the last decade, the United States government has set up two online programs against radicalization designed to counter anti-American propaganda and misinformation from al-Qaeda or the Islamic state. These programs seek to win the "war of ideas" by countering self-styled jihadist rhetoric.[2]

Private sector counter-initiatives involve the YouTube Creators for Change with young "ambassadors" mandated to "drive greater awareness and foster productive dialogue around social issues through content creation and speaking engagements";[77] the "redirectmethod.org" pilot initiative to use search queries in order to direct vulnerable young people to online videos of citizen testimonies, on-the-ground reports, and religious debates that debunk narratives used for violent recruitment. The initiative avoids "government-produced content and newly or custom created material, using only existing and compelling YouTube content".[78]

Several governments are opting to invest in primary prevention through education of the public at large, and of young public in particular, via various "inoculatory" tactics that can be grouped under the broad label of Media and Information Literacy (MIL). Based on knowledge about the use of MIL in other domains, this initiative can be seen, interalia, as a long term comprehensive preventive strategy for reducing the appeal of violent radicalization.[79][80][2]

Media and information literacy

MIL has a long tradition of dealing with harmful content and violent representations, including propaganda.[81] In its early history, MIL was mostly put in place to fight misinformation (particularly in advertising) by developing critical skills about the media. By the 1980s, MIL also introduced cultural and creative skills to use the media in an empowering way, with active pedagogies.[82][83] Since the year 2000, MIL has enlarged the media definition to incorporate the Internet and social media, adding issues related to ethical uses of online media to the traditional debates over harmful content and harmful behavior and aligning them more with the perspectives that consider issues of gratifications of media users.[2]

Media and Social Media Politics and Law Academia and Think Tanks
News and entertainment media give disproportionate attention to social media as an explanation of violent radicalization, to the detriment of other explanations (religious strife, alienation, geopolitics of terror, racism and segregation, youth unemployment etc.). States and social media platforms operate a series of counter-measures ranging from censorship to counter-narratives and education strategies. Lack of capacity for researchers to engage with theory and empirical research
An alarmist representation of violent radicalization can lead to politics of fear and of fear-mongering by various interested parties, and create a chilling effect on dissent and critical expression. There are questions about strategies like blocking of access and filtering content, because there is no clear evidence about the effectiveness of these steps. The impact of online surveillance on radicalization is complicated to research, and is barely covered in the literature. Lack of interdisciplinary collaboration
The spread of stereotypes transforms the "other" into a potential enemy and can affect the way minorities are viewed and view themselves.[2] There seems to be a developing trend for online counter-speech that challenges extremist representations and hate speech. There is less evidence of alternative narratives that acknowledge feelings of powerlessness and alienation, and which propose non-violent ways to address perceived or real grievances. It is also rare to find references to the value of preserving the independence of civil society and media in regard to multi-stakeholder engagement in countering violent narratives. Lack of research on the impact of censorship, surveillance, counter-speech and Media and Information Literacy
Education-centered solutions show few initiatives that have been documented and assessed for their efficacy. Many Media and Information Literacy (MIL) resources designed to be used by teachers in a classroom setting are focused on critical thinking, on debunking plot theory, "fake news" and rumors, and on extolling fact-checking. Their impact in terms of reducing risks of online violent radicalization is still not clear.[2]

International human rights standards

Key international human rights standards to serve as a benchmark for approaching violent extremism
The International Covenant of Civil and Political Rights (ICCPR) Foregrounds the protection of freedom of expression in Article 19. The Covenant also recognizes that certain exceptional speech falls outside of free expression. Article 20 calls for prohibitions on "propaganda for war", and on "any advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence". In Article 19 of the ICCPR, certain expression may be limited by law—if necessary—for the purpose of protection of personal reputation, national security, public order, public health or public morals. All these provisions have a bearing on expression in relation to violent radicalization. General Comment No. 34 of the UN Human Rights Committee emphasizes that Article 20, on compulsory restrictions, has to be interpreted in the context of Article 19. Overall, it underlines that the norm is freedom, and that any restrictions should be exceptional and subject to necessity and proportionality.
The Rabat Plan of Action on the prohibition of advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence[84] The Rabat Plan was developed in 2012 by the UN's Office of the High Commissioner for Human Rights. It cautions us against illegitimate restrictions of speech based on purported implementation of ICCPR standards. The Rabat Plan proposes a nuanced approach to assessing expressions of hatred in terms of whether they really incite harm. This approach suggests that restriction should only be considered in terms of an assessment of (a) context of effect (the intent and likelihood), (b) the status of the speaker, (c) the specific content, (d) the reach of the expression, and (e) the actual imminent likelihood of resulting harm. This calls on us to use our heads, not our hearts, in reacting to the relationship of expression to the issue of violent radicalization.
The United Nations principles There is recognition by regional and UN rapporteurs that speech can be "offensive, shocking and disturbing", without necessarily constituting a threat to national security, or hatred that incites harms, or propaganda for war.

In October 2015, UNESCO's Executive Board adopted a decision on UNESCO's role in promoting education as a tool to prevent violent extremism.[85]

References

  1. ^ Wilner & Dubouloz (2010). "Homegrown terrorism and transformative learning: an interdisciplinary approach to understanding radicalization". Global Change, Peace and Security. 22 (1): 33–51. doi:10.1080/14781150903487956. S2CID 55876637.
  2. ^ a b c d e f g h i j k l m n o p q r s t u v w x y z Alava, Frau-Meigs & Hassan 2017, p. [page needed].
  3. ^ "Social-Media Sites Face Pressure to Monitor Terrorist Content". Wall Street Journal.
  4. ^ "UNESCO releases new research on youth and violent extremism on social media". UNESCO. 30 November 2017.
  5. ^ Khosrokhavar, Farhad (2014). Radicalisation [Radicalization] (in French). Fondation Maison des Sciences de l'Homme. OCLC 1026971404.[page needed]
  6. ^ Alava, Frau-Meigs & Hassan 2017, p. 12.
  7. ^ "What is a Social Media Echo Chamber? | Stan Richards School of Advertising". advertising.utexas.edu. November 18, 2020. Retrieved 2022-11-02.
  8. ^ "The Websites Sustaining Britain's Far-Right Influencers". bellingcat. 2021-02-24. Retrieved 2021-03-10.
  9. ^ Camargo, Chico Q. (January 21, 2020). "YouTube's algorithms might radicalise people – but the real problem is we've no idea how they work". The Conversation. Retrieved 2021-03-10.
  10. ^ E&T editorial staff (2020-05-27). "Facebook did not act on own evidence of algorithm-driven extremism". eandt.theiet.org. Retrieved 2021-03-10.
  11. ^ "How Can Social Media Firms Tackle Hate Speech?". Knowledge at Wharton. Retrieved 2022-11-22.
  12. ^ "Internet Association - We Are The Voice Of The Internet Economy. | Internet Association". 2021-12-17. Archived from the original on 2021-12-17. Retrieved 2022-11-22.
  13. ^ a b Muliru, Scofield; Wario, Halkano; Azmiya, Fathima; Odote, Peterlinus (12 April 2022). "Vulnerable Offline/Online: Narrative Formation and Contextualization for Violent Extremism and Terrorism". Scofield Associates. Retrieved 22 November 2022.
  14. ^ a b c d e f g Hussain, Ghaffar; Saltman, Erin Marie (2014). Jihad Trending: A Comprehensive Analysis of Online Extremism and how to Counter it (PDF). Quilliam. ISBN 978-1-906603-99-1. Archived from the original (PDF) on 22 July 2014.[page needed]
  15. ^ a b Mahmood, Shah (2012). "Online social networks: The overt and covert communication channels for terrorists and beyond". 2012 IEEE Conference on Technologies for Homeland Security (HST). pp. 574–579. doi:10.1109/THS.2012.6459912. ISBN 978-1-4673-2708-4. S2CID 14587021.
  16. ^ Sageman, Marc (2004). Understanding Terror Networks. University of Pennsylvania Press. ISBN 978-0-8122-3808-2.[page needed]
  17. ^ Sageman, Marc (2008). "A Strategy for Fighting International Islamist Terrorists". The Annals of the American Academy of Political and Social Science. 618: 223–231. doi:10.1177/0002716208317051. JSTOR 40375787. S2CID 145482523.
  18. ^ Manavis, Sarah (15 March 2018). "The Christchurch shooting shows how a far-right web culture is driving radicalisation". New Statesman. Retrieved 26 March 2019.
  19. ^ Todd, Andrew; Morton, Frances (21 March 2019). "NZ Authorities Have Been Ignoring Online Right-Wing Radicalisation For Years". Vice. Retrieved 26 March 2019.
  20. ^ Ward, Justin (April 19, 2018). "Day of the trope: White nationalist memes thrive on Reddit's r/The_Donald". Hatewatch. Southern Poverty Law Center. Retrieved 24 March 2019.
  21. ^ Wilms, Tim (22 March 2019). "Future Now Facebook pages deleted". unshackled.net. Retrieved 22 March 2019.
  22. ^ Cox, Joseph; Koebler, Jason (27 March 2019). "Facebook Bans White Nationalism and White Separatism". Motherboard. Retrieved 27 March 2019.
  23. ^ Crettiez, Xavier (2011). "" High risk activism " : essai sur le processus de radicalisation violente (première partie)" ['High risk activism': essay on the process of violent radicalization (first part)]. Pôle Sud (in French). 34 (1): 45–60. doi:10.3917/psud.034.0045.
  24. ^ Menkhaus, Ken (2014). "Al-Shabaab and Social Media: A Double-Edged Sword". The Brown Journal of World Affairs. 20 (2): 309–327. JSTOR 24590990.
  25. ^ a b Salem, Arab; Reid, Edna; Chen, Hsinchun (24 June 2008). "Multimedia Content Coding and Analysis: Unraveling the Content of Jihadi Extremist Groups' Videos". Studies in Conflict & Terrorism. 31 (7): 605–626. doi:10.1080/10576100802144072. S2CID 53631656.
  26. ^ Yamaguchi, T. (1 October 2013). "Xenophobia in Action: Ultranationalism, Hate Speech, and the Internet in Japan". Radical History Review. 2013 (117): 98–118. doi:10.1215/01636545-2210617.
  27. ^ Ganor, Boaz; Knop, Katharina von; Duarte, Carlos A. M. (2007). Hypermedia Seduction for Terrorist Recruiting. IOS Press. ISBN 978-1-58603-761-1.[page needed]
  28. ^ Fighel, Jonathan (2007). "Radical Islamic internet propaganda: Concepts, idioms and visual motifs". In Ganor, Boaz; Knop, Katharina von; Duarte, Carlos A. M. (eds.). Hypermedia Seduction for Terrorist Recruiting. IOS Press. pp. 34–38. ISBN 978-1-58603-761-1.
  29. ^ Pantucci, Raffaello (2011). A typology of lone wolves: preliminary analysis of lone Islamist terrorists (PDF). International Centre for the Study of Radicalisation and Political Violence. OCLC 712783565.
  30. ^ Vergani, Matteo (3 April 2014). "Rethinking grassroots campaigners in the digital media: The 'grassroots orchestra' in Italy". Australian Journal of Political Science. 49 (2): 237–251. doi:10.1080/10361146.2014.898129. S2CID 153527802.
  31. ^ Weimann, Gabriel (2010). "Terror on Facebook, Twitter, and Youtube". The Brown Journal of World Affairs. 16 (2): 45–54. JSTOR 24590908.
  32. ^ Alava, Frau-Meigs & Hassan 2017, p. 16.
  33. ^ Lewis, Rebecca (September 2018). "Alternative Influence: Broadcasting the Reactionary Right on YouTube" (PDF). datasociety.net. Data and Society. Retrieved 26 March 2019.
  34. ^ Ingram, Matthew (September 19, 2018). "YouTube's secret life as an engine for right-wing radicalization". Columbia Journalism Review. Retrieved 26 March 2019.
  35. ^ a b Selepak, Andrew (2010). "Skinhead Super Mario Brothers: An Examination of Racist and Violent Games on White Supremacist Web Sites". Journal of Criminal Justice and Popular Culture. 17 (1): 1–47. CiteSeerX 10.1.1.454.4951.
  36. ^ Hasan, Youssef; Bègue, Laurent; Scharkow, Michael; Bushman, Brad J. (March 2013). "The more you play, the more aggressive you become: A long-term experimental study of cumulative violent video game effects on hostile expectations and aggressive behavior". Journal of Experimental Social Psychology. 49 (2): 224–227. doi:10.1016/j.jesp.2012.10.016.
  37. ^ Chris Hale, W. (December 2012). "Extremism on the World Wide Web: a research review". Criminal Justice Studies. 25 (4): 343–356. doi:10.1080/1478601X.2012.704723. S2CID 218545798.
  38. ^ Neumann, Peter R. (June 2013). "Options and Strategies for Countering Online Radicalization in the United States". Studies in Conflict & Terrorism. 36 (6): 431–459. doi:10.1080/1057610X.2013.784568. S2CID 110830723.
  39. ^ Weimann, Gabriel (2015). "Terrorist Migration to Social Media". Georgetown Journal of International Affairs. 16 (1): 180–187. JSTOR 43773679.
  40. ^ Weimann, Gabriel (March 2004). Www.terror.net: how modern terrorism uses the Internet (PDF). U.S. Institute of Peace. OCLC 54699291.
  41. ^ a b Conway, Maura (2005). "Terrorist Web Sites". Media and Conflict in the Twenty-First Century. pp. 185–215. doi:10.1057/9781403980335_9. ISBN 978-1-349-53059-5.
  42. ^ Conway, Maura (2006). Reality bytes : cyberterrorism and terrorist use of the Internet (Thesis). hdl:2262/86269. ProQuest 301660701.
  43. ^ Mohamed, Feisal G. (2007). "The Globe of Villages: Digital Media and the Rise of Homegrown Terrorism". Dissent. 54 (1): 61–64. doi:10.1353/dss.2007.0033. S2CID 143279574.
  44. ^ Warner, Benjamin R. (17 August 2010). "Segmenting the Electorate: The Effects of Exposure to Political Extremism Online". Communication Studies. 61 (4): 430–444. doi:10.1080/10510974.2010.497069. S2CID 145273650.
  45. ^ Meddaugh, Priscilla Marie; Kay, Jack (30 October 2009). "Hate Speech or 'Reasonable Racism?' The Other in Stormfront". Journal of Mass Media Ethics. 24 (4): 251–268. doi:10.1080/08900520903320936. S2CID 144527647.
  46. ^ Vergani, Matteo (3 July 2014). "Neo- Jihadist Prosumers and Al Qaeda Single Narrative: The Case Study of Giuliano Delnevo". Studies in Conflict & Terrorism. 37 (7): 604–617. doi:10.1080/1057610X.2014.913122. S2CID 144615965.
  47. ^ Oberschall, Anthony (1973). Social Conflict and Social Movements. Prentice-Hall. ISBN 978-0-13-815761-6.[page needed]
  48. ^ Busher, 2015[full citation needed]
  49. ^ Bouzar, Caupenne & Sulayman, 2014. ‘La Métamorphose de la jeune opérée par les nouveaux discours terroristes’. Rennes : Centre de Prévention contre les dérives sectaires liées à l’islam. Retrieved from http://www.bouzar-expertises.fr/metamorphose Archived 2018-10-08 at the Wayback Machine
  50. ^ a b Wojcieszak, Magdalena (June 2010). "'Don't talk to me': effects of ideologically homogeneous online groups and politically dissimilar offline ties on extremism". New Media & Society. 12 (4): 637–655. doi:10.1177/1461444809342775. S2CID 28424552.
  51. ^ e.g., ATHENA report, 2015[full citation needed]
  52. ^ Pauwels, Lieven; Brion, Fabienne; De Ruyver, Brice (2014). "Comprendre et expliquer le rôle des nouveaux médias sociaux dans la formation de l'extrémisme violent. Une recherche qualitative et quantitative" [Understand and explain the role of new social media in the formation of violent extremism. Qualitative and quantitative research] (in French).
  53. ^ "Understanding the complex causes and processes of radicalisation" (PDF). Office of the National Security Adviser. 2015.
  54. ^ Gonzalez-Quijano, Yves (May 2012). "Internet en Égypte: une redéfinition du champ politique?" [Internet in Egypt: a redefinition of the political field?]. Chroniques Egyptiennes/Egyptian Chronicles (in French): 99–116.
  55. ^ Mourtada, Racha; Salem, Fadi; Alshaer, Sarah (June 2014). Citizen Engagement and Public Services in the Arab World: The Potential of Social Media. Arab Social Media Report (6th ed.). doi:10.2139/ssrn.2578993. S2CID 155418472. SSRN 2578993.
  56. ^ Khalid, Iram; Leghari, Mina Ehsan (2014). "Radicalization of Youth in Southern Punjab" (PDF). South Asian Studies. 29 (2): 537–551.
  57. ^ a b Tadjbakhsh, Shahrbanou; Iskandarov, Kosimsho; Mohammadi, Abdul Ahad (October 2015). "Strangers Across the Amu River: Community Perceptions Along the Tajik–Afghan Borders". Stockholm International Peace Research Institute.
  58. ^ Tang, Lijun (December 2013). "The politics of flies: mocking news in Chinese cyberspace". Chinese Journal of Communication. 6 (4): 482–496. doi:10.1080/17544750.2013.844190. S2CID 144913665.
  59. ^ Feng, Hua (2009). 近年新疆周边伊斯兰极端主义与新疆稳定问题研究 [A study on the contemporary Islamic extremism of the Xinjiang Neighboring Countries and Xinjiang's stability] (Thesis) (in Chinese).
  60. ^ Li, Wei; Zhao, Yu (2015). "新疆地区宗教极端主义与民族分裂主义的来源与发展" [The Source and Development of Religious Extremism and National Separatism in Xinjiang]. Journal of Chinese People's Public Security University (in Chinese) (4): 138–144.
  61. ^ Zhang, Chi (2013). "新疆极端势力内控报告:近年数次恐袭无当地民众参与" [Report on internal control of extremist forces in Xinjiang: There have been several terrorist attacks in recent years without the participation of local people]. news.ifeng.com (in Chinese). Archived from the original on 14 June 2013.
  62. ^ Wo, Xiaojing (17 March 2016). "从源头切断恐怖主义的网络传播-中国社会科学网" [Cut off the network spread of terrorism from the source]. cssn.cn (in Chinese).
  63. ^ Du, 2016;[full citation needed]
  64. ^ Long, 2016;[full citation needed]
  65. ^ Sun, 2014[full citation needed]
  66. ^ Liu, 2016[full citation needed]
  67. ^ Al-Amir Ould Sidi, A. (March 2015). "Bokoharam et la juxtaposition des contextes" [Bokoharam and the juxtaposition of contexts] (Document) (in French). Doha, AlJazeera Center for Studies.[verification needed]
  68. ^ Ogbondah, Chris Wolumati; Agbese, Pita Ogaba (2018). "Terrorists and Social Media Messages: A Critical Analysis of Boko Haram's Messages and Messaging Techniques". The Palgrave Handbook of Media and Communication Research in Africa. pp. 313–345. doi:10.1007/978-3-319-70443-2_18. ISBN 978-3-319-70442-5. PMC 7121539. S2CID 158309183.
  69. ^ Faure, Guy Olivier (17 March 2015). "Negotiating Hostages with Terrorists: Paradoxes and Dilemmas". International Negotiation. 20 (1): 129–145. doi:10.1163/15718069-12341301.[failed verification]
  70. ^ Varin, Caroline (2016). Boko Haram and the War on Terror. ABC-CLIO. ISBN 978-1-4408-4411-9.[page needed]
  71. ^ Badurdeen, Azmiya, Fathima (2018). "Online Radicalisation and Recruitment: Al-Shabaab Luring Strategies with New Technology" (PDF). Confronting Violent Extremism in Kenya. 15 (1): 93–113. Retrieved 22 November 2022.
  72. ^ van Eerten, Jan-Jaap; Doosje, Bertjan; Konijn, Elly; de Graaf, Beatrice (2019). "Summary, Conclusions, Limitations, and Future Directions". Challenging Extremist Views on Social Media: Developing a Counter-Messaging Response. Routledge. doi:10.4324/9780429287145-7. ISBN 978-1-000-06361-5. S2CID 208456684.
  73. ^ Archetti, Cristina (2012). Understanding Terrorism in the Age of Global Media: A Communication Approach. Palgrave Macmillan. ISBN 978-0-230-36049-5.[page needed]
  74. ^ Cornish, Paul; Lindley-French, Julian; Yorke, Claire (September 2011). Strategic Communications and National Strategy (PDF). Chatham House. ISBN 978-1-86203-255-2.[page needed]
  75. ^ Corman, Steven R. (September 2011). "Understanding the Role of Narratives in Extremist Strategic Communications". In Fenstermacher, Laurie; Leventhal, Todd (eds.). Countering Violent Extremism: Scientific Methods and Strategies. pp. 36–43. OCLC 793599766. DTIC AD1092274.
  76. ^ Stevens, Tim; Neumann, Peter R. (2009). Countering Online Radicalization: A Strategy for Action (PDF). p. 10.
  77. ^ "Creators for Change" – via YouTube.[non-primary source needed]
  78. ^ "The Redirect Method". redirectmethod.org.[non-primary source needed]
  79. ^ Earnhardt, Rebecca (1 January 2014). "Al-Qaeda's Media Strategy: Internet self-radicalization and counter-radicalization policies". Digital America. 4 (3).
  80. ^ Frau-Meigs, Divina (2011). Socialisation des jeunes et éducation aux médias du bon usage des contenus et comportements à risque [Socialization of young people and media education on the proper use of risky content and behavior] (in French). Erès. OCLC 880667820.[page needed]
  81. ^ Gerbner, George (1988). Violence and terror in the mass media.[page needed]
  82. ^ Hobbs, Renee; Jensen, Amy (10 September 2013). "The Past, Present, and Future of Media Literacy Education". Journal of Media Literacy Education. 1 (1).
  83. ^ Potter, W. James (June 2013). "Review of Literature on Media Literacy: Media literacy". Sociology Compass. 7 (6): 417–435. doi:10.1111/soc4.12041.
  84. ^ United Nations General Assembly Session 22nd Agenda item 2. Rabat Plan of Action on the prohibition of advocacy of national, racial or religious hatred that constitutes incitement to discrimination, hostility or violence A/HRC/22/17/Add.4 page 6. 11 January 2013.
  85. ^ Decisions adopted by the Executive Board at its 197th session. UNESCO. 2015.

Sources

 This article incorporates text from a free content work. Licensed under CC BY SA 3.0 IGO (license statement/permission). Text taken from Alava, Frau-Meigs & Hassan 2017

Read other articles:

В Википедии есть статьи о других людях с фамилией Калиджури. Даниэль Калиджури Общая информация Родился 15 января 1988(1988-01-15)[1][2] (35 лет)Филлинген-Швеннинген, Баден-Вюртемберг, ФРГ Гражданство Италия Германия Рост 182 см Позиция защитник, полузащитник Информация о кл�...

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (مارس 2019) جون إي. هندرسون (بالإنجليزية: John E. Henderson)‏    معلومات شخصية الميلاد 4 يناير 1917  الوفاة 3 ديسمبر 1994 (77 سنة)   كامبردج، أوهايو  مواطنة الولايات المتحدة...

حفرة صدغية الاسم العلميfossa temporalis تظهر حفرة العظم الصدغي واضحة في الصورة تفاصيل يتكون من يافوخ الجنيح  جزء من قبو قحفي  معرفات غرايز ص.183 ترمينولوجيا أناتوميكا 02.1.00.022   FMA 75307  UBERON ID 0013463  [عدل في ويكي بيانات ] تعديل مصدري - تعديل   الحفرة الصدغية حفرة العظم ال�...

Sebastião Navarro Deputado de Minas Gerais Período 1995 a 1999 (13ª Legislatura) 1999 a 2003 (14ª Legislatura) 2003 a 2005 (15ª Legislatura) Deputado Federal de Minas Gerais Período (1979 a 1982) e (1983 a 1987) Prefeito de Poços de Caldas Período 1.º - 1 de janeiro de 1989até 1 de janeiro de 19932.º - 1º de janeiro de 2005até 1 de janeiro de 2009 Dados pessoais Nascimento 30 de setembro de 1937 Botelhos, MG Morte 23 de setembro de 2017 (79 anos) Campinas, SP Nacionalid...

جزء من سلسلة مقالاتالركود العظيم الأبعاد الرئيسية الخط الزمني لأزمة الرهن العقاري [الإنجليزية] أزمة الوقود خلال العقد 2000 فقاعة الإسكان في الولايات المتحدة تصحيح سوق الإسكان في الولايات المتحدة الأزمة المالية 2007-2008 الركود العظيم أزمة صناعة السيارات الأمريكية لجنة التحقيق

Левада-Центр (Аналитический центр Юрия Левады) Автономна некомерційна організація Аналітичний Центр Юрія Левади (АНО Левада-Центр) 250 pxГасло От мнений — к пониманию (рос. Від думок до розуміння)На честь Левада Юрій ОлександровичТип науково-дослідний інститутгромадська �...

Style of polyphonic folk singing characteristic of Sardinia, particularly the region of Barbagia See also: Music of SardiniaThis article includes a list of general references, but it lacks sufficient corresponding inline citations. Please help to improve this article by introducing more precise citations. (November 2021) (Learn how and when to remove this template message)Canto a tenore, Sardinian pastoral songsUNESCO Intangible Cultural HeritageCanto a tenore in Oliena, SardiniaCountryItalyD...

سلطان المغرب محمد المتوكل سلطان المغرب الفترة 1574 - 1576 عبد الله الغالب عبد الملك الأول معلومات شخصية الاسم الكامل أبو عبد الله محمد السعدي تاريخ الميلاد القرن 16  الوفاة 1578قرب القصر الكبير مواطنة المغرب  الديانة الإسلام الأولاد مولاي الشيخ  الأب عبد الله الغالب عائلة...

All-Russian Scientific Research Institute for Physical-Engineering and Radiotechnical Metrology– VNIIFTRI –Agency overviewFormed1955HeadquartersMendeleyevo, Moscow Oblast, RussiaEmployees1500[1]Agency executiveSergey I. Donchenko, General DirectorWebsitevniiftri.ru All-Russian Scientific Research Institute for Physical-Engineering and Radiotechnical Metrology (VNIIFTRI; Russian: Всероссийский научно-исследовательский институт физико-

Dans MountainDans MountainHighest pointElevation2,895 ft (882 m) NGVD 29[1]Coordinates39°34′54″N 78°53′50″W / 39.5817558°N 78.8972453°W / 39.5817558; -78.8972453[2]GeographyLocationAllegany County, MarylandParent rangeAllegheny MountainsTopo mapUSGS LonaconingClimbingEasiest routeDrive up Dans Mountain is located in Allegany County, Maryland, USA between Georges Creek and the North Branch Potomac River. The highest p...

This article is about the Australian-Colombian short film. For the song by Edurne, see Amanecer (song). 2009 Australian filmAmanecerPromotional poster for AmanecerDirected byAlvaro D. RuizWritten byAlvaro D. RuizProduced by Ulysses Oliver Luci Temple Starring Jessica Chapnik Matias Stevens CinematographyRoss GiardinaEdited by Alejandro Reyes Anzola (as Alex Reyes) (rough cut) Alvaro D. Ruiz Music byPatrick NellesteinProductioncompaniesPuracé Pictures, Marshmallow ProductionsRelease date 28&#...

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (أبريل 2019) إستر كوبر جاكسون (بالإنجليزية: Esther Cooper Jackson)‏  معلومات شخصية اسم الولادة (بالإنجليزية: Esther Victoria Cooper)‏  الميلاد 21 أغسطس 1917  مقاطعة أرلنغتون، فيرجينيا...

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (مارس 2023) زاهر الشمراني معلومات شخصية الاسم الكامل زاهر موسى الشمراني تاريخ الميلاد 1 يناير 1995 (العمر 28 سنة) الطول 1.73 مركز اللعب لاعب وسط الجنسية السعودية معلومات الناد�...

Ancient castle town in Fukuoka prefecture, Japan Not to be confused with Kokora. Kokura Castle in central Kokura Kokura station Isetan department store, Kokura Emblem of Kokura Kokura (小倉市, Kokura-shi) is an ancient castle town and the center of Kitakyushu, Japan, guarding the Straits of Shimonoseki between Honshu and Kyushu with its suburb Moji. Kokura is also the name of the penultimate station on the southbound San'yō Shinkansen line, which is owned by JR West. Ferries connect Kokur...

This article is about the French Monoprix retail chain. For the Tunisian chain, see Monoprix (Tunisia). MonoprixTypeSociété par actions simplifiéeIndustryRetailFounded1932 (1932) in Rouen, FranceFounderMax HeilbronnHeadquartersClichy, Hauts-de-Seine, FranceNumber of locations700+Area servedFranceKey peopleJean-Charles Naouri (CEO)BrandsMonop'Monop' DailyMonop' BeautyMonop' StationNaturaliaParentGroupe CasinoWebsitemonoprix.fr (in French) A Monoprix location, which is the former head o...

Front page of The Family Herald, No. 427, 12 July 1851 The Family Herald: A Domestic Magazine of Useful Information & Amusement (1843–1940) was a weekly story paper launched by George Biggs in 1842, and re-established in May 1843 with James Elishama Smith and mechanised printing. By 1855 it had a circulation of 300,000.[1] Initially a penny weekly, the Family Herald later sold at 2d. Contributors included James George Stuart Burges Bohn, Charlotte Mary Brame (1836–84), Bertha ...

Japanese footballer and manager Ken Naganuma長沼 健 Left (with Dettmar Cramer)Personal informationFull name Ken NaganumaDate of birth (1930-09-05)September 5, 1930Place of birth Hiroshima, Hiroshima, Empire of JapanDate of death June 2, 2008(2008-06-02) (aged 77)Place of death JapanPosition(s) ForwardYouth career1946–1948 Hiroshima Normal School1949–1952 Kwansei Gakuin University1953–1954 Chuo UniversitySenior career*Years Team Apps (Gls)1955–1967 Furukawa Electric 19 (8)Total...

Loa of Haitian Vodou, Louisiana Voodoo and folk beliefs For other uses, see Baron Samedi (disambiguation). This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article may need to be rewritten to comply with Wikipedia's quality standards. You can help. The talk page may contain suggestions. (April 2018) This article needs additional citations for verification. Please help improve this art...

Rangka atap logam ringan Atap adalah penutup atas suatu bangunan yang melindungi bagian dalam bangunan dari hujan maupun salju. Bentuk atap ada yang datar dan ada yang miring, walaupun datar harus dipikirkan untuk mengalirkan air agar bisa jatuh. Bahan untuk atap bermacam-macam, di antaranya: genting (keramik, beton), seng bergelombang, asbes, maupun semen cor. Adapula atap genteng metal yang sangat ringan, tahan lama, anti karat dan tahan gempa[butuh rujukan]. Beberapa jenis tumbuhan...

Pulau Gulf Selatan (British Columbia) di Selat Georgia Sejak 2007, sekumpulan kaki manusia yang ditemukan di sekitar perairan laut Salish di British Columbia (Kanada) dan Washington (Amerika Serikat). Kaki-kaki ini berasal dari 5 laki-laki, 1 perempuan dan 2 lainnya belum diketahui jenis kelaminnya. 2 diantaranya merupakan pasangannya dan berasal dari 1 orang. Penemuan Hingga 26 Januari 2012, sepuluh atau sebelas kaki ditemukan di Kanada dan tiga kaki ditemukan di Negara Bagian AS Washington....