Maura Conway
Dublin City University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Maura Conway.
european conference on intelligence and security informatics | 2008
Maura Conway; Lisa McInerney
Large amounts of jihadi video content on YouTube along with the vast array of relational data that can be gathered opens up innovative avenues for exploration of the support base for political violence. This exploratory study analyses the online supporters of jihad-promoting video content on YouTube, focusing on those posting and commenting upon martyr-promoting material from Iraq. Findings suggest that a majority are under 35 years of age and resident outside the region of the Middle East and North Africa (MENA) with the largest percentage of supporters located in the United States. Evidence to support the potential for online radicalisation is presented. Findings relating to newly formed virtual relationships involving a YouTube user with no apparent prior links to jihadists are discussed.
Studies in Conflict & Terrorism | 2017
Maura Conway
ABSTRACT Some scholars and others are skeptical of a significant role for the Internet in processes of violent radicalization. There is increasing concern on the part of other scholars, and increasingly also policymakers and publics, that easy availability of violent extremist content online may have violent radicalizing effects. This article identifies a number of core questions regarding the interaction of violent extremism and terrorism and the Internet, particularly social media, that have yet to be adequately addressed and supplies a series of six follow-up suggestions, flowing from these questions, for progressing research in this area. These suggestions relate to (1) widening the range of types of violent online extremism being studied beyond violent jihadis; (2) engaging in more comparative research, not just across ideologies, but also groups, countries, languages, and social media platforms; (3) deepening our analyses to include interviewing and virtual ethnographic approaches; (4) up-scaling or improving our capacity to undertake “big data” collection and analysis; (5) outreaching beyond terrorism studies to become acquainted with, for example, the Internet Studies literature and engaging in interdisciplinary research with, for example, computer scientists; and (6) paying more attention to gender as a factor in violent online extremism.
Criminology and public policy | 2017
Paul Gill; Emily Corner; Maura Conway; Amy Thornton; Mia Bloom; John Horgan
Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone-actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme-right-wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviors. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme-right-wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to communicate online with co-ideologues.
Media, War & Conflict | 2012
Lorraine Bowman-Grieve; Maura Conway
This article seeks to contribute to broadening the focus of research in the area of violent online political extremism by examining the use of the internet by dissident Irish Republicans and their supporters. The argument here is not that the internet substitutes face-to-face contacts amongst Irish Republicans, including violent dissidents, nor that it currently plays a central role in processes of radicalisation into violent dissident groups, but that it has an important support function in terms of providing an ‘always-on’ space for discussion, consumption, and production of Irish Republicanism and thus a potentially educative role in terms of introducing ‘newbies’ to violent dissident Republicanism while also acting as a ‘maintenance’ space for the already committed. This exploratory study considers the importance of these functions in the context of repeated suggestions that the dissidents have no significant support base or constituency as internet activity certainly gives the appearance of some such support.
Communications of The ACM | 2011
Maura Conway
Why cyber-based terrorist attacks are unlikely to occur.
advances in social networks analysis and mining | 2014
Derek O'Callaghan; Nico Prucha; Derek Greene; Maura Conway; Joe Carthy; Pádraig Cunningham
The Syria conflict has been described as the most socially mediated in history, with online social media playing a particularly important role. At the same time, the ever-changing landscape of the conflict leads to difficulties in applying analytical approaches taken by other studies of online political activism. Therefore, in this paper, we use an approach that does not require strong prior assumptions or the proposal of an advance hypothesis to analyze Twitter and YouTube activity of a range of protagonists to the conflict, in an attempt to reveal additional insights into the relationships between them. By means of a network representation that combines multiple data views, we uncover communities of accounts falling into four categories that broadly reflect the situation on the ground in Syria. A detailed analysis of selected communities within the anti-regime categories is provided, focusing on their central actors, preferred online platforms, and activity surrounding “real world” events. Our findings indicate that social media activity in Syria is considerably more convoluted than reported in many other studies of online political activism, suggesting that alternative analytical approaches can play an important role in this type of scenario.
web science | 2013
Derek O'Callaghan; Derek Greene; Maura Conway; Joe Carthy; Pádraig Cunningham
Recent years have seen increased interest in the online presence of extreme right groups. Although originally composed of dedicated websites, the online extreme right milieu now spans multiple networks, including popular social media platforms such as Twitter, Facebook and YouTube. Ideally therefore, any contemporary analysis of online extreme right activity requires the consideration of multiple data sources, rather than being restricted to a single platform. We investigate the potential for Twitter to act as one possible gateway to communities within the wider online network of the extreme right, given its facility for the dissemination of content. A strategy for representing heterogeneous network data with a single homogeneous network for the purpose of community detection is presented, where these inherently dynamic communities are tracked over time. We use this strategy to discover and analyze persistent English and German language extreme right communities.
arXiv: Social and Information Networks | 2012
Derek O’Callaghan; Derek Greene; Maura Conway; Joe Carthy; Pádraig Cunningham
Many extreme right groups have had an online presence for some time through the use of dedicated websites. This has been accompanied by increased activity in social media platforms in recent years, enabling the dissemination of extreme right content to a wider audience. In this paper, we present an analysis of the activity of a selection of such groups on Twitter, using network representations based on reciprocal follower and interaction relationships, while also analyzing topics found in their corresponding tweets. International relationships between certain extreme right groups across geopolitical boundaries are initially identified. Furthermore, we also discover stable communities of accounts within local interaction networks, in addition to associated topics, where the underlying extreme right ideology of these communities is often identifiable.
Computer Fraud & Security | 2003
Maura Conway
Abstract The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either.
Social Science Computer Review | 2015
Derek O'Callaghan; Derek Greene; Maura Conway; Joe Carthy; draig Cunningham
In addition to hosting user-generated video content, YouTube provides recommendation services, where sets of related and recommended videos are presented to users, based on factors such as co-visitation count and prior viewing history. This article is specifically concerned with extreme right (ER) video content, portions of which contravene hate laws and are thus illegal in certain countries, which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTube’s recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTube’s related video service. A process is observable whereby users accessing an ER YouTube video are likely to be recommended further ER content, leading to immersion in an ideological bubble in just a few short clicks. The evidence presented in this article supports a shift of the almost exclusive focus on users as content creators and protagonists in extremist cyberspaces to also consider online platform providers as important actors in these same spaces.