Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Maura Conway is active.

Publication


Featured researches published by Maura Conway.


european conference on intelligence and security informatics | 2008

Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study

Maura Conway; Lisa McInerney

Large amounts of jihadi video content on YouTube along with the vast array of relational data that can be gathered opens up innovative avenues for exploration of the support base for political violence. This exploratory study analyses the online supporters of jihad-promoting video content on YouTube, focusing on those posting and commenting upon martyr-promoting material from Iraq. Findings suggest that a majority are under 35 years of age and resident outside the region of the Middle East and North Africa (MENA) with the largest percentage of supporters located in the United States. Evidence to support the potential for online radicalisation is presented. Findings relating to newly formed virtual relationships involving a YouTube user with no apparent prior links to jihadists are discussed.


Studies in Conflict & Terrorism | 2017

Determining the role of the Internet in violent extremism and terrorism: six suggestions for progressing research

Maura Conway

ABSTRACT Some scholars and others are skeptical of a significant role for the Internet in processes of violent radicalization. There is increasing concern on the part of other scholars, and increasingly also policymakers and publics, that easy availability of violent extremist content online may have violent radicalizing effects. This article identifies a number of core questions regarding the interaction of violent extremism and terrorism and the Internet, particularly social media, that have yet to be adequately addressed and supplies a series of six follow-up suggestions, flowing from these questions, for progressing research in this area. These suggestions relate to (1) widening the range of types of violent online extremism being studied beyond violent jihadis; (2) engaging in more comparative research, not just across ideologies, but also groups, countries, languages, and social media platforms; (3) deepening our analyses to include interviewing and virtual ethnographic approaches; (4) up-scaling or improving our capacity to undertake “big data” collection and analysis; (5) outreaching beyond terrorism studies to become acquainted with, for example, the Internet Studies literature and engaging in interdisciplinary research with, for example, computer scientists; and (6) paying more attention to gender as a factor in violent online extremism.


Criminology and public policy | 2017

Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes

Paul Gill; Emily Corner; Maura Conway; Amy Thornton; Mia Bloom; John Horgan

Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223 convicted United Kingdom–based terrorists, this article focuses on how they used the Internet in the commission of their crimes. As most samples of terrorist offenders vary in terms of capabilities (lone-actor vs. group offenders) and criminal sophistication (improvised explosive devices vs. stabbings), we tested whether the affordances they sought from the Internet significantly differed. The results suggest that extreme-right-wing individuals, those who planned an attack (as opposed to merely providing material support), conducted a lethal attack, committed an improvised explosive device (IED) attack, committed an armed assault, acted within a cell, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to learn online compared with those who did not engage in these behaviors. Those undertaking unarmed assaults were significantly less likely to display online learning. The results also suggested that extreme-right-wing individuals who perpetrated an IED attack, associated with a wider network, attempted to recruit others, and engaged in nonvirtual network activities and nonvirtual place interactions were significantly more likely to communicate online with co-ideologues.


Media, War & Conflict | 2012

Exploring the form and function of dissident Irish Republican online discourses

Lorraine Bowman-Grieve; Maura Conway

This article seeks to contribute to broadening the focus of research in the area of violent online political extremism by examining the use of the internet by dissident Irish Republicans and their supporters. The argument here is not that the internet substitutes face-to-face contacts amongst Irish Republicans, including violent dissidents, nor that it currently plays a central role in processes of radicalisation into violent dissident groups, but that it has an important support function in terms of providing an ‘always-on’ space for discussion, consumption, and production of Irish Republicanism and thus a potentially educative role in terms of introducing ‘newbies’ to violent dissident Republicanism while also acting as a ‘maintenance’ space for the already committed. This exploratory study considers the importance of these functions in the context of repeated suggestions that the dissidents have no significant support base or constituency as internet activity certainly gives the appearance of some such support.


Communications of The ACM | 2011

Against cyberterrorism

Maura Conway

Why cyber-based terrorist attacks are unlikely to occur.


advances in social networks analysis and mining | 2014

Online social media in the Syria conflict: encompassing the extremes and the in-betweens

Derek O'Callaghan; Nico Prucha; Derek Greene; Maura Conway; Joe Carthy; Pádraig Cunningham

The Syria conflict has been described as the most socially mediated in history, with online social media playing a particularly important role. At the same time, the ever-changing landscape of the conflict leads to difficulties in applying analytical approaches taken by other studies of online political activism. Therefore, in this paper, we use an approach that does not require strong prior assumptions or the proposal of an advance hypothesis to analyze Twitter and YouTube activity of a range of protagonists to the conflict, in an attempt to reveal additional insights into the relationships between them. By means of a network representation that combines multiple data views, we uncover communities of accounts falling into four categories that broadly reflect the situation on the ground in Syria. A detailed analysis of selected communities within the anti-regime categories is provided, focusing on their central actors, preferred online platforms, and activity surrounding “real world” events. Our findings indicate that social media activity in Syria is considerably more convoluted than reported in many other studies of online political activism, suggesting that alternative analytical approaches can play an important role in this type of scenario.


web science | 2013

Uncovering the wider structure of extreme right communities spanning popular online networks

Derek O'Callaghan; Derek Greene; Maura Conway; Joe Carthy; Pádraig Cunningham

Recent years have seen increased interest in the online presence of extreme right groups. Although originally composed of dedicated websites, the online extreme right milieu now spans multiple networks, including popular social media platforms such as Twitter, Facebook and YouTube. Ideally therefore, any contemporary analysis of online extreme right activity requires the consideration of multiple data sources, rather than being restricted to a single platform. We investigate the potential for Twitter to act as one possible gateway to communities within the wider online network of the extreme right, given its facility for the dissemination of content. A strategy for representing heterogeneous network data with a single homogeneous network for the purpose of community detection is presented, where these inherently dynamic communities are tracked over time. We use this strategy to discover and analyze persistent English and German language extreme right communities.


arXiv: Social and Information Networks | 2012

An Analysis of Interactions within and between Extreme Right Communities in Social Media

Derek O’Callaghan; Derek Greene; Maura Conway; Joe Carthy; Pádraig Cunningham

Many extreme right groups have had an online presence for some time through the use of dedicated websites. This has been accompanied by increased activity in social media platforms in recent years, enabling the dissemination of extreme right content to a wider audience. In this paper, we present an analysis of the activity of a selection of such groups on Twitter, using network representations based on reciprocal follower and interaction relationships, while also analyzing topics found in their corresponding tweets. International relationships between certain extreme right groups across geopolitical boundaries are initially identified. Furthermore, we also discover stable communities of accounts within local interaction networks, in addition to associated topics, where the underlying extreme right ideology of these communities is often identifiable.


Computer Fraud & Security | 2003

Hackers as terrorists? why it doesn't compute

Maura Conway

Abstract The bulk of this article is concerned with showing why computer hackers and terrorists are unlikely to form an unholy alliance to engage in so-called cyberterrorism. The remainder of the paper examines why neither hacktivists nor crackers fall easily into the cyberterrorist category either.


Social Science Computer Review | 2015

Down the White Rabbit Hole

Derek O'Callaghan; Derek Greene; Maura Conway; Joe Carthy; draig Cunningham

In addition to hosting user-generated video content, YouTube provides recommendation services, where sets of related and recommended videos are presented to users, based on factors such as co-visitation count and prior viewing history. This article is specifically concerned with extreme right (ER) video content, portions of which contravene hate laws and are thus illegal in certain countries, which are recommended by YouTube to some users. We develop a categorization of this content based on various schema found in a selection of academic literature on the ER, which is then used to demonstrate the political articulations of YouTube’s recommender system, particularly the narrowing of the range of content to which users are exposed and the potential impacts of this. For this purpose, we use two data sets of English and German language ER YouTube channels, along with channels suggested by YouTube’s related video service. A process is observable whereby users accessing an ER YouTube video are likely to be recommended further ER content, leading to immersion in an ideological bubble in just a few short clicks. The evidence presented in this article supports a shift of the almost exclusive focus on users as content creators and protagonists in extremist cyberspaces to also consider online platform providers as important actors in these same spaces.

Collaboration


Dive into the Maura Conway's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Derek Greene

University College Dublin

View shared research outputs
Top Co-Authors

Avatar

Joe Carthy

University College Dublin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amy Thornton

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Emily Corner

University College London

View shared research outputs
Top Co-Authors

Avatar

Paul Gill

University College London

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge