{ "access": { "embargo": { "active": false, "reason": null }, "files": "public", "record": "public", "status": "open" }, "created": "2016-07-26T07:42:28+00:00", "custom_fields": { "journal:journal": { "issue": "1", "pages": "1-20", "title": "International Journal of Cyber Criminology", "volume": "10" } }, "deletion_status": { "is_deleted": false, "status": "P" }, "files": { "count": 1, "enabled": true, "entries": { "ImranAwanvol10issue1IJCC2016.pdf": { "checksum": "md5:504e04db8af59965c2a58bb84dd99eb3", "ext": "pdf", "id": "a5a3c967-0ccd-49d9-9a80-6238978cfd77", "key": "ImranAwanvol10issue1IJCC2016.pdf", "metadata": null, "mimetype": "application/pdf", "size": 831016 } }, "order": [], "total_bytes": 831016 }, "id": "58517", "is_draft": false, "is_published": true, "links": { "access": "https://zenodo.org/api/records/58517/access", "access_links": "https://zenodo.org/api/records/58517/access/links", "access_request": "https://zenodo.org/api/records/58517/access/request", "access_users": "https://zenodo.org/api/records/58517/access/users", "archive": "https://zenodo.org/api/records/58517/files-archive", "archive_media": "https://zenodo.org/api/records/58517/media-files-archive", "communities": "https://zenodo.org/api/records/58517/communities", "communities-suggestions": "https://zenodo.org/api/records/58517/communities-suggestions", "doi": "https://doi.org/10.5281/zenodo.58517", "draft": "https://zenodo.org/api/records/58517/draft", "files": "https://zenodo.org/api/records/58517/files", "latest": "https://zenodo.org/api/records/58517/versions/latest", "latest_html": "https://zenodo.org/records/58517/latest", "media_files": "https://zenodo.org/api/records/58517/media-files", "parent": "https://zenodo.org/api/records/639202", "parent_doi": "https://zenodo.org/doi/", "parent_html": "https://zenodo.org/records/639202", "requests": "https://zenodo.org/api/records/58517/requests", "reserve_doi": "https://zenodo.org/api/records/58517/draft/pids/doi", "self": "https://zenodo.org/api/records/58517", "self_doi": "https://zenodo.org/doi/10.5281/zenodo.58517", "self_html": "https://zenodo.org/records/58517", "self_iiif_manifest": "https://zenodo.org/api/iiif/record:58517/manifest", "self_iiif_sequence": "https://zenodo.org/api/iiif/record:58517/sequence/default", "versions": "https://zenodo.org/api/records/58517/versions" }, "media_files": { "count": 0, "enabled": false, "entries": {}, "order": [], "total_bytes": 0 }, "metadata": { "contributors": [ { "affiliations": [ { "name": "Raksha Shakti University" } ], "person_or_org": { "family_name": "K Jaishankar", "name": "K Jaishankar", "type": "personal" }, "role": { "id": "editor", "title": { "de": "EditorIn", "en": "Editor" } } } ], "creators": [ { "affiliations": [ { "name": "Birmingham City University, United Kingdom " } ], "person_or_org": { "family_name": "Awan", "given_name": "Imran", "name": "Awan, Imran ", "type": "personal" } } ], "description": "
Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also a growing number of online virtual communities, and hate groups who are using this space to share a violent, Islamophobic and racist narrative which attempts to create a hostile virtual environment. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a damaging impact on community cohesion within society. Moreover, as a result of recent figures that show an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. This research examined 100 different Facebook pages, posts and comments and found 494 instances of online hate speech directed against Muslim communities. The findings revealed some interesting parallels and common characteristics shared within these groups, which helped the author to create a typology of five characteristics of anti-Muslim hate espoused on Facebook. Overall, this study found Muslims being demonised and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.
", "publication_date": "2016-07-24", "publisher": "Zenodo", "references": [ { "reference": "Allen, C., Arshad I., & Ozlem, Y. (2013, November 30). Experiences of Muslim Women on Behalf of Tell MAMA. Retrieved from: http://tellmamauk.org/wp-content/uploads/2013/11/maybewearehated.pdf." }, { "reference": "Allen, C. (2010). Islamophobia. Farnham, UK: Ashgate Publishing." }, { "reference": "Allen, C. (2014, January 31st). Anti-Social Networking: Findings From a Pilot Study on Opposing Dudley Mosque Using Facebook Groups as Both Site and Method for Research, Sage Open. Retrieved from: http://sgo.sagepub.com/content/4/1/2158244014522074." }, { "reference": "Association of Chief Police Officers. (2013, January 10). True Vision Records. Retrieved on 27 May 2016 from: http://www.report-it.org.uk/true_vision_records_a_significant_weekly_reduct" }, { "reference": "Associated Press (2016, February 26) Zuckerberg on refugee crisis: \u2018Hate speech has no place on Facebook\u2019. The Guardian. Retrieved from: https://www.theguardian.com/technology/2016/feb/26/mark-zuckerberg-hate-speech-germany-facebook-refugee-crisis." }, { "reference": "Awan, I., & Blakemore. B. (2012). Policing Cyber Hate, Cyber Threats and Cyber Terrorism. Ashgate: Farnham." }, { "reference": "Awan, I. (2016). (Eds.) Islamophobia in Cyberspace: Hate Crimes go Viral. Routledge: New York." }, { "reference": "Awan, I. (2014). Islamophobia on Twitter: A Typology of Online Hate against Muslims on Social Media, Policy & Internet, 6, 133\u201350." }, { "reference": "Awan, I & Zempi, I. (2015a). Virtual and Physical World Anti-Muslim Hate Crime, The British Journal of Criminology. doi: 10.1093/bjc/azv122. First published online: December 18, 2015." }, { "reference": "Awan, I. & Zempi (2015b). The affinity between online and offline anti-Muslim hate crime: Dynamics and impacts\u2019. Aggression and Violent Behaviour, 27, 1\u20138." }, { "reference": "Back, M. D., Stopfer, J. M., Vazire, S., Gaddis, S., Schmukle, S. C., Egloff, B., & Gosling, S. D. (2010). Facebook profiles reflect actual personality, not self-idealization. Psychological Science, 21, 372-374" }, { "reference": "Bargh, J.A., & McKenna, K.Y.A. (2004). The Internet and social life. Annual Review of Psychology, 55, 573-590." }, { "reference": "BBC News. (2013, March 11). 632 Anti-Muslim Hate Incidents Recorded by Tell Mama. Retrieved from: http://www.bbc.co.uk/news/uk-21712826." }, { "reference": "Blair, J. (2003). New breed of bullies torment their peers on the Internet. Education Week, 22 (1), 6-7." }, { "reference": "Chakraborti, N., & Garland, J. (2009). Hate Crime: Impact and Causes, London: Sage." }, { "reference": "Citron, D. (2014). Hate Crimes in Cyberspace. Cambridge: Harvard University Press." }, { "reference": "Clarke, S. (2003). Social theory, psychoanalysis and racism. London: Palgrave." }, { "reference": "Christopherson, K. (2007). The Positive and Negative Implications of Anonymity in Internet, Nobody Knows You\u2019re a Dog. Computers in Human Behavior, 23(6), 3038\u201356." }, { "reference": "Coliandris, G. (2012). Hate in a Cyber Age. In I. Awan & B. Blakemore(eds.), Policing Cyber Hate, Cyber Threats and Cyber Terrorism (pp. 75\u201394). Ashgate: Farnham,." }, { "reference": "DEMOS Report. (2011). The rise of populism in Europe can be traced through online behaviour. Retrieved from: http://www.demos.co.uk/files/Demos_OSIPOP_Book-web_03.pdf?1320601634." }, { "reference": "Douglas, K., C. McGarty, A. M., Bliuc, & Lala, G. (2005). Understanding Cyberhate: Social Competition and Social Creativity in Online White Supremacist Groups. Social Science Computer Review, 23(1), 68\u201376." }, { "reference": "Facebook (2015). Community Standards on Hate Speech. Retrieved from: https://en-gb.facebook.com/help/135402139904490." }, { "reference": "Feldman, M. M., Dack, L. J., & Copsey, N. (2013). Anti-Muslim Hate Crime and the Far Right. Middlesbrough, Teeside: Teeside University. Retrieved from: http://tellmamauk.org/wp-content/uploads/2013/07/antimuslim2.pdf." }, { "reference": "Faith Matters (2014). Rotherham, hate and the far-right online. Retrieved from: http://tellmamauk.org/wp-content/uploads/2014/09/Rotherham.pdf." }, { "reference": "Gurak, L. J., & Logie, J. (2003). Internet protests, from text to Web. In M. McCaughey & M. D. Ayers (Eds.), Cyberactivism: Online activism in theory and practice (pp. 25-46). London: Routledge." }, { "reference": "Hewson, C., Yule, P., Laurent, D., & Vogel, C. (2003). Internet research methods: A practical guide for the behavioural and social sciences. London: Sage." }, { "reference": "Hall, N. (2013). Hate Crime. Cullompton: Willan Publishing." }, { "reference": "Hodges, E., & Perry, D. (1999). Personal and interpersonal antecedents and consequences of victimization by peers. Journal of Personality Social Psychology, 76, 677-685." }, { "reference": "Iganski, P. (2012). Hate Crime: Taking Stock: Programmes for Offenders of Hate. Belfast: Northern Ireland: The Challenge Hate Crime project." }, { "reference": "Jaishankar, K. (2008). Cyber Hate: Antisocial networking in the Internet. International Journal of Cyber Criminology, 2(2), 16-20." }, { "reference": "Keats, C. D., & Norton, H. L. (2011). Industrial Relations and the Law: retrospect and prospect, British Journal of Industrial Relations, 7, 301-316." }, { "reference": "Kotecha, S. (2013, September 24). Quarter of young British people \u2018do not trust Muslims\u2019, BBC News. Retrieved from: http://www.bbc.co.uk/newsbeat/24204742." }, { "reference": "Lee, D. (2013, May 29). Facebook bows to campaign groups over \u2018hate speech\u2019, Retrieved from:" }, { "reference": "http://www.bbc.co.uk/news/technology-22701082." }, { "reference": "Littler, M., & Feldman, M. (2015). Tell MAMA Reporting 2014/2015: Annual Monitoring, Cumulative Extremism, and Policy Implications. Teesside University Press: Middlesbrough, Teesside." }, { "reference": "Online Hate Prevention Centre. (2013). Islamophobia on the Internet: The Growth of Online Hate Targeting Muslims. Retrieved from: http://ohpi.org.au/islamophobia-on-the-internet-the-growth-of-online-hate-targetingmuslims/." }, { "reference": "McGhee, D. (2005). \u2018Intolerant Britain? Hate, Citizenship and Difference\u2019. Maidenhead: Open University Press." }, { "reference": "McNamee, L., Brittany L. Peterson & Jorge Pena (2010). A Call to Educate, Participate, Invoke and Indict: Understanding the Communication of Online Hate Groups, Communication Monographs. 77(2), 257-280." }, { "reference": "Morris, N. (2015, January 6). Attorney General steps into social media racism row, Retrieved on from: http://www.independent.co.uk/news/uk/politics/attorney-general-steps-into-social-media-racism-row-9961364.html." }, { "reference": "Perry, B. (2001). In the Name of Hate: Understanding Hate Crimes. London: Routledge." }, { "reference": "Perry, B. (2003). Anti-Muslim Retaliatory Violence following the 9/11 terrorist attacks, In B. Perry (Ed.), Hate and Bias Crime: A Reader (pp. 183-202). London, Routledge." }, { "reference": "Runnymede Trust (1997). Islamophobia: A challenge for us all (Report of the Runnymede Trust Commission on British Muslims and Islamophobia). London: Runnymede Trust." }, { "reference": "Rushton, K. (2014, October 28). Facebook now has as many users as China has people. The Telegraph, Retrieved from: http://www.telegraph.co.uk/technology/facebook/11194049/Facebook-profits-pass-1bn-as-more-users-log-on-every-day.html." }, { "reference": "Taras, R. (2012). Xenophobia and Islamophobia in Europe. Edinburgh: Edinburgh University Press." }, { "reference": "Williams, M. L. & Burnap, P. (2016). Cyberhate on Social Media in the Aftermath of Woolwich: A Case Study in Computational Criminology and Big Data. British Journal of Criminology, 56(2), 211-238. doi: 10.1093/bjc/azv059. First published online: June 25, 2015." }, { "reference": "Yar, M. (2013). Cyber Crime and Society: London: Sage." } ], "related_identifiers": [ { "identifier": "http://cybercrimejournal.com/ImranAwanvol10issue1IJCC2016.pdf", "relation_type": { "id": "issupplementto", "title": { "de": "Erg\u00e4nzt", "en": "Is supplement to" } }, "scheme": "url" } ], "resource_type": { "id": "publication-article", "title": { "de": "Zeitschriftenartikel", "en": "Journal article" } }, "rights": [ { "description": { "en": "" }, "icon": "cc-by-nc-sa-icon", "id": "cc-by-nc-sa-4.0", "props": { "scheme": "spdx", "url": "https://creativecommons.org/licenses/by-nc-sa/4.0/legalcode" }, "title": { "en": "Creative Commons Attribution Non Commercial Share Alike 4.0 International" } } ], "subjects": [ { "subject": "Islamophobia, Online, Social Media, Facebook, Internet, Extremism" } ], "title": "Islamophobia on Social Media: A Qualitative Analysis of the Facebook\u2019s Walls of Hate" }, "parent": { "access": { "owned_by": { "user": 13663 } }, "communities": { "default": "9dc977ce-8c52-41f6-b0a1-99d351310dd8", "entries": [ { "access": { "member_policy": "open", "members_visibility": "public", "record_policy": "open", "review_policy": "open", "visibility": "public" }, "children": { "allow": false }, "created": "2015-08-02T09:29:30+00:00", "custom_fields": {}, "deletion_status": { "is_deleted": false, "status": "P" }, "id": "9dc977ce-8c52-41f6-b0a1-99d351310dd8", "links": {}, "metadata": { "curation_policy": "", "page": "International Journal of Cyber Criminology (IJCC) is a peer reviewed online (open access) interdisciplinary journal published biannually and devoted to the study of cyber crime, cyber criminal behavior, cyber victims, cyber laws and cyber policy.IJCC will focus on all aspects of cyber/computer crime: Forms of Cyber Crime, Impact of cyber crimes in the real world, Policing Cyber space, International Perspectives of Cyber Crime, developing cyber safety policy, Cyber Victims, Cyber Psychopathology, Geographical aspects of Cyber crime, Cyber offender behavior, cyber crime law, Cyber Pornography, Privacy & Anonymity on the Net, Internet Fraud and Identity Theft, Mobile Phone Safety and policy issues, Online Gambling, Copyright and Intellectual property Law. As the discipline of Cyber Criminology approaches the future, facing the dire need to document the literature in this rapidly changing area has become more important than ever before. The IJCC will be a nodal centre to develop and disseminate the knowledge of cyber crimes to the academic and lay world. The journal publishes theoretical, methodological, and applied papers, as well as book reviews. We do not publish highly technical cyber forensics / digital forensics papers and papers of descriptive / overview nature.
\r\n\r\nhttp://www.cybercrimejournal.com
", "title": "International Journal of Cyber Criminology (ISSN: 0974 \u2013 2891) " }, "revision_id": 0, "slug": "cybercriminologyjournal", "updated": "2016-07-26T09:19:23+00:00" } ], "ids": [ "9dc977ce-8c52-41f6-b0a1-99d351310dd8" ] }, "id": "639202", "pids": { "doi": { "identifier": "", "provider": "legacy" } } }, "pids": { "doi": { "client": "datacite", "identifier": "10.5281/zenodo.58517", "provider": "datacite" }, "oai": { "identifier": "oai:zenodo.org:58517", "provider": "oai" } }, "revision_id": 11, "stats": { "all_versions": { "data_volume": 2166458712.0, "downloads": 2607, "unique_downloads": 2314, "unique_views": 2761, "views": 3070 }, "this_version": { "data_volume": 2162303632.0, "downloads": 2602, "unique_downloads": 2309, "unique_views": 2755, "views": 3064 } }, "status": "published", "updated": "2020-01-20T17:36:17.133833+00:00", "versions": { "index": 1, "is_latest": true } }