{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:38:30Z","timestamp":1767137910606,"version":"build-2238731810"},"publisher-location":"Cham","reference-count":78,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319584591","type":"print"},{"value":"9783319584607","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_33","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T07:08:42Z","timestamp":1494572922000},"page":"481-493","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Radicalization, the Internet and Cybersecurity: Opportunities and Challenges for HCI"],"prefix":"10.1007","author":[{"given":"Joanne","family":"Hinds","sequence":"first","affiliation":[]},{"given":"Adam","family":"Joinson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"issue":"2","key":"33_CR1","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1093\/pa\/gsl009","volume":"59","author":"M Conway","year":"2006","unstructured":"Conway, M.: Terrorism and the internet: new media\u2014new threat? Parliam. Aff. 59(2), 283\u2013298 (2006)","journal-title":"Parliam. Aff."},{"key":"33_CR2","unstructured":"Conway, M.: Terrorist use of the internet and the challenges of governing cyberspace. In: Power and Security in the Information Age: Investigating the Role of the State in Cyberspace, pp. 95\u2013127 (2007)"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Aly, A., Macdonald, S., Jarvis, L., Chen, T.M.: Introduction to the special issue: terrorist online propaganda and radicalization. Stud. Terror. Confl. 40, 1\u20139 (2016)","DOI":"10.1080\/1057610X.2016.1157402"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Conway, M.: Determining the role of the internet in violent extremism and terrorism: six suggestions for progressing research. Stud. Confl. Terror. 25 (2016)","DOI":"10.4324\/9781315692029-8"},{"issue":"1","key":"33_CR5","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1080\/1057610X.2016.1157406","volume":"40","author":"A Gendron","year":"2017","unstructured":"Gendron, A.: The call to jihad: charismatic preachers and the internet. Stud. Confl. Terror. 40(1), 44\u201361 (2017)","journal-title":"Stud. Confl. Terror."},{"key":"33_CR6","first-page":"22","volume":"97","author":"AP Schmid","year":"2013","unstructured":"Schmid, A.P.: Radicalisation, de-radicalisation, counter-radicalisation: a conceptual discussion and literature review. ICCT Res. Pap. 97, 22 (2013)","journal-title":"ICCT Res. Pap."},{"key":"33_CR7","unstructured":"Fraihi, T.: Escalating radicaliastion: the debate within muslim and immigrant communities. In: Jihadi Terrorism and the Radicalization Challenge in Europe. Ashgate, Hampshire (2008)"},{"issue":"1","key":"33_CR8","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1080\/14781150903487956","volume":"22","author":"AS Wilner","year":"2010","unstructured":"Wilner, A.S., Dubouloz, C.J.: Homegrown terrorism and transformative learning: an interdisciplinary approach to understanding radicalization. Glob. Chang. Peace Secur. 22(1), 33\u201351 (2010)","journal-title":"Glob. Chang. Peace Secur."},{"issue":"4","key":"33_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.5038\/1944-0472.4.4.1","volume":"4","author":"R Borum","year":"2011","unstructured":"Borum, R.: Radicalization into violent extremism I: a review of social science theories. J. Strateg. Secur. 4(4), 7\u201336 (2011)","journal-title":"J. Strateg. Secur."},{"issue":"1","key":"33_CR10","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1177\/0002716208317539","volume":"618","author":"J Horgan","year":"2008","unstructured":"Horgan, J.: From profiles to pathways and roots to routes: perspectives from psychology on radicalization into terrorism. Ann. Am. Acad. Polit. Soc. Sci. 618(1), 80\u201394 (2008)","journal-title":"Ann. Am. Acad. Polit. Soc. Sci."},{"key":"33_CR11","unstructured":"Runciman, W.G.: Relative deprivation and social justice: study attitudes social inequality in 20th century England (1966)"},{"key":"33_CR12","doi-asserted-by":"publisher","DOI":"10.4324\/9781315631073","volume-title":"Why Men Rebel","author":"TR Gurr","year":"2015","unstructured":"Gurr, T.R.: Why Men Rebel. Routledge, Abingdon (2015)"},{"issue":"04","key":"33_CR13","doi-asserted-by":"publisher","first-page":"1569","DOI":"10.2307\/1959942","volume":"68","author":"W Korpi","year":"1974","unstructured":"Korpi, W.: Conflict, power and relative deprivation. Am. Polit. Sci. Rev. 68(04), 1569\u20131578 (1974)","journal-title":"Am. Polit. Sci. Rev."},{"issue":"4","key":"33_CR14","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1111\/j.2044-8309.1984.tb00645.x","volume":"23","author":"I Walker","year":"1984","unstructured":"Walker, I., Pettigrew, T.F.: Relative deprivation theory: an overview and conceptual critique. Br. J. Soc. Psychol. 23(4), 301\u2013310 (1984)","journal-title":"Br. J. Soc. Psychol."},{"key":"33_CR15","unstructured":"Gunning, J.: Social movement theory and the study of terrorism. In: Critical Terrorism Studies: A New Research Agenda, pp. 156\u2013177 (2009)"},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"373","DOI":"10.2307\/1386185","volume":"20","author":"J Lofland","year":"1981","unstructured":"Lofland, J., Skonovd, N.: Conversion motifs. J. Sci. Stud. Relig. 20, 373\u2013385 (1981)","journal-title":"J. Sci. Stud. Relig."},{"key":"33_CR17","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/S0065-2601(08)60133-1","volume":"13","author":"S Moscovici","year":"1980","unstructured":"Moscovici, S.: Toward a theory of conversion behavior. Adv. Exp. Soc. Psychol. 13, 209\u2013239 (1980)","journal-title":"Adv. Exp. Soc. Psychol."},{"issue":"3","key":"33_CR18","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1177\/003776899046003003","volume":"46","author":"LR Rambo","year":"1999","unstructured":"Rambo, L.R.: Theories of conversion: understanding and interpreting religious change. Soc. Compass 46(3), 259\u2013271 (1999)","journal-title":"Soc. Compass"},{"issue":"7","key":"33_CR19","first-page":"7","volume":"72","author":"R Borum","year":"2003","unstructured":"Borum, R.: Understanding the terrorist mindset. FBI Law Enforc. Bull. 72(7), 7\u201310 (2003)","journal-title":"FBI Law Enforc. Bull."},{"issue":"2","key":"33_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1037\/0003-066X.60.2.161","volume":"60","author":"FM Moghaddam","year":"2005","unstructured":"Moghaddam, F.M.: The staircase to terrorism: a psychological exploration. Am. Psychol. 60(2), 161 (2005)","journal-title":"Am. Psychol."},{"issue":"1","key":"33_CR21","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1177\/0002716208317051","volume":"618","author":"M Sageman","year":"2008","unstructured":"Sageman, M.: A strategy for fighting international Islamist terrorists. Ann. Am. Acad. Polit. Soc. Sci. 618(1), 223\u2013231 (2008)","journal-title":"Ann. Am. Acad. Polit. Soc. Sci."},{"key":"33_CR22","unstructured":"Wiktorowicz, Q.: Joining the cause: Al-Muhajiroun and radical Islam. In: Devji, F. (ed.) The Roots of Islamic Radicalism conference, Yale. Landscapes of the Jihad: Militancy, Morality and Modernity. C Hurst & Co Publishers Ltd., London (2004)"},{"key":"33_CR23","first-page":"1","volume-title":"Radicalization in the West: The Homegrown Threat","author":"MD Silber","year":"2007","unstructured":"Silber, M.D., Bhatt, A., Analysts, S.I.: Radicalization in the West: The Homegrown Threat, pp. 1\u201390. Police Department, New York (2007)"},{"key":"33_CR24","unstructured":"Precht, T.: Home grown terrorism and Islamist radicalisation in Europe. From conversion to terrorism (2007)"},{"key":"33_CR25","volume-title":"The Psychology of Everyday Things","author":"DA Norman","year":"1988","unstructured":"Norman, D.A.: The Psychology of Everyday Things. Basic Books, New York (1988)"},{"key":"33_CR26","unstructured":"Gibson, J.J.: The theory of affordances. In: Shaw, R., Bransford, J. (eds.) Perceiving, Acting, and Knowing (1977)"},{"issue":"1","key":"33_CR27","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1111\/1745-9133.12285","volume":"16","author":"PJ Taylor","year":"2017","unstructured":"Taylor, P.J., Holbrook, D., Joinson, A.: Same kind of different. Criminol. Public Policy 16(1), 127\u2013133 (2017)","journal-title":"Criminol. Public Policy"},{"key":"33_CR28","unstructured":"Gibson, J.J.: The theory of affordances. In: The Ecological Approach to Visual Perception, pp. 127\u2013143 (1979)"},{"key":"33_CR29","unstructured":"Ashour, O.: Online de-radicalization? Countering violent extremist narratives: message, messenger and media strategy. Perspect. Terror. 4(6) (2011)"},{"key":"33_CR30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-0962-9","volume-title":"Cyberterrorism","author":"T Chen","year":"2014","unstructured":"Chen, T., Jarvis, L., Macdonald, S.: Cyberterrorism. Springer, Heidelberg (2014)"},{"key":"33_CR31","unstructured":"Torok, R.: \u201cMake A Bomb In Your Mums Kitchen\u201d: Cyber Recruiting and Socialisation of \u2018White Moors\u2019 and Home Grown Jihadists (2010)"},{"key":"33_CR32","unstructured":"Von Behr, I.: Radicalisation in the digital era: the use of the Internet in 15 cases of terrorism and extremism (2013)"},{"issue":"1","key":"33_CR33","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1111\/1745-9133.12249","volume":"16","author":"P Gill","year":"2017","unstructured":"Gill, P., Corner, E., Conway, M., Thornton, A., Bloom, M., Horgan, J.: Terrorist use of the internet by the numbers. Criminol. Public Policy 16(1), 99\u2013117 (2017)","journal-title":"Criminol. Public Policy"},{"issue":"1","key":"33_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1146\/annurev.ps.33.020182.000245","volume":"33","author":"H Tajfel","year":"1982","unstructured":"Tajfel, H.: Social psychology of intergroup relations. Ann. Rev. Psychol. 33(1), 1\u201339 (1982)","journal-title":"Ann. Rev. Psychol."},{"key":"33_CR35","volume-title":"Theories of Intergroup Relations: International Social Psychological Perspectives","author":"DM Taylor","year":"1994","unstructured":"Taylor, D.M., Moghaddam, F.M.: Theories of Intergroup Relations: International Social Psychological Perspectives. Greenwood Publishing Group, Westport (1994)"},{"issue":"6","key":"33_CR36","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1037\/0022-3514.37.6.822","volume":"37","author":"B Latane","year":"1979","unstructured":"Latane, B., Williams, K., Harkins, S.: Many hands make light the work: the causes and consequences of social loafing. J. Pers. Soc. Psychol. 37(6), 822 (1979)","journal-title":"J. Pers. Soc. Psychol."},{"issue":"3","key":"33_CR37","first-page":"297","volume":"63","author":"DG Myers","year":"1975","unstructured":"Myers, D.G., Lamm, H.: The polarizing effect of group discussion: the discovery that discussion tends to enhance the average prediscussion tendency has stimulated new insights about the nature of group influence. Am. Sci. 63(3), 297\u2013303 (1975)","journal-title":"Am. Sci."},{"key":"33_CR38","volume-title":"Victims of Groupthink: A Psychological Study of Foreign-Policy Decisions and Fiascoes","author":"IL Janis","year":"1972","unstructured":"Janis, I.L.: Victims of Groupthink: A Psychological Study of Foreign-Policy Decisions and Fiascoes. Houghton Mifflin, Boston (1972)"},{"issue":"9","key":"33_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/h0093718","volume":"70","author":"SE Asch","year":"1956","unstructured":"Asch, S.E.: Studies of independence and conformity: I. A minority of one against a unanimous majority. Psychol. Monogr.: Gen. Appl. 70(9), 1 (1956)","journal-title":"Psychol. Monogr.: Gen. Appl."},{"key":"33_CR40","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/0020-7373(91)90045-9","volume":"34","author":"M Lea","year":"1991","unstructured":"Lea, M., Spears, R.: Computer-mediated communication, de-individuation and group decision-making. Int. J. Man Mach. Stud. 34, 283\u2013301 (1991)","journal-title":"Int. J. Man Mach. Stud."},{"key":"33_CR41","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1177\/009365098025006006","volume":"25","author":"T Postmes","year":"1998","unstructured":"Postmes, T., Spears, R., Lea, M.: Breaching or building social boundaries? SIDE-effects of computer-mediated communication. Commun. Res. 25, 689\u2013715 (1998)","journal-title":"Commun. Res."},{"issue":"1","key":"33_CR42","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1287\/isre.13.1.70.92","volume":"13","author":"CL Sia","year":"2002","unstructured":"Sia, C.L., Tan, B.C., Wei, K.K.: Group polarization and computer-mediated communication: effects of communication cues, social presence, and anonymity. Inf. Syst. Res. 13(1), 70\u201390 (2002)","journal-title":"Inf. Syst. Res."},{"key":"33_CR43","unstructured":"Gottfried, J., Shearer, E.: News Use Across Social Media Platforms 2016. Pew Research Centre (2016). http:\/\/www.journalism.org\/2016\/05\/26\/news-use-across-social-media-platforms-2016\/. Accessed 10 Feb 2017"},{"issue":"6239","key":"33_CR44","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1126\/science.aaa1160","volume":"348","author":"E Bakshy","year":"2015","unstructured":"Bakshy, E., Messing, S., Adamic, L.A.: Exposure to ideologically diverse news and opinion on Facebook. Science 348(6239), 1130\u20131132 (2015)","journal-title":"Science"},{"key":"33_CR45","unstructured":"Baer, D.: The \u2018Filter Bubble\u2019 Explains Why Trump Won and You Didn\u2019t See It Coming (2016). http:\/\/nymag.com\/scienceofus\/2016\/11\/how-facebook-and-the-filter-bubble-pushed-trump-to-victory.html. Accessed 10 Feb 2017"},{"key":"33_CR46","unstructured":"Cialdini, R.B.: Influence, vol. 3. A. Michel (1987)"},{"issue":"3","key":"33_CR47","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1037\/0022-3514.75.3.681","volume":"75","author":"KY McKenna","year":"1998","unstructured":"McKenna, K.Y., Bargh, J.A.: Coming out in the age of the internet: identity \u201cdemarginalization\u201d through virtual group participation. J. Pers. Soc. Psychol. 75(3), 681 (1998)","journal-title":"J. Pers. Soc. Psychol."},{"issue":"8","key":"33_CR48","doi-asserted-by":"publisher","first-page":"1153","DOI":"10.1080\/13691180802266665","volume":"11","author":"W De Koster","year":"2008","unstructured":"De Koster, W., Houtman, D.: Stormfront is like a second home to me: on virtual community formation by right-wing extremists. Inf. Commun. Soc. 11(8), 1153\u20131175 (2008)","journal-title":"Inf. Commun. Soc."},{"issue":"2","key":"33_CR49","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/15213260802023433","volume":"11","author":"AL Gonzales","year":"2008","unstructured":"Gonzales, A.L., Hancock, J.T.: Identity shift in computer-mediated environments. Media Psychol. 11(2), 167\u2013185 (2008)","journal-title":"Media Psychol."},{"key":"33_CR50","doi-asserted-by":"crossref","unstructured":"Qu, Y., Huang, C., Zhang, P., Zhang, J.: Microblogging after a major disaster in China: a case study of the 2010 Yushu Earthquake. In: Proceedings of CSCW 2011, pp. 25\u201334 (2011)","DOI":"10.1145\/1958824.1958830"},{"key":"33_CR51","first-page":"241","volume":"2010","author":"K Starbird","year":"2010","unstructured":"Starbird, K., Palen, L., Hughes, A., Vieweg, S.: Chatter on the red: what hazards threat reveals about the social life of microblogged information. Proceedings of CSCW 2010, 241\u2013250 (2010)","journal-title":"Proceedings of CSCW"},{"issue":"4","key":"33_CR52","first-page":"12","volume":"2","author":"M Conway","year":"2012","unstructured":"Conway, M.: From al-Zarqawi to al-Awlaki: the emergence and development of an online radical milieu. CTX: Combat. Terror. Exch. 2(4), 12\u201322 (2012)","journal-title":"CTX: Combat. Terror. Exch."},{"issue":"7","key":"33_CR53","doi-asserted-by":"publisher","first-page":"966","DOI":"10.1177\/0002764213479372","volume":"57","author":"B Gleason","year":"2013","unstructured":"Gleason, B.: # occupy wall street: exploring informal learning about a social movement on Twitter. Am. Behav. Sci. 57(7), 966\u2013982 (2013)","journal-title":"Am. Behav. Sci."},{"key":"33_CR54","doi-asserted-by":"crossref","unstructured":"Starbird, K., Palen, L.: (How) will the revolution be retweeted? Information diffusion and the 2011 Egyptian uprising. In: Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work, pp. 7\u201316. ACM, February 2012","DOI":"10.1145\/2145204.2145212"},{"key":"33_CR55","doi-asserted-by":"crossref","unstructured":"Wulf, V., Misaki, K., Atam, M., Randall, D., Rohde, M.: \u2018On the ground\u2019 in Sidi Bouzid: investigating social media use during the tunisian revolution. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work, pp. 1409\u20131418. ACM, February 2013","DOI":"10.1145\/2441776.2441935"},{"issue":"3","key":"33_CR56","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/j.clsr.2009.03.007","volume":"25","author":"AS Cheung","year":"2009","unstructured":"Cheung, A.S.: China internet going wild: cyber-hunting versus privacy protection. Comput. Law Secur. Rev. 25(3), 275\u2013279 (2009)","journal-title":"Comput. Law Secur. Rev."},{"issue":"2","key":"33_CR57","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1002\/bult.2012.1720380212","volume":"38","author":"E Tonkin","year":"2012","unstructured":"Tonkin, E., Pfeiffer, H.D., Tourte, G.: Twitter, information sharing and the London riots? Bull. Am. Soc. Inf. Sci. Technol. 38(2), 49\u201357 (2012)","journal-title":"Bull. Am. Soc. Inf. Sci. Technol."},{"key":"33_CR58","doi-asserted-by":"crossref","unstructured":"Christensen, H.: Political activities on the Internet: slacktivism or political participation by other means? First Monday 2 (2011). http:\/\/firstmonday.org\/ojs\/index.php\/fm\/article\/viewArticle\/3336","DOI":"10.5210\/fm.v16i2.3336"},{"issue":"3","key":"33_CR59","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1002\/ejsp.2084","volume":"45","author":"S Schumann","year":"2015","unstructured":"Schumann, S., Klein, O.: Substitute or stepping stone? Assessing the impact of low-threshold online collective actions on offline participation. Eur. J. Soc. Psychol. 45(3), 308\u2013322 (2015)","journal-title":"Eur. J. Soc. Psychol."},{"key":"33_CR60","unstructured":"Morozov, E.: The brave new world of slacktivism [Weblog post] (2009). http:\/\/neteffect.foreignpolicy.com\/posts\/2009\/05\/19\/the_brave_new_world_of_slacktivism"},{"key":"33_CR61","unstructured":"Gladwell, M.: Small change: why the revolution will not be tweeted [Weblog post] (2010). http:\/\/www.newyorker.com\/reporting\/2010\/10\/04\/101004fa_fact_gladwell"},{"issue":"11","key":"33_CR62","doi-asserted-by":"publisher","first-page":"1492","DOI":"10.1287\/mnsc.32.11.1492","volume":"32","author":"L Sproull","year":"1986","unstructured":"Sproull, L., Kiesler, S.: Reducing social context cues: electronic mail in organizational communication. Manag. Sci. 32(11), 1492\u20131512 (1986)","journal-title":"Manag. Sci."},{"issue":"2","key":"33_CR63","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1111\/j.1083-6101.2006.00020.x","volume":"11","author":"N Ellison","year":"2006","unstructured":"Ellison, N., Heino, R., Gibbs, J.: Managing impressions online: self-presentation processes in the online dating environment. J. Comput.-Mediat. Commun. 11(2), 415\u2013441 (2006)","journal-title":"J. Comput.-Mediat. Commun."},{"issue":"8","key":"33_CR64","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1177\/0146167208318067","volume":"34","author":"CL Toma","year":"2008","unstructured":"Toma, C.L., Hancock, J.T., Ellison, N.B.: Separating fact from fiction: an examination of deceptive self-presentation in online dating profiles. Pers. Soc. Psychol. Bull. 34(8), 1023\u20131036 (2008)","journal-title":"Pers. Soc. Psychol. Bull."},{"issue":"2","key":"33_CR65","doi-asserted-by":"publisher","first-page":"642","DOI":"10.1016\/j.chb.2011.11.010","volume":"28","author":"RE Guadagno","year":"2012","unstructured":"Guadagno, R.E., Okdie, B.M., Kruse, S.A.: Dating deception: gender, online dating, and exaggerated self-presentation. Comput. Hum. Behav. 28(2), 642\u2013647 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"33_CR66","doi-asserted-by":"crossref","unstructured":"Hancock, J.T., Toma, C., Ellison, N.: The truth about lying in online dating profiles. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 449\u2013452. ACM, April 2007","DOI":"10.1145\/1240624.1240697"},{"key":"33_CR67","unstructured":"McVeigh, T., Reidy, T.: Families who fear Isis is targeting their children urged to lock up their passports. Guard. (2015). https:\/\/www.theguardian.com\/society\/2015\/feb\/21\/syria-isis-uk-families-warned-lock-up-passports-daughters"},{"key":"33_CR68","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1207\/s15324834basp2802_8","volume":"28","author":"AE Kelly","year":"2006","unstructured":"Kelly, A.E., Rodriguez, R.R.: Publicly committing oneself to an identity. Basic Appl. Soc. Psychol. 28, 185\u2013191 (2006)","journal-title":"Basic Appl. Soc. Psychol."},{"key":"33_CR69","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1037\/0022-3514.63.3.435","volume":"63","author":"D Tice","year":"1992","unstructured":"Tice, D.: Self-concept shift and self-presentation: the looking glass self is also a magnifying glass. J. Pers. Soc. Psychol. 63, 435\u2013451 (1992)","journal-title":"J. Pers. Soc. Psychol."},{"key":"33_CR70","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1177\/0146167294201002","volume":"20","author":"BR Schlenker","year":"1994","unstructured":"Schlenker, B.R., Dlugolecki, D.W., Doherty, K.: The impact of self- presentations on self-appraisals and behavior: The power of public commitment. Pers. Soc. Psychol. Bull. 20, 20\u201333 (1994)","journal-title":"Pers. Soc. Psychol. Bull."},{"issue":"1","key":"33_CR71","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1177\/009365096023001001","volume":"23","author":"JB Walther","year":"1996","unstructured":"Walther, J.B.: Computer-mediated communication impersonal, interpersonal, and hyperpersonal interaction. Commun. Res. 23(1), 3\u201343 (1996)","journal-title":"Commun. Res."},{"key":"33_CR72","unstructured":"Walther, J.B., Parks, M.R.: Cues filtered out, cues filtered. In: Handbook of Interpersonal Communication, pp. 529\u2013563 (2002)"},{"issue":"1","key":"33_CR73","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/j.bushor.2009.09.003","volume":"53","author":"AM Kaplan","year":"2010","unstructured":"Kaplan, A.M., Haenlein, M.: Users of the world, unite! The challenges and opportunities of social media. Bus. Horiz. 53(1), 59\u201368 (2010)","journal-title":"Bus. Horiz."},{"key":"33_CR74","unstructured":"Anti-Defamation League: Best practices for responding to cyberhate (2014)"},{"key":"33_CR75","doi-asserted-by":"crossref","unstructured":"Harper, F.M., Frankowski, D., Drenner, S., Ren, Y., Kiesler, S., Terveen, L., Riedl, J.: Talk amongst yourselves: inviting users to participate in online conversations. In: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 62\u201371. ACM, January 2007","DOI":"10.1145\/1216295.1216313"},{"key":"33_CR76","unstructured":"Kiesler, S., Kraut, R., Resnick, P., Kittur, A.: Regulating behavior in online communities. In: Building Successful Online Communities: Evidence-Based Social Design. MIT Press, Cambridge (2012)"},{"key":"33_CR77","doi-asserted-by":"crossref","unstructured":"Lampe, C., Resnick, P.: Slash (dot) and burn: distributed moderation in a large online conversation space. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 543\u2013550. ACM, April 2004","DOI":"10.1145\/985692.985761"},{"issue":"1","key":"33_CR78","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/S0953-5438(98)00056-3","volume":"12","author":"J Preece","year":"1999","unstructured":"Preece, J.: Empathic communities: balancing emotional and factual communication. Interact. Comput. 12(1), 63\u201377 (1999)","journal-title":"Interact. Comput."}],"updated-by":[{"DOI":"10.1007\/978-3-319-58460-7_51","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T00:00:00Z","timestamp":1494633600000}}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,30]],"date-time":"2021-06-30T22:00:48Z","timestamp":1625090448000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":78,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"13 May 2017","order":2,"name":"change_date","label":"Change Date","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Correction","order":3,"name":"change_type","label":"Change Type","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This chapter was originally published without the inclusion of a Funding Disclosure Statement. This has been corrected.","order":4,"name":"change_details","label":"Change Details","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}