{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:24:04Z","timestamp":1759962244801,"version":"3.41.2"},"reference-count":46,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["AJIM"],"published-print":{"date-parts":[[2019,12,19]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to explore the use of community question answering sites (CQAs) on the topic of terrorism. Three research questions are investigated: what are the dominant themes reflected in terrorism-related questions? How do answer characteristics vary with question themes? How does users\u2019 anonymity relate to question themes and answer characteristics?<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>Data include 300 questions that attracted 2,194 answers on the community question answering Yahoo! Answers. Content analysis was employed.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>The questions reflected the community\u2019s information needs ranging from the life of extremists to counter-terrorism policies. Answers were laden with negative emotions reflecting hate speech and Islamophobia, making claims that were rarely verifiable. Users who posted sensitive content generally remained anonymous.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Practical implications<\/jats:title>\n<jats:p>This paper raises awareness of how CQAs are used to exchange information about sensitive topics such as terrorism. It calls for governments and law enforcement agencies to collaborate with major social media companies to develop a process for cross-platform blacklisting of users and content, as well as identifying those who are vulnerable.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Theoretically, it contributes to the academic discourse on terrorism in CQAs by exploring the type of questions asked, and the sort of answers they attract. Methodologically, the paper serves to enrich the literature around terrorism and social media that has hitherto mostly drawn data from Facebook and Twitter.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ajim-08-2019-0204","type":"journal-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:42:21Z","timestamp":1578454941000},"page":"1-16","source":"Crossref","is-referenced-by-count":6,"title":["The topic of terrorism on Yahoo! Answers: questions, answers and users\u2019 anonymity"],"prefix":"10.1108","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5603-2453","authenticated-orcid":false,"given":"Alton Y.K.","family":"Chua","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6355-0470","authenticated-orcid":false,"given":"Snehasish","family":"Banerjee","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"year":"2008","first-page":"183","article-title":"Finding high-quality content in social media","key":"key2020010808421465900_ref001"},{"key":"key2020010808421465900_ref002","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1016\/j.chb.2015.09.009","article-title":"Psychological factors behind the lack of participation in online discussions","volume":"55","year":"2016","journal-title":"Computers in Human Behavior"},{"issue":"1","key":"key2020010808421465900_ref003","first-page":"1","article-title":"Islamophobia on social media: a qualitative analysis of the Facebook\u2019s Walls of Hate","volume":"10","year":"2016","journal-title":"International Journal of Cyber Criminology"},{"unstructured":"BBC (2017), \u201cTrump\u2019s executive order: who does travel ban affect?\u201d, BBC, 10 February, available at: www.bbc.co.uk\/news\/world-us-canada-38781302 (accessed 16 April 2019).","key":"key2020010808421465900_ref004"},{"issue":"9","key":"key2020010808421465900_ref005","doi-asserted-by":"crossref","first-page":"590","DOI":"10.17705\/1jais.00437","article-title":"Graph-based cluster analysis to identify similar questions: a design science approach","volume":"17","year":"2016","journal-title":"Journal of the Association for Information Systems"},{"unstructured":"Bond, D. and Findlay, S. (2019), \u201cSri Lanka attacks spark fears of ISIS resurgence\u201d, Financial Times, 24 April, available at: www.ft.com\/content\/6981d396-661d-11e9-9adc-98bf1d35a056 (accessed 1 June 2019).","key":"key2020010808421465900_ref006"},{"issue":"1","key":"key2020010808421465900_ref007","first-page":"1","article-title":"Eating disorder questions in Yahoo! Answers: information, conversation, or reflection?","volume":"49","year":"2012","journal-title":"Proceedings of the Association for Information Science and Technology"},{"issue":"10","key":"key2020010808421465900_ref008","first-page":"2058","article-title":"So fast so good: an analysis of answer quality and answer speed in community question-answering sites","volume":"64","year":"2013","journal-title":"Journal of the Association for Information Science and Technology"},{"issue":"1","key":"key2020010808421465900_ref009","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1177\/0002716216672896","article-title":"Terrorism in perspective: a review for the next American President","volume":"668","year":"2016","journal-title":"The Annals of the American Academy of Political and Social Science"},{"unstructured":"Dearden, L. (2014), \u201cIsis vs Islamic State vs Isil vs Daesh: what do the different names mean \u2013 and why does it matter?\u201d, The Independent, 23 September, available at: www.independent.co.uk\/news\/world\/middle-east\/isis-vs-islamic-state-vs-isil-vs-daesh-what-do-the-different-names-mean-9750629.html (accessed 14 April 2019).","key":"key2020010808421465900_ref010"},{"issue":"5","key":"key2020010808421465900_ref011","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1177\/0165551511415584","article-title":"A comparative assessment of answer quality on four question answering sites","volume":"37","year":"2011","journal-title":"Journal of Information Science"},{"issue":"1","key":"key2020010808421465900_ref012","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1111\/1745-9133.12249","article-title":"Terrorist use of the internet by the numbers","volume":"16","year":"2017","journal-title":"Criminology & Public Policy"},{"unstructured":"Gunaratna, R., Bashar, I., Alkaff, S.H., Mahzam, R. and Soliev, N. (2018), \u201cGlobal threat assessment\u201d, available at: www.rsis.edu.sg\/rsis-publication\/icpvtr\/counter-terrorist-trends-and-analyses-ctta-volume-10-issue-01 (accessed 14 April 2019).","key":"key2020010808421465900_ref013"},{"issue":"7","key":"key2020010808421465900_ref014","article-title":"Question types in social Q&A sites","volume":"15","year":"2010","journal-title":"First Monday"},{"volume-title":"Qualitative Research in Nursing and Healthcare","year":"2010","key":"key2020010808421465900_ref015"},{"issue":"2","key":"key2020010808421465900_ref016","first-page":"102","article-title":"How can we deter cyber terrorism?","volume":"21","year":"2012","journal-title":"Information Security Journal: A Global Perspective"},{"issue":"7","key":"key2020010808421465900_ref017","doi-asserted-by":"crossref","first-page":"928","DOI":"10.1016\/j.im.2018.04.008","article-title":"Are we ready for cyberterrorist attacks? Examining the role of individual resilience","volume":"55","year":"2018","journal-title":"Information & Management"},{"issue":"2","key":"key2020010808421465900_ref018","first-page":"1","article-title":"This is not your mother\u2019s terrorism: social media, online radicalization and the practice of political jamming","volume":"6","year":"2015","journal-title":"Journal of Terrorism Research"},{"issue":"4","key":"key2020010808421465900_ref019","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1080\/14680777.2012.741073","article-title":"\u2018Your a ugly, whorish, slut\u2019 understanding e-bile","volume":"14","year":"2014","journal-title":"Feminist Media Studies"},{"year":"2006","first-page":"228","article-title":"A framework to predict the quality of answers with non-textual features","key":"key2020010808421465900_ref020"},{"key":"key2020010808421465900_ref022","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.chb.2017.09.022","article-title":"Did the risk of exposure to online hate increase after the November 2015 Paris attacks? A group relations approach","volume":"78","year":"2018","journal-title":"Computers in Human Behavior"},{"issue":"4","key":"key2020010808421465900_ref023","doi-asserted-by":"crossref","first-page":"6","DOI":"10.11114\/ijsss.v5i4.2265","article-title":"Defining the good citizen: online conceptions of American members of the Yahoo! Answers community","volume":"5","year":"2017","journal-title":"International Journal of Social Science Studies"},{"doi-asserted-by":"crossref","unstructured":"King, N. (2004), \u201cUsing templates in the thematic analysis of text\u201d, in Cassell, C. and Symon, G. (Eds), Essential Guide to Qualitative Methods in Organizational Research, Sage, London, pp. 256-270.","key":"key2020010808421465900_ref024","DOI":"10.4135\/9781446280119.n21"},{"issue":"1","key":"key2020010808421465900_ref025","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/1057610X.2014.974948","article-title":"Tweeting the Jihad: social media networks of western foreign fighters in Syria and Iraq","volume":"38","year":"2015","journal-title":"Studies in Conflict & Terrorism"},{"issue":"1","key":"key2020010808421465900_ref026","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1111\/1745-9133.12292","article-title":"Terrorism and the internet","volume":"16","year":"2017","journal-title":"Criminology & Public Policy"},{"issue":"10","key":"key2020010808421465900_ref027","doi-asserted-by":"crossref","first-page":"1246","DOI":"10.1002\/asi.24042","article-title":"Retrieving people: identifying potential answerers in community question-answering","volume":"69","year":"2018","journal-title":"Journal of the Association for Information Science & Technology"},{"unstructured":"Leetaru, K. (2018), \u201cCan we finally stop terrorists from exploiting social media?\u201d, available at: www.forbes.com\/sites\/kalevleetaru\/2018\/10\/09\/can-we-finally-stop-terrorists-from-exploiting-social-media\/#1c101bc96d80 (accessed 24 October 2019).","key":"key2020010808421465900_ref028"},{"issue":"3","key":"key2020010808421465900_ref029","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1080\/13811118.2012.695274","article-title":"Seeking validation in unlikely places: the nature of online questions about non-suicidal self-injury","volume":"16","year":"2012","journal-title":"Archives of Suicide Research"},{"issue":"3","key":"key2020010808421465900_ref030","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1108\/AJIM-11-2017-0246","article-title":"Characterizing peer-judged answer quality on academic Q&A sites: a cross-disciplinary case study on ResearchGate","volume":"70","year":"2018","journal-title":"Aslib Journal of Information Management"},{"unstructured":"Lomas, N. (2018), \u201cTwitter claims more progress on squeezing terrorist content\u201d, available at: https:\/\/techcrunch.com\/2018\/04\/05\/twitter-transparency-report-12\/ (accessed 24 October 2019).","key":"key2020010808421465900_ref031"},{"issue":"4","key":"key2020010808421465900_ref032","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1108\/10662240710828030","article-title":"Understanding intention to continuously share information on weblogs","volume":"17","year":"2007","journal-title":"Internet Research"},{"issue":"1","key":"key2020010808421465900_ref033","first-page":"163","article-title":"Facebook, defamation, and terrorism: who is responsible for dangerous posts on social media?","volume":"26","year":"2017","journal-title":"Tulane Journal of International and Comparative Law"},{"issue":"3","key":"key2020010808421465900_ref034","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1089\/cyber.2018.0210","article-title":"A qualitative analysis of internet trolling","volume":"22","year":"2019","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"volume-title":"Qualitative Data Analysis","year":"2013","key":"key2020010808421465900_ref035"},{"year":"2017","first-page":"85","article-title":"A measurement study of hate speech in social media","key":"key2020010808421465900_ref036"},{"issue":"1","key":"key2020010808421465900_ref037","first-page":"1","article-title":"The relationships between motivations and answering strategies: an exploratory review of health answerers\u2019 behaviors in Yahoo! Answers","volume":"48","year":"2011","journal-title":"Proceedings of the Association for Information Science and Technology"},{"issue":"1","key":"key2020010808421465900_ref038","doi-asserted-by":"crossref","first-page":"13","DOI":"10.17705\/1thci.00005","article-title":"The reader-to-leader framework: motivating technology-mediated social participation","volume":"1","year":"2009","journal-title":"AIS Transactions on Human-Computer Interaction"},{"key":"key2020010808421465900_ref039","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.ijinfomgt.2018.05.003","article-title":"Identifying reputation collectors in community question answering (CQA) sites: exploring the dark side of social media","volume":"42","year":"2018","journal-title":"International Journal of Information Management"},{"volume-title":"Doing Qualitative Research","year":"2013","edition":"4th ed.","key":"key2020010808421465900_ref040"},{"year":"2015","first-page":"458","article-title":"One-day flies on stack overflow: why the vast majority of stack overflow users only posts once","key":"key2020010808421465900_ref041"},{"unstructured":"Steinbach, M. (2016), \u201cISIL online: countering terrorist radicalization and recruitment on the internet and social media\u201d, FBI News, 6 July, available at: www.fbi.gov\/news\/testimony\/isil-online-countering-terrorist-radicalization-and-recruitment-on-the-internet-and-social-media- (accessed 14 April 2019).","key":"key2020010808421465900_ref042"},{"volume-title":"Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory","year":"1998","key":"key2020010808421465900_ref043"},{"issue":"3","key":"key2020010808421465900_ref044","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1089\/1094931041291295","article-title":"The online disinhibition effect","volume":"7","year":"2004","journal-title":"Cyberpsychology & Behavior"},{"unstructured":"Suzuki, J. (2018), \u201cIndonesia grapples with terror threat as Islamic militants return\u201d, Nikkei Asian Review, 15 May, available at: https:\/\/asia.nikkei.com\/Politics\/International-Relations\/Indonesia-grapples-with-terror-threat-as-Islamic-militants-return (accessed 15 April 2019).","key":"key2020010808421465900_ref045"},{"volume-title":"The Black Swan: The Impact of the Highly Improbable","year":"2007","key":"key2020010808421465900_ref046"},{"issue":"2","key":"key2020010808421465900_ref047","first-page":"75","article-title":"Lone wolves in cyberspace","volume":"3","year":"2012","journal-title":"Journal of Terrorism Research"}],"container-title":["Aslib Journal of Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-08-2019-0204\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/AJIM-08-2019-0204\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:01:06Z","timestamp":1753398066000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ajim\/article\/72\/1\/1-16\/41277"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,19]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12,19]]}},"alternative-id":["10.1108\/AJIM-08-2019-0204"],"URL":"https:\/\/doi.org\/10.1108\/ajim-08-2019-0204","relation":{},"ISSN":["2050-3806"],"issn-type":[{"type":"print","value":"2050-3806"}],"subject":[],"published":{"date-parts":[[2019,12,19]]}}}