{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T23:26:37Z","timestamp":1777937197580,"version":"3.51.4"},"reference-count":134,"publisher":"SAGE Publications","issue":"11","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["New Media &amp; Society"],"published-print":{"date-parts":[[2024,11]]},"abstract":"<jats:p>\n                    Given that terrorism is omnipresent on social media, it is imperative to study how seeing terror content online is related to individuals\u2019 attitudes, behaviors, and emotions. This study investigates how exposure to terrorism on social media associates with terror-related online self-disclosure and how self-disclosure, in turn, relates to fear of terrorism. A quota-based survey of young social media users (16- to 25-year-olds;\n                    <jats:italic toggle=\"yes\">N<\/jats:italic>\n                    \u2009=\u2009864) in Germany revealed that exposure to Islamist and far-right terrorism is related to higher online self-disclosure. Political ideology moderated the relationship between exposure to far-right terrorism and online self-disclosure, but not when exposed to Islamist terrorism. Attitudinal differentiation was negatively associated with self-disclosure. Additionally, we found an interaction effect of exposure to Islamist terrorism and attitudinal differentiation on self-disclosure. Finally, the results showed that online self-disclosure was positively related to fear of terrorism. By and large, our findings highlight the relevance of social media for the levels of fear.\n                  <\/jats:p>","DOI":"10.1177\/14614448221148982","type":"journal-article","created":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T03:54:17Z","timestamp":1675223657000},"page":"6260-6288","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":10,"title":["See something, say something? The role of online self-disclosure on fear of terror among young social media users"],"prefix":"10.1177","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1557-4405","authenticated-orcid":false,"given":"Ruta","family":"Kaskeleviciute","sequence":"first","affiliation":[{"name":"University of Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Helena","family":"Knupfer","sequence":"additional","affiliation":[{"name":"University of Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9408-955X","authenticated-orcid":false,"given":"J\u00f6rg","family":"Matthes","sequence":"additional","affiliation":[{"name":"University of Vienna, Austria"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","published-online":{"date-parts":[[2023,2]]},"reference":[{"issue":"3","key":"e_1_3_4_2_1","first-page":"54","article-title":"Ethnicity and politics in contextualising far right and Islamist extremism","volume":"11","author":"Abbas T","year":"2017","unstructured":"Abbas T (2017) Ethnicity and politics in contextualising far right and Islamist extremism. Perspectives on Terrorism 11(3): 54\u201361.","journal-title":"Perspectives on Terrorism"},{"key":"e_1_3_4_3_1","doi-asserted-by":"publisher","DOI":"10.1525\/california\/9780520235946.001.0001"},{"key":"e_1_3_4_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/1750635214531110"},{"key":"e_1_3_4_5_1","unstructured":"Amarasingam A Maher S Winter C (2021) How Telegram disruption impacts jihadist platform migration. Available at: https:\/\/www.academia.edu\/download\/65377645\/21_002_01e.pdf"},{"key":"e_1_3_4_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/01419870.2017.1413200"},{"key":"e_1_3_4_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077699018803080"},{"key":"e_1_3_4_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/17577632.2020.1760474"},{"key":"e_1_3_4_9_1","unstructured":"Beisch VN Sch\u00e4fer C (2020) Internetnutzung mit gro\u00dfer Dynamik: Medien Kommunikation Social Media [Internet use with great dynamics: media communication social media]. Available at: https:\/\/www.ard-media.de\/fileadmin\/user_upload\/media-perspektiven\/pdf\/2020\/0920_Beisch_Schaefer_2020-11-1.pdf"},{"key":"e_1_3_4_10_1","unstructured":"Berger JM Morgan J (2015) The ISIS Twitter census: defining and describing the population of ISIS supporters on Twitter. Available at: https:\/\/www.brookings.edu\/wp-content\/uploads\/2016\/06\/isis_twitter_census_berger_morgan.pdf"},{"key":"e_1_3_4_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2017.1306748"},{"key":"e_1_3_4_12_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650220971142"},{"key":"e_1_3_4_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssresearch.2019.06.002"},{"key":"e_1_3_4_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/17405904.2021.1879185"},{"key":"e_1_3_4_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2011.03.003"},{"key":"e_1_3_4_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.86.2.307"},{"key":"e_1_3_4_17_1","first-page":"811","volume-title":"Encyclopedia of Social Psychology","author":"Brunell AB","year":"2007","unstructured":"Brunell AB (2007) Self-disclosure. In: Baumeister RF, Vohs KD (eds) Encyclopedia of Social Psychology. Thousand Oaks, CA: SAGE, pp. 811\u2013812."},{"key":"e_1_3_4_18_1","unstructured":"Bundesamt f\u00fcr Verfassungsschutz (2021) Verfassungsschutzbericht 2020 [Annual report of the Domestic Intelligence Agency 2020]. Bundesministerium des Inneren f\u00fcr Bau und Heimat. Available at: https:\/\/www.verfassungsschutz.de\/SharedDocs\/publikationen\/DE\/verfassungsschutzberichte\/2021-06-verfassungsschutzbericht-2020.pdf?__blob=publicationFile&v=8"},{"key":"e_1_3_4_19_1","doi-asserted-by":"publisher","DOI":"10.1111\/pops.12005"},{"key":"e_1_3_4_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.011"},{"key":"e_1_3_4_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.04.026"},{"key":"e_1_3_4_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/15295036.2017.1393096"},{"key":"e_1_3_4_23_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2850.2007.00078.x"},{"key":"e_1_3_4_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2020.1866730."},{"key":"e_1_3_4_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.evalprogplan.2004.10.002"},{"key":"e_1_3_4_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2008.12.001"},{"key":"e_1_3_4_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011128720981898"},{"key":"e_1_3_4_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2019.1647175"},{"key":"e_1_3_4_29_1","doi-asserted-by":"publisher","DOI":"10.1093\/jogss\/ogz081"},{"key":"e_1_3_4_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444820971786"},{"key":"e_1_3_4_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.294"},{"key":"e_1_3_4_32_1","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2019.1571696"},{"key":"e_1_3_4_33_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443715608259"},{"key":"e_1_3_4_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444818765484"},{"key":"e_1_3_4_35_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118813649"},{"key":"e_1_3_4_36_1","unstructured":"European Commission (2017) Standard\u2014Eurobarometer 87\u2014Spring 2017: public opinion in the European Union first results. Available at: https:\/\/webgate.ec.europa.eu\/ebsm\/api\/public\/deliverable\/download?doc=true&deliverableId=62559"},{"key":"e_1_3_4_37_1","unstructured":"European Commission (2020) A counter-terrorism agenda for the EU: anticipate prevent protect respond. Available at: https:\/\/ec.europa.eu\/home-affairs\/system\/files\/2020-12\/09122020_communication_commission_european_parliament_the_council_eu_agenda_counter_terrorism_po-2020-9031_com-2020_795_en.pdf"},{"key":"e_1_3_4_38_1","unstructured":"European Commission (2021) Standard\u2014Eurobarometer 95\u2014Spring 2021: public opinion in the European Union first results. Available at: https:\/\/europa.eu\/eurobarometer\/api\/deliverable\/download\/file?deliverableId=79223"},{"key":"e_1_3_4_39_1","unstructured":"European Commission (2022) Standard-Eurobarometer 96\u2014Winter 2021-2022: public opinion in the European Union first results. Available at: https:\/\/webgate.ec.europa.eu\/ebsm\/api\/public\/deliverable\/download?doc=true&deliverableId=81214"},{"key":"e_1_3_4_40_1","unstructured":"European Parliament (2022) Flash Eurobarometer\u2014Media & News Survey 2022. Available at: https:\/\/europa.eu\/eurobarometer\/surveys\/detail\/2832"},{"key":"e_1_3_4_41_1","unstructured":"Europol (2020) European Union terrorism situation and trend report (TE-SAT) 2020. Available at: https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/european-union-terrorism-situation-and-trend-report-te-sat-2020"},{"key":"e_1_3_4_42_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-0167.51.3.340"},{"key":"e_1_3_4_43_1","doi-asserted-by":"crossref","unstructured":"Ferrara E (2015) \u201cManipulation and abuse on social media\u201d by Emilio Ferrara with Ching-man Au Yeung as coordinator. In: ACM SIGWEB newsletter Spring pp. 1\u20139. Available at: https:\/\/dl.acm.org\/doi\/10.1145\/2749279.2749283","DOI":"10.1145\/2749279.2749283"},{"key":"e_1_3_4_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.07.030"},{"key":"e_1_3_4_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2006.10.004"},{"key":"e_1_3_4_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/0272-7358(88)90076-1"},{"key":"e_1_3_4_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444819899625"},{"key":"e_1_3_4_48_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0022381609990910"},{"key":"e_1_3_4_49_1","doi-asserted-by":"publisher","DOI":"10.1111\/ajps.12692."},{"key":"e_1_3_4_50_1","doi-asserted-by":"publisher","DOI":"10.14763\/2019.2.1407"},{"key":"e_1_3_4_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.63.2.212"},{"key":"e_1_3_4_52_1","doi-asserted-by":"publisher","DOI":"10.1177\/14648849211017003."},{"key":"e_1_3_4_53_1","doi-asserted-by":"publisher","DOI":"10.1080\/19434472.2015.1126341"},{"key":"e_1_3_4_54_1","volume-title":"Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-based Approach","author":"Hayes AF","year":"2017","unstructured":"Hayes AF (2017) Introduction to Mediation, Moderation, and Conditional Process Analysis: A Regression-based Approach. New York: Guilford Publications."},{"key":"e_1_3_4_55_1","doi-asserted-by":"publisher","DOI":"10.3758\/BRM.41.3.924"},{"key":"e_1_3_4_56_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21685"},{"key":"e_1_3_4_57_1","volume-title":"Inside terrorism","author":"Hoffman B","year":"2018","unstructured":"Hoffman B (2018) Inside terrorism. New York: Columbia University Press."},{"key":"e_1_3_4_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.030"},{"key":"e_1_3_4_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/19434472.2021.1903064."},{"key":"e_1_3_4_60_1","unstructured":"Institute for Economics & Peace (2020) Global Terrorism Index 2020: measuring the impact of terrorism. Available at: https:\/\/www.economicsandpeace.org\/wp-content\/uploads\/2020\/11\/GTI-2020-web-2.pdf"},{"key":"e_1_3_4_61_1","unstructured":"Institute for Economics & Peace (2022) Global Terrorism Index 2020: measuring the impact of terrorism. Available at: https:\/\/www.visionofhumanity.org\/wp-content\/uploads\/2022\/03\/GTI-2022-web_110522-1.pdf"},{"key":"e_1_3_4_62_1","volume-title":"Is Anyone Responsible? How Television Frames Political Issues","author":"Iyengar S","year":"1994","unstructured":"Iyengar S (1994) Is Anyone Responsible? How Television Frames Political Issues. Chicago, IL: University of Chicago Press."},{"key":"e_1_3_4_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/105846001750322998"},{"key":"e_1_3_4_64_1","doi-asserted-by":"publisher","DOI":"10.1111\/jasp.12243"},{"key":"e_1_3_4_65_1","first-page":"117","volume-title":"The McGraw Hill Homeland Security Handbook","author":"Jenkins BM","year":"2006","unstructured":"Jenkins BM (2006) The new age of terrorism. In: Kamien DG (ed.) The McGraw Hill Homeland Security Handbook. New York: McGraw-Hill Professional, pp. 117\u2013130."},{"key":"e_1_3_4_66_1","doi-asserted-by":"publisher","DOI":"10.1080\/09557571.2019.1705246"},{"key":"e_1_3_4_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2009.09.003"},{"key":"e_1_3_4_68_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2019.0255"},{"key":"e_1_3_4_69_1","doi-asserted-by":"publisher","DOI":"10.1177\/0163443715584101"},{"key":"e_1_3_4_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-99804-2_5"},{"key":"e_1_3_4_71_1","doi-asserted-by":"publisher","DOI":"10.1080\/07418825.2018.1524507"},{"key":"e_1_3_4_72_1","first-page":"156","volume-title":"Computer-mediated Communication in Personal Relationships","author":"Kim J","year":"2011","unstructured":"Kim J, Dindia K (2011) Online self-disclosure: a review of research. In: Wright KB, Webb LM (eds) Computer-mediated Communication in Personal Relationships. New York: Peter Lang, pp. 156\u2013180."},{"key":"e_1_3_4_73_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315648453"},{"key":"e_1_3_4_74_1","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2017.1369545"},{"key":"e_1_3_4_75_1","doi-asserted-by":"publisher","DOI":"10.1177\/0265407512449400"},{"key":"e_1_3_4_76_1","first-page":"192","volume-title":"Emotions, Cognition, and Behavior","author":"Lang PJ","year":"1984","unstructured":"Lang PJ (1984) Cognition in emotion: concept and action. In: Izard CE, Kagan J, Zajonc RB (eds) Emotions, Cognition, and Behavior. Cambridge: Cambridge University Press, pp. 192\u2013226."},{"key":"e_1_3_4_77_1","doi-asserted-by":"publisher","DOI":"10.1177\/13675494211005060"},{"key":"e_1_3_4_78_1","volume-title":"Salafi-jihadism: The History of an Idea","author":"Maher S","year":"2016","unstructured":"Maher S (2016) Salafi-jihadism: The History of an Idea. London: Hurst & Company."},{"key":"e_1_3_4_79_1","doi-asserted-by":"publisher","DOI":"10.1080\/1461670X.2020.1812422"},{"key":"e_1_3_4_80_1","doi-asserted-by":"publisher","DOI":"10.2196\/28700"},{"key":"e_1_3_4_81_1","doi-asserted-by":"publisher","DOI":"10.1111\/pops.12576"},{"key":"e_1_3_4_82_1","doi-asserted-by":"publisher","DOI":"10.1093\/isq\/sqaa034"},{"key":"e_1_3_4_83_1","doi-asserted-by":"publisher","DOI":"10.1080\/17539153.2022.2031132"},{"key":"e_1_3_4_84_1","doi-asserted-by":"publisher","DOI":"10.1177\/1940161212474472"},{"key":"e_1_3_4_85_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2021.1942957"},{"key":"e_1_3_4_86_1","unstructured":"Milmo C (2014) Iraq crisis exclusive: Isis jihadists using World Cup and Premier League hashtags to promote extremist propaganda on Twitter. The Independent 23 June. Available at: https:\/\/www.independent.co.uk\/news\/world\/middle-east\/iraq-crisis-exclusive-isis-jihadists-using-world-cup-and-premier-league-hashtags-promote-extremist-propaganda-twitter-9555167.html"},{"key":"e_1_3_4_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09917-x"},{"key":"e_1_3_4_88_1","doi-asserted-by":"publisher","DOI":"10.1037\/10621-000"},{"key":"e_1_3_4_89_1","doi-asserted-by":"publisher","DOI":"10.1177\/0030222817709691"},{"key":"e_1_3_4_90_1","doi-asserted-by":"publisher","DOI":"10.1177\/1473325012464383"},{"key":"e_1_3_4_91_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011128720922539"},{"key":"e_1_3_4_92_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011128712452961"},{"key":"e_1_3_4_93_1","doi-asserted-by":"publisher","DOI":"10.1080\/02699939308409206"},{"key":"e_1_3_4_94_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.67.1.92"},{"key":"e_1_3_4_95_1","doi-asserted-by":"publisher","DOI":"10.1002\/ejsp.2420100307"},{"key":"e_1_3_4_96_1","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2019.1613279"},{"key":"e_1_3_4_97_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327957pspr0902_2"},{"key":"e_1_3_4_98_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.42.6.1051"},{"key":"e_1_3_4_99_1","unstructured":"Pew Research Center (2021) Social media fact sheet. Available at: https:\/\/www.pewresearch.org\/internet\/fact-sheet\/social-media\/"},{"key":"e_1_3_4_100_1","doi-asserted-by":"publisher","DOI":"10.1080\/09546550802544698"},{"key":"e_1_3_4_101_1","doi-asserted-by":"publisher","DOI":"10.1111\/1475-6765.12538."},{"key":"e_1_3_4_102_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.106.4.835"},{"key":"e_1_3_4_103_1","doi-asserted-by":"publisher","DOI":"10.1111\/1475-6765.12254"},{"key":"e_1_3_4_104_1","doi-asserted-by":"publisher","DOI":"10.1177\/1750635219829165"},{"key":"e_1_3_4_105_1","doi-asserted-by":"publisher","DOI":"10.1080\/14792779843000072"},{"key":"e_1_3_4_106_1","doi-asserted-by":"publisher","DOI":"10.1080\/14792779243000078"},{"key":"e_1_3_4_107_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.77.5.905"},{"key":"e_1_3_4_108_1","doi-asserted-by":"publisher","DOI":"10.1080\/17539153.2019.1579777"},{"key":"e_1_3_4_109_1","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2021.1877673."},{"key":"e_1_3_4_110_1","doi-asserted-by":"publisher","DOI":"10.1177\/0011128720940984"},{"key":"e_1_3_4_111_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022002700044004005"},{"key":"e_1_3_4_112_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.12193"},{"key":"e_1_3_4_113_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3523-6_12"},{"key":"e_1_3_4_114_1","doi-asserted-by":"publisher","DOI":"10.1163\/21659214-00801007"},{"key":"e_1_3_4_115_1","doi-asserted-by":"publisher","DOI":"10.1177\/1750635219846033"},{"key":"e_1_3_4_116_1","doi-asserted-by":"publisher","DOI":"10.17645\/mac.v4i4.593"},{"key":"e_1_3_4_117_1","doi-asserted-by":"publisher","DOI":"10.1177\/1527476417747653"},{"key":"e_1_3_4_118_1","first-page":"276","volume-title":"Psychology of Intergroup Relations","author":"Tajfel H","year":"1986","unstructured":"Tajfel H, Turner JC (1986) The social identity theory of intergroup behavior. In: Worchel S, Austin LW (eds) Psychology of Intergroup Relations. Chicago, IL: Nelson-Hall, pp. 276\u2013293."},{"key":"e_1_3_4_119_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.020"},{"key":"e_1_3_4_120_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327965PLI1103_03"},{"key":"e_1_3_4_121_1","volume-title":"Who Is Charlie? Xenophobia and the New Middle Class","author":"Todd E","year":"2015","unstructured":"Todd E (2015) Who Is Charlie? Xenophobia and the New Middle Class. Cambridge: Polity Press."},{"key":"e_1_3_4_122_1","doi-asserted-by":"publisher","DOI":"10.1080\/17512786.2020.1854052"},{"key":"e_1_3_4_123_1","doi-asserted-by":"publisher","DOI":"10.2224\/sbp.2007.35.1.63"},{"key":"e_1_3_4_124_1","doi-asserted-by":"publisher","DOI":"10.1177\/0093650218803276"},{"key":"e_1_3_4_125_1","doi-asserted-by":"publisher","DOI":"10.1080\/15205436.2017.1342131"},{"key":"e_1_3_4_126_1","doi-asserted-by":"publisher","DOI":"10.1177\/1464884921990223"},{"key":"e_1_3_4_127_1","unstructured":"Wakefield J (2019) Christchurch shootings: social media races to stop attack footage. BBC News 16 March. Available at: https:\/\/www.bbc.com\/news\/technology-47583393"},{"key":"e_1_3_4_128_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1983.tb02372.x"},{"key":"e_1_3_4_129_1","volume-title":"Terrorism in Cyberspace: The Next Generation","author":"Weimann G","year":"2015","unstructured":"Weimann G (ed.) (2015) Terrorism in Cyberspace: The Next Generation. New York: Columbia University Press."},{"key":"e_1_3_4_130_1","doi-asserted-by":"publisher","DOI":"10.1080\/13602004.2017.1345103"},{"key":"e_1_3_4_131_1","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2019.1569519"},{"issue":"1","key":"e_1_3_4_132_1","first-page":"1","article-title":"Online extremism: research trends in internet activism, radicalization, and counter-strategies","volume":"14","author":"Winter C","year":"2020","unstructured":"Winter C, Neumann P, Meleagrou-Hitchens A, et al. (2020) Online extremism: research trends in internet activism, radicalization, and counter-strategies. International Journal of Conflict and Violence 14(1): 1\u201320.","journal-title":"International Journal of Conflict and Violence"},{"key":"e_1_3_4_133_1","doi-asserted-by":"publisher","DOI":"10.1080\/17539153.2021.1932298"},{"key":"e_1_3_4_134_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.05.043"},{"key":"e_1_3_4_135_1","unstructured":"Z\u00f6ller M (2014) Strafrechtliche Verfolgung von Terrorismus und politischem Extremismus unter dem Einfluss des Rechts der Europ\u00e4ischen Union [Criminal prosecution of terrorism and political extremism under the influence of European Union Law]. Zeitschrift F\u00fcr Internationale Strafrechtsdogmatik 9: 402\u2013411. Available at: www.zis-online.com\/dat\/artikel\/2014_9_846.pdf"}],"container-title":["New Media &amp; Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448221148982","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/14614448221148982","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/14614448221148982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T03:57:21Z","timestamp":1777694241000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/14614448221148982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":134,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10.1177\/14614448221148982"],"URL":"https:\/\/doi.org\/10.1177\/14614448221148982","relation":{},"ISSN":["1461-4448","1461-7315"],"issn-type":[{"value":"1461-4448","type":"print"},{"value":"1461-7315","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2]]}}}