No Cover Image

Book chapter 157 views

Online Terrorism

Katy Vaughan Orcid Logo

Routledge Handbook of Online Violent Extremism

Swansea University Author: Katy Vaughan Orcid Logo

Abstract

Terrorists have always adopted the most advanced technologies available to them. The focus of this chapter is the intersection of terrorism and the online realm, a topic that has long been of interest to researchers, policymakers, and practitioners alike. The chapter considers the online as a site f...

Full description

Published in: Routledge Handbook of Online Violent Extremism
Published: Routledge
URI: https://cronfa.swan.ac.uk/Record/cronfa70953
first_indexed 2025-11-21T00:12:32Z
last_indexed 2026-01-16T05:32:48Z
id cronfa70953
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2026-01-15T12:55:15.8232726</datestamp><bib-version>v2</bib-version><id>70953</id><entry>2025-11-21</entry><title>Online Terrorism</title><swanseaauthors><author><sid>3004372545efc989f9de1eb456d20c6c</sid><ORCID>0000-0001-5025-5747</ORCID><firstname>Katy</firstname><surname>Vaughan</surname><name>Katy Vaughan</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2025-11-21</date><deptcode>HRCL</deptcode><abstract>Terrorists have always adopted the most advanced technologies available to them. The focus of this chapter is the intersection of terrorism and the online realm, a topic that has long been of interest to researchers, policymakers, and practitioners alike. The chapter considers the online as a site for both substantive acts of (cyber)terrorism, as well as a much wider range of preparatory, facilitative and supportive forms of terrorism-related activity. It then examines the principal powers that states have deployed against online terrorism and the responses that have been developed by the tech industry itself. Evident throughout is the tension between, on the one hand, ensuring that contemporary understandings of terrorism reflect the latest technological developments and that counterterrorism powers enable early intervention and prevention and, on the other hand, the importance of clearly defined powers that do not overreach for various reasons, including the protection of fundamental human rights.</abstract><type>Book chapter</type><journal>Routledge Handbook of Online Violent Extremism</journal><volume/><journalNumber/><paginationStart/><paginationEnd/><publisher>Routledge</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic/><keywords>terrorist content, terrorism, violent extremism, cyberterrorism, content moderation, online regulation</keywords><publishedDay>0</publishedDay><publishedMonth>0</publishedMonth><publishedYear>0</publishedYear><publishedDate>0001-01-01</publishedDate><doi/><url/><notes/><college>COLLEGE NANME</college><department>Hillary Rodham Clinton Law School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>HRCL</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2026-01-15T12:55:15.8232726</lastEdited><Created>2025-11-21T00:00:24.3239074</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Katy</firstname><surname>Vaughan</surname><orcid>0000-0001-5025-5747</orcid><order>1</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2026-01-15T12:55:15.8232726 v2 70953 2025-11-21 Online Terrorism 3004372545efc989f9de1eb456d20c6c 0000-0001-5025-5747 Katy Vaughan Katy Vaughan true false 2025-11-21 HRCL Terrorists have always adopted the most advanced technologies available to them. The focus of this chapter is the intersection of terrorism and the online realm, a topic that has long been of interest to researchers, policymakers, and practitioners alike. The chapter considers the online as a site for both substantive acts of (cyber)terrorism, as well as a much wider range of preparatory, facilitative and supportive forms of terrorism-related activity. It then examines the principal powers that states have deployed against online terrorism and the responses that have been developed by the tech industry itself. Evident throughout is the tension between, on the one hand, ensuring that contemporary understandings of terrorism reflect the latest technological developments and that counterterrorism powers enable early intervention and prevention and, on the other hand, the importance of clearly defined powers that do not overreach for various reasons, including the protection of fundamental human rights. Book chapter Routledge Handbook of Online Violent Extremism Routledge terrorist content, terrorism, violent extremism, cyberterrorism, content moderation, online regulation 0 0 0 0001-01-01 COLLEGE NANME Hillary Rodham Clinton Law School COLLEGE CODE HRCL Swansea University 2026-01-15T12:55:15.8232726 2025-11-21T00:00:24.3239074 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Katy Vaughan 0000-0001-5025-5747 1
title Online Terrorism
spellingShingle Online Terrorism
Katy Vaughan
title_short Online Terrorism
title_full Online Terrorism
title_fullStr Online Terrorism
title_full_unstemmed Online Terrorism
title_sort Online Terrorism
author_id_str_mv 3004372545efc989f9de1eb456d20c6c
author_id_fullname_str_mv 3004372545efc989f9de1eb456d20c6c_***_Katy Vaughan
author Katy Vaughan
author2 Katy Vaughan
format Book chapter
container_title Routledge Handbook of Online Violent Extremism
institution Swansea University
publisher Routledge
college_str Faculty of Humanities and Social Sciences
hierarchytype
hierarchy_top_id facultyofhumanitiesandsocialsciences
hierarchy_top_title Faculty of Humanities and Social Sciences
hierarchy_parent_id facultyofhumanitiesandsocialsciences
hierarchy_parent_title Faculty of Humanities and Social Sciences
department_str Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law
document_store_str 0
active_str 0
description Terrorists have always adopted the most advanced technologies available to them. The focus of this chapter is the intersection of terrorism and the online realm, a topic that has long been of interest to researchers, policymakers, and practitioners alike. The chapter considers the online as a site for both substantive acts of (cyber)terrorism, as well as a much wider range of preparatory, facilitative and supportive forms of terrorism-related activity. It then examines the principal powers that states have deployed against online terrorism and the responses that have been developed by the tech industry itself. Evident throughout is the tension between, on the one hand, ensuring that contemporary understandings of terrorism reflect the latest technological developments and that counterterrorism powers enable early intervention and prevention and, on the other hand, the importance of clearly defined powers that do not overreach for various reasons, including the protection of fundamental human rights.
published_date 0001-01-01T05:34:02Z
_version_ 1856987036707192832
score 11.096068