Exploring the capabilities of Prevent in addressing radicalisation in cyberspace within Higher Education
Keywords:
Prevent Duty, Counter Terrorism, Radicalisation, Higher Education, Counter-narrativesAbstract
The Counter Terrorism and Security Act (2015) introduced a binding duty on public sector bodies in the United Kingdom (UK), including education, to have ‘due regard to the need to prevent people from being drawn into terrorism’. The Prevent duty has become widely controversial in the Higher Education (HE) sector with questions as to whether it contravenes academic freedom and freedom of speech.
This research seeks to identify how Prevent may be applied to cyberspace to reduce risk of students being radicalised online at universities. Through semi-structured interviews (N= 16) with individuals working in Prevent and HE, attention is given to the capability of monitoring and filtering website content, which must be considered by universities as part of Prevent compliance. In addition, non-technical methods of reducing radicalisation in cyberspace are explored. Consideration is given to building students’ resilience to challenging information they see online through developing counter-narrative content for social media platforms. With students developing counter-narrative content themselves, specifically addressing vulnerability drivers to radicalisation, universities can enhance compliance with Prevent and create counter extremist content which can be used in cyberspace both in and outside of HE.References
Abdulhamid, S and Ibrahim, F, 2014. Controlling citizens cyber viewing using enhanced internet content filters Information Technology and Computer Science, 12 (1), 56-63
Acik, N., Deakin, H and Hindle, R, 2018. Safeguarding, surveillance and control: school policy and practice responses to the Prevent duty in the ‘war on terror’ in the UK, The Palgrave International Handbook of School Discipline, Surveillance, and Social Control, 467-489
Aloi, G., Di Felice, M., Loscri, V., Pace, P and Ruggeri, G, 2014. Spontaneous smartphone networks as user-centric solution for the future internet, Communications Magazine, 52 (12), 26-33
Araujo, T., Neijens, P and Vliegenthart, 2015. What motivates consumers to retweet brand content? The impact of information, emotion and traceability on pass-along behaviour, Journal of Advertising Research, 55 (3), 284-295
Awan, I, 2017. Cyber extremism: ISIS and the power of social media, Society, 54 (2), 138
Barber, N and King, J, 2017. Henry Pearce: some thought on the encryption regulatory debate, UK Constitutional Law Association, 4 (25), 8-15
Barratt, M., Choi, T and Li, M, 2011. Qualitative case studies in operations management: trends, research outcomes, and future research implications, Journal of Operations Management, 29 (4), 329-342
Bertram, L, 2016. Terrorism, the internet and the social media advantage: exploring how terrorist organisations exploit aspects of the internet , social media and how these same platforms could be used to counter violent extremism, Journal for Deradicalisation, 7 (1), 225-252
Braun, V and Clarke, V, 2006. Using thematic analysis in psychology. Qualitative Research in Psychology, 3, 77-101
Burnard, P, 1991. A method of analysing interview transcripts in qualitative research, Nurse Education Today, 11 (6), 461-446
Busher, J., Choudhury, T., Thomas, P and Harris, G (2017). What the Prevent duty means for schools and colleges in England: An analysis of educationalists’ experiences. Research Report. Aziz Foundation
Cerekovic, A., Aran, O and Gatica-Perez, 2017. Rapport with virtual agents: what do human social cues and personalities explain?, Transactions on Affective Computering, 8 (3), 382-395
Ceron, A and Memoli, V, 2016. Flames and debates: do social media affect satisfaction with democracy?, Social Indicators Research, 126 (1), 255-240
Considine, B., Krahel, J., Lenk, M and Janvrin, D, 2016. Social technology: a compendium of short cases, Issues in Accounting Education, 31 (4), 417-430
Coppock, V and McGovern, 2014. ‘Dangerous minds’? Deconstructing counter terrorism discourse, radicalisation and the ‘psychological vulnerability’ of Muslim children and young people in Britain, Children and Society, 28 (3), 242-256
Cornell, H, 2016. Counter terrorism, radicalisation, and the university: debating the Prevent Strategy, Global Justice Academy Blog, 1 (20), 9-15
Costa, D, 2015. First word, PC Magazine, 1 (1), 6-8
Counter Terrorism and Security Act (2015). Available at http://www.legislation.gov.uk/ukpga/2015/6/pdfs/ukpga_20150006_en.pdf (Accessed: 7th November 2016)
Cozine, K, 2016. Social media and the globalisation of Sicarii, Global Security Studies, 7 (1), 1-12
Cram, I and Fenwick, H, 2018. Protecting free speech and academic freedom in universities, Modern Law Review, 81 (5), 825-873
Curren, R, 2017. Why character education?, Impact, 24 (1), 1-44
Davies, M, 2015. Academic freedom: a lawyer’s perspective, The International Journal of Higher Education Research, 70 (6), 987-1002
Durodie, B, 2016. Securitising education to prevent terrorism or losing direction?, British Journal of Educational Studies, 64 (1), 21-35
Elton-Chalcraft, S., Lander, V., Revell, L., Warner, D and Whitworth, L, 2017. To promote, or not to promote fundamental British values? Teachers’ standards, diversity and teacher education, British Educational Research Journal, 43 (1), 29-48
Extreme Dialogue (2017). About Extreme Dialogue, Available at http://extremedialogue.org/about/ (Accessed: 15th March 2017)
Goodman, S., Kirk, J and Kirk, M, 2007. Cyberspace as a medium for terrorists, Terrorism and Technology, Technological Forecasting and Social Change, 74 (2), 193-210
Guiora, L, 2018. Inciting terrorism on the internet: the limits of tolerating intolerance, Incitement to Terrorism, 253 (1), 1-10
Hare, C, 2017. Digital surveillance detrimental to learning, expert says, ATA News, 51 (10), 12-13
Heath-Kelly, C and Strausz, E, 2018. The banality of counterterrorism ‘after, after 9/11’? perspectives on the Prevent duty from the UK health care sector, Critical Studies on Terrorism, DOI: 10.1080/17539153.2018.1494123
Institute for Strategic Dialogue (2019). Innovation Fund Round 1 Awarded Projects, Available at https://www.isdglobal.org/innovation-fund/innovation-fund-round-1/ (Accessed: 14th April 2019)
Isaacson, S, 2016. Finding something more in targeted cyberspace activities, Rutgers University Law Review, 68 (1), 905
Lee, P., Hui, S and Fong, A, 2005. An intelligent categorisation for bilingual web content filtering, Transactions on Multimedia, 7 (6), 1183-1190
Loughry, M and Tosi, H, 2008. Performance implications of peer monitoring, Organisation Science, 19 (6), 876-890
McNicol, S, 2016. Responding to concerns about online radicalisation in UK schools through a radicalisation critical digital literacy approach, Computers in the Schools, 33 (4), 227-238
McQueeney, K, 2014. Disrupting Islamophobia: teaching the social construction of terrorism in the mass media, International Journal of Teaching and Learning in Higher Education, 26 (2), 297-309
Miah, S, 2017. The Prevent policy and the values discourse: Muslims and radical governmentality, Muslim Students, Education and Neoliberalism: Schooling a ‘suspect community’, 1 (1), 131-144
NUS (2015). Preventing Prevent handbook. Available at http://www.nusconnect.org.uk/articles/preventing-prevent-handbooks (Accessed: 20th March 2017)
O’Connor, K., Schmidt, G and Drouin, M, 2016. Suspended because of social media? Students’ knowledge and opinions of university social media policies and practices, Computers in Human Behaviour, 65 (6), 619-626
Pal. S, 2015. Spies, surveillance and stakeouts: Monitoring Muslim moves in British State Schools, Race, Ethnicity and Education, 18 (2), 183-201
Prevent Duty Guidance for Higher Education Institutions in England and Wales (2015). Available at https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/445916/Prevent_Duty_Guidance_For_Higher_Education__England__Wales_.pdf (Accessed: 12th March 2017)
Prevent Duty Guidance for Higher Education Institutions in Scotland (2015). Available at https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/445921/Prevent_Duty_Guidance_For_Higher_Education__Scotland_-Interactive.pdf (Accessed: 20th November 2017)
Ribeiro, J, 2015. Facebook to widen use of safety check tool beyond Paris attacks, PC World, 1 (1), 1
Santoro, D, 2018. A cosmopolitanism of fear: the global significance of terrorism after 9/11, Knowledge Cultures, 6 (3), 28-42
Straw, W, 2016. How do you get people to leave Islamist or neo-nazi movements?, Left foot forward: Evidence Based Political Blogging, 8 (5), 36-45
Streitwieser, B., Kristen, A., & Duffy-Jaeger, K, 2019. Higher Education in an Era of Violent Extremism: Exploring Tensions Between National Security and Academic Freedom. JD Journal for Deradicalisation, Spring 2019 (18), 74-107
Sukarieh, M and Tannock, S, 2016. The deradicalisation of education: terror, youth and the assault on learning, Race and Class, 57 (4), 22-38
Terrazas-Arellanes, F., Knox, C., Anderson-Inman, L., Walden, D and Hildreth, 2016. The SOAR strategies for online academic research, Special and Gifted Education, 1 (1), 351-389
Theohary, C and Rollins, J, 2011. Terrorist use of the internet: information operations in cyberspace, International Journal of Terrorism and Political Hot Spots, 6 (4), 597-614
Thorne, A, 2015. Social media, civility and free expression, Academic Questions, 28 (3), 334-338
Vanderbeck, R and Johnson, P, 2016. The promotion of British values: sexual orientation equality, religion, and English schools, International Journal of Law, Policy and the Family, 30 (3), 292-321
Weimann, G (2014). New Terrorism and New Media. Washington, DC: Commons Lab of the Woodrow Wilson International Center for Scholars
Wolff, J and Lehr, W, 2018. When cyber threats loom, what can state and local governments do?, Georgetown Journal of International Affairs, 19 (1), 76-82
Wright, J and Breindl, Y, 2013. Internet filtering trends in liberal democracies: French and German regulatory debates, Internet Policy Review, 2 (2), 1
Xie, Y., Qiao, R., Shao, G and Chen, H, 2016. Research on Chinese social media users’ communications during public emergency events, Special Issue on Social Media in China, Telematics and Informatics, 34 (3), 740-754
Zelenkauskaite, A and Balduccini, M, 2017. ‘Information warfare’ and online news commenting: analysing forces of social influence through location based commenting user typology, Social Media and Society, 3 (3), 1-13
Zsidisin, G and Wagner, S, 2010. Do perceptions become reality? The moderating role of supply chain resiliency on disruption occurrence, Journal of Business Logistics, 31 (2), 1-20
Zucker, A, 2019. Using critical thinking to counter misinformation, Science Scope, 42 (8), 6-9
Downloads
Published
Issue
Section
License
The JD Journal for Deradicalization uses a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-ND) Licence. You are free to share - copy and redistribute the material in any medium or format under the following conditions:
Attribution — You must give appropriate credit, provide a link to the license, andindicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.