COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > A Comprehensive Study of the Extremist Narratives and the Role of Alternative Social Networks that Facilitate Radical Discourse
A Comprehensive Study of the Extremist Narratives and the Role of Alternative Social Networks that Facilitate Radical DiscourseAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Hridoy Sankar Dutta. Conspiracy theories have become a pervasive and potent force in the digital age, challenging societies and democracies worldwide. This talk delves into the enigmatic origins of the QAnon conspiracy to offer a comprehensive analysis of the online fringe communities that facilitate such discourse. We employ a data-driven cross-platform mixed-methods approach to investigate the evolution, behavior, and impact of QAnon across various alternative social networks. Conspiracy theories, including QAnon, pose significant threats to democracies and individual autonomy. This is exemplified by their exploitation for political gain, as evidenced by events such as the 2016 US Presidential Elections and the 2021 insurrection at the US Capitol. Furthermore, these theories have real-world consequences, from public health threats due to COVID -19 misinformation to incidents of violence and radicalization. Our research transcends QAnon’s specific narratives to address critical questions about the movement, including but not limited to the activity of adherents, discussion topics, and community responses to platform shutdowns and online migration. This talk underscores the imperative of understanding conspiracy theories in a digital world and the urgent need to develop strategies for countering their influence. We provide unique insights into the dynamics of online communities, the challenges of moderation, and the intricate interplay between conspiracy theories and alternative social networks. https://us02web.zoom.us/j/86421076573?pwd=aG4rY2VyZmttcVBhOTgvd2lXZ09NZz09 Meeting ID: 864 2107 6573 Passcode: 825423 RECORDING : Please note, this event will be recorded and will be available after the event for an indeterminate period under a CC BY -NC-ND license. Audience members should bear this in mind before joining the webinar or asking questions. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other liststest Centre for Energy Studies Type the title of a new list hereOther talksSound Control Synthesis with Logics and Data Software architecture: between rigid process and ´somehow I manage´ approach Free afternoon Prototyping the Deep Underground Neutrino Experiment Welcome Talk Richard Anslow on Impacts and Prebiotic Chemistry |