This blog continues the analysis of how to respond to terrorist activity (including recruitment and planning of attacks) using network information technology, in particular social media. As noted earlier, I think promising avenues to investigate include three areas:
1) Countering misinformation
2) Active recruitment to alternative missions
3) Areas beyond communication - e.g., algorithmic adjustments by social media platforms
While information technologies, and the business platforms that deploy them have a central role, the core of the best responses to violent extremism may turn out not to be tools, but people.
Read Full Story from Of Interest http://cyberlaw.stanford.edu/blog/2016/05/%E2%80%9Ctool-without-handle-%E2%80%9Ctools-terror-tools-peace%E2%80%9D-part-ii
This article by Chuck Cosson originally appeared on cyberlaw.stanford.edu on May 15, 2016 at 01:06AM