How Social Media Algorithms Potentially Reinforce Radical Views
Abstract
This research delves into the complexities of social media's role as a platform for communication, examining how it facilitates the spread of radical ideologies while simultaneously serving as a space for deradicalization. Through a comprehensive literature review, the researchers aim to combine existing findings with fresh insights employong qualitative analyses. Central to the study is the application of the Uses and Gratifications Theory (UGT), which posits that users actively select content based on specific needs and desires. By applying UGT, the research seeks to uncover the underlying motivations driving users to engage with extremist content on social media, offering a nuanced perspective on the platform's societal influence and potential implications for policy and platform modifications. The study employing comprehensive literature reviewmethodology, the research collects and analyzes a wide range of scholarly articles, reports, and relevant sources to provide a comprehensive overview of how social media contributes to the disemination of radical views. Based on the findings, Social media platforms, through their algorithm-driven content curation and interactive community structures, create environments where radical ideologies are normalized and amplified within echo chambers, subtly increasing the likelihood of real-world radicalization. Media consumers, guided by the Uses and Gratifications Theory (UGT), actively shape their content experiences on platforms like X, Facebook, and Youtube. However, the platforms’designs and algorithms can inadvertently drive radicalization. Countermeasures, informed by understanding users' motivations via UGT, are crucial to mitigate this, but they must be regularly evaluated for effectiveness.
Keywords: dissemination, radical views, social media, UGT
References
Ajala, I., Feroze, S., El Barachi, M., Oroumchian, F., Mathew, S., Yasin, R., & Lutfi, S. (2022). Combining artificial intelligence and expert content analysis to explore radical views on X: Case study on far-right discourse. Journal of Cleaner Production, 362, 132263. https://doi.org/10.1016/j.jclepro.2022.132263
Al-Khalifa, H. S., & Al-Eidan, R. M. (2011). An experimental system for measuring the credibility of news content in X. International Journal of Web Information Systems, 7(2),130-151. https://doi.org/10.1108/17440081111141772
Aly, A., Taylor, E., & Karnovsky, S. (2014). Moral Disengagement and Building Resilience to Violent Extremism: An Education Intervention. Studies in Conflict and Terrorism, 37(4), 369-385. https://doi.org/10.1080/1057610X.2014.879379
Archetti, C. (2015). Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. Perspectives on Terrorism, 9(1).
Baharuddin, T., Widayat, R. M., Qodir, Z., & Jubba, H. (2021). The Narrative And Collectivity Of The Deradicalization Movement Regarding Terror Actions In Indonesia: A X Analysis. JURNAL ILMU SOSIAL, 1(1), 1-10. https://doi.org/10.14710/jis.1.1.2021.95-110
Bazzaz Abkenar, S., Haghi Kashani, M., Akbari, M., & Mahdipour, E. (2023). Learning textual features for X spam detection: A systematic literature review. Expert Systems with Applications, 228, 120366. https://doi.org/10.1016/j.eswa.2023.120366
Bélanger, J. J., Bliuc, A.-M., Wansink, B., Haq, H., Shaheed, S., & Stephan, A. (2020). Radicalization Through the Lens of Situated Affectivity. HYPOTHESIS AND THEORY Published, 1-12. https://doi.org/10.3389/fpsyg.2020.00205
Bell, M. D. (2021). Terrorism and Social Media: Extremist Groups and College Student Recruitment Student Recruitment [Walden University], 15-25. https://scholarworks.waldenu.edu/dissertations
Bonzio, A. (2013, September). ISIS’ Use of Social Media Is Not Surprising; Its Sophisticated Digital Strategy Is | HuffPost UK Tech. https://www.huffingtonpost.co.uk/alessandro-bonzio/isis-use-of-social-media-_b_5818720.html
Brown, K. E., & Saeed, T. (2015). Radicalization and counter-radicalization at British universities: Muslim encounters and alternatives. Ethnic and Racial Studies, 38(11). https://doi.org/10.1080/01419870.2014.911343
Caiani, M., Carlotti, B., & Padoan, E. (2021). Online Hate Speech and the Radical Right in Times of Pandemic: The Italian and English Cases. Javnost, 28(2), 1953-1966. https://doi.org/10.1080/13183222.2021.1922191
Carthy, S. L., Doody, C. B., Cox, K., O’Hora, D., & Sarma, K. M. (2020). Counter-narratives for the prevention of violent radicalisation: A systematic review of targeted interventions. In Campbell Systematic Reviews (Vol. 16, Issue 3), 1-37. https://doi.org/10.1002/cl2.1106
Carthy, S. L., & Sarma, K. M. (2023). Countering Terrorist Narratives: Assessing the Efficacy and Mechanisms of Change in Counter-narrative Strategies. Terrorism and Political Violence, 35(3), 569-592. https://doi.org/10.1080/09546553.2021.1962308
Fernandez, M., Asif, M., & Alani, H. (2018). Understanding the roots of radicalisation on X. WebSci 2018 - Proceedings of the 10th ACM Conference on Web Science,1-10. https://doi.org/10.1145/3201064.3201082
Frau-Meigs, D. (2019). Information disorders: Risks and opportunities for digital media and information literacy? Medijske Studije, 10(19),10-28. https://doi.org/10.20901/ms.10.19.1
Frissen, T. (2021). Internet, the great radicalizer? Exploring relationships between seeking for online extremist materials and cognitive radicalization in young adults. Computers in Human Behavior, 114, 106549. https://doi.org/10.1016/j.chb.2020.106549
Gaudette, T., Scrivens, R., Davies, G., & Frank, R. (2021). Upvoting extremism: Collective identity formation and the extreme right on Reddit. New Media & Society, 23(12), 3491–3508. https://doi.org/10.1177/1461444820958123
Gunton, K. (2022). The Impact of the Internet and Social Media Platforms on Radicalisation to Terrorism and Violent Extremism. In R. Montasari, F. Carroll, I. Mitchell, S. Hara, & R. Bolton-King (Eds.), Privacy, Security And Forensics in The Internet of Things (IoT) (pp. 167–177). Springer International Publishing. https://doi.org/10.1007/978-3-030-91218-5_8
Habib, H., Srinivasan, P., & Nithyanand, R. (2022). Making a radical misogynist: How online social engagement with the manosphere influences traits of radicalization. Proceedings of the ACM on Human-Computer Interaction. https://dl.acm.org/doi/abs/10.1145/3555551
Hafez, M., & Mullins, C. (2015). The Radicalization Puzzle: A Theoretical Synthesis of Empirical Approaches to Homegrown Extremism. Studies in Conflict & Terrorism, 38(11), 958–975. https://doi.org/10.1080/1057610X.2015.1051375
Heft, A., Pfetsch, B., Voskresenskii, V., & Benert, V. (2022). Transnational issue agendas of the radical right? Parties’ Facebook campaign communication in six countries during the 2019 European Parliament election. European Journal of Communication, 22-42. https://doi.org/10.1177/02673231221100146
Hernawati, S. (2019). Attempts on Deradicalisation of Religious Generation of Millenials Through the Utilization of Institutional Website or Social Media Account, 34-40. https://doi.org/10.2991/iscogi-17.2019.9
Hollewell, G. F., & Longpré, N. (2022). Radicalization in the Social Media Era: Understanding the Relationship between Self-Radicalization and the Internet. International Journal of Offender Therapy and Comparative Criminology, 66(8), 896–913. https://doi.org/10.1177/0306624X211028771
Hutchinson, J. (2019). Australian and Canadian Far-right Extremism A Cross-National Comparative Analysis of Social Media Mobilisation on Facebook [Macquarie University], . https://doi.org/10.25949/19428185.V1
Hwang, S. (2013). The Effect of X Use on Politicians’ Credibility and Attitudes toward Politicians. Journal of Public Relations Research, 25(3), 37-41. https://doi.org/10.1080/1062726X.2013.788445
Jensen, M. A., Atwell Seate, A., & James, P. A. (2020). Radicalization to Violence: A Pathway Approach to Studying Extremism. Terrorism and Political Violence, 32(5), 1067–1090. https://doi.org/10.1080/09546553.2018.1442330
Jerome, L. E. E., & Elwick, A. (2019). Identifying an Educational Response to the Prevent Policy: Student Perspectives on Learning about Terrorism, Extremism and Radicalisation. British Journal of Educational Studies, 67(1), 1-18. https://doi.org/10.1080/00071005.2017.1415295
Katz, E., Blumler, J. G., & Gurevitch, M. (1973). Uses and gratifications research. Public Opinion Quarterly, 37(4), 509–523. https://doi.org/10.1086/268109
Kim, W. H., & Chae, B. (Kevin). (2018). Understanding the relationship among resources, social media use and hotel performance: The case of X use by hotels. International Journal of Contemporary Hospitality Management, 30(9), 1-21. https://doi.org/10.1108/IJCHM-02-2017-0085
Kouba, T. (2022). Online radicalization: x privatization as a threat to the modern society. Politika Nacionalne Bezbednosti, Special issue 2022, 1-18. https://doi.org/10.22182/pnb.specijal2022.9
Lee, E., & Leets, L. (2002). Persuasive storytelling by hate groups online: Examining its effects on adolescents. American Behavioral Scientist, 45(6), 927-957. https://doi.org/10.1177/0002764202045006003
Li, J., Paananen, V., Suryanarayana, S. A., Huusko, E., Kuutila, M., Mäntylä, M., & Hosio, S. (2023). It is an online platform and not the real world, i don’t care much: Investigating X Profile Credibility with an Online Machine Learning-Based Tool. CHIIR 2023 - Proceedings of the 2023 Conference on Human Information Interaction and Retrieval. 30-45 https://doi.org/10.1145/3576840.3578308
Martínez-Rojas, M., Pardo-Ferreira, M. del C., & Rubio-Romero, J. C. (2018). X as a tool for the management and analysis of emergency situations: A systematic literature review. International Journal of Information Management, 43, 196–208. https://doi.org/10.1016/j.ijinfomgt.2018.07.008
Marwick, A. E., Clancy, B., & Furl, K. (2022). Far-right online radicalization: A review of the literature. The Bulletin of Technology & Public Life. https://citap.pubpub.org/pub/jq7l6jny/release/1
McCauley, C., & Moskalenko, S. (2008). Mechanisms of Political Radicalization: Pathways Toward Terrorism. Terrorism and Political Violence, 20(3), 415–433. https://doi.org/10.1080/09546550802073367
Mitts, T. (2017). Do Community Engagement Efforts Reduce Extremist Rhetoric on Social Media? SSRN Electronic Journal, 1-71. https://doi.org/10.2139/ssrn.2940290
Mitts, T. (2022). Countering Violent Extremism and Radical Rhetoric. International Organization, 76(1), 1-22. https://doi.org/10.1017/S0020818321000242
Necaise, A., Williams, A., & Vrzakova, H. (2021). Regularity versus novelty of users’ multimodal comment patterns and dynamics as markers of social media radicalization. Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems, 1-20. https://dl.acm.org/doi/abs/10.1145/3465336.3475095
Niemi, P.-M., Benjamin, S., Kuusisto, A., & Gearon, L. (2018). How and Why Education Counters Ideological Extremism in Finland. Religions, 9(12), 420. https://doi.org/10.3390/rel9120420
Nienierza, A., Reinemann, C., Fawzi, N., Riesmeyer, C., & Neumann, K. (2021). Too dark to see? Explaining adolescents’ contact with online extremism and their ability to recognize it. Information Communication and Society, 24(9), 1-18. https://doi.org/10.1080/1369118X.2019.1697339
Odağ, Ö., Leiser, A., & Boehnke, K. (2019). Reviewing the Role of the Internet in Radicalization Processes 1. https://www.dji.de/fileadmin/user_upload/bibs2018/Boehnke_Odag_Leiser_2015_Neue_Medien_Extremismus.p
Paton, N., Nilsen, A. B., Dechesne, M., Sakellariou, A., Helm, G., Salord, T., & Cabanac, G. (2022). The European Far Right and Islamist Extremism on X: From Radicalisation to Political Participation. ESSACHESS - Journal for Communication Studies, 15(2), 1-10. https://doi.org/10.21409/VAQQ-S725
Richey, M. K., & Binz, M. (2015). Open source collection methods for identifying radical extremists using social media. International Journal of Intelligence and CounterIntelligence, 28(2), 37-41. https://doi.org/10.1080/08850607.2014.962374
Ruggiero, T. E. (2000). Uses and Gratifications Theory in the 21st Century. Mass Communication and Society, 3(1), 37-41. https://doi.org/10.1207/s15327825mcs0301_02
Saidi, F., Trabelsi, Z., & Thangaraj, E. (2022). A novel framework for semantic classification of cyber terrorist communities on X. Engineering Applications of Artificial Intelligence, 115, 105271, 115-130. https://doi.org/10.1016/j.engappai.2022.105271
Sato, K., Wang, J., & Cheng, Z. (2019). Credibility Evaluation of X-Based Event Detection by a Mixing Analysis of Heterogeneous Data. IEEE Access, 7, 1095-1106. https://doi.org/10.1109/ACCESS.2018.2886312
Schumann, S., Boer, D., Hanke, K., & Liu, J. (2021). Social media use and support for populist radical right parties: assessing exposure and selection effects in a two-wave panel study. Information Communication and Society, 24(7),1-20. https://doi.org/10.1080/1369118X.2019.1668455
Son, J., Lee, J., Oh, O., Lee, H. K., & Woo, J. (2020). Using a Heuristic-Systematic Model to assess the X user profile’s impact on disaster tweet credibility. International Journal of Information Management, 54, 102176,1-22. https://doi.org/10.1016/j.ijinfomgt.2020.102176
Stone, J. A., & Can, S. H. (2021). Investigating Factors of X Use among Municipal Governments. Journal of Computer Information Systems, 61(3),1-8. https://doi.org/10.1080/08874417.2019.1628673
Thompson, R. (2011). Radicalization and the Use of Social Media. Journal of Strategic Security, 4(4),1-10. https://doi.org/10.5038/1944-0472.4.4.8
Van Eerten, J.-J., Doosje, B., Konijn, E., & Doosje, B. (2017). The role of counter-narratives in prevention of radicalization and de-radicalization.
Wahlström, M., & Törnberg, A. (2021). Social Media Mechanisms for Right-Wing Political Violence in the 21st Century: Discursive Opportunities, Group Dynamics, and Co-Ordination. Terrorism and Political Violence, 33(4),1-22. https://doi.org/10.1080/09546553.2019.1586676
Wang, K., Lam, N. S. N., & Mihunov, V. (2023). Correlating X Use with Disaster Resilience at Two Spatial Scales: A Case Study of Hurricane Sandy. Annals of GIS, 29(1),1-20. https://doi.org/10.1080/19475683.2023.2165545
Wang, K., Lam, N. S. N., Zou, L., & Mihunov, V. (2021). X use in hurricane isaac and its implications for disaster resilience. ISPRS International Journal of Geo-Information, 10(3),1-20. https://doi.org/10.3390/ijgi10030116
Wang, Y. (2016). How do television networks use X? Exploring the relationship between X use and television ratings. Southern Communication Journal, 81(3),125-135. https://doi.org/10.1080/1041794X.2015.1116593
Warrington, A. (2017). Countering violent extremism via de-securitisation on X. Journal for Deradicalization, 0(11).
Watkin, A. L., & Conway, M. (2022). Building social capital to counter polarization and extremism? A comparative analysis of tech platforms’ official blog posts. First Monday, 27(5),20-40. https://doi.org/10.5210/fm.v27i5.12611
Wolfowicz, M., Perry, S., Hasisi, B., & Weisburd, D. (2021). Faces of radicalism: Differentiating between violent and non-violent radicals by their social media profiles. Computers in Human Behavior, 116,1-10. https://doi.org/10.1016/j.chb.2020.106646
Yang, J., Yu, M., Qin, H., Lu, M., & Yang, C. (2019). A X data credibility framework—Hurricane Harvey as a use case. ISPRS International Journal of Geo-Information, 8(3), 1-21. https://doi.org/10.3390/ijgi8030111

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
1. The author retains copyright and grants the journal the right of first publication with the work simultaneously licensed under a Creative Commons attribution license that allows others to share the work within an acknowledgment of the work’s authorship and initial publication of this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their websites) before and during submission, as it can lead to productive exchanges and earlier and more extraordinary citations of published works.