SlideShare a Scribd company logo
1/4
December 7, 2023
Methodology of CVE Research - Sajid Amit
sajidamit.com/methodology-of-cve-research
December 7, 2023
Category: Countering violent
No Comments
The research method for understanding violent extremism and counter violent extremism
differs from one group to another. The main idea behind this particular CVE research is to
identify existing initiatives globally in the space of disruptive online technologies that have
yielded some success in preventing CVE.
We will break down the research method used, how the data was collected and how the
data was analyzed. Using these valuable data further analysis can be done on the topic of
VE and CVE.
Research Setting
This study has a global setting, so it is not focused on any particular region. It considers
events, incidences, and decisions associated with CVE activities around the world. This
study is explorative with a qualitative approach. The data collection focuses on capturing
the state of the CVE scenario influenced by social media based on secondary data sources,
2/4
which are widely used for high-quality research. Indeed, secondary data is perhaps more
appropriate for this study because first-hand data could not provide comprehensive
knowledge about the impact of disruptive technology on CVE.
Secondary data has been widely used in a range of disciplines, including strategic
orientation (Shortell and Zajac, 1990), microfinancing (Cobb et al., 2016), and policy
establishment (Lichtenberger et al., 2014; Stewart, 2017), and it has several benefits for
academic studies (Houston et al., 2006). It shows the real decisions being made by real
decision-makers, having been collected in a less obstructive manner and not influenced by
the biases of self-reporting. The biases related to the vital informant sampling approach can
therefore be avoided. Recent studies based on online comments to a newspaper article
present a vivid exemplification of the importance of such data for studies (Cheng and Foley,
2018).
Data Collection
The main data sources comprise newspaper and popular press articles, blog posts,
published journal articles, and video clips. Through a comprehensive search, we collected
as much information as possible about social media impacts on CVE activities. When
searching for relevant articles, we used the keywords shown in Table 1. We only included
documents written in English that clearly discuss social media technology and CVE
relationship. The searches took place during July and August of 2020. Whenever we found
an appropriate document, we added its title and a web link to a spreadsheet. After
completing the collection process, we sorted the documents listed in the spreadsheet to see
if any had been recorded twice.
We found several such documents, so duplicates were removed from the list. We do not
claim to cover all the relevant documents available on the internet. Still, we feel that our list
is comprehensive enough to provide an insightful academic contribution about social media
impact on VE activities and effective recommendations to minimize it. The final body of
documents comprised 104 written documents and 8 videos, with the latter being viewed
carefully and their main information being written down. For implementing the appropriate
online-based CVE strategies in Bangladesh, information collected worldwide was validated
and further enriched from 15 in-depth interviews with experts (including academics,
activists, journalists, and researchers) in this field (Annex 01).
Table 1. Overview of data collection sources.
Data
Source
type
No. of
documents
Collection
sites
Searching Keyword
Journal
Articles
48 Google
Scholar
Impact of social media/internet on VE activities,
strategies to reduce the VE using social media,
3/4
and successful global strategies for controlling
CVE.
Newspaper
articles
23 Google
Search
Reports 14 Google
Search
Blogs 19 Google
Search
Data Analysis
All documents were downloaded as PDFs and saved in a temporary folder. Subsequently,
these were combined into a single PDF document that was 894 pages long. We applied
content analysis and organized the diverse data, including coding information, into different
categories (Neuendorf & Kumar, 2015; Soldatenko and Backer, 2019). Content analysis can
contribute a new depth of understanding for a phenomenon that has received limited
attention (Vaismoradi et al., 2016). The combined document was uploaded to Qualitative
Data Analysis (QDA) Miner Lite, an effective qualitative data analysis program. A free basic
version was used, which is sufficient for coding and data analysis purposes.
We used a range of preselected codes and additional codes through open coding. The
preselected codes included worldwide CVE interventions, apps to reduce it, and effective
strategies. We read each document line by line and coded it accordingly. After completing
the iterative coding process, we merged several codes into one to reduce the number of
coding categories to a more reasonable level. Once the coding process was completed, we
extracted the coded texts into Excel files and synthesized the findings for implementable
online-based strategies to minimize the CVE effect. The results of this study are described
briefly in the following section.
Conclusion
The research method implemented in this project involved a global setting that included
numerous events, incidences, and decisions. One of the methods of data collection
involved social media platforms.
The information that was collected primarily revolved around social media impacts on CVE
activities. Afterward, the information was analyzed using a qualitative data analysis
program.
Disclaimer
Originally this article was published in ScienceDirect, the world’s leading source for
scientific, technical, and medical research journals and articles.
4/4

More Related Content

Similar to Methodology of CVE Research - Sajid Amit.pdf

hariri2019.pdf
hariri2019.pdfhariri2019.pdf
hariri2019.pdf
Akuhuruf
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
IJCI JOURNAL
 
Analyzing sentiment dynamics from sparse text coronavirus disease-19 vaccina...
Analyzing sentiment dynamics from sparse text coronavirus  disease-19 vaccina...Analyzing sentiment dynamics from sparse text coronavirus  disease-19 vaccina...
Analyzing sentiment dynamics from sparse text coronavirus disease-19 vaccina...
IJECEIAES
 
Maemura_WARCnet_Developing Datasheets for Archived Web Datasets.pdf
Maemura_WARCnet_Developing Datasheets for Archived Web Datasets.pdfMaemura_WARCnet_Developing Datasheets for Archived Web Datasets.pdf
Maemura_WARCnet_Developing Datasheets for Archived Web Datasets.pdf
WARCnet
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
IRJET Journal
 
COVID Sentiment Analysis of Social Media Data Using Enhanced Stacked Ensemble
COVID Sentiment Analysis of Social Media Data Using Enhanced Stacked EnsembleCOVID Sentiment Analysis of Social Media Data Using Enhanced Stacked Ensemble
COVID Sentiment Analysis of Social Media Data Using Enhanced Stacked Ensemble
IRJET Journal
 
Visual Analytics for Cime e aprendizado de maquina
Visual    Analytics    for     Cime e aprendizado de maquinaVisual    Analytics    for     Cime e aprendizado de maquina
Visual Analytics for Cime e aprendizado de maquina
GustavoCruzConceio
 
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDYINVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
ijseajournal
 
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDYINVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
ijseajournal
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
ijaia
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
gerogepatton
 
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
gerogepatton
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
IJITE
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
Firas Husseini
 
Data Intensive Architectures
Data Intensive ArchitecturesData Intensive Architectures
Data Intensive Architectures
PoojaKumar84
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
IJDKP
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
IJDKP
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
IJCSEA Journal
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
IJCSEA Journal
 

Similar to Methodology of CVE Research - Sajid Amit.pdf (20)

hariri2019.pdf
hariri2019.pdfhariri2019.pdf
hariri2019.pdf
 
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
MACHINE LEARNING APPLICATIONS IN MALWARE CLASSIFICATION: A METAANALYSIS LITER...
 
Analyzing sentiment dynamics from sparse text coronavirus disease-19 vaccina...
Analyzing sentiment dynamics from sparse text coronavirus  disease-19 vaccina...Analyzing sentiment dynamics from sparse text coronavirus  disease-19 vaccina...
Analyzing sentiment dynamics from sparse text coronavirus disease-19 vaccina...
 
Maemura_WARCnet_Developing Datasheets for Archived Web Datasets.pdf
Maemura_WARCnet_Developing Datasheets for Archived Web Datasets.pdfMaemura_WARCnet_Developing Datasheets for Archived Web Datasets.pdf
Maemura_WARCnet_Developing Datasheets for Archived Web Datasets.pdf
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
COVID Sentiment Analysis of Social Media Data Using Enhanced Stacked Ensemble
COVID Sentiment Analysis of Social Media Data Using Enhanced Stacked EnsembleCOVID Sentiment Analysis of Social Media Data Using Enhanced Stacked Ensemble
COVID Sentiment Analysis of Social Media Data Using Enhanced Stacked Ensemble
 
Visual Analytics for Cime e aprendizado de maquina
Visual    Analytics    for     Cime e aprendizado de maquinaVisual    Analytics    for     Cime e aprendizado de maquina
Visual Analytics for Cime e aprendizado de maquina
 
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDYINVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
 
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDYINVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
INVESTIGATE,IDENTIFY AND ESTIMATE THE TECHNICAL DEBT: A SYSTEMATIC MAPPING STUDY
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
 
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
NOVEL MACHINE LEARNING ALGORITHMS FOR CENTRALITY AND CLIQUES DETECTION IN YOU...
 
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
Novel Machine Learning Algorithms for Centrality and Cliques Detection in You...
 
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
ANALYSIS OF DEVELOPMENT COOPERATION WITH SHARED AUTHORING ENVIRONMENT IN ACAD...
 
Knime social media_white_paper
Knime social media_white_paperKnime social media_white_paper
Knime social media_white_paper
 
Data Intensive Architectures
Data Intensive ArchitecturesData Intensive Architectures
Data Intensive Architectures
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MININGPREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
PREDICTIVE MODELLING OF CRIME DATASET USING DATA MINING
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
 
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
ANALYSIS OF TOPIC MODELING WITH UNPOOLED AND POOLED TWEETS AND EXPLORATION OF...
 

Recently uploaded

Create a spend money transaction during bank reconciliation.pdf
Create a spend money transaction during bank reconciliation.pdfCreate a spend money transaction during bank reconciliation.pdf
Create a spend money transaction during bank reconciliation.pdf
andreakaterasco
 
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, FloridaDining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
The Sarasota Collection Home Store
 
Web Technology LAB MANUAL for Undergraduate Programs
Web Technology  LAB MANUAL for Undergraduate ProgramsWeb Technology  LAB MANUAL for Undergraduate Programs
Web Technology LAB MANUAL for Undergraduate Programs
Chandrakant Divate
 
How to Build a Diversified Investment Portfolio.pdf
How to Build a Diversified Investment Portfolio.pdfHow to Build a Diversified Investment Portfolio.pdf
How to Build a Diversified Investment Portfolio.pdf
Trims Creators
 
How To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine BusinessHow To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine Business
Charlie McDermott
 
Michael Economou - Don't build a marketplace.pdf
Michael Economou - Don't build a marketplace.pdfMichael Economou - Don't build a marketplace.pdf
Michael Economou - Don't build a marketplace.pdf
Michael Oikonomou
 
Textile Chemical Brochure - Tradeasia (1).pdf
Textile Chemical Brochure - Tradeasia (1).pdfTextile Chemical Brochure - Tradeasia (1).pdf
Textile Chemical Brochure - Tradeasia (1).pdf
jeffmilton96
 
Best Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to SuccessBest Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to Success
Intelisync
 
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota CollectionOffice Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
The Sarasota Collection Home Store
 
Showcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdfShowcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdf
MarianAndreaSTana
 
Get To Know About Salma Karina Hayat.pdf
Get To Know About Salma Karina Hayat.pdfGet To Know About Salma Karina Hayat.pdf
Get To Know About Salma Karina Hayat.pdf
Salma Karina Hayat
 

Recently uploaded (11)

Create a spend money transaction during bank reconciliation.pdf
Create a spend money transaction during bank reconciliation.pdfCreate a spend money transaction during bank reconciliation.pdf
Create a spend money transaction during bank reconciliation.pdf
 
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, FloridaDining Tables and Chairs | Furniture Store in Sarasota, Florida
Dining Tables and Chairs | Furniture Store in Sarasota, Florida
 
Web Technology LAB MANUAL for Undergraduate Programs
Web Technology  LAB MANUAL for Undergraduate ProgramsWeb Technology  LAB MANUAL for Undergraduate Programs
Web Technology LAB MANUAL for Undergraduate Programs
 
How to Build a Diversified Investment Portfolio.pdf
How to Build a Diversified Investment Portfolio.pdfHow to Build a Diversified Investment Portfolio.pdf
How to Build a Diversified Investment Portfolio.pdf
 
How To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine BusinessHow To Leak-Proof Your Magazine Business
How To Leak-Proof Your Magazine Business
 
Michael Economou - Don't build a marketplace.pdf
Michael Economou - Don't build a marketplace.pdfMichael Economou - Don't build a marketplace.pdf
Michael Economou - Don't build a marketplace.pdf
 
Textile Chemical Brochure - Tradeasia (1).pdf
Textile Chemical Brochure - Tradeasia (1).pdfTextile Chemical Brochure - Tradeasia (1).pdf
Textile Chemical Brochure - Tradeasia (1).pdf
 
Best Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to SuccessBest Crypto Marketing Ideas to Lead Your Project to Success
Best Crypto Marketing Ideas to Lead Your Project to Success
 
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota CollectionOffice Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
Office Furniture | Furniture Store in Sarasota, Florida | Sarasota Collection
 
Showcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdfShowcase Portfolio- Marian Andrea Tana.pdf
Showcase Portfolio- Marian Andrea Tana.pdf
 
Get To Know About Salma Karina Hayat.pdf
Get To Know About Salma Karina Hayat.pdfGet To Know About Salma Karina Hayat.pdf
Get To Know About Salma Karina Hayat.pdf
 

Methodology of CVE Research - Sajid Amit.pdf

  • 1. 1/4 December 7, 2023 Methodology of CVE Research - Sajid Amit sajidamit.com/methodology-of-cve-research December 7, 2023 Category: Countering violent No Comments The research method for understanding violent extremism and counter violent extremism differs from one group to another. The main idea behind this particular CVE research is to identify existing initiatives globally in the space of disruptive online technologies that have yielded some success in preventing CVE. We will break down the research method used, how the data was collected and how the data was analyzed. Using these valuable data further analysis can be done on the topic of VE and CVE. Research Setting This study has a global setting, so it is not focused on any particular region. It considers events, incidences, and decisions associated with CVE activities around the world. This study is explorative with a qualitative approach. The data collection focuses on capturing the state of the CVE scenario influenced by social media based on secondary data sources,
  • 2. 2/4 which are widely used for high-quality research. Indeed, secondary data is perhaps more appropriate for this study because first-hand data could not provide comprehensive knowledge about the impact of disruptive technology on CVE. Secondary data has been widely used in a range of disciplines, including strategic orientation (Shortell and Zajac, 1990), microfinancing (Cobb et al., 2016), and policy establishment (Lichtenberger et al., 2014; Stewart, 2017), and it has several benefits for academic studies (Houston et al., 2006). It shows the real decisions being made by real decision-makers, having been collected in a less obstructive manner and not influenced by the biases of self-reporting. The biases related to the vital informant sampling approach can therefore be avoided. Recent studies based on online comments to a newspaper article present a vivid exemplification of the importance of such data for studies (Cheng and Foley, 2018). Data Collection The main data sources comprise newspaper and popular press articles, blog posts, published journal articles, and video clips. Through a comprehensive search, we collected as much information as possible about social media impacts on CVE activities. When searching for relevant articles, we used the keywords shown in Table 1. We only included documents written in English that clearly discuss social media technology and CVE relationship. The searches took place during July and August of 2020. Whenever we found an appropriate document, we added its title and a web link to a spreadsheet. After completing the collection process, we sorted the documents listed in the spreadsheet to see if any had been recorded twice. We found several such documents, so duplicates were removed from the list. We do not claim to cover all the relevant documents available on the internet. Still, we feel that our list is comprehensive enough to provide an insightful academic contribution about social media impact on VE activities and effective recommendations to minimize it. The final body of documents comprised 104 written documents and 8 videos, with the latter being viewed carefully and their main information being written down. For implementing the appropriate online-based CVE strategies in Bangladesh, information collected worldwide was validated and further enriched from 15 in-depth interviews with experts (including academics, activists, journalists, and researchers) in this field (Annex 01). Table 1. Overview of data collection sources. Data Source type No. of documents Collection sites Searching Keyword Journal Articles 48 Google Scholar Impact of social media/internet on VE activities, strategies to reduce the VE using social media,
  • 3. 3/4 and successful global strategies for controlling CVE. Newspaper articles 23 Google Search Reports 14 Google Search Blogs 19 Google Search Data Analysis All documents were downloaded as PDFs and saved in a temporary folder. Subsequently, these were combined into a single PDF document that was 894 pages long. We applied content analysis and organized the diverse data, including coding information, into different categories (Neuendorf & Kumar, 2015; Soldatenko and Backer, 2019). Content analysis can contribute a new depth of understanding for a phenomenon that has received limited attention (Vaismoradi et al., 2016). The combined document was uploaded to Qualitative Data Analysis (QDA) Miner Lite, an effective qualitative data analysis program. A free basic version was used, which is sufficient for coding and data analysis purposes. We used a range of preselected codes and additional codes through open coding. The preselected codes included worldwide CVE interventions, apps to reduce it, and effective strategies. We read each document line by line and coded it accordingly. After completing the iterative coding process, we merged several codes into one to reduce the number of coding categories to a more reasonable level. Once the coding process was completed, we extracted the coded texts into Excel files and synthesized the findings for implementable online-based strategies to minimize the CVE effect. The results of this study are described briefly in the following section. Conclusion The research method implemented in this project involved a global setting that included numerous events, incidences, and decisions. One of the methods of data collection involved social media platforms. The information that was collected primarily revolved around social media impacts on CVE activities. Afterward, the information was analyzed using a qualitative data analysis program. Disclaimer Originally this article was published in ScienceDirect, the world’s leading source for scientific, technical, and medical research journals and articles.
  • 4. 4/4