9,475
Views
28
CrossRef citations to date
0
Altmetric
Articles

Right-wing extremism in Australia: the rise of the new radical right

, &
Pages 121-142 | Received 12 Apr 2016, Accepted 29 Aug 2016, Published online: 16 Oct 2016

References

  • Althouse, B., Ng, Y., & Cummings, D. (2011). Prediction of dengue incidence using search query surveillance. Public Library of Science, 5(8), 1–7. doi:10.1371/journal.pntd.0001258
  • Aly, A. (2015). Anne Aly: Reclaim Australia is the product of rising rightwing extremism. The Guardian.
  • Baxendale, R. (2015). Reclaim Australia rallies: Two sides go to war in towns, cities. The Australian. Retrieved March 8, 2016, from: http://www.theaustralian.com.au/national-affairs/immigration/reclaim-australia-rallies-two-sides-go-to-war-in-towns-cities/news-story/f05fb4bb7305b2533faf51075e05e0f5
  • Belanger, E., & Meguid, B. M. (2008). Issue salience, issue ownership, and issue-based vote choice. Electoral Studies, 27, 477–491. doi: 10.1016/j.electstud.2008.01.001
  • Betz, H. (2003). Against globalization: Xenophobia, identity politics, and exclusionary populism in Western Europe. Socialist Register, 39, 193–210.
  • Chen, H., Qin, J., & Reid, E. (2004). Dark web portal: Collecting and analyzing the presence of domestic and international terrorist groups on the Web. IEEE intelligent transportation conference, Washington: D.C.
  • Cowling, D. (2016). Social media statistics Australia – January 2016. Retrieved from http://www.socialmedianews.com.au/social-media-statistics-australia-january-2016/
  • Denning, D. E. (2001). Activism, hacktivism, and cyberterrorism. In J. Arquilla, & D. Ronfeldt (Eds.), Networks and netwars (pp. 239–288). Santa Monica, CA: Rand.
  • Elwes, R. (2011). How to build a brain and 34 other really interesting uses of mathematics. London: Quercus.
  • Falter, J., & Schumann, S. (1988). Affinity towards right-wing extremism in Western Europe. West European Politics, 11(2), 96–110. doi: 10.1080/01402388808424684
  • Freiburger, T., & Crane, J. (2011). The internet as a terrorist’s tool: A social learning perspective. In K. Jaishankar (Eds.), Cyber criminology: Exploring internet crimes and criminal behaviour (pp. 127–138). Boca Raton, FL: CRC Press.
  • Ginsberg, J., Mohebb, M., Patel, R., Brammer, L., & Smolinski, M. (2009). Detecting influenza epidemics using search engine query data. Nature, 1012–1014.
  • Goel, S., Hoffman, J. M., Lahaie, S., Pennock, D., & Watts, D. (2010). Predicting consumer behavior with web search. Proceedings of The National academy of sciences, 17486-17490.
  • Guibernau, M. (2010). Migration and the rise of the radical right. Social Malaise and the Failure of Mainstream Politics. Retrieved March 8, 2016, from http://www.policy-network.net/publications_download.aspx?ID = 3684
  • Harrison, S., & Bruter, M. (2011). Mapping extreme right ideology. An empirical geography of the European extreme right. London: Palgrave Macmillan.
  • Holt, T. (2010). Exploring strategies for qualitative criminological and criminal justice inquiry using On-line data. Journal of Criminal Justice Education, 21, 466–487. doi: 10.1080/10511253.2010.516565
  • Holt, T. (2012). Exploring the intersections of technology, crime, and terror. Terrorism and Political Violence, 24, 337–354. doi: 10.1080/09546553.2011.648350
  • Holt, T., & Bolden, M. (2014). Technological skills of White supremacists in an online-forum: A qualitative examination. International Journal of Cyber Criminology, 8(2), 79–93.
  • Ignazi, P. (1992). The silent counter-revolution. Hypotheses on the emergence of extreme right-wing parties in Europe. European Journal of Political Research, 22(1), 3–34. doi: 10.1111/j.1475-6765.1992.tb00303.x
  • James, S. (2005). The policing of right-wing violence in Australia. Police Practice and Research, 6(2), 103–119. doi: 10.1080/15614260500121088
  • Kilger, M. (2011). Social dynamics and the future of technology-driven crime. In T. Holt, & B. Schell (Eds.), Corporate hacking and technology-driven crime: Social dynamics and implications (pp. 205–227). Hershey, PA: IGI-Global.
  • Kunkle, J. (2012). Social media and the homegrown terrorist threat. The Police Chief, 79, p. 22.
  • Lavoipierre, A. (2015). Reclaim Australia rallies: Racial cohesion facing its greatest threat in 30 years, says president of the Anti-Discrimination Board of NSW. ABC News. Retrieved March 8, 2016, from http://www.abc.net.au/news/2015-07-20/racial-cohesion-under-threat,-says-anti-discrimination-president/6632548
  • Macridis, R. (1989). Contemporary political ideologies: Movements and regimes (4th ed.). Glennview: Scott Foresman and Company.
  • Makin, D., & Morczek, A. (2015). The dark side of internet searchers: A macro level assessment of rape culture. International Journal of Cyber Criminology, 9(1), 1–23.
  • Marhan, A., Saucan, D., Popa, C., & Danciu, B. (2012). Searching internet: A report on accessibility, nature, and quality of suicide-related information. Procedia – Social and Behavioral Sciences, 33, 373–377. doi: 10.1016/j.sbspro.2012.01.146
  • McCarthy, M. (2010). Internet monitoring of suicide risk in the population. Journal of Affective Disorders, 122(3), 277–279. doi:10.1016/j.jad.2009.08.015
  • Mudde, C. (2002). The ideology of the extreme right. New York, NY: Manchester University Press.
  • Reilly, S., Richey, S., & Taylor, B. (2012). Using google search data for state politics research: An empirical validity test using roll-Off data. State Politics & Policy Quarterly, 12(2), 146–159. doi: 10.1177/1532440012438889
  • Reis, B., & Brownstein, J. S. (2010). Measuring the impact of health policies using internet search patterns: The case of abortion. BMC Public Health, 10, 829. doi:10.1186/1471-2458-10-514
  • Ripberger, J. (2011). Capturing curiosity: Using internet search trends to measure public attentiveness. Policy Studies Journal, 39(2), 239–259. doi:10.1111/j.1541-0072.2011.00406.x
  • Sainsbury, D. (1980). Swedish social democratic ideology and electoral politics 1944–1948. A study of the functions of party ideology. Stockholm: Almqvist & Wicksell.
  • Scharkow, M., & Vogelgesang, J. (2011). Measuring the public agenda using search engine queries. International Journal of Public Opinion Research, 23(1), 104–113. doi:10.1093/ijpor/edq048
  • Silber, M. (2012). The Al qaeda factor: Plots against the west. Philadelphia: University of Pennsylvania Press.
  • Stewart, C., Smith, C., & Denton, R. (2007). Persuasion and social movements. Long Grove, IL: Waveland Press.
  • US Department of Homeland Security. (2009). Rightwing extremism: Current economic and political climate fueling resurgence in radicalization and recruitment. Office of intelligence and Analysis. Retrieved from https://fas.org/irp/eprint/rightwing.pdf
  • Val Burris, V., Smith, E., & Strahm, A. (2000). White supremacist networks on the internet. Sociological Focus, 33(2), 215–235. doi: 10.1080/00380237.2000.10571166
  • Weeks, B., & Southwell, B. (2010). The symbiosis of news coverage and aggregate online search behavior: Obama, rumors, and presidential politics. Mass Communication and Society, 13(4), 341–360. doi:10.1080/15205430903470532
  • Weimann, G. (2011). Cyber-fatwas and terrorism. Studies in Conflict and Terrorism, 34, 765–781. doi: 10.1080/1057610X.2011.604831
  • Wiederer, R. (2013). Mapping the right-wing extremism movement on the internet – structural patterns 2006–2011. In M. Deland, M. Minkenberg, & C. Mays (Eds.), In the tracks of Breivik. Far right networks in northern and Eastern Europe (pp. 209–227). Münster: LIT Verlag.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.