Show simple item record

dc.contributor.authorLooney, S
dc.date.accessioned2023-09-19T09:35:12Z
dc.date.available2023-09-19T09:35:12Z
dc.date.issued2023-12
dc.identifier.issn1944-2866
dc.identifier.issn1944-2866
dc.identifier.urihttps://pearl.plymouth.ac.uk/handle/10026.1/21331
dc.description.abstract

Considerable attention has been paid by researchers to social media platforms, especially the ‘big companies’, and increasingly also messaging applications, and how effectively they moderate extremist and terrorist content on their services. Much less attention has yet been paid to if and how infrastructure and service providers, further down ‘the tech stack’, deal with extremism and terrorism. Content Delivery Networks (CDN) such as Cloudflare play an underestimated role in moderating the presence of extremist and terrorist content online as it is impossible for these websites to operate without DDoS protection. This is evidenced by the takedown of a wide range websites such as The Daily Stormer, 8chan, a variety of Taliban websites and more recently the organised harassment site Kiwifarms following refusal of service by Cloudflare. However, it is unclear whether there is any formal process of content review conducted by the company when it decides to refuse services. This article aims to first provide an analysis of what extremist and terrorist websites make use of Cloudflare's services as well as other CDNs, and how many of them have been subject to takedown following refusal of service. Following this the article analyses CDNs' terms of service and how current and upcoming internet regulation applies to these CDNs.

dc.format.extent544-558
dc.languageen
dc.publisherWiley
dc.subjectContent Delivery Networks
dc.subjectcontent moderation
dc.subjectextremism
dc.subjectregulation
dc.subjectwebsites
dc.titleContent moderation through removal of service: Content delivery networks and extremist websites
dc.typejournal-article
dc.typeArticle
plymouth.issue4
plymouth.volume15
plymouth.publisher-urlhttp://dx.doi.org/10.1002/poi3.370
plymouth.publication-statusPublished
plymouth.journalPolicy & Internet
dc.identifier.doi10.1002/poi3.370
plymouth.organisational-group|Plymouth
plymouth.organisational-group|Plymouth|Faculty of Arts, Humanities and Business
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA
plymouth.organisational-group|Plymouth|Users by role
plymouth.organisational-group|Plymouth|Users by role|Academics
plymouth.organisational-group|Plymouth|REF 2021 Researchers by UoA|UoA18 Law
plymouth.organisational-group|Plymouth|Faculty of Arts, Humanities and Business|School of Society and Culture
dcterms.dateAccepted2023-08-26
dc.date.updated2023-09-19T09:35:07Z
dc.rights.embargodate2023-9-20
dc.identifier.eissn1944-2866
dc.rights.embargoperiodforever
rioxxterms.versionofrecord10.1002/poi3.370


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV