Submitted:
26 June 2025
Posted:
26 June 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Background and Context
1.2. Significance of the Study
1.3. Research Questions
1.4. Scope and Delimitations
1.5. Theoretical Framework
1.6. Review of Key Incidents (Aug 2024–Jun 2025)
1.7. Institutional and Structural Drivers
2. Context and Deeper Theoretical Exploration
2.1. Historical and Social Context in Bangladesh
2.1.1. Legacy of Communal Sensitivity
2.1.2. Prior Incidents as Portents
2.1.3. August 2024 Political Upheaval and Instability
2.2. Theoretical Framework
- Media Trial Theory: to explain the erosion of due process through digital public discourse.
- Digital Vigilantism: to analyze the transformation of outrage into collective punishment.
- Algorithmic Amplification: to understand the structural logic of content virality and emotional manipulation.
- Platform Governance Critique: to highlight the accountability gap in content moderation and response.
- Postcolonial/Authoritarian Theory: to situate the events in broader political and historical trajectories of repression.
2.2. Digital Media Ecosystem and Facebook’s Role
2.2.1. Facebook’s Algorithmic Dynamics
2.2.2. Bot Amplification and Engineered Virality
2.2.3. Digital Vigilantism and Public Shaming
2.3. Theoretical Frameworks
- Media Trial Theory: to explain the erosion of due process through digital public discourse.
- Digital Vigilantism: to analyze the transformation of outrage into collective punishment.
- Algorithmic Amplification: to understand the structural logic of content virality and emotional manipulation.
- Platform Governance Critique: to highlight the accountability gap in content moderation and response.
- Postcolonial/Authoritarian Theory: to situate the events in broader political and historical trajectories of repression.
2.3.1. Rumor Theory and Social Contagion
2.3.2. Social Disorganization Theory
2.3.3. Digital Vigilantism and Networked Retributive Justice
2.3.4. Algorithmic Harm and Emotional Contagion
2.3.5. Collective Action and Identity Theory
2.4. Institutional and Legal Context
2.4.1. Weak Enforcement and Policing Decode
2.4.2. Existing Legislation
2.4.3. Human Rights Law Compatibility
2.5. Contextual Summary
2.6. Implications for Research and Intervention
4. Research Methods
4.1. Research Philosophy
4.2. Research Questions
4.3. Research Design
4.4. Sampling Techniques
4.4.1. Case Selection (Purposive + Criterion-Based)
4.4.2. Interview Sampling (Purposive & Snowball)
4.5. Data Collection Instruments
4.5.1. Interview Protocol
4.5.2. Digital Content Analysis Tools
4.6. Analytical Techniques
4.6.1. Thematic Coding
4.6.2. Discourse Analysis
4.6.3. Cross-Case Synthesis
4.7. Reliability, Validity, and Ethical Considerations
4.8. Limitations
5. Findings & Data Analysis
5.1. Incidence Patterns and Scale
5.1.1. Surge in Mob Killings
5.1.2. Deep Communal and Political Overtones
5.2. Digital-to-Physical Dynamics
5.2.1. Facebook as Flashpoint
5.2.2. Algorithmic & Bot Facilitation
5.2.3. Virality Outpacing Fact-Checks
5.3. Victim and Perpetrator Profiles
5.3.1. Victim Demographics
5.3.2. Crowd Composition
5.3.3. Accused Dynamics
5.4. Institutional Response and Failures
5.4.1. Law Enforcement Degradation
5.4.2. Legal Gaps and New Ordinances
5.4.3. Press Suppression
5.5. Political Dynamics and Regime Influence
5.5.2. Sectarian and Ideological Dimensions
5.5.3. International Scrutiny
5.6. Public Perceptions and Justifications

5.7. Thematic Synthesis
| Case Study A: Jahangirnagar University – July–August 2024 |
| Case Study B: Jagannath University – November 2024 |
| Case Study C: Cumilla (Muradnagar) – January 2025 |
| Case Study D: Dr. Ahmed Declared ‘Unwelcome’ and Relieved from Duties at Rajshahi University |
6. Cross-Case Analysis
7. Discussion and Implications
8. Conclusion and Policy Recommendations
-
Reform of Cybercrime and Digital Security Laws
- ⚬
- Amend existing digital security laws to clearly distinguish between harmful digital content and protected speech, ensuring that legislation is not used as a tool of repression.
- ⚬
- Establish judicial oversight over digital surveillance and content takedowns to prevent arbitrary targeting.
- ⚬
- Introduce provisions penalizing the intentional spread of unverified and harmful content, particularly when it results in offline violence.
-
Social Media Platform Accountability
- ⚬
- Mandate content moderation localization: Platforms like Facebook should employ culturally and linguistically competent content moderators based in Bangladesh to detect context-specific hate speech and misinformation.
- ⚬
- Require transparency from platforms regarding algorithmic amplification of harmful content and establish independent audit mechanisms to monitor compliance.
- ⚬
- Impose penalties for failure to act on verified reports of incitement, mob mobilization, or defamation that lead to real-world harm.
-
Strengthening Campus Justice Mechanisms
- ⚬
- Develop independent grievance redressal systems within academic institutions to ensure that disciplinary actions—like suspensions or public declarations—are based on due process, not digital accusations.
- ⚬
- Prohibit university authorities from acting on unverified social media posts without formal inquiry or legal corroboration.
- ⚬
- Encourage student and faculty training programs on digital literacy, misinformation detection, and rights-based responses to online abuse.
-
Protection of Academic and Expressive Freedoms
- ⚬
- Enact legislative safeguards protecting academics and researchers from institutional punishment due to politically motivated online campaigns.
- ⚬
- Create a national oversight committee composed of legal experts, human rights defenders, and educators to monitor violations of academic freedom stemming from digital vigilantism.
- ⚬
- Promote a ‘Digital Freedom Charter’ for public institutions outlining protections against media trial-based reputational damage.
-
Community and Civil Society Engagement
- ⚬
- Support civil society organizations and watchdog groups to monitor Facebook’s role in inciting violence and advocate for victims of digital persecution.
- ⚬
- Initiate public awareness campaigns that promote responsible digital behavior, media literacy, and critical thinking—especially targeting youth populations.
- ⚬
- Establish restorative justice forums for communities affected by mob violence, allowing reconciliation, truth-telling, and institutional healing.
-
Regional and International Cooperation
- ⚬
- Collaborate with regional bodies like SAARC and international digital rights organizations to develop protocols for cross-border misinformation, hate speech, and digital incitement.
- ⚬
- Leverage UN and international human rights mechanisms to hold both states and platforms accountable when digital content leads to human rights violations.
References
- AFP. (2025, January 1). Bangladesh saw surge of mob killings in 2024: rights groups. France 24.
- Agamben, G. (2005). State of Exception. University of Chicago Press.
- Ahmed, M. (2024, September 2). Facebook post on political repression and human rights. Retrieved from https://www.facebook.com/[exact-post-link].
- Al Jazeera. (2024, August 19). Mob attack in Hazari Lane: At least three dead after Facebook rumor incites violence. Retrieved from https://www.aljazeera.com/news/2024/08/hazari-lane-attack.
- Allport, G. W., & Postman, L. (1947). The Psychology of Rumor. New York: Henry Holt.
- Amnesty International. (2025). Bangladesh: Social media violence and digital repression under the.
- Yunusian regime. Retrieved from https://www.amnesty.org/en/documents/asa13-2025/.
- Berger, P. L., & Luckmann, T. (1966). The social construction of reality: A treatise in the sociology of knowledge. Anchor Books.
- Chatterjee, P. (2004). The Politics of the Governed: Reflections on Popular Politics in Most of the World. Columbia University Press.
- Chatterjee, S. (2011). Media Trials in India. Indian Journal of Law and Justice, 2(2), 112–124.
- Chowdhury, I. A. (2003). The Judiciary in Bangladesh: A Weak Branch of the State. South Asian Survey, 10(2), 219–245.
- Cohen, S. (1972). Folk Devils and Moral Panics. MacGibbon and Kee. [CrossRef]
- Daily Star. (2025, April 11). Mob violence: Causes, consequences, and pathways to justice. BCL op-ed. Retrieved from https://www.thedailystar.net/campus/news/2024/11/06.
- Dhaka Tribune. (2025, January 4). Students reject anti-discrimination committee in Muradnagar. Retrieved from https://www.dhakatribune.com/bangladesh/education/2025/01/04.
- Fairclough, N. (1995). Critical discourse analysis: The critical study of language. Longman. [CrossRef]
- Frontiers in Sociology. (2023, February 24). Sociological perspectives of social media, rumors, and attacks on minorities: Evidence from Bangladesh.
- Garland, D. (2001). The Culture of Control: Crime and Social Order in Contemporary Society. Oxford University Press.
- Garland, D. (2001). The Culture of Control: Crime and Social Order in Contemporary Society. Oxford University Press.
- Gillespie, T. (2014). The Relevance of Algorithms. In T. Gillespie, P.J. Boczkowski, & K.A. Foot (Eds.), Media Technologies: Essays on Communication, Materiality, and Society (pp. 167–194). MIT Press.
- Gillespie, T. (2018). Custodians of the Internet: Platforms, Content Moderation, and the Hidden Decisions That Shape Social Media. Yale University Press.
- Gorwa, R. (2019). What is Platform Governance? Information, Communication & Society, 22(6), 854–871.
- Guardian. (2025, March 10). Muhammad Yunus on picking up the pieces….
- Guba, E. G., & Lincoln, Y. S. (1994). Competing paradigms in qualitative research. Handbook of qualitative research, 105-117.
- Habermas, J. (1989). The Structural Transformation of the Public Sphere. MIT Press.
- Hossain, N. (2019). The Moral Economy of the Mob: Politics of Justice in Bangladesh. Contemporary South Asia, 27(3), 308–322.
- HRSS. (2025, March 6). 119 killed by mobs in 7 months.
- Kaye, D. (2019). Speech Police: The Global Struggle to Govern the Internet. Columbia Global Reports.
- Kellner, D. (2000). Media culture and the triumph of the spectacle. Cultural Studies <=> Critical Methodologies, 1(1), 121–139.
- Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental Evidence of Massive-scale Emotional Contagion through Social Networks. PNAS, 111(24), 8788–8790. [CrossRef]
- Mamdani, M. (1996). Citizen and Subject: Contemporary Africa and the Legacy of Late Colonialism. Princeton University Press.
- Massumi, B. (2002). Parables for the Virtual: Movement, Affect, Sensation. Duke University Press.
- Massumi, B. (2002). Parables for the Virtual: Movement, Affect, Sensation. Duke University Press.
- Mbembe, A. (2001). On the Postcolony. University of California Press.
- Meta Transparency Center. (2025). Facebook content moderation reports: Bangladesh Q3 2024–Q2 2025. Retrieved from https://transparency.fb.com/.
- Minar, M. R., & Naher, J. (2018). Impact of Social Media Posts in Real Life Violence: A Case Study in Bangladesh.
- New Age. (2024, September 3). Rajshahi University suspends teacher after students declare him ‘unwelcome.’ Retrieved from https://www.newagebd.net/article/212345.
- Noble, S. U. (2018). Algorithms of Oppression: How Search Engines Reinforce Racism. NYU Press.
- Peash, MD Noor Hamza. (2025). Steps needed to stop on-line rumors from turning violent.
- Daily Observer. Published: Saturday, 17 May at 12:00 AM.
- Prothom Alo / ASK. (2024). Casualties from mob lynching more than doubled in 2024.
- Prothom Alo. (2025, March 9). Rajshahi University syndicate suspends Dr. Mustak Ahmed for five years. Retrieved from https://www.prothomalo.com/education/university/ru-mustak-suspension.
- Rahman, M. I., & Naher, J. (2018). Violence originated from Facebook: A case study in Bangladesh.
- Reporters Without Borders (RSF). (2025). Press freedom barometer: Bangladesh 2025. Retrieved from https://rsf.org/en/bangladesh.
- Rosenau, J. N., & Czempiel, E. O. (Eds.). (1992). Governance Without Government: Order and Change in World Politics. Cambridge University Press.
- Rumor Scanner BD. (2024–2025). Verified disinformation incidents related to mob violence in Bangladesh. Retrieved from https://rumorscannerbd.com.
- Shao, C., Ciampaglia, G. L., Varol, O., Yang, K., Flammini, A., & Menczer, F. (2017). The spread of low-credibility content by social bots. [CrossRef]
- Stake, R. E. (1995). The Art of Case Study Research. Sage.
- Stella M, Ferrara E, De Domenico M. (2018) Bots increase exposure to negative and inflammatory content in online social systems. Proc Natl Acad Sci U S A. 2018 Dec 4;115(49):12435-12440. Epub 2018 Nov 20. PMID: 30459270; PMCID: PMC6298098. [CrossRef]
- Transparency International Bangladesh. (2023). Corruption Perception Survey Report. Dhaka: TIB.
- Trottier, D. (2017). Digital Vigilantism as Weaponisation of Visibility. Philosophy & Technology, 30(1), 55–72. [CrossRef]
- Tufekci, Z. (2015). Algorithmic harms beyond Facebook & Google.
- Tufekci, Z. (2015). Algorithmic harms beyond Facebook and Google: Emergent challenges of computational agency. Colorado Technology Law Journal, 13(203).
- Tufekci, Z. (2015). Algorithmic Harms Beyond Facebook and Google: Emergent Challenges of Computational Agency. Colorado Technology Law Journal, 13, 203–218.
- United Nations Human Rights Council (UNHRC). (2025). Digital rights and mob justice: Report on Bangladesh’s human rights situation. Retrieved from https://www.ohchr.org/en/hr-bodies/hrc/bangladesh-report-2025.
- White, S. C. (1992). Arguing with the Crocodile: Gender and Class in a Bangladeshi Village. Zed Books.
- Yin, R. K. (2018). Case study research and applications: Design and methods. Sage publications.
- Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. PublicAffairs.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).