Cyber-Extremism: Isis and the Power of Social Media
@article{Awan2017CyberExtremismIA, title={Cyber-Extremism: Isis and the Power of Social Media}, author={Imran Awan}, journal={Society}, year={2017}, volume={54}, pages={138-149} }
The current crises in Syria has led to a number of Britons travelling abroad to fight with groups such as Isis. Capitalising on this growth, Isis are now increasingly fighting an online cyber war, with the use of slick videos, online messages of hate and even an app that all aim to radicalise and create a new generation of cyber jihadists. These modern day tools are helping Isis spread their propaganda and ideology to thousands of online sympathisers across the world. Indeed, the group has…
126 Citations
Youth as an Object of Online Extremist Propaganda: The Case of the IS
- Political Science
- 2021
A youth audience is the most vulnerable part of society as an object of influence of radical ideas. The authors argue that the most efficient tool of involving young people of different origin and…
Social Media Grooming: Relationship Of Social Media, Youth And Terrorism In Ksa
- Business
- 2018
Tremendous growth of presence of the terrorist organizations in emerging markets poses threat to the security of the world. Jihadists increased their active promotion of the strategic goals by virtue…
The Media in the Service of ISIS Propaganda War
- Political ScienceJurnal Pengajian Media Malaysia
- 2018
The research discussed how the Islamic State uses the media to spread their propaganda especially the exploitation of modern communication technology. Then we examined an essential aspect of how the…
Haters Gonna “Like”: Exploring Canadian Far-Right Extremism on Facebook
- Political Science
- 2020
The overwhelming focus in the scholarly literature on extremist groups online tends to focus on jihadist groups like the so-called Islamic State and Al Qaeda. With right-wing violence erupting in…
From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa
- Political Science
- 2019
This study examines the Twitter rivalry of two groups of the alt-Right and antifascist movement to understand how certain appeals, launched through social media, may promote material violence.…
“Now Is the Time to Wake Up”: Islamic State’s Narratives of Political Awareness
- Political ScienceTerrorism and Political Violence
- 2019
ABSTRACT Terrorist organisations are increasingly seeking to attract transnational membership. In particular, the Islamic State proudly displays transnational support in its propaganda. As a result,…
Social Media Warfare in Indonesia Political Campaign: A Survey
- Political Science2018 3rd International Conference on Information Technology, Information System and Electrical Engineering (ICITISEE)
- 2018
Social Media has a strategic role in political competition. By using social media, information delivery to the public becomes faster. As a medium of mass information dissemination with broader…
Online Extremism: Research Trends in Internet Activism, Radicalization, and Counter-Strategies
- Political Science
- 2020
This article reviews the academic literature on how and for what purposes violent extremists use the Internet, at both an individual and organizational level. After defining key concepts like…
Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events
- Computer Science
- 2021
Analysis of the internal dynamics and networks of Al-Qaeda and the Islamic State of Iraq and al-Sham using a “Global Cyberterrorism Dataset” that features data on cyberterror attacks between 2011 and 2016 indicates that terror in cyberspace is ubiquitous, more flexible than traditional terrorism, and that cyberattacks mostly occurred within the countries of origin.
Unity Starts with U: A Case Study of a Counter-Hate Campaign Through the Use of Social Media Platforms
- SociologyJournal of Hate Studies
- 2020
Hate has been a growing concern with hate-groups and individuals using the Internet, or more specifically, social media platforms, to globalize hate. Since these social media platforms can connect…
References
SHOWING 1-10 OF 61 REFERENCES
Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq
- Political Science
- 2015
Social media have played an essential role in the jihadists’ operational strategy in Syria and Iraq, and beyond. Twitter in particular has been used to drive communications over other social media…
Terrorist Use of the Internet: The Real Story
- Computer Science
- 2007
The Internet has five characteristics that make it an ideal tool for terrorist organizations, and small terrorist groups can have a global cyber presence that rivals that of much larger organizations.
The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign
- Law
- 2012
Producers of Al-Qaeda inspired propaganda have shifted their operations in recent years from closed membership online forums to mainstream social networking platforms. Using social network analysis,…
Cyberspace-A New Medium for Communication, Command, and Control by Extremists
- Political Science
- 1999
Information and Communication Technologies (ICTs) are extending the arena within which extremists and terrorists operate. Among the most active participants are Islamists and the Far Right, whose…
www.terrorism.com: Terror on the Internet
- Business
- 2002
The nature of the Internet--the ease of access, the chaotic structure, the anonymity, and the international character--all furnish terrorist organizations with an easy and effective arena for action.…
Rise of ISIS: A Threat We Can't Ignore
- Political Science
- 2014
Jay Sekulow, one of America's most influential attorneys, closely examines the rise of the terrorist groups ISIS and Hamas, explains their objectives and capabilities and how, if left undefeated,…
The Real Online Terrorist Threat
- Political Science
- 2006
THE UNITED STATES is gradually losing the online war against terrorists. Rather than aggressively pursuing its enemies, the U.S. government has adopted a largely defensive strategy, the centerpiece…
A Systematic Examination of Terrorist Use of the Internet1
- Business
- 2008
The design of the Internet has made it an especially useful tool to terrorist groups. Using the Internet, terrorist groups have been especially successful in recruiting new members and exciting them…
Users of the world, unite! The challenges and opportunities of Social Media
- Computer Science
- 2010
Black Ice: The Invisible Threat of Cyber-Terrorism
- Political Science
- 2003
From the Publisher:
The first book to define the clear and present danger posed by a cyber-terrorist attack on the U.S. computer- and network-dependent infrastructure. The pages are packed with…