Islamic Radicalization through social media for ISIS Recruitment of Fighters
Keywords:
ISIS, Jihad, Social Media, Recruitment, Fighters, Caliphate, IdeologyAbstract
This paper will briefly discussed on the history of ISIS establishment, their ideology and the concept of Islamic radicalization that have been disseminate through social media with the purpose of recruiting fighters, promoting jihad ideology and intimidating their enemies. This will further emphasize on the current phenomena of ISIS social media engagement as a global problem to terrorism. With the subsequent growth of social media platforms for communications, militant groups like ISIS have incorporated their ideology through social media and further employ recruitment strategy through the use of social media networks. Under the command of Abu Bakr al-Baghdadi, ISIS has established an Islamic caliphate, an advanced common jihadist ideas in a short amount of time which is an achievement that no other insurgency has been able to accomplish. The ISIS powered their projects by combining innovative technological strategies and advancing with strong force, financial resources and also intimidation as their main ideology.
Downloads
References
Kohlmann, E. and L. Alkhouri, Profiles of foreign fighters in Syria and Iraq. CTC Sentinel, 2014. 7(9):p. 1-5.
Louis, W.R., Implications of social psychological approaches to terrorism for conflict management. Terrorism and torture: An interdisciplinary perspective, 2009: p. 125-153.DOI: https://doi.org/10.1017/CBO9780511581199.008.
O'Callaghan, D., et al. Online social media in the Syria conflict: Encompassing the extremes and the in- betweens. IEEE.DOI: https://doi.org/10.1109/ASONAM.2014.6921619.
Cockburn, P., The rise of Islamic State: ISIS and the new Sunni revolution, 198-335. 2015: Verso Books.
Ali, M., ISIS and propaganda: How ISIS exploits women. Reuters Institute for the Study of Journalism, 2015: p. 10-11.
Cronin, A.K., ISIS is not a terrorist group: Why counterterrorism won't stop the latest jihadist threat.Foreign Aff., 2015. 94: p. 87.
Awan, I., Cyber-extremism: Isis and the power of social media. Society, 2017. 54(2): p. 138-149.DOI: https://doi.org/10.1007/s12115-017-0114-0.
Lieber, P.S. and P.J. Reiley, Countering ISIS’s social media influence. Special Operations Journal, 2016.2(1): p. 47-57.DOI: https://doi.org/10.1080/23296151.2016.1165580.
Siboni, G., D. Cohen, and T. Koren, The Islamic State’s strategy in cyberspace. Military and Strategic Affairs, 2015. 7(1): p. 127-144.
Stubbs-Richardson, M., et al., Not Your Typical Social Media Influencer: Exploring the Who, What, and Where of Islamic State Online Propaganda. International Journal of Cyber Criminology, 2020. 14(2): p. 479-496.
Doosje, B., A. Loseman, and K. Van Den Bos, Determinants of radicalization of Islamic youth in the Netherlands: Personal uncertainty, perceived injustice, and perceived group threat. Journal of Social Issues, 2013. 69(3): p. 586-604.DOI: https://doi.org/10.1111/josi.12030.
DeJong, J., et al., The sexual and reproductive health of young people in the Arab countries and Iran. Reproductive health matters, 2005. 13(25): p. 49-59.DOI: https://doi.org/10.1016/S0968- 8080(05)25181-9.
Kaplan, A.M., Social media, the digital revolution, and the business of media. International Journal on Media Management, 2015. 17(4): p. 197-199.DOI: https://doi.org/10.1080/14241277.2015.1120014.
Cohen-Almagor, R., In internet’s way: Radical, terrorist Islamists on the free highway. International Journal of Cyber Warfare and Terrorism (IJCWT), 2012. 2(3): p. 39-58.DOI: https://doi.org/10.4018/ijcwt.2012070104.
Masum, A. and M.R.M. Desa, Media and the libel law: The Malaysian experience. Procedia-Social and Behavioral Sciences, 2014. 155: p. 34-41.DOI: https://doi.org/10.1016/j.sbspro.2014.10.252.
Mayring, P., Qualitative content analysis: theoretical foundation, basic procedures and software solution, 1-143. 2014.DOI: https://doi.org/10.1007/978-94-017-9181-6_13.
McCauley, C. and S. Moskalenko, Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and political violence, 2008. 20(3): p. 415-433.DOI: https://doi.org/10.1080/09546550802073367.
Abuza, Z., Joining the new caravan: ISIS and the regeneration of terrorism in Southeast Asia. US Army War College Strategic Studies Institute. June, 25. 2015.
Weimann, G., Going dark: Terrorism on the dark web. Studies in Conflict & Terrorism, 2016. 39(3): p. 195-206.DOI: https://doi.org/10.1080/1057610X.2015.1119546.
Kenney, M., et al., Organisational adaptation in an activist network: Social networks, leadership, and change in al-Muhajiroun. Applied ergonomics, 2013. 44(5): p. 739-747.DOI: https://doi.org/10.1016/j.apergo.2012.05.005.
Sarac, B.N., Jessica Stern and JM Berger. ISIS: The State of Terror. Terrorism and Political Violence, 2016. 28(4): p. 823-824.DOI: https://doi.org/10.1080/09546553.2016.1205467.
Golan, G.J. and J.S. Lim, Third-person effect of ISIS's recruitment propaganda: Online political self- efficacy and social media activism. International Journal of Communication, 2016. 10: p. 21.
Peresin, A. and A. Cervone, The Western muhajirat of ISIS. Studies in Conflict & Terrorism, 2015.38(7): p. 495-509.DOI:https://doi.org/10.1080/1057610X.2015.1025611.
Vaismoradi, M., H. Turunen, and T. Bondas, Content analysis and thematic analysis: Implications for conducting a qualitative descriptive study. Nursing & health sciences, 2013. 15(3): p. 398-405.DOI: https://doi.org/10.1111/nhs.12048.
Wood, G., What ISIS really wants. The Atlantic, 2015. 315(2): p. 78-94.
Kyu, H.H., et al., The global burden of tuberculosis: results from the Global Burden of Disease Study 2015. The Lancet Infectious Diseases, 2018. 18(3): p. 261-284.DOI: https://doi.org/10.1016/S1473- 3099(17)30703-X.
Berger, J.M. and J. Morgan, The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter, 2nd edtion. 118-120. 2015.
Lemieux, A.F., et al., Inspire magazine: A critical analysis of its significance and potential impact through the lens of the information, motivation, and behavioral skills model. Terrorism and Political Violence, 2014. 26(2): p. 354-371.DOI: https://doi.org/10.1080/09546553.2013.828604.
Ho, S.S., V.H.-H. Chen, and C.C. Sim, The spiral of silence: Examining how cultural predispositions, news attention, and opinion congruency relate to opinion expression. Asian journal of communication, 2013. 23(2): p. 113-134.DOI: https://doi.org/10.1080/01292986.2012.725178.
Elo, S., et al., Qualitative content analysis: A focus on trustworthiness. SAGE open, 2014. 4(1): p. 2158244014522633.DOI: https://doi.org/10.1177/2158244014522633.
Elo, S. and H. Kyngäs, The qualitative content analysis process. Journal of advanced nursing, 2008.62(1): p. 107-115.DOI: https://doi.org/10.1111/j.1365-2648.2007.04569.x.
Marshall, C. and G.B. Rossman, Designing qualitative research, 4th edition. 2014: Sage publications.
Forman, J. and L. Damschroder, Empirical methods for bioethics: A primer. Advances in bioethics, 2008. 11: p. 39-62.DOI: https://doi.org/10.1016/S1479-3709(07)11003-7.
Burmeister, E. and L.M. Aitken, Sample size: How many is enough? Australian Critical Care, 2012.25(4): p. 271-274.DOI: https://doi.org/10.1016/j.aucc.2012.07.002.
Kyngäs, H., et al., Sisällönanalyysi suomalaisessa hoitotieteellisessä tutkimuksessa. Hoitotiede, 2011.23(2): p. 138-148.
Nordin, M.N.B., M.Z.B. Mustafa, and A. Razzaq, Relationship between headmasters' leadership, task load on special education integration programme teachers' job satisfaction. Universal Journal of Educational Research, 2020. 8(8): p. 3398-3405.DOI: https://doi.org/10.13189/ujer.2020.080813.
Polus, S.S. and G. Benny, International Organizations Against the Islamic State in Iraq and Syria: An Neoliberal Institutionalist Analysis. The Social Sciences, 2017. 12(3): p. 441-451.
Morgan, D.L., Qualitative content analysis: a guide to paths not taken. Qualitative health research, 1993.3(1): p. 112-121.DOI: https://doi.org/10.1177/104973239300300107.
Leggiero, K., Countering ISIS recruitment in western nations. Journal of Political Risk, 2015. 3(1): p. 1- 10.
Gates, S. and S. Podder, Social media, recruitment, allegiance and the Islamic State. Perspectives on Terrorism, 2015. 9(4): p. 107-116.
Gulmohamad, Z.K., The Rise and Fall of the Islamic State of Iraq and Al-Sham (Levant) ISIS. Global security studies, 2014. 5(2).
Gunaratna, R., Islamic State’s First Terror Attack in Malaysia. RSIS Commentaries, 2016. 29.
Bouzis, K., Countering the Islamic State: US counterterrorism measures. Studies in Conflict & Terrorism, 2015. 38(10): p. 885-897.DOI: https://doi.org/10.1080/1057610X.2015.1046302.
Hewitt, C. and J. Kelley-Moore, Foreign fighters in Iraq: a cross-national analysis of Jihadism. Terrorism and Political Violence, 2009. 21(2): p. 211-220.DOI: https://doi.org/10.1080/09546550802544839.
Laub, Z. and J. Masters, Islamic State in Iraq and Syria. Council on Foreign Relations, 14. 2014.
Gill, P., Lone-actor terrorists: A behavioural analysis, 1-67. 2015: Routledge.DOI: https://doi.org/10.4324/9781315766348.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.