Radicalism on World Wide Web and Propaganda Strategy
2016, Al-Ulum
https://doi.org/10.30603/AU.V16I2.42Abstract
Radical individual and organizations are setting strong foothold on Internet. They operate in dark network hidden from authorities view to pursuade, recruit, and coordinate radical and violent actions. The presence of radical individual and organizations onInternet sites have caused massive debate and contraversi among Internet users, law enforcement bodies,and policy makers regarding misuse of Internet. However, little is known how exactly radical individual and organizations deliver their propaganda on Internet and what radical organizations practice such activities on Internet. Through the use of content analysis approach, this study analyzed various radical websites content to provide deep insight of radical operation and propaganda on Internet. Data was collected from various popular radical organization websites and previous studies. The findings show that well-kown organized radical and terorist oragnizations in Indonesia and International have intensively used Internet for n...
References (66)
- Awan, A. N, Radicalization on the Internet? The RUSI Journal, vol. 152, No.3, 2007, pp. 76-81
- Sageman, M, Leaderless Jihad. Philadelphia: University of Pennsylvania Press, 2008, p.125
- Conway, M., & McInerney, L, "Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study". In D. Ortiz-Arroyo, H. Larsen, D. Zeng, D. Hicks & G. Wagner (Eds.), Intelligence and Security Informatics (Vol. 5376): Springer Berlin Heidelberg, 2008, pp. 108-118
- Elo, S., & Kyngäs, H. (2008). The qualitative content analysis process. [Article].
- Journal of Advanced Nursing, Vol. 62 No. 1, 2008, pp.107-115
- Hsieh, H.-F., & Shannon, S. E, Three Approaches to Qualitative Content Analysis. Qualitative Health Research, Vol. 15 No. 9, 2005, pp. 1277-1288
- Hara, N., Bonk, C., & Angeli, C, Content analysis of online discussion in an applied educational psychology course. Instructional Science, Bol. 28 No. 2, 2000, pp. 115-152
- Yang, C. C., &Ng, T. D, . Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization. Paper presented at the Intelligence and Security Informatics, 2007 IEEE, p. 3
- Last, M., & Kandel, A, Fighting Terror in Cyberspace. Hackensack, N.J.: World Scientific Publishing Company, 2005.
- Attride-Stirling, J. (2001). Thematic Networks: an Analytic Tool for Qualitative Research. Qualitative Research, Vol 1 No. 3, 2001, pp. 385-405
- Internet WorldStats. 2015a. Internet Usage Statistics: The Internet Big Picture World Internet Users and 2015 Population Stats. Retrieved 20 januari 2016, from Internet World Stats http://www.internetworldstats.com/stats.htm
- InternetWorldStats. 2015. Internet Users in Asia. Retrieved 20 januari 2016, from Internet World Stats http://www.internetworldstats.com/stats3.htm#asia http://journal.iaingorontalo.ac.id/index.php/au
- Kominfo. 2015. Kominfo Sudah Blokir 814.594 Situs Radikal Retrieved 21 Pebruari 2016, from Kominfo http://kominfo.go.id/index.php/content/detail/5083/Kominfo+Sudah+Blokir+814.594+S itus+Radikal+/0/sorotan_media#.Vsm0q0AaiwY
- Weimann, G. (2010). "Terror on Facebook, Twitter, and Youtube." Brown Journal of World Affairs XVI(II): 55
- Weimann, G. (2012). "Lone Wolves in Cyberspace." Journal of Terrorism Research 3(2): 18
- 49 Detiknews. 2016. Pemerintah Tutup 11 Situs Radikalisme Termasuk www.bahrunaim.com. Retrieved 21 Pebruary 2016, from Detik News http://news.detik.com/berita/3119768/pemerintah-tutup-11-situs-radikalisme-termasuk- wwwbahrunnaimco
- Mantel, B. 2009. Terrorism and the Internet : Should Web Sites That Promote Terrorism Be Shut Down? Retrieved 26 June 2015, from CQ Researcher http://www.sagepub.com/sites/default/files/upm-binaries/36306_6.pdf.
- Weimann, G, Lone Wolves in Cyberspace. Journal of Terrorism Research, Vol 3 No. 2, 2012, p. 80
- Hui, J. Y, The Internet in Indonesia, p. 177
- 66 Conway, M, TERRORIST 'USE' OF THE INTERNET, p.4
- 67 Weimann, G, Terror in Cyberspace, pp. 31
- 68 Weimann, G, Terror on Facebook, p.55
- 69 Zerofox. 2014. ISIS: Terror Has Gone Social Retrieved 14 June 2014, from Zerofox https://www.zerofox.com/blog/islamic-state-isis-terror-has-gone-social-infographic/
- Gates, S., & Podder, S. Social Media, Recruitment, Allegiance and the Islamic State.
- PERSPECTIVES ON TERRORISM, No. 9 Vol. 4,2015, p. 109
- Carnegie, P. J. (2015). Countering the (Re-) Production of Militancy in Indonesia: between Coercion and Persuasion. PERSPECTIVES ON TERRORISM, Vol. 9 No. 5, 2015, p. 18 http://journal.iaingorontalo.ac.id/index.php/au REFERENCES
- Aghaei, S., Nematbakhsh, M. A., & Farsani, H. K. 2012. Evolution of the World Wide Web: From Web 1.0 to Web 4.0 International Journal of Web & Semantic Technology (IJWesT), Vol. 3 No. 1, pp. 1-10.
- Attride-Stirling, J. 2001. Thematic Networks: an Analytic Tool for Qualitative Research. Qualitative Research, Vol. 1 No. 3, pp. 385- 405.
- Bermingham, A., Conway, M., McInerney, L., O'Hare, N., & Smeaton, A. F. 2009. Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation. Paper presented at the The International Conference on Advances in Social Network Analysis and Mining, 2009. ASONAM '09 Athens.
- Berners-Lee, T. 1998. The World Wide Web: A very short personal history. Retrieved 17 Pebruary 2016 https://www.w3.org/People/Berners-Lee/ShortHistory.html
- Xu, J., Chen, H., Zhou, Y., & Qin, J, On the Topology of the Dark Web of Terrorist Groups. In S. Mehrotra, D. D. Zeng, H. Chen, B. Thuraisingham & F.-Y. Wang (Eds.), Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings (pp. 367-376). Berlin, Heidelberg: Springer Berlin Heidelberg.2006, P.65
- Nurdin Bräuchler, B. 2004. Islamic Radicalism Online: The Moluccan Mission of the Laskar Jihad in Cyberspace. The Australian Journal of Anthropology, Vol. 15 No. 3, pp. 267-285.
- Carnegie, P. J. 2015. Countering the (Re-) Production of Militancy in Indonesia: between Coercion and Persuasion. PERSPECTIVES ON TERRORISM, Vol. 9 No. 5, pp. 15-25.
- Casciani, D. 2014. How do you define Islamist extremism? Retrieved 30 June 2015, from BBC News http://www.bbc.com/news/uk- 27777892
- Cohen, F. 2002. Terrorism and Cyberspace. Network Security, Vol. 5, pp. 17-19.
- Conway, M. 2005. TERRORIST 'USE' OF THE INTERNET AND FIGHTING BACK. Paper presented at the Cybersafety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, London.
- Detiknews. 201). Pemerintah Tutup 11 Situs Radikalisme Termasuk www.bahrunaim.com. Retrieved 21 Pebruary 2016, from Detik News http://news.detik.com/berita/3119768/pemerintah-tutup-11- situs-radikalisme-termasuk-wwwbahrunnaimco
- Egon, B. 1963. Radicalism and the Organization of Radical Movements. American Sociological Review, Vol. 28 No. 6, pp. 928-940.
- Ellison, N. B., Steinfield, C., & Lampe, C. 2007). The Benefits of Facebook "Friends:" Social Capital and College Students' Use of Online Social Network Sites. Journal of Computer-Mediated Communication, Vol. 12 No. 4, pp. 1143-1168.
- Elo, S., & Kyngäs, H. 2008. The qualitative content analysis process. [Article]. Journal of Advanced Nursing, Vol. 62 No. 1, pp. 107- 115. Fleet, M. (1992). Christian Communities in Chile and Peru Toronto, Kellog Institute, 2002, p.3
- Furnell, S., & Warren, M. 1999. Computer Hacking and Cyber Terrorism: The Real Threats in the New Millennium. Computers and Security Vol. 18 No. 1, pp. 28-34.
- Gates, S., &Podder, S. 2015. Social Media, Recruitment, Allegiance and the Islamic State. PERSPECTIVES ON TERRORISM, Vol. 9 No. 4, pp. 107-116.
- Hara, N., Bonk, C., & Angeli, C. 2000. Content analysis of online discussion in an applied educational psychology course. Instructional Science, Vol. 28 No. 2, pp. 115-152. http://journal.iaingorontalo.ac.id/index.php/au Radicalism on World Wide Web and Propaganda Strategy Hodkinson, P., & Hodkinson, H. 2001. The Strengths and Limitations of Case Study Research. Retrieved 25 Juy 2015, from University of Leeds http://education.exeter.ac.uk/tlc/docs/publications/LE_PH_PUB_ 05.12.01.rtf.
- Hsieh, H.-F., & Shannon, S. E. 2005. Three Approaches to Qualitative Content Analysis. Qualitative Health Research, Vol. 15 No. 9, pp. 1277-1288.
- Hui, J. Y. 2010. The Internet in Indonesia: Development and Impact of Radical Websites. Studies in Conflict & Terrorism,Vol. 33, pp. 171-191.
- InternetWorldStats. 2015a. Internet Usage Statistics: The Internet Big Picture World Internet Users and 2015 Population Stats. Retrieved 20 januari 2016, from Internet World Stats http://www.internetworldstats.com/stats.htm InternetWorldStats. 2015b. Internet Users in Asia. Retrieved 20 januari 2016, from Internet World Stats http://www.internetworldstats.com/stats3.htm#asia
- Kaplan, A. M., & Haenlein, M. 2010. Users of the World, Unite! The Challenges and Opportunities of Social Media. Business Horizons, Vol. 53 No. 1, pp. 59 -68.
- Kominfo. 2015. Kominfo Sudah Blokir 814.594 Situs Radikal Retrieved 21 Pebruari 2016, from Kominfo http://kominfo.go.id/index.php/content/detail/5083/Kominfo+Sud ah+Blokir+814.594+Situs+Radikal+/0/sorotan_media#.Vsm0q0A aiwY Krotoski, A. 2010. The internet's cyber radicals: heroes of the web changing the world Retrieved 20 Pebruary 2016, from The Guardian http://www.theguardian.com/technology/2010/nov/28/internet- radicals-world-wide-web
- Last, M., & Kandel, A. 2005. Fighting Terror in Cyberspace. Hackensack, N.J.: World Scientific Publishing Company.
- Mantel, B. 2009. Terrorism and the Internet : Should Web Sites That Promote Terrorism Be Shut Down? Retrieved 26 June 2015, from CQ Researcher http://www.sagepub.com/sites/default/files/upm- binaries/36306_6.pdf.
- Mauro, R. 2014. Understanding Islamic Extremism. Retrieved 24 June 2015, from The Clarion Project Nurdin http://www.clarionproject.org/understanding-islamism/islamic- extremism#
- McKenna, K. Y. A., Green, A. S., & Gleason, M. E. J. 2002. Relationship Formation on the Internet: What's the Big Attraction? Journal of Social Issues, Vol. 58 No. 1, pp. 9-31.
- O'Reilly, T. 2007. What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. Communications & Strategies, Vol 1 No. 1, p.17.
- Odell, J. S. 2001. Case Study Method in International Political Economy. International Studies Perspectives, Vol. 2, pp. 161-176.
- Ramsay, G. 2013. Jihadi Culture on the World Wide Web. New York: Bloomsbury Publishing.
- Ridouani, D. 2011. The Representation of Arabs and Muslims in Western Media. RUTA, Vol. 3, p.15.
- Schjolberg, S. 2005. Terrorism in Cyberspace -Myth or reality? Paper presented at the 4th Annual Conference: Effective Counter- Terrorism and the Rule of International La, Hague, Netherland. http://www.cybercrimelaw.net/documents/Cyberterrorism.pdf
- Shahak, I. and N. Mezvinsky (1999). Jewish Fundamentalism in Israel. Bon Germany, Pluto Press. 1999, p. 220.
- Sindonews. 2015. Kominfo Sudah Blokir 814.594 Situs Radikal. Retrieved 21 Pebruari 2016, from Koran Sindo http://nasional.sindonews.com/read/1009534/14/kominfo-sudah- blokir-814-594-situs-radikal-1433566920
- Telegraph. 2014. How terrorists are using social media. Retrieved 20 May 2015, from The Telegraph http://www.telegraph.co.uk/news/worldnews/islamic- state/11207681/How-terrorists-are-using-social-media.html Thomas, T. L. 2003. Al Qaeda and the Internet: The Danger of "Cyberplanning. Retrieved 21 Pebryary 2016, from Parameters Spring http://carlisle- www.army.mil/usawc/Parameters/03spring/thomas.htm
- United-Nation. 2012. The use of the Internet for terrorist purposes. Vienna: UNODC. University-of-Aberdeen. (2014). Understanding Radicalism. Retrieved 30 June 2015, from University of Aberdeen https://www.abdn.ac.uk/radicalism/understanding.shtml http://journal.iaingorontalo.ac.id/index.php/au Radicalism on World Wide Web and Propaganda Strategy Weimann, G. (2004). www.terror.net: How Modern Terrorism Uses the Internet (Vol. 116, pp. 12). Washington: United States Institute of Peace. Weimann, G. 2006. Terror in Cyberspace. Washington: Haifa University. p. 31
- Weimann, G. 2010. Terror on Facebook, Twitter, and Youtube. Brown Journal of World Affairs, XVI(II), p.55.
- Weimann, G. 2012. Lone Wolves in Cyberspace. Journal of Terrorism Research, Vol 3 No. 2, p. 18.
- Xu, J., Chen, H., Zhou, Y., & Qin, J. 2006. On the Topology of the Dark Web of Terrorist Groups. In S. Mehrotra, D. D. Zeng, H. Chen, B. Thuraisingham & F.-Y. Wang (Eds.), Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006. Proceedings (pp. 367-376). Berlin, Heidelberg: Springer Berlin Heidelberg.
- Yang, C. C., & Ng, T. D. 2007. Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization. Paper presented at the Intelligence and Security Informatics, 2007 IEEE.
- Zerofox. 2014. ISIS: Terror Has Gone Social Retrieved 14 June 2014, from Zerofox https://www.zerofox.com/blog/islamic-state-isis- terror-has-gone-social-infographic/