[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2757401.2757408acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks

Published: 27 May 2015 Publication History

Abstract

Islamic State (IS) terrorist networks in Syria and Iraq pose threats to national security. IS' exploitation of social media and digital strategy plays a key role in its global dissemination of propaganda, radicalization, and recruitment. However, systematic research on Islamic terrorist communication via social media is limited. Our research investigates the question: How do IS members/supporters use Twitter for terrorism communication: propaganda, radicalization, and recruitment? Theoretically, we drew on microeconomic network theories to develop a theoretical framework for multi-sided Twitter networks in the global Islamic terrorist communication environment. Empirically, we collected 3,039 tweets posted by @shamiwitness who was identified in prior research as "an information disseminator" for the IS cause. Methodologically, we performed social network analysis, trend and content analyses of the tweet data. We find strong evidence for Shamiwitness-intermediated multi-sided Twitter networks of international mass media, regional Arabic mass media, IS fighters, and IS sympathizers, supporting the framework's utility.

References

[1]
ABC, 2014. Islamic State: Number of fighters for militant group in Iraq, Syria could be as high as 31,500, CIA say. http://www.abc.net.au/news/2014-09-12/islamic-state-has-up-to-31500-fighters-in-iraq-and-syria/5740356. Accessed: September 12, 2014.
[2]
Abdallah, A., 2014. Urgent video: ISIS releases Abu Bakr Al-Baghdadi sermon in Mosul Grand Mosque. http://www.iraqinews.com/features/urgent-video-isis-releaes-abu-bakr-al-baghdadi-sermaon-mosul-grand-mosque. Accessed: November 20, 2014.
[3]
Ackerman, S., 2014. Foreign jihadists flocking to Iraq and Syria on 'unprecedented scale'. http://www.theguardian.com/world/2014/oct/30/foreign-jihadist-iraq-syria-unprecedented-un-IS. Accessed: October 31, 2014.
[4]
Al-Rasheed, M., 2014. Saudi Arabia forced to rethink ideology in fight against IS. http://www.almonitor.com/pulse/originals/2014/12/saudi-kingdom-versus-caliphate.html. Accessed: December 3, 2014.
[5]
Al Sharif, O., 2014. Jordanians divided over anti-IS coalition. AlMonitor The Pulse of the Middle East. http://www.almonitor.com/pulse/originals/2014/09/jordan-role-coalition-fight-islamic-state.html. Accessed: November 11, 2014
[6]
Andre, V., 2012. 'Neojihadism' 1 and YouTube: Patani militant propaganda dissemination and radicalization. Asian Security 8, 1, 27--53.
[7]
Awan, A. N., 2007. Virtual jihadist media: Function, legitimacy and radicalizing efficacy. European Journal of Cultural Studies 10, 3, 389--408.
[8]
BBC, 2014. @shamiwitness: India arrests man over pro-Islamic State tweets. BBC News India. http://www.bbc.com/news/world-asia-30461455. Accessed: December 13, 2014.
[9]
BBC, 2015. Battle for Iraq and Syria in maps. BBC News Middle East. http://www.bbc.com/news/world-middle-east-27838034. Accessed: January 5, 2015
[10]
Bender, R., 2015. Ex-emir wants to nurse in Syria. In The Australian, 7.
[11]
Bhargava, H. K. and Choudhary, V., 2004. Economics of an information intermediary with aggregation benefits. Information Systems Research 15, 1, 22--36+107.
[12]
Bodansky, Y., 1999. Bin Laden: The man who declared war on America. Forum, Prima Publishing, Roseville, California.
[13]
Bodansky, Y., 2002. The high cost of peace: How Washington's Middle East policy left America vulnerable to terrorism. Forum, Prima Publishing, Roseville, California.
[14]
Bueno De Mesquita, E. and Dickson, E. S., 2007. The propaganda of the deed: Terrorism, counterterrorism, and mobilization. American Journal of Political Science 51, 2, 364--381.
[15]
Burki, S. K., 2011. Haram or Halal? Islamists' use of suicide Attacks as "Jihad". Terrorism and Political Violence 23, 4, 582--601.
[16]
Carter, J., Maher, S., and Neumann, P., 2014. #Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks. http://icsr.info/wp-content/uploads/2014/04/ICSR-Report-Greenbirds-Measuring-Importance-and-Infleunce-in-Syrian-Foreign-Fighter-Networks.pdf. Accessed: 2014, November 11.
[17]
Cohen, K., Johansson, F., Kaati, L., and Mork, J. C., 2014. Detecting Linguistic Markers for Radical Violence in Social Media. Terrorism and Political Violence 26, 1, 246--256.
[18]
Crilley, K., 2001. Information warfare: New battlefields terrorists, propaganda and the Internet. Aslib Proceedings 53, 7, 250--264.
[19]
Eisenmann, T., 2007. Platform mediated networks: Definitions and core concepts. Harvard Business School, Cambridge.
[20]
Eisenmann, T., Parker, G., and Van Alstyne, M. W., 2006. Strategies for two-sided markets. Harvard business review 84, 10, 92--101+149.
[21]
El-Ibiary, R., 2011. New media, geopolitics, and terror: Discursive analysis of Bush and bin Laden's rhetoric. Arab World Geographer 14, 3, 215--234.
[22]
Evans, D. S., 2003. Some empirical aspects of multi-sided platform industries. Review of Network Economics 2, 3.
[23]
Feneley, R., 2014. Out of the shadows. In The Sydney Morning Herald, 25, 28.
[24]
Giovanni, J. D., 2014. Who Is IS Leader Abu Bakr al-Baghdadi? http://www.newsweek.com/2014/12/19/who-IS-leader-abu-bakr-al-baghdadi-290081.html. Accessed: December 8, 2014
[25]
Gottlieb, S., 2014. Four Reasons ISIS Is a Threat to the American Homeland. http://nationalinterest.org/feature/four-reasons-isis-threat-the-american-homeland-11317. Accessed: November 11, 2014.
[26]
Gutfraind, A., 2009. Understanding terrorist organizations with a dynamic model. Studies in Conflict and Terrorism 32, 1, 45--59.
[27]
Hagiu, A., 2006. Pricing and commitment by two-sided platforms. RAND Journal of Economics 37, 3, 720--737.
[28]
Hedges, J. W., 2008. Eliminating the learning curve: A pragmatic look at jihadist use of the Internet. Journal of Applied Security Research 3, 1, 71--91.
[29]
Hudson, P. and Maley, P., 2014. Support for Tony Abbott's terror crackdown. http://www.theaustralian.com.au/national-affairs/foreign-affairs/support-for-tony-abbotts-terror-crackdown/story-fn59nm2j-1227036630551. Accessed: August 26, 2014.
[30]
Jacobson, M., 2010. Terrorist financing and the internet. Studies in Conflict and Terrorism 33, 4, 353--363.
[31]
Katz, M. L. and Shapiro, C., 1992. Product introduction with network externalities. The Journal of Industrial Economics 40, 1, 55--83.
[32]
Kimmel, M. S., 2003. Globalization and its Mal(e) Contents: The Gendered Moral and Political Economy of Terrorism. International Sociology 18, 3 (September 1, 2003), 603--620. DOI= http://dx.doi.org/10.1177/02685809030183008.
[33]
Klausen, J., 2015. Tweeting the Jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict and Terrorism 38, 1, 1--22.
[34]
Kuksov, D., 2007. Brand value in social interaction. Management Science 53, 10, 1634--1644.
[35]
Laub, Z. and Masters, J., 2014. Islamic State in Iraq and Syria. Council on Foreign Relations. http://www.cfr.org/iraq/islamic-state-iraq-syria/p14811. Accessed: August 8, 2014.
[36]
Leigh, K., 2014. IS Makes Up To $3 Million a Day Selling Oil, Say Analysts. http://abcnews.go.com/International/IS-makes-million-day-selling-oil-analysts/story?id=24814359. Accessed: August 2, 2014.
[37]
Lynch, O., 2013. British Muslim youth: Radicalisation, terrorism and the construction of the "other". Critical Studies on Terrorism 6, 2, 241--261.
[38]
Mastors, E. and Siers, R., 2014. Omar al-Hammami: A case study in radicalization. Behavioral Sciences and the Law.
[39]
McCauley, C. and Moskalenko, S., 2008. Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence 20, 3, 415--433.
[40]
Michael, G., 2009. Adam gadahn and Al-Qaeda's internet strategy. Middle East Policy 16, 3, 135--152.
[41]
Newsweek, 2014. U.S. Strikes Kill 'Several Hundred' Islamic State Militants Near Kobani: Pentagon. http://www.newsweek.com/us-strikes-kill-several-hundred-islamic-state-militants-near-kobani-pentagon-277731. Accessed: October 15, 2014.
[42]
O'Brien, N., 2014. Why Islamic State glorified the Sydney siege. http://www.abc.net.au/news/2014-12-31/obrien-why-islamic-state-glorified-the-sydney-siege/5993830. Accessed: January 19, 2015.
[43]
Ogun, M. N., 2012. Terrorist Use of Internet: Possible Suggestions to Prevent the Usage for Terrorist Purposes. Journal of Applied Security Research 7, 2, 203--217.
[44]
Oxford, 2014. Propaganda. Propaganda. http://www.oxforddictionaries.com/definition/english/propaganda. Accessed: November 10, 2014.
[45]
Payne, S., 2014. What the 60-plus members of the anti-Islamic State coalition are doing. http://www.washingtonpost.com/news/checkpoint/wp/2014/09/25/what-the-60-members-of-the-anti-islamic-state-coalition-are-doing/. Accessed: November 11, 2014.
[46]
Pisoiu, D., 2013. Coming to Believe "Truths" about Islamist radicalization in Europe. Terrorism and Political Violence 25, 2, 246--263.
[47]
Poel, M., Renda, A., and Ballon, P., 2007. Business model analysis as a new tool for policy evaluation: Policies for digital content platforms. Info 9, 5, 86--100.
[48]
Post, J. M., 2010. "When hatred is bred in the bone:" the social psychology of terrorism. Annals of the New York Academy of Sciences 1208, 15--23.
[49]
Richards, D., 2014. The Twitter jihad: ISIS insurgents in Iraq, Syria using social media to recruit fighters, promote violence. http://www.abc.net.au/news/2014-06-20/isis-using-social-media-to-recruit-fighters-promote-violence/5540474. Accessed: June 21, 2014.
[50]
Sageman, M., 2008. Leaderless jihad: Terror networks in the twenty-first century. University of Pennsylvania Press, USA.
[51]
Sanyal, S., 2008. Legitimizing Violence: Seditious Propaganda and Revolutionary Pamphlets in Bengal, 1908--1918. The Journal of Asian Studies 67, 03, 759--787.
[52]
Sarma, K., 2007. Defensive propaganda and IRA political control in Republican Communities. Studies in Conflict and Terrorism 30, 12, 1073--1094.
[53]
Schiff, A., 2003. Open and closed systems of two-sided networks. Information Economics and Policy 15, 4, 425--442.
[54]
Schmidt, E. and Cohen, J., 2013. The New Digital Age Reshaping the Future of People, Nations and Business. Alfred A. Knoff, New York.
[55]
Sekulow, J., Sekulow, J., Ash, R. W., and French, D., 2014. Rise of ISIS: A Threat We Can't Ignore. Howard Books, New York.
[56]
Smith, M. and Walsh, J. I., 2013. Do Drone Strikes Degrade Al Qaeda? Evidence From Propaganda Output. Terrorism and Political Violence 25, 2, 311--327.
[57]
Statista, 2014. Number of monthly active Facebook users worldwide from 3rd quarter 2008 to 3rd quarter 2014 (in millions). http://www.statista.com/statistics/264810/number-of-monthly-active-facebook-users-worldwide/ Accessed: November 9, 2014.
[58]
Statista, 2014. Number of monthly active Twitter users worldwide from 1st quarter 2010 to 3rd quarter 2014 (in millions). http://www.statista.com/statistics/282087/number-of-monthly-active-twitter-users/. Accessed: November 9, 2014.
[59]
Sullivan, R., 2014. Live-tweeting terror: a rhetorical analysis of @HSMPress_ Twitter updates during the 2013 Nairobi hostage crisis. Critical Studies on Terrorism 7, 3, 422--433.
[60]
Thoppil, D. A. and Bellman, E., 2014. Indian Police Arrest Man Over Pro-Islamic State Twitter Account. Mehdi Masroor Biswas Accused of Spreading the Views of Militant Group on Social Media. http://www.wsj.com/articles/indian-police-arrest-man-over-pro-islamic-state-twitter-account-1418474209. Accessed: December 13, 2014.
[61]
Torres, M. R., Jordán, J., and Horsburgh, N., 2006. Analysis and evolution of the Global Jihadist Movement propaganda. Terrorism and Political Violence 18, 3, 399--421.
[62]
Torres Soriano, M. R., 2011. The road to media Jihad: The propaganda actions of al Qaeda in the Islamic Maghreb. Terrorism and Political Violence 23, 1, 72--88.
[63]
Torres Soriano, M. R., 2012. Between the Pen and the Sword: The Global Islamic Media Front in the West. Terrorism and Political Violence 24, 5, 769--786.
[64]
U. S. Department of Defense, 2014. Terrorism. http://www.dtic.mil/doctrine/dod_dictionary/. Accessed: November 9, 2014.
[65]
Vertigans, S., 2004. Social barriers to peace: Socialisation processes in the radicalisation of the Palestinian struggle. Sociological Research Online 9, 3.
[66]
Weimann, G., 2008. The psychology of mass-mediated terrorism. American Behavioral Scientist 52, 1, 69--86.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
dg.o '15: Proceedings of the 16th Annual International Conference on Digital Government Research
May 2015
369 pages
ISBN:9781450336000
DOI:10.1145/2757401
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Arizona State University: Arizona State University

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 May 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Islamic extremism
  2. Islamic state
  3. communication
  4. global social networks
  5. multi-sided networks
  6. propaganda
  7. radicalization
  8. recruitment
  9. shamiwitness
  10. social network analysis
  11. strategy
  12. terrorism communication
  13. twitter

Qualifiers

  • Research-article

Conference

dg.o 2015
Sponsor:
  • Arizona State University

Acceptance Rates

Overall Acceptance Rate 150 of 271 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)140
  • Downloads (Last 6 weeks)7
Reflects downloads up to 20 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Israel, Palästina und Bilder-Fragenkommunikation@gesellschaft10.15460/kommges.2024.25.1.141325:1Online publication date: 28-Jun-2024
  • (2024)Online Radicalisation: How Social Media Is Promoting Islamist MilitancySouth Asian Survey10.1177/0971523123121882230:2(189-209)Online publication date: 3-Feb-2024
  • (2024)Networks and Influencers in Online Propaganda Events: A Comparative Study of Three Cases in IndiaProceedings of the ACM on Human-Computer Interaction10.1145/36537098:CSCW1(1-27)Online publication date: 26-Apr-2024
  • (2024)Decoding Ideology: Machine Learning-Based Detection of Extremist Content2024 International Conference on Intelligent Computing, Communication, Networking and Services (ICCNS)10.1109/ICCNS62192.2024.10776480(114-120)Online publication date: 24-Sep-2024
  • (2024)Ideology and the Microfoundations of Conflict10.1093/oso/9780197670187.001.0001Online publication date: 22-Feb-2024
  • (2024)Analyzing a Dark Web forum page in the context of terrorism: a topic modeling approachSecurity Journal10.1057/s41284-024-00421-937:4(1360-1381)Online publication date: 13-Mar-2024
  • (2024)Identifying Daesh-Related Propaganda Using OSINT and Clustering AnalysisCybersecurity Challenges in the Age of AI, Space Communications and Cyborgs10.1007/978-3-031-47594-8_6(97-146)Online publication date: 20-Feb-2024
  • (2023)Bibliometric analysis of international publication trends on social media and terrorism by using the Scopus databaseFrontiers in Communication10.3389/fcomm.2023.11404618Online publication date: 13-Jun-2023
  • (2023)Artificial Intelligence and Modern Information Technologies Applications in Islamic Sciences: A SurveyInternational Journal on Perceptive and Cognitive Computing10.31436/ijpcc.v9i2.4039:2(48-61)Online publication date: 28-Jul-2023
  • (2023)Hate speech in the Internet context: Unpacking the roles of Internet penetration, online legal regulation, and online opinion polarization from a transnational perspectiveInformation Development10.1177/0266666922114848740:4(533-549)Online publication date: 4-Jan-2023
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media