Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2017 | 2 (46) | 105-117

Article title

How and Why Do Terrorist Organizations Use the Internet?

Content

Title variants

Languages of publication

EN

Abstracts

EN
The article gives general characterisation of the ways in which these organizations use modern communication technologies. Currently, every major terrorist organisation maintain robust media wings, which focus on producing videos, publishing magazines and sharing them with the public via the Web. The empirical system of reference is based on the activity of al-Qaeda, her franchise AQAP (al-Qaeda in the Arabian Peninsula) and ISIS (the so-called Islamic State). While analysing the media of terrorist organisations, the Lasswell model was applied. This formula is a standard research procedure used for investigating acts of communication by answering the questions: who, says what, in which channel, to whom, with what effect?. The author also present typology of videos produced by jihadist organisations, characterised the most important and active media actions of terrorist organisations and a typology of recipients of such messages. The article presents a number of reasons why the Internet has become such an important tool for terrorists.

Year

Volume

Pages

105-117

Physical description

Contributors

  • University of Silesia (Poland)

References

  • Bolechów, B. (2010). Terroryzm: aktorzy, statyści, widownie. Warszawa: Wydawnictwo Naukowe PWN.
  • Białek, T. (2005). Terroryzm: manipulacja strachem. Warszawa: Wydawnictwo Studio EMKA.
  • Cockburn, P. (2014). Państwo Islamskie, Warszawa: Wydawnictwo Naukowe PWN.
  • Goban-Klas, T. (2009). Media i terroryści. Czy zastraszą nas na śmierć? Kraków: Wydawnictwo Uniwersytetu Jagiellońskiego
  • Evolution of Jihadi Video (2005). Intel Center. Retrieved from: https://intelcenter.com/EJV-PUB-v1-0.pdf.
  • Hegghammer, T. (2010). "Un-Inspired". Jihadica. Retrieved from: http://www.jihadica.com/un-inspired/.
  • Holtmann, P. (2012). "Virtual Jihad: A Real Danger". In R. Lohlker, New Approaches to the Analysis of Jihadism: Online and Offline (pp. 9-14). Goettingen: V&r Unipress.
  • Jaworski, M. (2006). "Ekonomia a terroryzm". In K. Liedel (Ed.), Terrozyzm. Anatomia zjawiska (pp. 21-66). Warszawa: Wydawnictwo Scholar
  • "Letter from the editor" (2010). Inspire, 1, p. 2. Retrieved from: https://azelin.files.wordpress.com/2010/06/aqap-inspire-magazine-volume-1-uncorrupted.pdf.
  • Liedel, K. (Ed.) (2006). Terrozyzm. Anatomia zjawiska. Warszawa: Wydawnictwo Scholar.
  • “Marrying a jihadist” (2011). Al-Shamikha, 1, p. 18. Retrieved from: https://www.archive.org/stream/AlshamikhaMagazine/AlshamikhaM#page/n17/mode/2up.
  • "Meeting with a mujahid’s wife" (2011). Al-Shamikha, 1, p. 9-12. Retrieved from :https://www.archive.org/stream/AlshamikhaMagazine/AlshamikhaM#page/n7/mode/2up.
  • Pisarek, W. (2008). Wstęp do nauki o komunikowaniu, Warszawa: Wydawnictwa Akademickie i Profesjonalne.
  • Schmid, A.P., & Tinnes, J. (2015). "Foreign (Terrorist) Fighters with IS: A European Perspective". The International Centre for Counter-Terrorism – The Hague, 6(8), pp. 1-69. DOI: http://dx.doi.org/10.19165/2015.1.08.
  • Schmid, A.P. (2015). “Foreign (Terrorist) Fighter Estimates: Conceptual and Data Issues “. The International Centre for Counter-Terrorism – The Hague, 6(4), pp. 1-21, Retrieved from: https://www.icct.nl/wp-content/uploads/2015/10/ICCT-Schmid-Foreign-Terrorist-Fighter-Estimates-Conceptual-and-Data-Issues-October20152.pdf.
  • "The Operation Of ‘Umar Al-Faruq Al-Nigiri In Response To The American Aggression On Yemen" (2010). Inspire, 1, p. 5. Retrieved from: https://azelin.files.wordpress.com/2010/06/aqap-inspire-magazine-volume-1-uncorrupted.pdf.
  • "Your house is your kingdom" (2011). Al-Shamikha, 1, p. 23-30. Retrieved from: https://www.archive.org/stream/AlshamikhaMagazine/AlshamikhaM#page/n21/mode/2up.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.desklight-9db41096-6030-43fa-baaa-49538702ca22
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.