Terrorist groups online networking tactics: Why Twitter Magnetize the youth of Saudi Arabia?

  • Authors

    • Hasmah Zanuddin
    • Yazeed AlYousef
    2018-11-30
    https://doi.org/10.14419/ijet.v7i4.28.22394
  • In July 2013, the European Parliament distinguished Wahhabism as the fundamental wellspring of worldwide fear mongering, but then the Grand Mufti of Saudi Arabia, censuring IS in the most grounded terms, has demanded that "the thoughts of fanaticism, radicalism and psychological warfare don't have a place with Islam in any capacity". Different individuals from the Saudi decision class, be that as it may, look all the more sympathetic on the development, commending its staunch restriction to Shiaism and for its Salafi devotion, its adherence to the first practices of Islam. IS' abuse of online networking and computerized system assumes a key part in its worldwide scattering of promulgation, radicalization, and enlistment. Be that as it may, deliberate research on Islamic fear monger correspondence by means of online networking is constrained. Our examination researches the inquiry: How do IS individuals/supporters utilize Twitter for fear based oppression correspondence: publicity, radicalization, and enrollment? Hypothetically, we drew on microeconomic system speculations to build up a hypothetical structure for multi-sided Twitter organizes in the worldwide Islamic psychological militant correspondence condition. Exactly, we gathered 3,039 tweets posted by @shamiwitness who was recognized in earlier research as "a data disseminator" for the IS cause. Methodologically, we performed interpersonal organization investigation, pattern and substance examinations of the tweet information. We find solid proof for Shamiwitness-intermediated multi-sided Twitter systems of worldwide broad communications, territorial Arabic broad communications, IS warriors, and IS sympathizers, supporting the structure's utility. The paper will focus on probing solutions that can guide the youth in using Twitter for a more positive approach and how can this influence be eradicated. The interview approach will be used to gather data and make the implications.

  • References

    1. [1] Abootalebi, A. (2013). Civil society, democracy and the Middle East. Middle East Review of International Affairs, 2(3), 46-59.

      Haroro J Ingram (2014) Three Traits of the Islamic State'Information Warfare, The RUSI Journal, 159:6, 4—11
  • Downloads

  • How to Cite

    Zanuddin, H., & AlYousef, Y. (2018). Terrorist groups online networking tactics: Why Twitter Magnetize the youth of Saudi Arabia?. International Journal of Engineering & Technology, 7(4.28), 72-76. https://doi.org/10.14419/ijet.v7i4.28.22394