scholarly journals Analisis Metode Penggalangan Intelijen Dalam Penerapan Program Deradikalisasi oleh BNPT

2021 ◽  
Vol 18 (1) ◽  
pp. 61-71
Author(s):  
Ahmad Pradipta Budhihatma Adikara ◽  
Muhammad Luthfi Zuhdi ◽  
Wawan Hari Purwanto
Keyword(s):  

Penelitian ini bertujuan untuk mengetahui dan menganalisis bentuk dari program deradikalisasi yang dilakukan oleh Badan Nasional Penanggulangan Terorisme (BNPT). Metode yang digunakan dalam penelitian ini adalah kualitatif deskriptif dengan menggunakan analisis penggalangan intelijen. Teknik pengumpulan data yang dilakukan dalam penelitian ini adalah dengan wawancara narasumber dan studi literatur. Analisa dan pengolahan data dalam penelitian ini menggunakan model triangulasi data untuk memastikan keabsahan data yang didapatkan dari narasumber satu dengan lainnya dan dari studi literatur. Hasil penelitian ini menunjukkan bahwa program deradikalisasi yang dilakukan oleh BNPT baik yang ada di dalam lapas dan di luar lapas menggunakan penggalangan intelijen dengan metode RASCLS (Reciprocation, Authority, Scarcity, Commitment, Liking, Social Proof) dan MICE (Money, Ideology, Coercion, Ego) namun tidak secara keseluruhan. Metode Scarcity dan Coercion tidak digunakan dalam program deradikalisasi karena tujuan deradikalisasi adalah melakukan pembinaan, pendampingan, dan pemberdayaan dengan hati ke hati bukan untuk membuat target (narapidana terorisme dan mantan narapidana terorisme) menjadi susah dan dipaksa.

2011 ◽  
Author(s):  
Maarten Bos ◽  
Rick Van Baaren ◽  
Ap Dijksterhuis
Keyword(s):  

2018 ◽  
Vol 170 ◽  
pp. 1044-1051 ◽  
Author(s):  
Saiquan Hu ◽  
Zhengfeng Li ◽  
Jin Zhang ◽  
Junming Zhu

2016 ◽  
Vol 0 (10) ◽  
pp. 6
Author(s):  
Ruslan Allahverdi ogly Aliev ◽  
Andrey Alekseevich Avramenko ◽  
Ekaterina Aleksandrovna Bliznetskaya ◽  
Natalya Evgenyvna Ryazanova

Author(s):  
Jonathan Bishop

This chapter presents a location-based affective computing system, which can assist growing emerging markets by helping them reduce crime and increase public safety when used in conjunction with CCTV. Internet systems based on location-based services have increased in availability. Social platforms such as Twitter and Facebook now employ the information on user locations to provide context to their posts, and services such as Foursquare rely on people checking into different places, often to compete with their friends and others. Location-based information, when combined with other records, such as CCTV, promotes the opportunity for a better society. People normally abused by corrupt state officials for crimes they did not commit will now have alibis, shops will be able to more effectively build trust and procure new customers through “social proof,” and other forms of corruption will be tackled such as benefit fraud and tax evasion. Trust that everyone is paying his or her fair share can develop.


Gamification ◽  
2015 ◽  
pp. 2113-2125
Author(s):  
Jonathan Bishop

This chapter presents a location-based affective computing system, which can assist growing emerging markets by helping them reduce crime and increase public safety when used in conjunction with CCTV. Internet systems based on location-based services have increased in availability. Social platforms such as Twitter and Facebook now employ the information on user locations to provide context to their posts, and services such as Foursquare rely on people checking into different places, often to compete with their friends and others. Location-based information, when combined with other records, such as CCTV, promotes the opportunity for a better society. People normally abused by corrupt state officials for crimes they did not commit will now have alibis, shops will be able to more effectively build trust and procure new customers through “social proof,” and other forms of corruption will be tackled such as benefit fraud and tax evasion. Trust that everyone is paying his or her fair share can develop.


Author(s):  
Chad R. Mortensen ◽  
Robert B. Cialdini

It is through the influence process that people generate and manage change. As such, it is important to understand fully the workings of the influence processes that produce compliance with requests for change. Fortunately, a vast body of scientific evidence exists on how, when, and why people comply with influence attempts. From this formidable body of work, one can extract six universal principles of influence that generate compliance in the widest range of circumstances. Reciprocation states that people are more willing to comply with requests (for favors, services, information, concessions, etc.) from those who have provided such things first. Commitment/Consistency states that people are more willing to be moved in a particular direction if they see it as consistent with an existing commitment. Authority states that people are more willing to follow the directions or recommendations of a communicator to whom they attribute relevant expertise. Social Proof states that people are more willing to take a recommended action if they see evidence that many others, especially similar others, are taking it. Scarcity states that people find objects and opportunities more attractive to the degree that they are scarce, rare, or dwindling in availability. Finally, Liking states that people prefer to say yes to those they like, such as those who are similar to them and who have complimented them.


2020 ◽  
Vol 11 ◽  
Author(s):  
Tina A. G. Venema ◽  
Floor M. Kroese ◽  
Jeroen S. Benjamins ◽  
Denise T. D. de Ridder
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document