The Islamist Cyberpropaganda Threat and Its Counter-Terrorism Policy Implications

Author(s):  
Nigel Jones ◽  
Paul Baines ◽  
Russell Craig ◽  
Ian Tunnicliffe ◽  
Nicholas O'Shaughnessy

This chapter examines Islamist cyberpropaganda case studies live in 2014, namely Al Qaeda, Islamic State, Boko Haram and Al Shabaab. The authors define cyberpropganda as the exploitation of the generative characteristics of online interaction for the production and reproduction of propaganda. The cross-case analysis identifies key messages and themes, how cyberpropaganda is generated and spread, and how it is made attractive to those who may act on it. In the discussion that follows implications for the policy-maker are identified and addressed. These include whether to tackle symptoms or causes of the problems and whether to treat the problems as essentially global or local. The final issue is how the counter-propagandist can make themselves heard.

2019 ◽  
pp. 118-143
Author(s):  
Nigel Jones ◽  
Paul Baines ◽  
Russell Craig ◽  
Ian Tunnicliffe ◽  
Nicholas O'Shaughnessy

This chapter examines Islamist cyberpropaganda case studies live in 2014, namely Al Qaeda, Islamic State, Boko Haram and Al Shabaab. The authors define cyberpropganda as the exploitation of the generative characteristics of online interaction for the production and reproduction of propaganda. The cross-case analysis identifies key messages and themes, how cyberpropaganda is generated and spread, and how it is made attractive to those who may act on it. In the discussion that follows implications for the policy-maker are identified and addressed. These include whether to tackle symptoms or causes of the problems and whether to treat the problems as essentially global or local. The final issue is how the counter-propagandist can make themselves heard.


Author(s):  
Nigel Jones ◽  
Paul Baines ◽  
Russell Craig ◽  
Ian Tunnicliffe ◽  
Nicholas O'Shaughnessy

This chapter examines Islamist cyberpropaganda case studies live in 2014, namely Al Qaeda, Islamic State, Boko Haram and Al Shabaab. The authors define cyberpropganda as the exploitation of the generative characteristics of online interaction for the production and reproduction of propaganda. The cross-case analysis identifies key messages and themes, how cyberpropaganda is generated and spread, and how it is made attractive to those who may act on it. In the discussion that follows implications for the policy-maker are identified and addressed. These include whether to tackle symptoms or causes of the problems and whether to treat the problems as essentially global or local. The final issue is how the counter-propagandist can make themselves heard.


2004 ◽  
Vol 18 (2) ◽  
pp. 154-171 ◽  
Author(s):  
Heidi L. Meehan ◽  
Stephen J. Bull ◽  
Dan M. Wood ◽  
David V.B. James

The present study explored the experiences of five competitive endurance athletes (1 female, 4 male) diagnosed with the overtraining syndrome (OTS). A multicontextual method of inquiry was used, which first involved a medical examination whereby OTS was diagnosed according to established criteria. In addition, 2 questionnaires were administered: the Athlete Daily Hassle Scale (Albinson & Pearce, 1998) and the Coping Response Inventory (Moos, 1992), and a semistructured interview was conducted. Individual case studies were then developed and cross-case analysis carried out. Findings from the present study illustrate that together with sport stress, nonsport stress appears to make an important contribution to the experience of those athletes diagnosed with the OTS. This finding provides evidence to support anecdotes in previous reports.


Author(s):  
Kelli Campbell

In this chapter, the qualitative study will investigate and evaluate the effectiveness of the Leveled Literacy Intervention (LLI) framework with English Language Learners (ELL) newcomers and their literacy achievement using the case study method and cross case analysis. Student case studies will consist of LLI pre and post assessment data, guided reading data, and information gathered from student interviews. The triangulation of student interviews, teacher surveys, and extant literature provide the foundation for answering questions regarding the effectiveness of LLI with the ELL newcomers. Findings are presented through student case studies, resulting from cross case analysis that identified themes, patterns, and commonalities in student reading achievement data and teacher survey results. Results show that ELL newcomers needed to develop social, academic, and content-related language. Findings from the study show that the students made progress while participating during the intervention but have not maintained or increased their reading levels after the intervention that provides opportunities for future research. Recommendation for future studies and conclusion are discussed.


2020 ◽  
pp. 66-114
Author(s):  
David Kilcullen

This chapter applies the evolutionary concepts explained in Chapter 2 to a series of case studies of nonstate adversaries. It explores how specific nonstate adversaries have adapted and evolved since 1993; these include Al Qaeda, Islamic State, Al Qaeda’s Syrian affiliate Hayat Tahrir al-Sham, and the Lebanese Shi’a group Hezbollah. The chapter shows that each of these irregular armed groups, despite differences of ideology, origin, operating environment and structure, are all responding in their own ways to a fitness landscape created by Western dominance of a particular, narrow, technology-centric form of warfare. Their patterns of adaptation indicate the ways in which evolutionary processes identified in the previous chapter have played out in practice.


Author(s):  
Fang Zhao

The previous chapters have included a comprehensive discussion of general issues concerning e-partnership management from both technology and people perspectives, and, continuing this theme, this chapter presents extended and systematic multiple case studies which allow a more profound exploration of the way in which companies have partnered in e-business. It also contains an in-depth examination of specific issues and problems raised in e-partnerships. The cases selected for the case studies represent a broad range of interests, from big brand dotcoms like Yahoo! and Google to a small manufacturer that has embraced e-business and e-partnership technologies and practices. The case studies are followed by a cross-case analysis of the key issues in relation to the development of e-partnerships. Key successful factors are identified from the successful cases, along with the hard lessons learned from failure.


Author(s):  
Virginia Comolli

This chapter briefly charts the emerge of the violent Islamist group Boko Haram in Nigeria before detailing its international connections and interactions with Al-Qaeda and, more significantly, Al-Qaeda in the Islamic Maghreb (AQIM). It goes on to discuss the group’s successful attempts at territorial control in the north east and its leader’s ambition to establish an Islamic state. The text explains how the Nigerians converged with ISIS, pledged allegiance to Abu Bakr al-Baghdadi and rebranded Boko Haram as Islamic State West African Province (ISWAP). This is complemented by an analysis of the practical manifestations of this allegiance, the remaining differences between ISWAP and ISIL/ISIS, and the possibly opportunistic reasons that may have motivated this move and that, in the future, could make the Nigerian outfit look elsewhere for more productive partnerships.


2021 ◽  
Author(s):  
Suvojit Bandopadhyaya

<p>This paper discusses the ideological differences between the Islamic State (IS) and Al Qaeda (AQ) and their differential media strategies that were existing from 2014 to 2017. This paper emphasises the interpretation of Qutbism and the unification of Ummah which led to the divide and disintegration of AQ of Iraq later becoming IS. This ideological difference emanates from practice and theological understanding of Salafism by IS and AQ and perception of the near and far enemy by both the terrorist organizations. Both terrorist organizations’ ideological doctrines are also influenced by the use of information and communication technologies catering to their respective audience. Considering the ideological differences and differences in IS and AQ media strategies, this paper proposes counter-terrorism strategies to fight IS and AQ online propaganda.</p>


2021 ◽  
Author(s):  
Suvojit Bandopadhyaya

<p>This paper discusses the ideological differences between the Islamic State (IS) and Al Qaeda (AQ) and their differential media strategies that were existing from 2014 to 2017. This paper emphasises the interpretation of Qutbism and the unification of Ummah which led to the divide and disintegration of AQ of Iraq later becoming IS. This ideological difference emanates from practice and theological understanding of Salafism by IS and AQ and perception of the near and far enemy by both the terrorist organizations. Both terrorist organizations’ ideological doctrines are also influenced by the use of information and communication technologies catering to their respective audience. Considering the ideological differences and differences in IS and AQ media strategies, this paper proposes counter-terrorism strategies to fight IS and AQ online propaganda.</p>


2021 ◽  
Author(s):  
◽  
Sarah Powell

<p>As pressure grows for cultural institutions to provide online access to images of collection objects, issues regarding copyright and reuse of materials arise. Yet little research has been conducted on the way heritage institutions within New Zealand have tackled these copyright issues and how they reach decisions to allow the reuse of digital content from their extensive online collections. Furthermore, there is a lack of academic investigation into what value any newly introduced reuse practices and policies can bring to cultural institutions and users of their digital content. My research explores how and why New Zealand’s two collecting domains, the National Library of New Zealand and the Museum of New Zealand Te Papa Tongarewa, provide openly licensed digital images of artefacts through online collection databases.  While literature on the topic of reuse of digitised documentary heritage collections is limited, previous research shows that there are myriad barriers surrounding the reuse of digitised collection objects, some of these include finding best practice for orphan works, acknowledging indigenous sensitivities, dealing with issues of trust and balancing commercial imperatives with public expectations. The body of literature also shows the opportunities and benefits that international cultural institutions have gained from establishing reuse practices for their digital collections, yet none offer insight from a New Zealand context.  Guided by this gap within the literature this dissertation investigates the establishment of use and reuse policies and practices by the National Library of New Zealand and the Museum of New Zealand Te Papa Tongarewa, and what value they feel this practice may bring to the sector. It explores each respective institution’s journey towards a connected commons through two in-depth qualitative case studies and concludes with a cross-case analysis. Within the cross-case analysis an Open GLAM Licensing Framework is proposed for Aotearoa that draws on the work that these institutions, along with other leading cultural institutions, have done in establishing reuse practices and policies for digital collections. This research contributes to Museum and Heritage Studies discourse by providing a snapshot of reuse in a New Zealand context and provides a valuable framework to evaluate the current motivations and processes of institutions establishing Open GLAM philosophies.</p>


Sign in / Sign up

Export Citation Format

Share Document