نوع مقاله : شبکه اجتماعی

نویسندگان

1 دانشجوی دکترای روابط بین‌الملل، دانشگاه اصفهان

2 دکترای روابط بین‌الملل، گروه علوم سیاسی، دانشیار دانشگاه اصفهان، اصفهان

چکیده

اینترنت به‌عنوان مهم­‌ترین ابزار ارتباطی عصر حاضر، تنها در انحصار دولت­‌ها و نهادهای بین­‌المللی نیست؛ چرا که دسترسی آسان به این فناوری سبب شده است تا در اختیار افراد و گروه­‌های مختلف؛ حتی گروه‌های تروریستی قرار گیرد. داعش را می‌توان ازجمله گروه­‌های تروریستی سازمان‌یافته‌ای دانست که نه‌تنها از نسل اول اینترنت برای پیشبرد اهداف خود عبور کرده؛ بلکه به دنبال به‌کارگیری ابعاد اجتماعی و معناگرایی نسل دوم و سوم اینترنت در فضای مجازی بوده است. از‌این‌رو، پژوهش حاضر به این پرسش مهم پاسخ می‌دهد که داعش چگونه از سه نسل وب (وب 1، وب 2، وب 3) برای پیشبرد اهداف خود استفاده کرده است؟ در مقام پاسخ، قابل ذکر است که پیشرفت فناوری‌­های ارتباطات سبب شده است تا تروریسم از شیوه‌­های سنتی برقراری ارتباط با جهان خارج، دست شوید و به حوزه­‌های گفتمانی منعطف سه نسل وب وارد شود. داعش با به‌کارگیری این سه نسل توانسته است علاوه بر فعالیت‌های عقیدتی، تبلیغی و کسب حمایت­‌های مالی، در برقراری ارتباط بین هواداران و جلب ‌توجه جوانان برای عضوگیری در سراسر جهان به‌نحوی موفقیت­‌آمیز عمل کند. البته داعش به لحاظ سلطه سرزمینی، (اکتبر 2017) نابود شده است، اما بی­‌تردید، استفاده از انواع وب را در دنیای دیجیتال ادامه می‌دهد. هدف از این پژوهش تبیین شناخت فناوری­‌های ارتباطات از سوی داعش برای اهداف سیاسی بوده است.

کلیدواژه‌ها

عنوان مقاله [English]

How ISIS Employs Three Generations of Web

نویسندگان [English]

  • Saeideh Moradifar 1
  • Ali Omidi 2

1 International Relations

2 Associate Prof. in International Relations, Isfahan Uni.

چکیده [English]

Internet as the most important communication tool in this era is not monopolized by governments and international institutions. Easy access to this technology has made it available to individuals and groups, including terrorist groups. ISIS can be considered as an organized terrorist group that has not only proceeded Web1 to advance its goals, but has also sought to use the social and semantic dimensions of Web2 and Web3 in cyberspace. So, this article is to respond to this important question: How did ISIS use the three generations of Web (Web 1, Web 2, Web 3) to advance its goals? It should be noted that the advancement of communication technologies has led terrorism to abandon the traditional ways of communicating and enter the flexible discursive domains of the three generations of Web. By using these three generations of Web, ISIS has been able to succeed in communicating with supporters and attracting young people's attention to recruiting around the world, besides ideological, propaganda and financial support activities. of course, it has been destroyed in terms of territorial domination (in October 2017), but undoubtedly, continues to use all kinds of Web in the digital world. The purpose of this article was to explain how ISIS recognized the communication technologies for its political purposes.

کلیدواژه‌ها [English]

  • Terrorism
  • Web 1
  • Web 2
  • Web 3
  • ISIS
عراقچی، عباس و جوزانی کهن، شاهین. (1396). بهره‌برداری داعش از فضای مجازی. روابط خارجی، 9(1).
عطارزاده، مجتبی. (1396). رسانه، آوردگاه قدرت هوشمند داعش. جامعه، فرهنگ و رسانه، 6(22).
فاضلی، نعمت­االله؛ سلطانی­فر، محمد و عباسی، حجت­الله. (1396). مزیت­ها و کارکردهای شبکه­های اجتماعی برای گروه­های تروریستی (مطالعه موردی: استفاده گروه داعش از توییتر و فیس­بوک). مطالعات رسانه‌های نوین، 3(12).
قاسمی، فائره و شجاع، مرتضی. (1396). بررسی مقایسه‌ای در راهبرد رسانه‌ای گروه‌های القاعده و داعش. مطالعات ملی، 18 (3).
نجات­پور، محمد؛ میلانی، جمیل و نجات، علی. (1393). پدیده داعش و شگردهای رسانه­ای. مطالعات رسانه و امت، 1(1).
Abel, F.; Gao, Q.; Houben, G. & Tao, K. (2011). Semantic Enrichment of Twitter Posts for User Profile Construction on the Social Web, the Semanic Web: Research and Applications. In Extended Semantic Web Conference,Springer, Verlag Berlin Heidelberg.
Aghaei, S.; Nematbakhsh, M.A. & Khosravi Farsani, H. (2012). Evolution of the world wide web: from Web 1.0 to Web 4.0. International Journal of Web & Semantic Technology, 3(1), 1-10.
Agichtein, E.; Castillo, C.; Donato, D.; Gionis, A. & Mishne, G. (2008). Finding Highquality Content in Social Media. In Proceedings of the 2008 International Conference on Web Search and Web Data Mining, 183-194.
Ali, M.R. (2015). ISIS and Propaganda: How ISIS Exploits Women. Reuters Institute for the Study of Journalism. University of Oxford, 1-25.
Al-Rawi, A. (2016). Video Games, Terrorism, and ISIS’s Jihad 3.0. Terrorism and Political Violence, 1-21. DOI: 10.1080/09546553.2016.1207633
Anaya, K. K. H. (2015). Persuasion Strategies in Terrorist Recruitment: The Case of ISIS. MA Thesis, Leiden University.
Awan, I. (2017). Cyber-Extremism: Isis and the Power of Social Media. Social Science and Public Policy, 54, 138–149.
Barassi, V. & Trere, E. (2012). Does Web 3.0 come after Web 2.0? Deconstructing Theoretical Assumptions through Practice. New Media & Society, 1–17.
Berger, J.M. & Perez, H. (2016). The Islamic State’s Diminishing Returns on Twitter: How Suspensions are limiting the Social Networks of English-Speaking ISIS Supporters. George Washington University, 1-20.
Berger, J.M. & Morgan, J. (2015). The ISIS Twitter Census: Defining and Describ-ing the Population of ISIS Supporters on Twitter. The Brookings Project on U.S. Relations with the Islamic World, 3(20).
Bidarra, J. & Cardoso, V. (2007). The Emergence of The Exciting New Web 3.0 and The Future of open Educational Resources. Available at: https://www.researchgate.net/publication/228722095
Blaker, L. (2015). The Islamic State’s Use of Online Social Media. The Journal of the Military Cyber Professionals Association, 1(1), 1-10.
Bloom, M.; Tiflati, H. & Horgan, J. (2017). Navigating ISIS’s Preferred Platform: Telegram. Terrorism and Political Violence, 1-14, http://www.tandfonline.com
Bown, A. (2018). How Video Games Are Fuelling The Rise of The Far Right. (Mar 12. 2018), available at: https://www.theguardian.com/commentisfree/2018/mar/12/video-games-fuel-rise-far-right-violent-misogynist
Callahan, G. (2017). Attacking ISIL on Twitter: Addressing Ethical Responsibility in the Weaponization of Social Media. Intersect, 10(2), 1-20.
Choudhury, N. (2014). World Wide Web and Its Journey from Web 1.0 Web 4.0. International Journal of Computer Science and Information Technologies, 5 (6), 8096-8100.
Click, A. & Petit, J. (2010). Social Networking and Web 2.0 in Information Literacy. The International Information & Library Review, 42, 137-142.
Constantinides, E. & Fountain, S. J. (2008). Web 2.0: Conceptual Foundations and Marketing Issues. Journal of Direct, Data and Digital Marketing Practice, 9(3), 231–244.
Conway, M. (2006). Terrorism and the Internet: New Media-New Threat?. Parliamentary Affairs, 59(2), 283–298.
Cunningham, D.; Sean, F. E. & Schroeder, R. (2015). Social Media and the ISIS Narrative, Department of Defense Analysis, Naval Postgraduate School, 1-13.
Devanandan, K. V. & Lakshmi, R. (2018). ICT embedded Education and Research: A Hand Guide for Teachers and Researchers. Notion Press.‏
Ellison, N. & Hardey, M. (2014). Social Media and Local Government: Citizenship, Consumption and Democracy. Local Government Studies, 40(1), 21–40.
FATF. (2015). Financing of the terrorist organisation Islamic State in Iraq and the Levant (ISIL). FATF. Available at: www.fatfgafi.org/topics/methodsandtrends/documents/financing-of-terrorist-organisation-isil.html
Fortezzaa, F. & Pencarelli, T. (2015). Potentialities of Web 2.0 and new Challenges for Destinations: Insights from Italy. An International Journal of Tourism and Hospitality Research, 26(4), 563-573.
Freeman, L.; Schroeder, R. & Everton, S. (2017). Social Media Exploitation by Covert Networks: A Case Study of ISIS. Communications of the Association for Information Systems, 41, 97-120.
Gambhir, H. K. (2014). Dabiq: The Strategic Messaging of the Islamic State. Institute for the Study of War, 15, 1-12.‏
Garrigos-Simon, F. J.; Alcam R. L. & Ribera, T. B. (2012). Social networks and Web 3.0: their impact on the management and marketing of organizations. Management Decision, 50(10), 1880-1890.
Gates, S. & Podder, S. (2015). Social Media, Recruitment, Allegiance and the Islamic State. Perspectives on Terrorism, 9(4), 107-116.‏
Giannakos, M. & Lapatas, V. (2010). Towards WEB 3.0 Concept for Collaborative E-Learning. In Proceedings of the Multi-Conference on Innovative Developments in ICT, 147-151.
Hassan, M.K.; Sarhan, A.M. & El-Dosouki, A. (2012). Semantic Web a Gainst Classic Web (Contender or Natural Evolution). International Journal of Advanced Research in Computer Science and Software Engineering, 2(9), 54-61.
Jackson, N. A. & Lilleker, D. G. (2009). Building an Architecture of Participation? Political Parties and Web 2.0 in Britain. Journal of Information Technology & Politics, 6, 232–250.
Jawhar, J. (2016). Terrorists’ Use of the Internet: the Case of Daesh. First published. Malaysia. Publisher: The Southeast Asia Regional Centre for Counter-Terrorism.
Kalçık, T. & Bayraktar, Ü. A. (2017). Terror Propaganda on Social Media: Daesh Terrorist Organisation. International Journal of Business and Social Science, 8(9), 128-137.‏
Kaplan, A. M. & Haenlein, M. (2010). Users of the world, unite! The Challenges and Opportunities of Social Media. Business Horizons, 53, 59-68.
Korkmaz, S. C. (2016). Propaganda of Terror: Konstantiniyye Magazine and the Discourse of Daesh. ORSAM, 204, 1-28.
Kursuncu, U.; Gaur, M.; Lokala, U.; Thirunarayan, K.; Sheth, A. & Arpinar, I. B. (2019). Predictive Analysis on Twitter: Techniques and Applications. In Emerging Research Challenges and Opportunities in Computational Social Network Analysis and Mining. Springer, Cham.‏
Lakomy, M. (2017). The evolution of cyber jihad from al-Qaeda to the Islamic State. Available at: https://www.researchgate.net/profile/Miron_Lakomy/publication/321097989
Leander, A. (2016). Digital/commercial (in) visibility: The politics of DAESH Recruitment Videos. European Journal of Social Theory,
 1-25, DOI: 10.1177/1368431016668365.
Lewis, J. A. (2005). The Internet and Terrorism. Proceedings of the Annual Meeting (American Society of International Law), 99, 112-115.
Magdy, W.; Darwish, K. & Weber, I. (2015). FailedRevolutions: Using Twitter to Study the Antecedents of ISIS Support. availeble at: https://arxiv.org/pdf/1503.02401.pdf
Maggioni, M. & Magri, P. (2015). Twitter and Jihad: the Communication Strategy of ISIS, First edition, The Italian Institute for International Political Studies. ISPI.
Magro, M. J. (2012). A Review of Social Media Use in E-Government. Administrative sciences, 2, 148-161, DOI:10.3390/admsci2020148
Mahood, S. & Rane, H. (2016). Islamist narratives in ISIS recruitment propaganda. The Journal of International Communication, 1-21. DOI: 10.1080/13216597.2016.1263231
Mansor, A.Z. (2012). Top Five Creative Ideas Using web 2.0. Procedia - Social and Behavioral Sciences, 59, 429-437.
McNutt, J. G. (2008). Web 2.0 Tools for Policy Research and Advocacy. Journal of Policy Practice, 7(1), 81-85.
Milton, D. (2018). Pulling Back the Curtain: An inside Look at the Islamic State’s Media Organization. Combating Terrorism Center at West Point. United States Military Academy.
Moore, J. (2017). ISIS on the Web: Islamic State Has 30,000-Website-Strong ‘Virtual Caliphate,’ Warns EU Anti-Terror Chief. https://www.newsweek.com/isis-has-30000-website-strong-virtual-caliphate-warns-eu-terror-chief-632534
Naik, U.&  Shivalingaiah, D. (2008). Comparative Study of Web 1.0, Web 2.0 and Web 3.0. International CALIBER, 499-507.
Niglia, A.; Al Sabaileh, A. & Hammad, A. (2017). Countering Terrorism, Preventing Radicalization and Protecting Cultural Heritage: The Role of Human Factors and Technology, IOS Press, 133. ‏
Nurminen, E. (2016). The Creation and use of an Efficient Social Media Strategy in Modern Terrorism and How to Tackle IT: an ISIS case Study. Bachelor’s Thesis. Tallinn University of Technology.
Omer, E. (2015). Using machine learning to identify jihadist messages on Twitter. M.S Theses, Dept. Information Technology, Uppsala university.
Oosterveld, W. T.; Bloem, W.; Farnham, N.; Kayaoglu, B. & Sweijs, T. (2017). The Rise and fall of ISIS: From Evitability to Inevitability. The Hague Centre for Strategic Studies, 1-23.
O'Reilly, T. (2009). What is web 2.0. O'Reilly Media, Inc.
Pearson, E. (2017). Online as the New Frontline: Affect, Gender and ISIS-take-down on Social Media. Studies in Conflict & Terrorism, Published online, 1-46.
Peresin, A. (2015). Fatal Attraction: Western Muslimas and ISIS. Perspectives on Terrorism, 9(3), 21-38.‏
Postigo, H. (2011). Questioning the Web 2.0 Discourse: Social Roles, Production, Values, and the Case of the Human Rights Portal. The Information Society, 27, 181-193.
Prabhu, D. (2016). Application of WEB 2.0 and WEB 3.0: an Overview. International Journal of Research in Library Science, 2(1), 54-62.
Pues, V. (2016). The Islamic State on Tumblr – Recruiting Western Women. International Institute for Counter, 1-20.
Sardarnia, Kh. & Safizadeh, R. (2017). The Internet and Its Potentials for Networking and Identity Seeking: A Study on ISIS. Terrorism and Political Violence, DOI: 10.1080/09546553.2017.1341877.
Schulzke, M. (2013). Rethinking military gaming: America's army and its Critics. Games and Culture, 8(2), 59-76.
Seijbel, J. (2017). The War for Supremacy of the Jihadist Movement (Intra-movement rivalry in jihadist media, 2011-2016). Master Thesis. Erasmus University Rotterdam.
Shaltout, M. S. A. F. & Salamah, A. I. B. (2013). The impact of Web 3.0 on E-Learning, in e-Learning "Best Practices in Management, Design and Development of e-Courses: Standards of Excellence and Creativity". 2013 Fourth International Conference on, IEEE, 227-232.
Shamieh, L. & Szanes, Z. (2015). The Propaganda of ISIS/DAESH Through the Virtul Space. DATR, 7(1), 7-31
UN. (2012). The use of the Internet for Terrorist Purposes. United Nations Office on Drugs and Crime.
Veilleux-Lepage, Y. (2014). Retweeting the Caliphate: The Role of soft-Sympathizers in the Islamic State’s social media strategy. In 2014 6th International Terrorism and Transnational Crime Conference, 3.
Veilleux-Lepage, Y. (2016). Paradigmatic Shifts in Jihadism in Cyberspace: The Emerging Role of Unaffiliated Sympathizers in Islamic State’s Social Media Strategy. Journal of Terrorism Research, 7(1),‏ 36-51.
Weimann, G. (2015). Going Dark: Terrorism on the Dark Web. Studies in Conflict & Terrorism, 1-25. DOI: 10.1080/1057610X.2015.1119546
Wilson, L. (2017). Understanding the Appeal of ISIS. New England Journal of Public Policy, 29(1), 1-10.
Woodard, Ch. T. (2017). From Family to Facebook to Foreign Fighter – The Attraction of Young Adults to ISIS through Societal Relationships and Social Media. Master Thesis. Duke University.
Yayla, A. S. & Speckhard, A. (2017). Telegram: the Mighty Application that ISIS Loves. publication at: https://www.researchgate.net/publication/316789344
Yeung, J. Ch.Y. (2015). A Critical Analysis on ISIS Propaganda and Social Media Strategies. Terrorism & Security Studies. Available at: https://www.researchgate.net/publication/316146537_A_Critical_Analysis_on_ISIS_Propaganda_and_Social_Media_Strategies
Zgryziewicz, R. (2016). Daesh Recruitment. How the Group Attracts Supportes. NATO Strategic Communications Centre of Excellence.