gajahslot mariatogel airbet robopragma wajik77 mposlot https://siapadia.riau.go.id/plugins/pulsa-limaribu/ https://journal.parahikma.ac.id/juaraslot/ https://jurnalbening.uho.ac.id/pages/tm/ http://adj.fkg.unand.ac.id/lib/pkp/alexistoto/ http://inomet.ft.unand.ac.id/locale/bento/ https://jurnal.usk.ac.id/lib/pkp/sbobet88/ https://htn.parahikma.ac.id/sbotop/ https://jurnalbening.uho.ac.id/lib/pkp/bni4d/ https://job.uho.ac.id/lib/pkp/btn4d/ paito hk From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries | Jati | Simulacra

From bombing to social media: The role of returning foreign fighters in nurturing terrorism in Asian countries

Wasisto Jati

Abstract


This article aims for revisiting the terrorism studies from different perspective. The terror attacks itself cannot be hundred percent zero but it just fluctuated trend. More specifically, terrorism always adaptive in following trends. While terror attacks still to target innocent civilians, the perpetrators could be closest relatives and neighbors. The way terror attack to reach out that group of people basically shows the silent role of returning foreign fighters (RFF)/returnees nurturing dan breeding terror ideologies. By using critical literature review especially historical narrative analysis, this study wants to examine the current terror trend that utilizes social media. It can spread terror narration and also affecting people to join. The way to analyze data is making clear connection from each literature. The findings of this study are: the RFF is adept at social media in nurturing terror ideologies and then making their home country and new terrorist cells to be breeding grounds.

Keywords


returning foreign fighters (RFF); social media; terrorism; returnees; Asian

Full Text:

PDF

References


al-Ubaydi, M., Lahoud, N., Milton, D., & Price, B. (2014, December). The group that calls itself a state: Understanding the evolution and challenges of the Islamic State. Combating Terrorism Center at West Point. https://www.ctc.usma.edu/the-group-that-calls-itself-a-state-understanding-the-evolution-and-challenges-of-the-islamic-state/

Asongu, S. A., Orim, S.-M. I., & Nting, R. T. (2019). Terrorism and social media: Global evidence. Journal of Global Information Technology Management, 22(3), 208–228. https://doi.org/10.1080/1097198X.2019.1642023

Borum, R. (2012). Radicalization into violent extremism II: A review of conceptual models and empirical research. Journal of Strategic Security, 4(4), 37–62.

Byman, D. (2012). Curious victory: Explaining Israel’s suppression of the second intifada. Terrorism and Political Violence, 24(5), 825–852. https://doi.org/10.1080/09546553.2011.652317

Byman, D. (2013). Why drones work: The case for Washington’s weapon of choice. Foreign Affairs, 92(4), 32–43.

Byman, D. (2016). The jihadist returnee threat: Just how dangerous? Political Science Quarterly, 131(1), 69–99. https://doi.org/10.1002/polq.12434

Cohen, K., Johansson, F., Kaati, L., & Mork, J. C. (2014). Detecting linguistic markers for radical violence in social media. Terrorism and Political Violence, 26(1), 246–256. https://doi.org/10.1080/09546553.2014.849948

Crenshaw, M. (1991). How terrorism declines. Terrorism and Political Violence, 3(1), 69–87.

Cronin, A. K. (2006). How al-Qaida ends: The decline and demise of terrorist groups. International Security, 31(1), 7–48.

Cronin, A. K. (2013). Why drones fail: When tactics drive strategy essay. Foreign Affairs, 4,1-54.

Crossett, C., & Spitaletta, J. (2010). Radicalization: Relevant psychological and sociological concepts. Asymmetric Warfare Group.

Ellis, C., Raffaello, P., Jeanine, Z., Gomis, B., Palombi, S., & Smith, M. (2016). Lone-actor terrorism: Final report. Royal United Services Institute for Defence and Security Studies. https://rusi.org/publication/occasional-papers/lone-actor-terrorism-final-report

Galily, Y., Yarchi, M., & Tamir, I. (2015). From Munich to Boston, and from theatre to social media: The evolutionary landscape of world sporting terror. Studies in Conflict & Terrorism, 38(12), 998–1007. https://doi.org/10.1080/1057610X.2015.1076640

Goodwin, J. (2006). A theory of categorical terrorism. Social Forces, 84(4), 2027–2046.

Herring, E. (2008). Critical terrorism studies: An activist scholar perspective. Critical Studies on Terrorism, 1(2), 197–211. https://doi.org/10.1080/17539150802187507

Hoffman, B. (2017). Inside terrorism. Columbia University Press.

IEP. (2019, November). Global terrorism index 2019: Measuring the impact of terrorism. Institute for Economics & Peace. http://visionofhumanity.org/reports

Kennedy, D. B., Homant, R. J., & Barnes, E. (2008). An insider view of the sleeper cell terrorist: A face validity study. Journal of Applied Security Research, 3(3–4), 325–350. https://doi.org/10.1080/19361610801968271

Malet, D., & Hayes, R. (2018). Foreign fighter returnees: An indefinite threat? Terrorism and Political Violence, 1–19. https://doi.org/10.1080/09546553.2018.1497987

McCauley, C., & Moskalenko, S. (2014). Toward a profile of lone wolf terrorists: What moves an individual from radical opinion to radical action. Terrorism and Political Violence, 26(1), 69–85. https://doi.org/10.1080/09546553.2014.849916

Newman, E. (2006). Exploring the “root causes” of terrorism. Studies in Conflict & Terrorism, 29(8), 749–772. https://doi.org/10.1080/10576100600704069

Nuraniyah, N. (2018). Not just brainwashed: Understanding the radicalization of Indonesian female supporters of the Islamic state. Terrorism and Political Violence, 30(6), 890–910. https://doi.org/10.1080/09546553.2018.1481269

Parker, T., & Sitter, N. (2016). The four horsemen of terrorism: It’s not waves, it’s strains. Terrorism and Political Violence, 28(2), 197–216. https://doi.org/10.1080/09546553.2015.1112277

Sageman, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26(4), 565–580. https://doi.org/10.1080/09546553.2014.895649

Schmid, A. P. (2005). Root causes of terrorism: Some conceptual notes, a set of indicators, and a model. Democracy and Security, 1(2), 127–136. https://doi.org/10.1080/17419160500321139

Schuurman, B., Lindekilde, L., Malthaner, S., O’Connor, F., Gill, P., & Bouhana, N. (2019). End of the lone wolf: The typology that should not have been. Studies in Conflict & Terrorism, 42(8), 771–778. https://doi.org/10.1080/1057610X.2017.1419554

See, S. (2018). Returning foreign terrorist fighters: A catalyst for recidivism among disengaged terrorists. Counter Terrorist Trends and Analyses, 10(6), 7–15.

Spaaij, R., & Hamm, M. S. (2015). Key issues and research agendas in lone wolf terrorism. Studies in Conflict & Terrorism, 38(3), 167–178. https://doi.org/10.1080/1057610X.2014.986979

Wolfendale, J. (2007). Terrorism, security, and the threat of counterterrorism. Studies in Conflict & Terrorism, 30(1), 75–92. https://doi.org/10.1080/10576100600791231

Zekulin, M. (2013). Islamic-inspired home-grown terrorism (IIHGT): What we know and what it means moving forward. University of Calgary.




DOI: https://doi.org/10.21107/sml.v4i2.11688

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 Wasisto Jati

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

--------------------------------------------------------------------------------------------------------------------------------------------------------

Simulacra has been indexed in these prominent indexing services:

Sinta 2DOAJIndex CopernicusEBSCOGoogle ScholarCrossrefDimensionsWorldcatHarvard LibraryOxford LibraryUniversiteit LeidenDRJIScilit MDPIPKP IndexROADBASEMorarefColumbia LibrarySheffield LibraryCORE

 

 Simulacra is licensed under a Creative Commons BY-NC-SA and published by the Center for Sociological Studies and Community Development, Department of Sociology, Universitas Trunojoyo Madura, Indonesia.