
- 197 pages
- English
- PDF
- Available on iOS & Android
About this book
The contributions of this volume aim at a new, evidence based approach to Jihadism studies. What is the structure of Jihadi online communication and the dissemination of operational material online? Which errors were made by conventional Jihadism research? Which programs, apps, etc. use Jihadis to further their online communication? Next to these questions the contributors discuss the evident inability to understand basic mathematical principles in conventional Jihadism research and consider a very important video as a case study of Jihadi online communication, stressing the linguistic and theological shortcomings of conventional research. The volume is based on the understanding of theological elements as a vital part of Jihadi communication.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Title Page
- Copyright
- Table of Contents
- Body
- Rüdiger Lohlker: Introduction: Confusion meets Confusion
- Rüdiger Lohlker: Collective Organizers: Lone Wolves, Remote Control, and Virtual Guidance
- Ali Fisher: Interrogating the electronic ribat: Data Science in the study of the Jihadist movement
- Ali Fisher / Nico Prucha: A Milestone for “Islamic State” Propaganda: “The Clanging of the Swords, part 4”
- Clemens Holzgruber: “Now You See Me – Now You Don't”: Analysing Jihadists' Online Privacy-Enhancing and Counter-Surveillance Strategies
- Contributors
- Index