University of Anbar
  • Register
  • Login
  • العربیة

Al-Anbar University Journal For Humanities

Notice

As part of Open Journals’ initiatives, we create website for scholarly open access journals. If you are responsible for this journal and would like to know more about how to use the editorial system, please visit our website at https://ejournalplus.com or
send us an email to info@ejournalplus.com

We will contact you soon

  1. Home
  2. Volume 2020, Issue 2
  3. Author

Current Issue

By Issue

By Subject

Keyword Index

Author Index

Indexing Databases XML

About Journal

Aims and Scope

Editorial Board

Publication Ethics

Indexing and Abstracting

Related Links

FAQ

News

International Cooperation in Combating the Recruitment of "Ione Wolves" on Social Media

    Ramzi Odeh

Al-Anbar University Journal For Humanities, 2020, Volume 2020, Issue 2, Pages 1-30

  • Show Article
  • References
  • Download
  • Cite
  • Statistics
  • Share

Abstract

Abstract
According to the large development in the use of social media sites and its wide spread among segments of society and large groups of people, especially young people, many extremist groups have used these sites to recruit terrorists and push them to carry out terrorist activities within their countries. This growing phenomenon is known as the phenomenon of lone wolves through social media sites.
Hence, this paper aims to identify and investigate the methods for global collaboration in a particular territory of cybersecurity, specifically countering the recruitment of lone wolves through social media sites.
As international regulation is still limited to the development of a set of rules, regulations and agreements against the recruitment of lone wolves. Indeed, this study, through using of analytical qualitative approach, concluded that the phenomenon of the recruitment of lone wolves is a transnational phenomenon that cannot be contained without creating agreed rules of international action; in order to combat the spread of this phenomenon through social networking sites.
The study also found out that the capabilities of many countriesin the field of combating the recruitment of lone wolves is relatively weak due to the weakness of the expertise and technological capabilities of cybersecurity in its security firms, which are usually expensive, complex and intertwined.
The study recommended the importance of establishing an "electronic army" by state and not only technical units, which is equipped with the latest technology and equipment and able to monitor SPAM and recruitment of terrorists.
Keywords:
    lone wolves Social Media Sites cyber terrorism international cooperation
  • PDF (795 K)
  • XML
(2020). International Cooperation in Combating the Recruitment of "Ione Wolves" on Social Media. Al-Anbar University Journal For Humanities, 2020(2), 1-30.
Ramzi Odeh. "International Cooperation in Combating the Recruitment of "Ione Wolves" on Social Media". Al-Anbar University Journal For Humanities, 2020, 2, 2020, 1-30.
(2020). 'International Cooperation in Combating the Recruitment of "Ione Wolves" on Social Media', Al-Anbar University Journal For Humanities, 2020(2), pp. 1-30.
International Cooperation in Combating the Recruitment of "Ione Wolves" on Social Media. Al-Anbar University Journal For Humanities, 2020; 2020(2): 1-30.
  • RIS
  • EndNote
  • BibTeX
  • APA
  • MLA
  • Harvard
  • Vancouver

  1. Esfandiary, D. (2015). ISIS: inside the army of terror. By Michael Weiss and Hassan Hassan and ISIS: the state of terror. By Jessica Stern and JM Berger.‏
  2. Feldman, M. (2013). Comparative lone wolf terrorism: Toward a heuristic definition. Democracy and Security, 9(3), 270-286.‏
  3. Holmer, G. (2013). Countering violent extremism: A peacebuilding perspective. US Institute of Peace.
  4. Spaaij, R. (2010). The enigma of lone wolf terrorism: An assessment. Studies in Conflict & Terrorism, 33(9), 854-870.‏
  5. Spaaij, R. (2011). Understanding lone wolf terrorism: Global patterns, motivations and prevention. Springer Science & Business Media.‏
  6. Teich, S. (2013). Trends and developments in lone wolf terrorism in the western world: An analysis of terrorist attacks and attempted attacks by Islamic extremists. International Institute for Counter-Terrorism
  7. The UN Global Counter-Terrorism Strategy Review. (2019). Retrieved 15 may, 2019. From http://cutt.us/9mQl1
  8. Vladimir Ivanovich Voronkov. (2018). Under-Secretary-General for Counter-Terrorism International Research-To-Practice Conference on Priorities of International Cooperation in Countering Extremism and Terrorism 3 April 2018, Moscow. Retrieved 15 may, 2019. From http://www.unrussia.ru/en/taxonomy/term/4/2018-04-05

                                                                                         

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

          1. International Telecommunication Union . Cybersecurity Guide for Developing Countries. Retrieved May 15, 2019 https://www.itu.int/dms_pub/itu-d/opb/str/d-str-secu-2007-msw-a.doc . (2007).

 

2. Amin, Amel.  Confronting "lone wolves" The road from intellectual mechanisms to security and intelligence confrontations. Middle East. Retrieved May 15, 2019 http://cutt.us/jznpa .(2017).

 

3. Al-Bashari, Muhammad. (2017). Cyberterrorism and the Responsibility of the International Community. Union newspaper. Retrieved May 15, 2019 http://cutt.us/azTi5.

 

4. Albayan. The International Conference on the Criminalization of Cyberterrorism kicks off in Abu Dhabi today. Retrieved May 15, 2019 https://www.albayan.ae/across-the-uae/news-and-reports/2017-05-15-1.2947562

 

5. League of Arab States. (2014). At the Conference on "The Impact of Terrorism on Global Peace and Security" October 14-16, 2014.

 

6. Al-Hayat newspaper.  Etidal: Social media facilitated the spread of 90 percent of extremist content. Retrieved May 15, 2019 from http://cutt.us/7deij

 

 

7. Hossam Mohamed. Recruitment of terrorists through social networking sites.  Regained on May 15, 2019 from, http://www.carjj.org/sites/default/files/events/%D8%%

 

8. Al-Rasheed, Firas.  Countering Cyber Terrorists. The upper link in the fight against terrorism.  Naif Arab University for Security Sciences. (2012).

 

9. East Electronic.  Fighting extremism and terrorism starts with social media. Retrieved May 15, 2019 http://cutt.us/VxuQJ .(2016).

 

10. Adel, Alaa.  Lone Wolves: Operations and Coping Strategies. Retrieved May 15, 2019 http://cutt.us/cjx57 .

 

11. Alearabia. Security leaders chasing "lone wolves" on social media. Retrieved May 15, 2019 http://cutt.us/GrauH .

 

12. Alearabia. An international organization reveals how al-Qaradawi spread extremism online. Retrieved May 15, 2019 http://cutt.us/qSjfU .

 

13. Attia, Acer.  The role of modern mechanisms to reduce new crimes and methods of confronting cyberterrorism. Conference on new crimes in light of regional and international changes and transformations for the period from 2-4, September, 2014.

 

14. Ali, Rushdie.  Cybercrime International ThreatConfronting Cybercrime between the Budapest Convention and National Legislation, retrieved May 15, 2019 http://cutt.us/aCXl5

 

15. Taliqani, Ali. How are the centers of electronic terrorism destroyed?. Retrieved May 15, 2019 from

16.       https://annabaa.org/arabic/violenceandterror/542

 

17. Olabi, Ibrahim. "Cyber Warfare". This is how the Gulf states fight terrorism electronically. Gulf Online. Retrieved May 15, 2019 http://cutt.us/LJKej

 

18. Fayed, Nora.  The Role of Social Media in Recruiting Members of Terrorist Organizations: A Case Study of ISIS. Arab Democratic Center. Retrieved May 15, 2019 https://democraticac.de/?p=34268

19. Al-Arab Magazine. . Interpa Conference stresses international cooperation to counter the exploitation of social media in spreading terrorism. Retrieved May 15, 2019 http://cutt.us/sBRxF

20. Working Group on the Criminal Justice Sector and the Rule of Law. (2011). Rabat Memorandum on Good Practices for Effective Criminal Justice Sector Counter-Terrorism. Retrieved May 15, 2019 https://www.thegctf.org/Portals/1/Documents/Framework%20Documents/A/GCTF-Rabat-Memorandum-ARA.pdf

  • Article View: 47
  • PDF Download: 15
  • LinkedIn
  • Twitter
  • Facebook
  • Google
  • Telegram
  • Home
  • Glossary
  • News
  • Aims and Scope
  • Privacy Policy
  • Sitemap
This journal is licensed under a Creative Commons Attribution 4.0 International (CC-BY 4.0)

Powered by eJournalPlus