数字时代恐怖主义问题的构建:系统视角

N. Odhiambo, N. Ochara, Amstrong Kadymatimba
{"title":"数字时代恐怖主义问题的构建:系统视角","authors":"N. Odhiambo, N. Ochara, Amstrong Kadymatimba","doi":"10.1109/OI.2018.8535619","DOIUrl":null,"url":null,"abstract":"Terrorism is a global challenge of the 21st century. The Kenya Westgate Mall attack and Garrissa University attacks in 2015 and the Libya suicide bombings, did not only claim the lives of many, but also had great political consequences. The advancements, ease of access and availability of information and communication technologies (ICT) is blamed for the increases in terrorist attacks: for instance, the Internet and especially, social media. This is because through the Internet, terrorist organizations such as ISIS have come up with innovative ways to recruit new members, to train and even disseminate ideologies. However, the terrorist opponents (counter-terrorism organizations) also have developed innovative counter-measures using ICT. Therefore, understanding and structuring terrorism in this digital age has enhanced the complexity in addition to multiple stakeholders involved in terrorism related incidences, intertwined causal-relationships, and the uncertainties in the mode of operandi of the terrorists. In this study, theory of synergetics is applied both as a theoretical and methodological approach to try structure the terrorism problem. Secondary data sources such as journal articles on terrorism related incidences and search terms (i.e. terrorism AND technology, terrorism AND Internet), were used by the researchers' to identify and include relevant documents in the study. Following the inclusion and exclusion criteria, the researchers remained with only 405 documents from which using the qualitative software Nvivo, a word cloud was developed to pictorially visualize the terrorism problem. Thereafter, relying on synergetics and using results from the word cloud, the researchers' were able to create a conceptual model. The findings from the analysis of the conceptual model showed that technology plays a critical role in the fight against terrorism as it appears to be part of each of the various components of synergetics, namely, order parameters, system elements, internal and external constraints, control parameters and environment. Thus, it is quite clear that in terrorism structuring in this digital age can be quite challenging.","PeriodicalId":331140,"journal":{"name":"2018 Open Innovations Conference (OI)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Structuring of the Terrorism Problem in the Digital Age: A Systems Perspective\",\"authors\":\"N. Odhiambo, N. Ochara, Amstrong Kadymatimba\",\"doi\":\"10.1109/OI.2018.8535619\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Terrorism is a global challenge of the 21st century. The Kenya Westgate Mall attack and Garrissa University attacks in 2015 and the Libya suicide bombings, did not only claim the lives of many, but also had great political consequences. The advancements, ease of access and availability of information and communication technologies (ICT) is blamed for the increases in terrorist attacks: for instance, the Internet and especially, social media. This is because through the Internet, terrorist organizations such as ISIS have come up with innovative ways to recruit new members, to train and even disseminate ideologies. However, the terrorist opponents (counter-terrorism organizations) also have developed innovative counter-measures using ICT. Therefore, understanding and structuring terrorism in this digital age has enhanced the complexity in addition to multiple stakeholders involved in terrorism related incidences, intertwined causal-relationships, and the uncertainties in the mode of operandi of the terrorists. In this study, theory of synergetics is applied both as a theoretical and methodological approach to try structure the terrorism problem. Secondary data sources such as journal articles on terrorism related incidences and search terms (i.e. terrorism AND technology, terrorism AND Internet), were used by the researchers' to identify and include relevant documents in the study. Following the inclusion and exclusion criteria, the researchers remained with only 405 documents from which using the qualitative software Nvivo, a word cloud was developed to pictorially visualize the terrorism problem. Thereafter, relying on synergetics and using results from the word cloud, the researchers' were able to create a conceptual model. The findings from the analysis of the conceptual model showed that technology plays a critical role in the fight against terrorism as it appears to be part of each of the various components of synergetics, namely, order parameters, system elements, internal and external constraints, control parameters and environment. Thus, it is quite clear that in terrorism structuring in this digital age can be quite challenging.\",\"PeriodicalId\":331140,\"journal\":{\"name\":\"2018 Open Innovations Conference (OI)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Open Innovations Conference (OI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/OI.2018.8535619\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Open Innovations Conference (OI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/OI.2018.8535619","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

恐怖主义是21世纪的全球性挑战。2015年肯尼亚西门购物中心袭击事件、加里萨大学袭击事件以及利比亚自杀式爆炸袭击事件,不仅夺去了许多人的生命,而且产生了巨大的政治后果。信息和通信技术(ICT)的进步、获取和可用性被认为是恐怖袭击增加的原因:例如,互联网,尤其是社交媒体。这是因为像ISIS这样的恐怖组织通过互联网想出了创新的方法来招募新成员,训练甚至传播意识形态。然而,恐怖主义对手(反恐组织)也利用信息通信技术制定了创新的应对措施。因此,在这个数字时代,理解和构建恐怖主义,增加了恐怖主义相关事件的复杂性,增加了涉及多个利益相关者的复杂性,增加了相互交织的因果关系,增加了恐怖分子作案方式的不确定性。在本研究中,协同学理论作为一种理论和方法来尝试构建恐怖主义问题。次要数据来源,如关于恐怖主义相关事件的期刊文章和搜索词(即恐怖主义和技术,恐怖主义和互联网),被研究人员用来确定并纳入研究中的相关文件。按照纳入和排除标准,研究人员只保留了405个文档,使用定性软件Nvivo,开发了一个词云,以图形化地可视化恐怖主义问题。此后,依靠协同效应和使用词云的结果,研究人员能够创建一个概念模型。概念模型分析的结果表明,技术在反恐斗争中起着关键作用,因为它似乎是协同作用的各个组成部分的一部分,即秩序参数、系统要素、内部和外部约束、控制参数和环境。因此,很明显,在这个数字时代,恐怖主义的结构是相当具有挑战性的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Structuring of the Terrorism Problem in the Digital Age: A Systems Perspective
Terrorism is a global challenge of the 21st century. The Kenya Westgate Mall attack and Garrissa University attacks in 2015 and the Libya suicide bombings, did not only claim the lives of many, but also had great political consequences. The advancements, ease of access and availability of information and communication technologies (ICT) is blamed for the increases in terrorist attacks: for instance, the Internet and especially, social media. This is because through the Internet, terrorist organizations such as ISIS have come up with innovative ways to recruit new members, to train and even disseminate ideologies. However, the terrorist opponents (counter-terrorism organizations) also have developed innovative counter-measures using ICT. Therefore, understanding and structuring terrorism in this digital age has enhanced the complexity in addition to multiple stakeholders involved in terrorism related incidences, intertwined causal-relationships, and the uncertainties in the mode of operandi of the terrorists. In this study, theory of synergetics is applied both as a theoretical and methodological approach to try structure the terrorism problem. Secondary data sources such as journal articles on terrorism related incidences and search terms (i.e. terrorism AND technology, terrorism AND Internet), were used by the researchers' to identify and include relevant documents in the study. Following the inclusion and exclusion criteria, the researchers remained with only 405 documents from which using the qualitative software Nvivo, a word cloud was developed to pictorially visualize the terrorism problem. Thereafter, relying on synergetics and using results from the word cloud, the researchers' were able to create a conceptual model. The findings from the analysis of the conceptual model showed that technology plays a critical role in the fight against terrorism as it appears to be part of each of the various components of synergetics, namely, order parameters, system elements, internal and external constraints, control parameters and environment. Thus, it is quite clear that in terrorism structuring in this digital age can be quite challenging.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Adopting Dynamic Capabilities of Mobile Information and Communication Technology in Namibian Small and Medium Enterprises Digital Transformation of Enterprises: A Transition Using Process Modelling Antecedents An Adaptive Framework for Recommender-Based Learning Management Systems Resistive Switching Memory Effect and Conduction Mechanism in Nano-Silver Incorporated Type-A Gelatin Films Demand Side Management of Grid- Tied Hybrid Photovoltaic-Diesel-Battery Energy System for a University Engineering Building
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1