Jump to ContentJump to Main Navigation
Show Summary Details
More options …


Journal of Interactive Media

Editor-in-Chief: Ziegler, Jürgen

See all formats and pricing
More options …
Volume 16, Issue 2


IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study

Christian Reuter / Katja Pätsch / Elena Runft
Published Online: 2017-07-19 | DOI: https://doi.org/10.1515/icom-2017-0013


The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.

Keywords: Social media; Twitter; Terrorism; Crisis management


  • [1]

    Abokhodair, Norah; Yoo, Daisy; McDonald, David W: Dissecting a Social Botnet. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing – CSCW ’15 (2015), S. 839–851 — ISBN 9781450329224.Google Scholar

  • [2]

    Al-Rawi, Ahmed: Anti-ISIS Humor: Cultural Resistance of Radical Ideology. In: Politics, Religion & Ideology Bd. 7689 (2016), Nr. May, S. 1–17.Google Scholar

  • [3]

    Archetti, Cristina: Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 1, S. 49–59.Google Scholar

  • [4]

    Barrett, Richard: The Islamic State, 2014.Google Scholar

  • [5]

    Chatfield, Akemi Takeoka; Reddick, Christopher G.; Brajawidagda, Uuf: Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In: Proceedings of the 16th Annual International Conference on Digital Government Research – dg.o ’15. New York, New York, USA : ACM Press, 2015, S. 239–249 — ISBN 9781450336000.Google Scholar

  • [6]

    Cheong, Marc; Lee, Vincent C S: A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. In: Information Systems Frontiers Bd. 13 (2011), Nr. 1, S. 45–59.Google Scholar

  • [7]

    Christoph, Stefan: Funktionslogik terroristischer Propaganda im bewegten Bild. In: Journal for Deradicalization Bd. Fall/15 (2015), Nr. 4, S. 145–205.Google Scholar

  • [8]

    Chu, Zi; Gianvecchio, Steven; Wang, Haining; Jajodia, Sushil: Who is Tweeting on Twitter: Human, Bot, or Cyborg? In: Acsac 2010 (2010), S. 21 — ISBN 9781450301336.Google Scholar

  • [9]

    Gartenstein-Ross, Daveed: Social Media in the Next Evolution of Terrorist Recruitment. In: Hearing before the Senate Committee on Homeland Security & Governmental Affairs, Foundation for Defense of Democracies (2015), S. 1–11.Google Scholar

  • [10]

    Gates, Scott; Podder, Sukanya: Social Media, Recruitment, Allegiance and the Islamic State. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 4, S. 107–116.Google Scholar

  • [11]

    Greene, Kyle J.: ISIS: Trends in Terrorist Media and Propaganda. In: International Studies Capstone Research Papers Bd. Paper 3 (2015), S. 1–59.Google Scholar

  • [12]

    Hussain, Ghaffar; Saltman, Erin Marie: Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter it : Quilliam, 2014.Google Scholar

  • [13]

    Jackob, Nikolaus: Die Diffusion von Terrormeldungen, die Wirkung von Anschlägen auf die öffentliche Meinung und die Folgen für das Vertrauen in der Demokratie. In: Glaab, S. (Hrsg.): Medien und Terrorismus – auf den Spuren einer symbiotischen Beziehung, Wissenschaft : Sicherheit#Bd.#3. Band 3. Aufl. Berlin : Berliner Wissenschafts-Verlag, 2007, S. 155–174 — ISBN 978-3-8305-1435-0.Google Scholar

  • [14]

    Jeberson, W; Sharma, Lucky: Survey on counter Web Terrorism. In: COMPUSOFT, An International Journal of Advanced Computer Technology Bd. 4 (2015), Nr. 5, S. 1744–1747.Google Scholar

  • [15]

    Khayat, M.: Jihadis’ responses to widespread decline in participation on jihadi forums, increased use of Twitter. In: MEMRI Inquiry & Analysis Bd. 955 (2013).Google Scholar

  • [16]

    Klausen, Jytte; Barbieri, Eliane Tschaen; Reichlin-Melnick, Aaron; Zelin, Aaron Y.: The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign. In: Perspectives on Terrorism Bd. 6 (2012), Nr. 1, S. 36–53.Google Scholar

  • [17]

    Koch, Michael; Richter, Alexander: Enterprise 2.0 – Planung, Einführung und erfolgreicher Einsatz von Social Software in Unternehmen : Oldenbourg-Verlag, 2009 — ISBN 9783486590548.Google Scholar

  • [18]

    Lerner, Jennifer S; Gonzalez, Roxana M; Small, Deborah A; Fischhoff, Baruch: Effects of fear and anger on perceived risks of terrorism: A national field experiment. In: Psychological Science Bd. 14 (2003), Nr. 2, S. 144–150.Google Scholar

  • [19]

    Neer, Thomas; O’Toole, Mary Ellen: The Violence of the Islamic State of Syria (ISIS): A Behavioral Perspective. In: Violence and Gender Bd. 1 (2014), Nr. 4, S. 145–156.Google Scholar

  • [20]

    Palen, Leysia; Vieweg, Sarah; Sutton, Jeannette; Liu, Sophia B.; Hughes, Amanda Lee: Crisis Informatics: Studying Crisis in a Networked World. In: Proceedings of the International Conference on E-Social Science. Ann Arbor, USA, 2007.Google Scholar

  • [21]

    Ratkiewicz, J; Conover, M D; Meiss, M; Gonc, B; Flammini, A; Menczer, F: Detecting and Tracking Political Abuse in Social Media. In: Proceedings Conference on Weblogs and Social Media, 2011, S. 297–304.Google Scholar

  • [22]

    Reuter, Christian; Geilen, Gordian; Gellert, Robin: Sicherheit vs. Privatsphäre: Zur Akzeptanz von Überwachung in sozialen Medien im Kontext von Terrorkrisen. In: Mayr, H. C.; Pinzger, M. (Hrsg.): Informatik 2016: von Menschen für Menschen. Klagenfurt : GI-Edition-Lecture Notes in Informatics (LNI), 2016.Google Scholar

  • [23]

    Reuter, Christian; Ludwig, Thomas; Kotthaus, Christoph; Kaufhold, Marc-André; von Radziewski, Elmar; Pipek, Volkmar: Big Data in a Crisis? Creating Social Media Datasets for Emergency Management Research. In: i-com: Journal of Interactive Media Bd. 15 (2016), Nr. 3.Google Scholar

  • [24]

    Reuter, Christian; Pätsch, Katja; Runft, Elena: Terrorismus und soziale Medien – Propaganda und Gegenpropaganda. In: Prinz, W.; Borchers, J.; Jarke, M. (Hrsg.): Mensch & Computer: Tagungsband. Aachen, Germany : Gesellschaft für Informatik e.V., 2016.Google Scholar

  • [25]

    Reuter, Christian; Pätsch, Katja; Runft, Elena: Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter. In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), 2017, S. 649–663.Google Scholar

  • [26]

    Rohde, Markus; Aal, Konstantin; Misaki, Kaoru; Randall, Dave; Weibert, Anne; Wulf, Volker: Out of Syria: Mobile Media in Use at the Time of Civil War. In: International Journal of Human-Computer Interaction Bd. 32 (2016), Nr. 7, S. 515–531.Google Scholar

  • [27]

    Ryan, L.: ISIS Is Better Than Al-Qaeda At Using the Internet. — Defense One.Google Scholar

  • [28]

    Saltman, Erin Marie; Russell, Jonathan: White Paper – The role of prevent in countering online extremism: Quilliam, 2014.Google Scholar

  • [29]

    Seib, Philip; Janbek, Dana M.: Global Terrorism and New Media: The post-Al Qaeda Generation. New York : Routledge, 2011.Google Scholar

  • [30]

    Stieglitz, Stefan; Dang-Xuan, Linh; Bruns, Axel; Neuberger, Christoph: Social media analytics – An Interdisciplinary Approach and Its Implications for Information Systems. In: Business and Information Systems Engineering Bd. 6 (2014), Nr. 2, S. 89–96.Google Scholar

  • [31]

    Strauss, Anselm L.: Qualitative Analysis for Social Scientists: Cambridge Press, 1987.Google Scholar

  • [32]

    Sutton, Jeannette; Palen, Leysia; Shklovski, Irina: Backchannels on the Front Lines: Emergent Uses of Social Media in the 2007 Southern California Wildfires. In: Friedrich, F.; Van de Walle, B. (Hrsg.): Proceedings of the Information Systems for Crisis Response and Management (ISCRAM). Washington D.C., USA, 2008, S. 624–632.Google Scholar

  • [33]

    Torok, Robyn: ISIS and the Institution of Online Terrorist Recruitment. URL http://www.mei.edu/content/map/isis-and-institution-online-terrorist-recruitment. – abgerufen am 2017-01-31. — Middle East Institute.Google Scholar

  • [34]

    Tuna, Tayfun; Akbas, Esra; Aksoy, Ahmet; Canbaz, Muhammed Abdullah; Karabiyik, Umit; Gonen, Bilal; Aygun, Ramazan: User characterization for online social networks. In: Social Network Analysis and Mining Bd. 6. Vienna : Springer (2016), Nr. 1, S. 104 — ISBN 1327801604.Google Scholar

  • [35]

    Turk, Austin T.: Terrorism and Counterterrorism. In: Goode, E. (Hrsg.): The Handbook of Deviance. Hoboken, NJ : John Wiley & Sons, Inc, 2015, S. 537–548.Google Scholar

  • [36]

    Wegener, Claudia: Inhaltsanalyse. In: Mikos, L.; Wegener, C. (Hrsg.): Qualitative Medienforschung: Ein Handbuch. Konstanz : UVK Verlagsgesellschaft mbH, 2005, S. 200–208.Google Scholar

  • [37]

    Weimann, Gabriel: The Emerging Role of Social Media in the Recruitment of Foreign Fighters. In: de Guttry, A.; Capone, F.; Paulussen, C. (Hrsg.): Foreign Fighters under International Law and Beyond. The Hague : T.M.C. Asser Press, 2016, S. 77–95.Google Scholar

  • [38]

    Weimann, Gabriel; Jost, Jannis: Neuer Terrorismus und Neue Medien. In: Zeitschrift für Außen- und Sicherheitspolitik Bd. 8. Wiesbaden : Springer Fachmedien (2015), Nr. 3, S. 369–388.Google Scholar

  • [39]

    Zelin, Aaron Y.: Picture Or It Didn’t Happen: A Snapshot of the Islamic State’s Official Media Output. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 4, S. 85–97.Google Scholar

About the article

Christian Reuter

Christian Reuter, PhD, studied Information Systems at the University of Siegen and the École Supérieure de Commerce de Dijon, France and received a PhD for his work on (inter-)organizational collaboration technology design for crisis management. Before his scientific engagement he was full time consultant for a telecommunication corporation. He has acquired, conducted and managed national and international consultancy and research projects and has published more than 100 scientific articles in information systems, human-computer interaction, computer-supported collaborative work, crisis management, peace, safety and security, and social media. He is divisional director for crisis information systems at the University of Siegen and voluntary founding chairman of the section “HCI in safety-critical systems” of the German Informatics Society.

Katja Pätsch

Katja Pätsch, B.A. in Literary, Cultural and Media Studies, is a student of Media Culture and Safety Management at the University of Siegen. She graduated as a B.A. in 2014 and now works as a student research assistant while pursuing her M.A. degree. Her research is focused on political communication in social media and it’s possible consequences.

Elena Runft

Elena Maria Runft, B.A. in Literary, Cultural and Media Studies, studies Media Culture and the newly introduced Security Management at the University of Siegen. She is interested in countering terrorism and writes her master thesis about counter narrative campaigns in social media.

Published Online: 2017-07-19

Published in Print: 2017-08-28

Funding Source: Seventh Framework Programme

Award identifier / Grant number: 608352

The research works were supported in the Seventh Framework Programme of the EU-FP7-project “EmerGent” (608352).

Citation Information: i-com, Volume 16, Issue 2, Pages 181–193, ISSN (Online) 2196-6826, ISSN (Print) 1618-162X, DOI: https://doi.org/10.1515/icom-2017-0013.

Export Citation

© 2017 Walter de Gruyter GmbH, Berlin/Boston.Get Permission

Comments (0)

Please log in or register to comment.
Log in