IT for Peace? Fighting Against Terrorism in Social Media – An Explorative Twitter Study

  • 1 University of Siegen, Siegen, Germany
Christian Reuter
  • Corresponding author
  • University of Siegen, Siegen, Germany
  • Email
  • Further information
  • Christian Reuter, PhD, studied Information Systems at the University of Siegen and the École Supérieure de Commerce de Dijon, France and received a PhD for his work on (inter-)organizational collaboration technology design for crisis management. Before his scientific engagement he was full time consultant for a telecommunication corporation. He has acquired, conducted and managed national and international consultancy and research projects and has published more than 100 scientific articles in information systems, human-computer interaction, computer-supported collaborative work, crisis management, peace, safety and security, and social media. He is divisional director for crisis information systems at the University of Siegen and voluntary founding chairman of the section “HCI in safety-critical systems” of the German Informatics Society.
  • Search for other articles:
  • degruyter.comGoogle Scholar
, Katja Pätsch
  • University of Siegen, Siegen, Germany
  • Email
  • Further information
  • Katja Pätsch, B.A. in Literary, Cultural and Media Studies, is a student of Media Culture and Safety Management at the University of Siegen. She graduated as a B.A. in 2014 and now works as a student research assistant while pursuing her M.A. degree. Her research is focused on political communication in social media and it’s possible consequences.
  • Search for other articles:
  • degruyter.comGoogle Scholar
and Elena Runft
  • University of Siegen, Siegen, Germany
  • Email
  • Further information
  • Elena Maria Runft, B.A. in Literary, Cultural and Media Studies, studies Media Culture and the newly introduced Security Management at the University of Siegen. She is interested in countering terrorism and writes her master thesis about counter narrative campaigns in social media.
  • Search for other articles:
  • degruyter.comGoogle Scholar


The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.

  • [1]

    Abokhodair, Norah; Yoo, Daisy; McDonald, David W: Dissecting a Social Botnet. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing – CSCW ’15 (2015), S. 839–851 — ISBN 9781450329224.

  • [2]

    Al-Rawi, Ahmed: Anti-ISIS Humor: Cultural Resistance of Radical Ideology. In: Politics, Religion & Ideology Bd. 7689 (2016), Nr. May, S. 1–17.

  • [3]

    Archetti, Cristina: Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 1, S. 49–59.

  • [4]

    Barrett, Richard: The Islamic State, 2014.

  • [5]

    Chatfield, Akemi Takeoka; Reddick, Christopher G.; Brajawidagda, Uuf: Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In: Proceedings of the 16th Annual International Conference on Digital Government Research – dg.o ’15. New York, New York, USA : ACM Press, 2015, S. 239–249 — ISBN 9781450336000.

  • [6]

    Cheong, Marc; Lee, Vincent C S: A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. In: Information Systems Frontiers Bd. 13 (2011), Nr. 1, S. 45–59.

    • Crossref
    • Export Citation
  • [7]

    Christoph, Stefan: Funktionslogik terroristischer Propaganda im bewegten Bild. In: Journal for Deradicalization Bd. Fall/15 (2015), Nr. 4, S. 145–205.

  • [8]

    Chu, Zi; Gianvecchio, Steven; Wang, Haining; Jajodia, Sushil: Who is Tweeting on Twitter: Human, Bot, or Cyborg? In: Acsac 2010 (2010), S. 21 — ISBN 9781450301336.

  • [9]

    Gartenstein-Ross, Daveed: Social Media in the Next Evolution of Terrorist Recruitment. In: Hearing before the Senate Committee on Homeland Security & Governmental Affairs, Foundation for Defense of Democracies (2015), S. 1–11.

  • [10]

    Gates, Scott; Podder, Sukanya: Social Media, Recruitment, Allegiance and the Islamic State. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 4, S. 107–116.

  • [11]

    Greene, Kyle J.: ISIS: Trends in Terrorist Media and Propaganda. In: International Studies Capstone Research Papers Bd. Paper 3 (2015), S. 1–59.

  • [12]

    Hussain, Ghaffar; Saltman, Erin Marie: Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter it : Quilliam, 2014.

  • [13]

    Jackob, Nikolaus: Die Diffusion von Terrormeldungen, die Wirkung von Anschlägen auf die öffentliche Meinung und die Folgen für das Vertrauen in der Demokratie. In: Glaab, S. (Hrsg.): Medien und Terrorismus – auf den Spuren einer symbiotischen Beziehung, Wissenschaft : Sicherheit#Bd.#3. Band 3. Aufl. Berlin : Berliner Wissenschafts-Verlag, 2007, S. 155–174 — ISBN 978-3-8305-1435-0.

  • [14]

    Jeberson, W; Sharma, Lucky: Survey on counter Web Terrorism. In: COMPUSOFT, An International Journal of Advanced Computer Technology Bd. 4 (2015), Nr. 5, S. 1744–1747.

  • [15]

    Khayat, M.: Jihadis’ responses to widespread decline in participation on jihadi forums, increased use of Twitter. In: MEMRI Inquiry & Analysis Bd. 955 (2013).

  • [16]

    Klausen, Jytte; Barbieri, Eliane Tschaen; Reichlin-Melnick, Aaron; Zelin, Aaron Y.: The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun’s Propaganda Campaign. In: Perspectives on Terrorism Bd. 6 (2012), Nr. 1, S. 36–53.

  • [17]

    Koch, Michael; Richter, Alexander: Enterprise 2.0 – Planung, Einführung und erfolgreicher Einsatz von Social Software in Unternehmen : Oldenbourg-Verlag, 2009 — ISBN 9783486590548.

  • [18]

    Lerner, Jennifer S; Gonzalez, Roxana M; Small, Deborah A; Fischhoff, Baruch: Effects of fear and anger on perceived risks of terrorism: A national field experiment. In: Psychological Science Bd. 14 (2003), Nr. 2, S. 144–150.

    • Crossref
    • PubMed
    • Export Citation
  • [19]

    Neer, Thomas; O’Toole, Mary Ellen: The Violence of the Islamic State of Syria (ISIS): A Behavioral Perspective. In: Violence and Gender Bd. 1 (2014), Nr. 4, S. 145–156.

    • Crossref
    • Export Citation
  • [20]

    Palen, Leysia; Vieweg, Sarah; Sutton, Jeannette; Liu, Sophia B.; Hughes, Amanda Lee: Crisis Informatics: Studying Crisis in a Networked World. In: Proceedings of the International Conference on E-Social Science. Ann Arbor, USA, 2007.

  • [21]

    Ratkiewicz, J; Conover, M D; Meiss, M; Gonc, B; Flammini, A; Menczer, F: Detecting and Tracking Political Abuse in Social Media. In: Proceedings Conference on Weblogs and Social Media, 2011, S. 297–304.

  • [22]

    Reuter, Christian; Geilen, Gordian; Gellert, Robin: Sicherheit vs. Privatsphäre: Zur Akzeptanz von Überwachung in sozialen Medien im Kontext von Terrorkrisen. In: Mayr, H. C.; Pinzger, M. (Hrsg.): Informatik 2016: von Menschen für Menschen. Klagenfurt : GI-Edition-Lecture Notes in Informatics (LNI), 2016.

  • [23]

    Reuter, Christian; Ludwig, Thomas; Kotthaus, Christoph; Kaufhold, Marc-André; von Radziewski, Elmar; Pipek, Volkmar: Big Data in a Crisis? Creating Social Media Datasets for Emergency Management Research. In: i-com: Journal of Interactive Media Bd. 15 (2016), Nr. 3.

  • [24]

    Reuter, Christian; Pätsch, Katja; Runft, Elena: Terrorismus und soziale Medien – Propaganda und Gegenpropaganda. In: Prinz, W.; Borchers, J.; Jarke, M. (Hrsg.): Mensch & Computer: Tagungsband. Aachen, Germany : Gesellschaft für Informatik e.V., 2016.

  • [25]

    Reuter, Christian; Pätsch, Katja; Runft, Elena: Terrorbekämpfung mithilfe sozialer Medien – ein explorativer Einblick am Beispiel von Twitter. In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), 2017, S. 649–663.

  • [26]

    Rohde, Markus; Aal, Konstantin; Misaki, Kaoru; Randall, Dave; Weibert, Anne; Wulf, Volker: Out of Syria: Mobile Media in Use at the Time of Civil War. In: International Journal of Human-Computer Interaction Bd. 32 (2016), Nr. 7, S. 515–531.

    • Crossref
    • Export Citation
  • [27]

    Ryan, L.: ISIS Is Better Than Al-Qaeda At Using the Internet. — Defense One.

  • [28]

    Saltman, Erin Marie; Russell, Jonathan: White Paper – The role of prevent in countering online extremism: Quilliam, 2014.

  • [29]

    Seib, Philip; Janbek, Dana M.: Global Terrorism and New Media: The post-Al Qaeda Generation. New York : Routledge, 2011.

  • [30]

    Stieglitz, Stefan; Dang-Xuan, Linh; Bruns, Axel; Neuberger, Christoph: Social media analytics – An Interdisciplinary Approach and Its Implications for Information Systems. In: Business and Information Systems Engineering Bd. 6 (2014), Nr. 2, S. 89–96.

    • Crossref
    • Export Citation
  • [31]

    Strauss, Anselm L.: Qualitative Analysis for Social Scientists: Cambridge Press, 1987.

  • [32]

    Sutton, Jeannette; Palen, Leysia; Shklovski, Irina: Backchannels on the Front Lines: Emergent Uses of Social Media in the 2007 Southern California Wildfires. In: Friedrich, F.; Van de Walle, B. (Hrsg.): Proceedings of the Information Systems for Crisis Response and Management (ISCRAM). Washington D.C., USA, 2008, S. 624–632.

  • [33]

    Torok, Robyn: ISIS and the Institution of Online Terrorist Recruitment. URL – abgerufen am 2017-01-31. — Middle East Institute.

  • [34]

    Tuna, Tayfun; Akbas, Esra; Aksoy, Ahmet; Canbaz, Muhammed Abdullah; Karabiyik, Umit; Gonen, Bilal; Aygun, Ramazan: User characterization for online social networks. In: Social Network Analysis and Mining Bd. 6. Vienna : Springer (2016), Nr. 1, S. 104 — ISBN 1327801604.

    • Crossref
    • Export Citation
  • [35]

    Turk, Austin T.: Terrorism and Counterterrorism. In: Goode, E. (Hrsg.): The Handbook of Deviance. Hoboken, NJ : John Wiley & Sons, Inc, 2015, S. 537–548.

    • Crossref
    • Export Citation
  • [36]

    Wegener, Claudia: Inhaltsanalyse. In: Mikos, L.; Wegener, C. (Hrsg.): Qualitative Medienforschung: Ein Handbuch. Konstanz : UVK Verlagsgesellschaft mbH, 2005, S. 200–208.

  • [37]

    Weimann, Gabriel: The Emerging Role of Social Media in the Recruitment of Foreign Fighters. In: de Guttry, A.; Capone, F.; Paulussen, C. (Hrsg.): Foreign Fighters under International Law and Beyond. The Hague : T.M.C. Asser Press, 2016, S. 77–95.

    • Crossref
    • Export Citation
  • [38]

    Weimann, Gabriel; Jost, Jannis: Neuer Terrorismus und Neue Medien. In: Zeitschrift für Außen- und Sicherheitspolitik Bd. 8. Wiesbaden : Springer Fachmedien (2015), Nr. 3, S. 369–388.

    • Crossref
    • Export Citation
  • [39]

    Zelin, Aaron Y.: Picture Or It Didn’t Happen: A Snapshot of the Islamic State’s Official Media Output. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 4, S. 85–97.

Purchase article
Get instant unlimited access to the article.
Log in
Already have access? Please log in.

Log in with your institution

Journal + Issues

i-com - Journal of Interactive Media is devoted to human-computer interaction, media design, usability, engineering and systems evaluation, software ergonomics, cooperative systems, e-learning, mobile and ubiquitous systems, user-adaptive systems, agent development tools and methods for media in different application fields, barrier-free systems design, and the social aspects of information and communication technologies.