Open Access
Issue |
E3S Web Conf.
Volume 609, 2025
The 7th International Conference on Multidiscipline Approaches for Sustainable Rural Development (ICMA SURE 2024)
|
|
---|---|---|
Article Number | 07003 | |
Number of page(s) | 7 | |
Section | Public Policy and Sustainability | |
DOI | https://doi.org/10.1051/e3sconf/202560907003 | |
Published online | 24 January 2025 |
- S. W. Brenner, “Cyberterrorism: How Real is the Threat?,” Media Asia, vol. 29, no. 3, pp. 149–154, Jan. 2002, doi: 10.1080/01296612.2002.11726680. [CrossRef] [Google Scholar]
- F. Gardner, “How do terrorists communicate?,” BBC. [Online]. Available: https://www.bbc.com/news/world-24784756 [Google Scholar]
- A. Al-Rawi, “Video games, terrorism, and ISIS’s Jihad 3.0,” Terror. Polit. Violence, vol. 30, no. 4, pp. 740–760, Jul. 2018, doi: 10.1080/09546553.2016.1207633. [CrossRef] [Google Scholar]
- M. Schulzke, “The Virtual War on Terror: Counterterrorism Narratives in Video Games,” New Polit. Sci., vol. 35, no. 4, pp. 586–603, Dec. 2013, doi: 10.1080/07393148.2013.848703. [CrossRef] [Google Scholar]
- M. Schulzke, “Being a terrorist: Video game simulations of the other side of the War on Terror,” Media, War Confl., vol. 6, no. 3, pp. 207–220, Dec. 2013, doi: 10.1177/1750635213494129. [CrossRef] [Google Scholar]
- M. Schulzke, “Simulating terrorism and insurgency: video games in the war of ideas,” Cambridge Rev. Int. Aff., vol. 27, no. 4, pp. 627–643, Oct. 2014, doi: 10.1080/09557571.2014.960508. [CrossRef] [Google Scholar]
- D. Kellner, “9/11, spectacles of terror, and media manipulation,” Crit. Discourse Stud., vol. 1, no. 1, pp. 41–64, Apr. 2004, doi: 10.1080/17405900410001674515. [CrossRef] [Google Scholar]
- J. P. Farwell, “The Media Strategy of ISIS,” Survival (Lond)., vol. 56, no. 6, pp. 49–55, Nov. 2014, doi: 10.1080/00396338.2014.985436. [CrossRef] [Google Scholar]
- K. Bennhold, “Jihad and Girl Power: How ISIS Lured 3 London Girls,” The New York Times. [Online]. Available: https://www.nytimes.com/2015/08/18/world/euro pe/jihad-and-girl-power-how-isis-lured-3-london-teenagers.html [Google Scholar]
- P. Seib and D. M. Janbek, Global Terrorism and New Media. Routledge, 2010. doi: 10.4324/9780203845370. [CrossRef] [Google Scholar]
- A. Raharjo, R. W. Bintoro, N. A. Tri Utami, and M. Suzuki, “The Legal Policy of Criminal Justice Bureaucracy Cybercrime,” BESTUUR, vol. 10, no. 2, p. 105, Dec. 2022, doi: 10.20961/bestuur.v10i2.64498. [CrossRef] [Google Scholar]
- D. E. Denning, “Cyberterrorism: Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives,” Georgetown University. [Online]. Available: https://faculty.nps.edu/dedennin/publications/Test imony-Cyberterrorism2000.htm [Google Scholar]
- J. A. Lewis, “Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats,” Cent. Strateg. Int. Stud., 2002. [Google Scholar]
- C. Wilson, “Computer Attack and Cyber Terrorism: Vulnerabilities and Policy Issues for Congress,” CRS Report for Congress. [Online]. Available: https://irp.fas.org/crs/RL32114.pdf [Google Scholar]
- J. D. Banez, “The internet and homegrown jihadist terrorism assessing U.S. detection techniques,” 2010. [Online]. Available: https://api.semanticscholar.org/CorpusID:153433 027 [Google Scholar]
- P. R. Golose, Invasi terorisme ke cyberspace. Jakarta: Yayasan Pengembangan Kajian Ilmu Kepolisian, 2015. [Google Scholar]
- A. B. A.S and I. Fitriana, “Cyberterrorism: Suatu Tantangan Komunikasi Asimetris bagi Ketahanan Nasional,” InterKomunika, vol. 2, no. 1, pp. 1–15, Jun. 2017, doi: 10.33376/ik.v2i1.12. [Google Scholar]
- A. Raharjo, Y. Saefudin, and R. Fidiyani, “The influence of technology determinism in forming criminal act of legislation,” E3S Web Conf., vol. 73, p. 12011, Dec. 2018, doi: 10.1051/e3sconf/20187312011. [CrossRef] [EDP Sciences] [PubMed] [Google Scholar]
- A. Raharjo, “Prevention of Cybercrime through the Development of Criminal Responsibility Principles for Internet Users,” J. Din. Huk., vol. 21, no. 3, p. 499, Aug. 2022, doi: 10.20884/1.jdh.2021.21.3.3256. [Google Scholar]
- R. R. Lubis, “Potensi Pengguna Internet Indonesia Dalam Counter-Cyber Radicalization,” J. Pertahanan Bela Negara, vol. 7, no. 2, Oct. 2017, doi: 10.33172/jpbh.v7i2.177. [Google Scholar]
- F. Wardah, “BNPT: Jumlah Anggota dan Simpatisan Organisasi Teroris Capai 17.000 Orang,” VOA Indonesia. [Online]. Available: https://www.voaindonesia.com/a/bnpt-jumlah-anggota-dan-simpatisan-organisasi-teroris-capai-17-000-orang/6240658.html [Google Scholar]
- N. Nuraniyah, “Not Just Brainwashed: Understanding the Radicalization of Indonesian Female Supporters of the Islamic State,” Terror. Polit. Violence, vol. 30, no. 6, pp. 890–910, Nov. 2018, doi: 10.1080/09546553.2018.1481269. [CrossRef] [Google Scholar]
- L. A. O’Rourke, “What’s Special about Female Suicide Terrorism?,” Secur. Stud., vol. 18, no. 4, pp. 681–718, Dec. 2009, doi: 10.1080/09636410903369084. [CrossRef] [Google Scholar]
- M. Bloom, “Bombshells: Women and Terror,” Gender Issues, vol. 28, no. 1–2, pp. 1–21, Jun. 2011, doi: 10.1007/s12147-011-9098-z. [CrossRef] [Google Scholar]
- K. Jacques and P. J. Taylor, “Male and Female Suicide Bombers: Different Sexes, Different Reasons?,” Stud. Confl. Terror., vol. 31, no. 4, pp. 304–326, Apr. 2008, doi: 10.1080/10576100801925695. [CrossRef] [Google Scholar]
- A. Berko and E. Erez, “Gender, Palestinian Women, and Terrorism: Women’s Liberation or Oppression?,” Stud. Confl. Terror., vol. 30, no. 6, pp. 493–519, May 2007, doi: 10.1080/10576100701329550. [CrossRef] [Google Scholar]
- C. D. Ness, “In the Name of the Cause: Women’s Work in Secular and Religious Terrorism,” Stud. Confl. Terror., vol. 28, no. 5, pp. 353–373, Sep. 2005, doi: 10.1080/10576100500180337. [CrossRef] [Google Scholar]
- J. Stone and K. Pattillo, “Al-Qaedaʹs Use of Female Suicide Bombers in Iraq:,” in Women, Gender, and Terrorism, University of Georgia Press, 2011, pp. 159–175. doi: 10.2307/j.ctt46nnjp.12. [CrossRef] [Google Scholar]
- K. Von Knop, “The Female Jihad: Al Qaeda’s Women,” Stud. Confl. Terror., vol. 30, no. 5, pp. 397–414, Apr. 2007, doi: 10.1080/10576100701258585. [CrossRef] [Google Scholar]
- M. Smith and E. M. Saltman, “Till Martyrdom Do Us Part,” 2015. [Online]. Available: https://www.isdglobal.org/wp-content/uploads/2016/02/Till_Martyrdom_Do_Us_Part_Gender_and_the_ISIS_Phenomenon.pdf [Google Scholar]
- L. Sjoberg, “Jihadi brides and female volunteers: Reading the Islamic State’s war to see gender and agency in conflict dynamics,” Confl. Manag. Peace Sci., vol. 35, no. 3, pp. 296–311, May 2018, doi: 10.1177/0738894217695050. [CrossRef] [Google Scholar]
- J. Auchter, “Gendering Terror,” Int. Fem. J. Polit., vol. 14, no. 1, pp. 121–139, Mar. 2012, doi: 10.1080/14616742.2011.619780. [CrossRef] [Google Scholar]
- A. Spencer, “The Hidden Face of Terrorism: An Analysis of the Women in Islamic State,” J. Strateg. Secur., vol. 9, no. 3, pp. 74–98, Sep. 2016, doi: 10.5038/1944-0472.9.3.1549. [CrossRef] [Google Scholar]
- C. Winter, Women of the Islamic State A manifesto on women by the Al-Khanssaa Brigade. London: Quilliam Foundation, 2015. [Google Scholar]
- C. C. Fair and A. Hamza, “Women and Support for Terrorism in Pakistan,” Terror. Polit. Violence, vol. 30, no. 6, pp. 962–983, Nov. 2018, doi: 10.1080/09546553.2018.1481313. [CrossRef] [Google Scholar]
- F. Haq, “Militarism and Motherhood: The Women of the Lashkar‐i‐Tayyabia in Pakistan,” Signs (Chic)., vol. 32, pp. 1023–1046, Jun. 2007, doi: 10.1086/512729. [CrossRef] [Google Scholar]
- F. Haq, “Mothers of Lashkar-e-Taiba,” Econ. Polit. Wkly., vol. 44, pp. 17–20, May 2009, doi: 10.2307/40278962. [Google Scholar]
- C. Fair, “Explaining Support for Sectarian Terrorism in Pakistan: Piety, Maslak and Sharia,” Religions, vol. 6, no. 4, pp. 1137–1167, Sep. 2015, doi: 10.3390/rel6041137. [CrossRef] [Google Scholar]
- V. Asal, C. C. Fair, and S. Shellman, “Consenting to a Child’s Decision to Join a Jihad : Insights from a Survey of Militant Families in Pakistan,” Stud. Confl. Terror., vol. 31, no. 11, pp. 973–994, Nov. 2008, doi: 10.1080/10576100802400201. [CrossRef] [Google Scholar]
- S. Mahmood, “Pakistan’s Women Jihadis: Understanding the nexus between women and terrorism in Pakistan.,” The Diplomat. [Online]. Available: https://thediplomat.com/2017/04/pakistans-women-jihadis/ [Google Scholar]
- F. Khan, “Assistants of terror: How women raise funds for Da’ish in Karachi,” The Express Tribune. [Online]. Available: https://tribune.com.pk/story/1013558/assistants-of-terror-revealed-how-women-raise-funds-for-daish-in-karachi [Google Scholar]
- S. Jones, “Radicalisation in the Philippines: The Cotabato Cell of the ‘East Asia Wilayah,’” Terror. Polit. Violence, vol. 30, no. 6, pp. 933–943, Nov. 2018, doi: 10.1080/09546553.2018.1481190. [CrossRef] [Google Scholar]
- J. C. Hwang, “Pathways into Terrorism: Understanding Entry into and Support for Terrorism in Asia,” Terror. Polit. Violence, vol. 30, no. 6, pp. 883–889, Nov. 2018, doi: 10.1080/09546553.2018.1481186. [CrossRef] [Google Scholar]
- M. Faizin, “Ini 5 Narasi Kelompok Radikal-Teroris dalam Merekrut Anggotanya,” NU Online. [Online]. Available: https://nu.or.id/daerah/ini-5-narasi-kelompok-radikal-teroris-dalam-merekrut-anggotanya-fZkI3 [Google Scholar]
- J. Horgan, “American Academy of Political and Social Science From Profiles to Pathways and Roots to Routes: Perspectives from Psychology on Radicalization into Terrorism,” Source Ann. Am. Acad. Polit. Soc. Sci., 2008. [Google Scholar]
- Solahudin, The Roots of Terrorism in Indonesia: From Darul Islam to Jemaah Islamiyah. Sidney: UNSW Press, 2013. [Google Scholar]
- M. Zerzri, “The Threat of Cyber Terrorism and Recommendations for The Threat of Cyber Terrorism and,” Center for Applied Policy Research. [Online]. Available: https://www.cap-lmu.de/download/2017/CAPerspectives-Tunisia-2017-04.pdf [Google Scholar]
- Kementerian Agama RI, “Situs Radikal Berkembang Pesat.” [Online]. Available: https://kemenag.go.id/nasional/situs-radikal-berkembang-pesat-ny2f8f [Google Scholar]
- Antara, “BNPT blokir 15--20 situs internet milik teroris,” 2013. [Online]. Available: https://www.antaranews.com/berita/364382/bnpt-blokir-15-20-situs-internet-milik-teroris [Google Scholar]
- Kominfo RI, “BNPT Minta Kominfo Blokir 22 Situs Radikal.” [Online]. Available: https://www.kominfo.go.id/index.php/content/det ail/4627/BNPT+Minta+Kominfo+Blokir+22+Situ s+Radikal/0/berita_satker [Google Scholar]
- M. R. Sandi, “273 Situs Mengandung Radikalisme dan Terorisme Diblokir Kominfo,” Okezone. [Online]. Available: https://nasional.okezone.com/read/2023/10/23/33 7/2906503/situs-mengandung-radikalisme-dan-terorisme-diblokir-kominfo [Google Scholar]
- CNN Indonesia, “Eks Teroris Minta Pemerintah Lebih Aktif Blokir Situs Radikal,” 2021. [Online]. Available: https://www.cnnindonesia.com/nasional/2021021 4194757-20-606152/eks-teroris-minta-pemerintah-lebih-aktif-blokir-situs-radikal. [Google Scholar]
- F. Wardah, “BNPT Temukan 650 Situs dan Akun Berpotensi Sebarkan Paham Radikal,” VOA Indonesia, 2022. [Online]. Available: https://www.voaindonesia.com/a/bnpt-temukan-650-situs-dan-akun-berpotensi-sebarkan-paham-radikal/6411934.html [Google Scholar]
- BBC Indonesia, “Indonesia diserang ‘teroris siber’, pemerintah meminta masyarakat tenang,” 2017. [Online]. Available: https://www.bbc.com/indonesia/39907370 [Google Scholar]
- CNN Indonesia, “Pakar: Serangan Ransomware ke PDNS 2 Aksi Terorisme Siber,” 2024. [Online]. Available: https://www.cnnindonesia.com/teknologi/202407 05173408-192-1118086/pakar-serangan-ransomware-ke-pdns-2-aksi-terorisme-siber [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.