Jihadist Terrorist Use Of Strategic Communication Management Techniques

Download Jihadist Terrorist Use Of Strategic Communication Management Techniques PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Jihadist Terrorist Use Of Strategic Communication Management Techniques book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.
Jihadist Terrorist Use of Strategic Communication Management Techniques

Since the symmetrical-global East-West conflict was decided in favor of the West, numerous asymmetrical conflicts have erupted around the globe. Jihadist terrorism has spread beyond the borders of the regions in which it had its origin and has reached a global dimension. Research and analysis of the root causes and underlying conditions, motivators and enablers of terrorism including the agitation propaganda of jihadist terrorists are vital to shaping appropriate countermeasures to the threat from Islamic terrorism. This paper looks at the jihadist use of strategic communication management techniques. The mass media and especially the Internet have become the key enablers and the main strategic communication assets for terrorists and have ensured them a favorable communication asymmetry.
Jihadist Terrorist Use of Strategic Communication Management Techniques

"The theoretical jihadist terrorist communication plan described in this paper shows that the jihadist terrorist knows how to apply strategic communication management techniques. The mass media and especially the Internet have become the key enablers and the main strategic communication assets for terrorists and have ensured them a favorable communication asymmetry. With these assets, terrorists are able to compensate for a significant part of their asymmetry in military might. Jihadist terrorists place a great deal of emphasis on developing comprehensive communication strategies in order to reach their desired short-, mid- and long-term goals and desired end states. Their ability to develop and implement such sophisticated strategies shows their fanatic conviction and their professionalism. Their communication goals are aimed at legitimizing, propagating and intimidating. They craft their strategies based on careful audience analysis and adapt their messages and delivery methods accordingly, adhering to the fundamental rules underlying any communication or public relations campaign. Their skillful use of the mass media and the Internet to compensate for asymmetrical disadvantages has enabled them to keep generating new generations of jihadist terrorists."--P. 5.
Between Crime and War

Author: Claire Oakes Finkelstein
language: en
Publisher: Oxford University Press
Release Date: 2023
The threat posed by the recent rise of transnational non-state armed groups does not fit easily within either of the two basic paradigms for state responses to violence. The civilian paradigm focuses on the interception of demonstrable immediate threats to the safety of others. The military paradigm focuses on threats posed by collective actors who pose a danger to the state's ability to maintain basic social order and, at times, the state. The book suggests, that we need not see the options as confined to this binary choice as it evaluates the philosophical and ethical implications of using both military and non-military frameworks for pursuing counterterrorism operations.