{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T13:39:26Z","timestamp":1776087566870,"version":"3.50.1"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T00:00:00Z","timestamp":1700524800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,11,21]]},"DOI":"10.1109\/snams60348.2023.10375416","type":"proceedings-article","created":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T20:36:22Z","timestamp":1704227782000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["The Mobile Apps Inflammatory and Terrorism in Saudi Arabia"],"prefix":"10.1109","author":[{"given":"Mokhtar","family":"Elareshi","sequence":"first","affiliation":[{"name":"Communication College, University of Sharjah,Sharjah,UAE"}]},{"given":"Mohammed","family":"Habes","sequence":"additional","affiliation":[{"name":"Yarmouk University,Department of Radio &#x0026; TV,Irbid,Jordan"}]},{"given":"Abdulkrim","family":"Ziani","sequence":"additional","affiliation":[{"name":"Communication &#x0026; Media College, Al Ain University,Abu Dhabi,UAE"}]},{"given":"Samar Ben","family":"Romdhane","sequence":"additional","affiliation":[{"name":"College of Mass Communication, Ajman University, Ajman,Ajman,UAE"}]}],"member":"263","reference":[{"key":"ref1","article-title":"New terrorism and new media","author":"Weimann","year":"2014","journal-title":"Wilson Center, Communicating Unreality"},{"key":"ref2","first-page":"133","article-title":"Global terrorism in 2016 LOBAL","volume":"39","author":"Gunaratna","year":"2016","journal-title":"Rev. UNISCI"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/1057610x.2019.1599192"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2017.1378645"},{"key":"ref5","article-title":"Ibn Baz between reality and illusion (in Arabic)","author":"Al-Zawahiri","year":"1995","journal-title":"ilmway.com"},{"key":"ref6","volume-title":"Counter-terrorism in Saudi Arabia: Narratives, practices and challenges","author":"AlMaawi","year":"2016"},{"issue":"1","key":"ref7","first-page":"15","article-title":"Fighting terrorism more effectively with the aid of GIS: Kingdom of Saudi Arabia case study","volume":"7","author":"Alharith","year":"2018","journal-title":"Am. J. Geogr. Inf. Syst."},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4236\/health.2020.126046"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s12115-017-0114-0"},{"key":"ref10","article-title":"Terror on twitter: How ISIS is taking war to social media-and social media is fighting back","author":"Singer","year":"2015","journal-title":"Popular Science"},{"key":"ref11","article-title":"Why do the followers of ISIS think that murdering so many people, even women and children, is the right and moral thing to do? - Quora","author":"Byron","year":"2015","journal-title":"Quora"},{"issue":"2","key":"ref12","first-page":"548","article-title":"University students awareness of social media use and hate speech in Jordan","volume":"13","author":"Serhan","year":"2019","journal-title":"Int. J. Cyber Criminol."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1177\/2057047319853323"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.poetic.2018.05.001"},{"key":"ref15","first-page":"1","article-title":"Majority of terrorists who have attacked America are not Muslim, new study finds","volume-title":"The Independent","author":"Sampathkumar","year":"2017"},{"key":"ref16","article-title":"Spread the word: Russia social media on the service of jihad","author":"Fainberg","year":"2017","journal-title":"The International Institute for Counter-Terrorism (ICT)"},{"key":"ref17","author":"Berger","year":"2015","journal-title":"The ISIS Twitter census defining and describing the population of ISIS supporters on Twitter"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3137597.3137600"},{"key":"ref19","article-title":"Most Americans who see fake news believe it, new survey says","author":"Silverman","year":"2016","journal-title":"BuzzFeed"},{"key":"ref20","article-title":"ISIS tactics illustrate social medias new place in modern war","author":"Melchior","year":"2014","journal-title":"Tech Crunch"},{"key":"ref21","article-title":"Facebook and Twitter gain more users in Saudi Arabia","author":"Gazette","year":"2014","journal-title":"Saudi Gazette"},{"key":"ref22","article-title":"Facebook and Twitter could pay the price for hate speech","author":"Naughton","year":"2017","journal-title":"The Guardian Newspwer"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1017\/s0020743815000112"},{"key":"ref24","first-page":"17","article-title":"Social media and the Arab Spring: Searching for emerging identities in the Arab Gulf","volume":"9","author":"Karolak","year":"2013","journal-title":"St Antonys Int. Rev."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s11412-011-9115-y"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.5040\/9781350988057.ch-005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2012.12.032"},{"issue":"13\/14","key":"ref28","first-page":"279","article-title":"Social media network as academic tool: A study of media group in the Facebook page","author":"Menaceur","year":"2015","journal-title":"J. Soc. Stud. Res. Univ. Martyr Himmat Llikhadr"},{"key":"ref29","volume-title":"The role of social media in creating political awareness and mobilizing political protests: A focus on Turkey","author":"Yunus","year":"2013"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.15655\/mw\/2019\/v10i2\/49642"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.31695\/IJASRE.2018.32728"},{"key":"ref32","first-page":"1","article-title":"Instrumental role of ICTs in development as freedom the contribution of ICTs to women empowerment: A capability perspective","volume-title":"the Twenty-third Americas Conference on Information Systems","author":"Abubakar","year":"2017"},{"key":"ref33","first-page":"1389","article-title":"Propaganda, fake news, and fake trends: The weaponization of Twitter bots in the Gulf crisis","volume":"13","author":"Jones","year":"2019","journal-title":"Int. J. Commun."},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1086\/716281"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2016.1207633"},{"issue":"1","key":"ref36","article-title":"Islamic radicalization through social media for ISIS recruitment of fighters","volume":"23","author":"Desa","year":"2022","journal-title":"Cent. Asia Caucasus"},{"issue":"1","key":"ref37","first-page":"25","article-title":"Social influence in the online recruitment of terrorists and terrorist sympathizers: Implications for social psychology research","volume":"23","author":"Guadagno","year":"2010","journal-title":"Rev. Int. Psychol. Soc."},{"key":"ref38","volume-title":"Human killing machines: Systematic indoctrination in Iran, Nazi Germany, Al Qaeda and Abu Ghraib","author":"Lankford","year":"2009"},{"key":"ref39","volume-title":"Obedience to authority: An experimental view","author":"Milgram","year":"1974"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1080\/09546553.2017.1385457"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1207\/S15327957PSPR0401_6"},{"issue":"1","key":"ref42","first-page":"1","article-title":"Islamophobia on social media: A qualitative analysis of the facebooks walls of hate","volume":"10","author":"Awan","year":"2016","journal-title":"Int. J. Cyber Criminol."}],"event":{"name":"2023 Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS)","location":"Abu Dhabi, United Arab Emirates","start":{"date-parts":[[2023,11,21]]},"end":{"date-parts":[[2023,11,24]]}},"container-title":["2023 Tenth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10375374\/10375393\/10375416.pdf?arnumber=10375416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,12]],"date-time":"2024-01-12T22:25:55Z","timestamp":1705098355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10375416\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,21]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/snams60348.2023.10375416","relation":{},"subject":[],"published":{"date-parts":[[2023,11,21]]}}}