{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T19:16:50Z","timestamp":1764962210790,"version":"3.46.0"},"reference-count":39,"publisher":"Walter de Gruyter GmbH","issue":"2","funder":[{"DOI":"10.13039\/100011102","name":"Seventh Framework Programme","doi-asserted-by":"publisher","award":["608352"],"award-info":[{"award-number":["608352"]}],"id":[{"id":"10.13039\/100011102","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8,28]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.<\/jats:p>","DOI":"10.1515\/icom-2017-0013","type":"journal-article","created":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T11:50:58Z","timestamp":1531914658000},"page":"181-193","source":"Crossref","is-referenced-by-count":5,"title":["IT for Peace? Fighting Against Terrorism in Social Media \u2013 An Explorative Twitter Study"],"prefix":"10.1515","volume":"16","author":[{"given":"Christian","family":"Reuter","sequence":"first","affiliation":[{"name":"University of Siegen , Siegen , Germany"}]},{"given":"Katja","family":"P\u00e4tsch","sequence":"additional","affiliation":[{"name":"University of Siegen , Siegen , Germany"}]},{"given":"Elena","family":"Runft","sequence":"additional","affiliation":[{"name":"University of Siegen , Siegen , Germany"}]}],"member":"374","published-online":{"date-parts":[[2017,7,19]]},"reference":[{"key":"2025120518170832131_j_icom-2017-0013_ref_001","doi-asserted-by":"crossref","unstructured":"Abokhodair, Norah; Yoo, Daisy; McDonald, David W: Dissecting a Social Botnet. In: Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing \u2013 CSCW \u201915 (2015), S. 839\u2013851 \u2014 ISBN 9781450329224.","DOI":"10.1145\/2675133.2675208"},{"key":"2025120518170832131_j_icom-2017-0013_ref_002","doi-asserted-by":"crossref","unstructured":"Al-Rawi, Ahmed: Anti-ISIS Humor: Cultural Resistance of Radical Ideology. In: Politics, Religion & Ideology Bd. 7689 (2016), Nr. May, S. 1\u201317.","DOI":"10.1080\/21567689.2016.1157076"},{"key":"2025120518170832131_j_icom-2017-0013_ref_003","unstructured":"Archetti, Cristina: Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 1, S. 49\u201359."},{"key":"2025120518170832131_j_icom-2017-0013_ref_004","unstructured":"Barrett, Richard: The Islamic State, 2014."},{"key":"2025120518170832131_j_icom-2017-0013_ref_005","doi-asserted-by":"crossref","unstructured":"Chatfield, Akemi Takeoka; Reddick, Christopher G.; Brajawidagda, Uuf: Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In: Proceedings of the 16th Annual International Conference on Digital Government Research \u2013 dg.o \u201915. New York, New York, USA : ACM Press, 2015, S. 239\u2013249 \u2014 ISBN 9781450336000.","DOI":"10.1145\/2757401.2757408"},{"key":"2025120518170832131_j_icom-2017-0013_ref_006","doi-asserted-by":"crossref","unstructured":"Cheong, Marc; Lee, Vincent C S: A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. In: Information Systems Frontiers Bd. 13 (2011), Nr. 1, S. 45\u201359.","DOI":"10.1007\/s10796-010-9273-x"},{"key":"2025120518170832131_j_icom-2017-0013_ref_007","unstructured":"Christoph, Stefan: Funktionslogik terroristischer Propaganda im bewegten Bild. In: Journal for Deradicalization Bd. Fall\/15 (2015), Nr. 4, S. 145\u2013205."},{"key":"2025120518170832131_j_icom-2017-0013_ref_008","doi-asserted-by":"crossref","unstructured":"Chu, Zi; Gianvecchio, Steven; Wang, Haining; Jajodia, Sushil: Who is Tweeting on Twitter: Human, Bot, or Cyborg? In: Acsac 2010 (2010), S. 21 \u2014 ISBN 9781450301336.","DOI":"10.1145\/1920261.1920265"},{"key":"2025120518170832131_j_icom-2017-0013_ref_009","unstructured":"Gartenstein-Ross, Daveed: Social Media in the Next Evolution of Terrorist Recruitment. In: Hearing before the Senate Committee on Homeland Security & Governmental Affairs, Foundation for Defense of Democracies (2015), S. 1\u201311."},{"key":"2025120518170832131_j_icom-2017-0013_ref_010","unstructured":"Gates, Scott; Podder, Sukanya: Social Media, Recruitment, Allegiance and the Islamic State. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 4, S. 107\u2013116."},{"key":"2025120518170832131_j_icom-2017-0013_ref_011","unstructured":"Greene, Kyle J.: ISIS: Trends in Terrorist Media and Propaganda. In: International Studies Capstone Research Papers Bd. Paper 3 (2015), S. 1\u201359."},{"key":"2025120518170832131_j_icom-2017-0013_ref_012","unstructured":"Hussain, Ghaffar; Saltman, Erin Marie: Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter it : Quilliam, 2014."},{"key":"2025120518170832131_j_icom-2017-0013_ref_013","unstructured":"Jackob, Nikolaus: Die Diffusion von Terrormeldungen, die Wirkung von Anschl\u00e4gen auf die \u00f6ffentliche Meinung und die Folgen f\u00fcr das Vertrauen in der Demokratie. In: Glaab, S. (Hrsg.): Medien und Terrorismus \u2013 auf den Spuren einer symbiotischen Beziehung, Wissenschaft : Sicherheit#Bd.#3. Band 3. Aufl. Berlin : Berliner Wissenschafts-Verlag, 2007, S. 155\u2013174 \u2014 ISBN 978-3-8305-1435-0."},{"key":"2025120518170832131_j_icom-2017-0013_ref_014","unstructured":"Jeberson, W; Sharma, Lucky: Survey on counter Web Terrorism. In: COMPUSOFT, An International Journal of Advanced Computer Technology Bd. 4 (2015), Nr. 5, S. 1744\u20131747."},{"key":"2025120518170832131_j_icom-2017-0013_ref_015","unstructured":"Khayat, M.: Jihadis\u2019 responses to widespread decline in participation on jihadi forums, increased use of Twitter. In: MEMRI Inquiry & Analysis Bd. 955 (2013)."},{"key":"2025120518170832131_j_icom-2017-0013_ref_016","unstructured":"Klausen, Jytte; Barbieri, Eliane Tschaen; Reichlin-Melnick, Aaron; Zelin, Aaron Y.: The YouTube Jihadists: A Social Network Analysis of Al-Muhajiroun\u2019s Propaganda Campaign. In: Perspectives on Terrorism Bd. 6 (2012), Nr. 1, S. 36\u201353."},{"key":"2025120518170832131_j_icom-2017-0013_ref_017","doi-asserted-by":"crossref","unstructured":"Koch, Michael; Richter, Alexander: Enterprise 2.0 \u2013 Planung, Einf\u00fchrung und erfolgreicher Einsatz von Social Software in Unternehmen : Oldenbourg-Verlag, 2009 \u2014 ISBN 9783486590548.","DOI":"10.1524\/9783486593648"},{"key":"2025120518170832131_j_icom-2017-0013_ref_018","doi-asserted-by":"crossref","unstructured":"Lerner, Jennifer S; Gonzalez, Roxana M; Small, Deborah A; Fischhoff, Baruch: Effects of fear and anger on perceived risks of terrorism: A national field experiment. In: Psychological Science Bd. 14 (2003), Nr. 2, S. 144\u2013150.","DOI":"10.1111\/1467-9280.01433"},{"key":"2025120518170832131_j_icom-2017-0013_ref_019","doi-asserted-by":"crossref","unstructured":"Neer, Thomas; O\u2019Toole, Mary Ellen: The Violence of the Islamic State of Syria (ISIS): A Behavioral Perspective. In: Violence and Gender Bd. 1 (2014), Nr. 4, S. 145\u2013156.","DOI":"10.1089\/vio.2014.0037"},{"key":"2025120518170832131_j_icom-2017-0013_ref_020","unstructured":"Palen, Leysia; Vieweg, Sarah; Sutton, Jeannette; Liu, Sophia B.; Hughes, Amanda Lee: Crisis Informatics: Studying Crisis in a Networked World. In: Proceedings of the International Conference on E-Social Science. Ann Arbor, USA, 2007."},{"key":"2025120518170832131_j_icom-2017-0013_ref_021","doi-asserted-by":"crossref","unstructured":"Ratkiewicz, J; Conover, M D; Meiss, M; Gonc, B; Flammini, A; Menczer, F: Detecting and Tracking Political Abuse in Social Media. In: Proceedings Conference on Weblogs and Social Media, 2011, S. 297\u2013304.","DOI":"10.1609\/icwsm.v5i1.14127"},{"key":"2025120518170832131_j_icom-2017-0013_ref_022","unstructured":"Reuter, Christian; Geilen, Gordian; Gellert, Robin: Sicherheit vs. Privatsph\u00e4re: Zur Akzeptanz von \u00dcberwachung in sozialen Medien im Kontext von Terrorkrisen. In: Mayr, H. C.; Pinzger, M. (Hrsg.): Informatik 2016: von Menschen f\u00fcr Menschen. Klagenfurt : GI-Edition-Lecture Notes in Informatics (LNI), 2016."},{"key":"2025120518170832131_j_icom-2017-0013_ref_023","doi-asserted-by":"crossref","unstructured":"Reuter, Christian; Ludwig, Thomas; Kotthaus, Christoph; Kaufhold, Marc-Andr\u00e9; von Radziewski, Elmar; Pipek, Volkmar: Big Data in a Crisis? Creating Social Media Datasets for Emergency Management Research. In: i-com: Journal of Interactive Media Bd. 15 (2016), Nr. 3.","DOI":"10.1515\/icom-2016-0036"},{"key":"2025120518170832131_j_icom-2017-0013_ref_024","unstructured":"Reuter, Christian; P\u00e4tsch, Katja; Runft, Elena: Terrorismus und soziale Medien \u2013 Propaganda und Gegenpropaganda. In: Prinz, W.; Borchers, J.; Jarke, M. (Hrsg.): Mensch & Computer: Tagungsband. Aachen, Germany : Gesellschaft f\u00fcr Informatik e.V., 2016."},{"key":"2025120518170832131_j_icom-2017-0013_ref_025","unstructured":"Reuter, Christian; P\u00e4tsch, Katja; Runft, Elena: Terrorbek\u00e4mpfung mithilfe sozialer Medien \u2013 ein explorativer Einblick am Beispiel von Twitter. In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), 2017, S. 649\u2013663."},{"key":"2025120518170832131_j_icom-2017-0013_ref_026","doi-asserted-by":"crossref","unstructured":"Rohde, Markus; Aal, Konstantin; Misaki, Kaoru; Randall, Dave; Weibert, Anne; Wulf, Volker: Out of Syria: Mobile Media in Use at the Time of Civil War. In: International Journal of Human-Computer Interaction Bd. 32 (2016), Nr. 7, S. 515\u2013531.","DOI":"10.1080\/10447318.2016.1177300"},{"key":"2025120518170832131_j_icom-2017-0013_ref_027","unstructured":"Ryan, L.: ISIS Is Better Than Al-Qaeda At Using the Internet. \u2014 Defense One."},{"key":"2025120518170832131_j_icom-2017-0013_ref_028","unstructured":"Saltman, Erin Marie; Russell, Jonathan: White Paper \u2013 The role of prevent in countering online extremism: Quilliam, 2014."},{"key":"2025120518170832131_j_icom-2017-0013_ref_029","doi-asserted-by":"crossref","unstructured":"Seib, Philip; Janbek, Dana M.: Global Terrorism and New Media: The post-Al Qaeda Generation. New York : Routledge, 2011.","DOI":"10.4324\/9780203845370"},{"key":"2025120518170832131_j_icom-2017-0013_ref_030","doi-asserted-by":"crossref","unstructured":"Stieglitz, Stefan; Dang-Xuan, Linh; Bruns, Axel; Neuberger, Christoph: Social media analytics \u2013 An Interdisciplinary Approach and Its Implications for Information Systems. In: Business and Information Systems Engineering Bd. 6 (2014), Nr. 2, S. 89\u201396.","DOI":"10.1007\/s12599-014-0315-7"},{"key":"2025120518170832131_j_icom-2017-0013_ref_031","doi-asserted-by":"crossref","unstructured":"Strauss, Anselm L.: Qualitative Analysis for Social Scientists: Cambridge Press, 1987.","DOI":"10.1017\/CBO9780511557842"},{"key":"2025120518170832131_j_icom-2017-0013_ref_032","unstructured":"Sutton, Jeannette; Palen, Leysia; Shklovski, Irina: Backchannels on the Front Lines: Emergent Uses of Social Media in the 2007 Southern California Wildfires. In: Friedrich, F.; Van de Walle, B. (Hrsg.): Proceedings of the Information Systems for Crisis Response and Management (ISCRAM). Washington D.C., USA, 2008, S. 624\u2013632."},{"key":"2025120518170832131_j_icom-2017-0013_ref_033","unstructured":"Torok, Robyn: ISIS and the Institution of Online Terrorist Recruitment. URL http:\/\/www.mei.edu\/content\/map\/isis-and-institution-online-terrorist-recruitment. \u2013 abgerufen am 2017-01-31. \u2014 Middle East Institute."},{"key":"2025120518170832131_j_icom-2017-0013_ref_034","doi-asserted-by":"crossref","unstructured":"Tuna, Tayfun; Akbas, Esra; Aksoy, Ahmet; Canbaz, Muhammed Abdullah; Karabiyik, Umit; Gonen, Bilal; Aygun, Ramazan: User characterization for online social networks. In: Social Network Analysis and Mining Bd. 6. Vienna : Springer (2016), Nr. 1, S. 104 \u2014 ISBN 1327801604.","DOI":"10.1007\/s13278-016-0412-3"},{"key":"2025120518170832131_j_icom-2017-0013_ref_035","doi-asserted-by":"crossref","unstructured":"Turk, Austin T.: Terrorism and Counterterrorism. In: Goode, E. (Hrsg.): The Handbook of Deviance. Hoboken, NJ : John Wiley & Sons, Inc, 2015, S. 537\u2013548.","DOI":"10.1002\/9781118701386.ch30"},{"key":"2025120518170832131_j_icom-2017-0013_ref_036","unstructured":"Wegener, Claudia: Inhaltsanalyse. In: Mikos, L.; Wegener, C. (Hrsg.): Qualitative Medienforschung: Ein Handbuch. Konstanz : UVK Verlagsgesellschaft mbH, 2005, S. 200\u2013208."},{"key":"2025120518170832131_j_icom-2017-0013_ref_037","doi-asserted-by":"crossref","unstructured":"Weimann, Gabriel: The Emerging Role of Social Media in the Recruitment of Foreign Fighters. In: de Guttry, A.; Capone, F.; Paulussen, C. (Hrsg.): Foreign Fighters under International Law and Beyond. The Hague : T.M.C. Asser Press, 2016, S. 77\u201395.","DOI":"10.1007\/978-94-6265-099-2_6"},{"key":"2025120518170832131_j_icom-2017-0013_ref_038","doi-asserted-by":"crossref","unstructured":"Weimann, Gabriel; Jost, Jannis: Neuer Terrorismus und Neue Medien. In: Zeitschrift f\u00fcr Au\u00dfen- und Sicherheitspolitik Bd. 8. Wiesbaden : Springer Fachmedien (2015), Nr. 3, S. 369\u2013388.","DOI":"10.1007\/s12399-015-0493-5"},{"key":"2025120518170832131_j_icom-2017-0013_ref_039","unstructured":"Zelin, Aaron Y.: Picture Or It Didn\u2019t Happen: A Snapshot of the Islamic State\u2019s Official Media Output. In: Perspectives on Terrorism Bd. 9 (2015), Nr. 4, S. 85\u201397."}],"container-title":["i-com"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyter.com\/view\/journals\/icom\/16\/2\/article-p181.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2017-0013\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2017-0013\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T18:48:19Z","timestamp":1764960499000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/icom-2017-0013\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,19]]},"references-count":39,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2017,8,10]]},"published-print":{"date-parts":[[2017,8,28]]}},"alternative-id":["10.1515\/icom-2017-0013"],"URL":"https:\/\/doi.org\/10.1515\/icom-2017-0013","relation":{},"ISSN":["2196-6826","1618-162X"],"issn-type":[{"type":"electronic","value":"2196-6826"},{"type":"print","value":"1618-162X"}],"subject":[],"published":{"date-parts":[[2017,7,19]]}}}