Araştırma Makalesi
BibTex RIS Kaynak Göster

Comparative Social Network Analysis of Terrorist Organizations Through Hashtag Activism

Yıl 2022, Sayı: 106, 169 - 197, 26.06.2022
https://doi.org/10.36484/liberal.1025312

Öz

Developments in communication technologies, especially in social media, caused significant changes in the activist approaches of terrorist organizations. While the organizations continued their traditional actions, they carried their de facto activism to the cyber world with hashtag activism.

This study aims to determine what kind of network structure terrorist organizations have, what kind of hashtag activism they create, who are the active individuals in the network and the activism process. In this context, we analyzed Twitter accounts and hashtags of the members and sympathizers of the FETO organization and PKK organization using a social network analysis computer program called NodeXL, and made social network analyzes.

Additionally, hashtag posts were subjected to content analysis to collect supporting data. According to the findings, PKK networks have a more horizontal and intense relationship. Foreign actors are also quite influential within the network, and FETO networks display a more hierarchical, controlled and organized relationship. They also sometimes cooperate in networks, despite having opposing ideological approaches.

Kaynakça

  • Ağcasulu, H. (2018). Sosyal Bilimlerde İlişkileri İnceleyen Bir Yöntem : Sosyal Ağ Analizi A M. Atatürk Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 22(Özel sayı), 1915–1933.
  • Amedie, J. (2015). The Impact of Social Media on Society. Advanced Writing: Pop Culture Intersections. http://scholarcommons.scu.edu/engl_176http://scholarcommons.scu.edu/engl_176/2
  • Armond, P. de. (2001). Netwar In The Emerald City: WHO Protest Strategyand Tactics. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 201–238).
  • Arquilla, John, & Ronfeldt, D. (2001). The Advent of Netwar (Revisited). In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 1–28).
  • Asongu, S. A., Orim, S. M. I., & Nting, R. T. (2019). Terrorism and Social Media: Global Evidence. Journal of Global Information Technology Management, 22(3), 208–228. https://doi.org/10.1080/1097198X.2019.1642023
  • Bandura, A. (1996). Failures in Self-Regulation : Energy Depletion or Selective Disengagement ? Psychological Inquiry, 7(1), 20–24. https://www.jstor.org/stable/1449147
  • Bennett, J. (2014). Behold the Power of #Hashtag Feminism. TİME Magazine. https://time.com/3319081/whyistayed-hashtag-feminism-activism/
  • Beşer, M. (2014). Organize Suç ve Terör Örgütleri ile Mücadelede Önleyici İstihbarat Hizmeti için Matematiksel Yaklaşım. KMÜ Sosyal ve Ekonomı̇k Araştırmalar Dergı̇si, 16(Özel Sayı 1), 206–211.
  • Bozkurt, A. (2013). Sosyal Medyanın “Gezi”deki rolü... Bilişim Dergisi, 156(54), 19–26.
  • Brams, S. J., Mutlu, H., & Ramirez, S. L. (2006). Influence in terrorist networks: From undirected to directed graphs. Studies in Conflict and Terrorism, 29(7), 703–718. https://doi.org/10.1080/10576100600701982
  • Bright, D., Brewer, R., & Morselli, C. (2021). Using social network analysis to study crime: Navigating the challenges of criminal justice records. Social Networks, 66(February), 50–64. https://doi.org/10.1016/j.socnet.2021.01.006
  • Bright, D., Whelan, C., & Harris-Hogan, S. (2020). On the Durability of Terrorist Networks: Revealing the Hidden Connections between Jihadist Cells. Studies in Conflict and Terrorism, 43(7), 638–656. https://doi.org/10.1080/1057610X.2018.1494411
  • Burcher, M., & Whelan, C. (2015). Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries. Global Crime, 16(2), 104–122. https://doi.org/10.1080/17440572.2015.1005363
  • Bürhan, Y., Baykara, M., & Daş, R. (2017). Sosyal Ağ Analizi ve Veri Görselleştirme Araçlarının İncelenmesi ve Uygulamalı Karşılaştırılması. In 2017 International Artificial Intelligence and Data Processing Symposium (IDAP), 1–5.
  • Clauset, A., Moore, C., & Newman, M. E. J. (2008). Hierarchical structure and the prediction of missing links in networks. Nature, 453(7191), 98–101. https://doi.org/10.1038/nature06830
  • Cohen, A. K. (1955). Delinquent Boys: The Culture of The Gang. Free Press.
  • Cohen, A. K., & Short, J. F. (1958). Research in Delinquent Subcultures. Journal of Social Issues, 14(3), 20–37. https://doi.org/10.1111/j.1540-4560.1958.tb01414.x
  • Conway, M. (2002). Reality bytes: Cyberterrorism and terrorist “use” of the internet. First Monday, 7(11), 1–17.
  • Conway, M. (2006). Terrorism and the Internet: New media - New threat? Parliamentary Affairs, 59(2), 283–298. https://doi.org/10.1093/pa/gsl009
  • Danitz, T., & Strobel, W. P. (2001). Networking Dissent Cyber Activists Use The İnternet to Promote Democracy in Burma. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 129–170).
  • Dean, G., Bell, P., & Newman, J. (2012). The Dark Side of Social Media : Review of Online Terrorism. Pakistan Journal of Criminology, 3(4), 191–210. Demir, Y. (2020). Sosyal Medyanın Gündem Belirleyicileri : Twitter ’ da Gündem Belirleme Süreci Üzerine Bir Sosyal Ağ Analizi. İletişim Kuram ve Araştırma Dergisi, 51, 1–19.
  • Denning, D. E. (2001). Activism, Hactivism, And Cyberterrorism: The Internet As A Tool For Influencing Foreign Policy. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 239–288).
  • Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the Dangers of Illicit Networks: Why al-Qaida May Be Less Threatening Than Many Think. International Security, 32(1), 7–44.
  • Eren, Z. (2018). Biçimsel ve Biçimsel Olmayan Örgüt Yapılarının Sosyal Ağ Analizi: Öneri ve Güven Ağları Örneği. Hacettepe University Journal of Education, 34(4), 1121–1142. https://doi.org/10.16986/huje.2018041879
  • Eteman, F. S., Gürsakal, N., & Tüzüntürk, S. (2014). NodeXL ile Sosyal Ağ Analizi : # akademikzam Örneği. 15. Uluslararası Ekonometri, Yöneylem Araştırmaları ve İstatistik Sempozyumu Bildiriler Kitabı, 2016, 464–482.
  • Gençer, M. (2017). Sosyal Ağ Analizi Yöntemlerine Bir Bakış. Yıldız Social Science Review, 3(2), 19–34.
  • Gialampoukidis, I., Kalpakis, G., Tsikrika, T., Vrochidis, S., & Kompatsiaris, I. (2017). Key player identification in terrorism-related social media networks using centrality measures. Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016, i, 112–115. https://doi.org/10.1109/EISIC.2016.029
  • Glasser, S. B., & Coll, S. (2005). e-Qaeda, In a Real War, a Cyber War: The Web as Weapon. Washington Post. https://www.washingtonpost.com/wp-dyn/content/article/2005/08/08/AR2005080801018.html
  • Goodman, S. E., Kirk, J. C., & Kirk, M. H. (2007). Cyberspace as a medium for terrorists. Technological Forecasting and Social Change, 74(2), 193–210. https://doi.org/10.1016/j.techfore.2006.07.007
  • Gülpınar-Demirci, V. (2020). Ağ Bilimi. In V. Gülpınar-Demirci & A. M. Çilingiroğlu (Eds.), Sosyal Ağ Analizi Yöntem ve İşletme Uygulamaları. Ekin Yayınevi.
  • Gürsakal, N. (2009). Sosyal Ağ Analizi. Dora Yayınları.
  • Güzeller, C. O., Eser, M. T., & Aksu, G. (2016). Ucinet ile Sosyal Ağa Analizi. Maya Akademi.
  • Harris-Hogan, S. (2013). Anatomy of a terrorist cell: A study of the network uncovered in Sydney in 2005. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 137–154. https://doi.org/10.1080/19434472.2012.727096
  • Hashemi, M., & Hall, M. (2019). Detecting and classifying online dark visual propaganda. Image and Vision Computing, 89, 95–105. https://doi.org/10.1016/j.imavis.2019.06.001
  • Hossain, M. S. (2015). Social Media and Terrorism. South Asian Survey, 22(2), 136–155. https://doi.org/10.1177/0971523117753280 Kenney, M., Coulthart, S., & Wright, D. (2017). Structure and Performance in a Violent Extremist Network: The Small-world Solution. Journal of Conflict Resolution, 61(10), 2208–2234. https://doi.org/10.1177/0022002716631104
  • Kervankıran, İ., Sert-Eteman, F., & Çuhadar, M. (2018). Türkiye’de İç Turizm Hareketlerinin Sosyal Ağ Analizi İle İncelenmesi. Turizm Akademik Dergisi, 5(1), 29–50.
  • Khomami, N. (2017). #MeToo: how a hashtag became a rallying cry against sexual harassment. The Gardian. https://www.theguardian.com/world/2017/oct/20/women-worldwide-use-hashtag-metoo-against-sexual-harassment
  • Klausen, J. (2015). Tweeting the Jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict and Terrorism, 38(1), 1–22. https://doi.org/10.1080/1057610X.2014.974948
  • Krebs, V. (2002). Mapping networks of terrorist cells. Connections, 24(3), 43–52.
  • Pedahzur, A., & Perliger, A. (2006). The Changing Nature of Suicide Attacks : A Social Network Perspective. Social Forces, 84(4), 1987–2008.
  • Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. PS - Political Science and Politics, 44(1), 45–50. https://doi.org/10.1017/S1049096510001848
  • Ressler, S. (2006). Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research. Homeland Security Affairs, 2(2), 1–10.
  • Ronfeldt, D., & Arquilla, J. (2001a). Emergence And Influence Of The Zapatista Social Netwar. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 171–200).
  • Ronfeldt, D., & Arquilla, J. (2001b). Networks, Netwars, and the Fight for the Future. First Monday, 6(10). https://firstmonday.org/ojs/index.php/fm/article/download/889/798?inline=1
  • Ronfeldt, D., & Arquilla, J. (2001c). What Next For Networks And Netwars? In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 311–362).
  • Sageman, M. (2008). Explaining Terror Networks in the 21st Century. Footnotes, 36(5). https://www.asanet.org/sites/default/files/savvy/footnotes/mayjun08/terror.html
  • Schwartz, D. M., & Rouselle, T. D. A. (2009). Using social network analysis to target criminal networks. Trends in Organized Crime, 12(2), 188–207. https://doi.org/10.1007/s12117-008-9046-9
  • Sevgi, H. (2018). Sosyal Medya ve Sendi̇kalar : Almanya, Fransa, Hollanda, Polonya ve Türkiye Örneği Üzerine Bir Sosyal Ağ Analizi Araştırması. Uludağ Üniversitesi.
  • Sullivan, J. P. (2001). Gangs, Hooligans, And Anachists-The Vanguard of Netwar in The Streets. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 99–128).
  • Sykes, G. M., & Matza, D. (1957). Techniques of Neutralization : A Theory of Delinquency. American Sociological Review, 22(6), 664–670. Tunalı, V. (2016). Sosyal Ağ Analizine Giriş. Nobel Yayınevi.
  • Weimann, G. (2006). Terror on the Internet: The New Arena, the New Challenges. Https://Www.Researchgate.Net/Publication/238077713%0ATerror. https://doi.org/10.1002/j.1538-165x.2007.tb01599.x
  • Weimann, G. (2008). The psychology of mass-mediated terrorism. American Behavioral Scientist, 52(1), 69–86. https://doi.org/10.1177/0002764208321342
  • Williams, P. (2001). Transnational Criminal Networks. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 61–98).
  • Wonneberger, A., Hellsten, I. R., & Jacobs, S. H. J. (2021). Hashtag activism and the configuration of counterpublics: Dutch animal welfare debates on Twitter. Information Communication and Society, 24(12), 1694–1711. https://doi.org/10.1080/1369118X.2020.1720770
  • Yıldırım, A., & Şimşek, H. (2013). Sosyal Bilimlerde Nitel Araştırma Yöntemleri. Seçkin Yayınları.
  • Zanini, M., & Edwards, S. J. A. (2001). The Net Working of Terror in the Information Age. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 29–60).

Terör Örgütlerinin Hashtag Aktivizmi Üzerinden Karşılaştırmalı Sosyal Ağ Analizi

Yıl 2022, Sayı: 106, 169 - 197, 26.06.2022
https://doi.org/10.36484/liberal.1025312

Öz

Sosyal medya başta olmak üzere iletişim teknolojilerinde yaşanan gelişmeler terör örgütlerinin aktivist yaklaşımlarında önemli değişikliklere neden olmuştur. Örgütler geleneksel eylemlerini sürdürüyor olsalar da asıl eylemselliklerini hashtag aktivizmi ile siber dünyaya taşımış durumdadırlar.

Bu çalışmada terör örgütlerinin nasıl bir ağ yapısına sahip olduğu, nasıl bir hashtag aktivizmi oluşturdukları, ağ içindeki etkin bireylerin kimler olduğu ve aktivizmin oluşma sürecinin belirlenmesi amaçlanmıştır. Bu kapsamda NodeXL adlı bir sosyal ağ analizi bilgisayar programı kullanılarak FETÖ örgütü ile PKK örgütü üyeleri ve sempatizanlarına ait Twitter hesapları ve hesaplardan açılan hashtaglar incelenmiş ve sosyal ağ analizleri yapılmıştır.

Ayrıca destekleyici veri toplama adına hashtag paylaşımları içerik analizlerine tabi tutulmuştur. PKK ağlarının daha yatay ve yoğun ilişki içinde olduğu, ağ içinde yabancı aktörlerin de oldukça etkili olduğu, FETÖ ağlarının daha hiyerarşik, kontrollü ve organize bir ilişki sergilediği konusunda bulgular elde edilmiştir. Ayrıca, zıt ideolojik yapılara sahip olmalarına rağmen zaman zaman ağlarda işbirliği yaptıklarına yönelik verilere rastlanmıştır.

Kaynakça

  • Ağcasulu, H. (2018). Sosyal Bilimlerde İlişkileri İnceleyen Bir Yöntem : Sosyal Ağ Analizi A M. Atatürk Üniversitesi Sosyal Bilimler Enstitüsü Dergisi, 22(Özel sayı), 1915–1933.
  • Amedie, J. (2015). The Impact of Social Media on Society. Advanced Writing: Pop Culture Intersections. http://scholarcommons.scu.edu/engl_176http://scholarcommons.scu.edu/engl_176/2
  • Armond, P. de. (2001). Netwar In The Emerald City: WHO Protest Strategyand Tactics. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 201–238).
  • Arquilla, John, & Ronfeldt, D. (2001). The Advent of Netwar (Revisited). In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 1–28).
  • Asongu, S. A., Orim, S. M. I., & Nting, R. T. (2019). Terrorism and Social Media: Global Evidence. Journal of Global Information Technology Management, 22(3), 208–228. https://doi.org/10.1080/1097198X.2019.1642023
  • Bandura, A. (1996). Failures in Self-Regulation : Energy Depletion or Selective Disengagement ? Psychological Inquiry, 7(1), 20–24. https://www.jstor.org/stable/1449147
  • Bennett, J. (2014). Behold the Power of #Hashtag Feminism. TİME Magazine. https://time.com/3319081/whyistayed-hashtag-feminism-activism/
  • Beşer, M. (2014). Organize Suç ve Terör Örgütleri ile Mücadelede Önleyici İstihbarat Hizmeti için Matematiksel Yaklaşım. KMÜ Sosyal ve Ekonomı̇k Araştırmalar Dergı̇si, 16(Özel Sayı 1), 206–211.
  • Bozkurt, A. (2013). Sosyal Medyanın “Gezi”deki rolü... Bilişim Dergisi, 156(54), 19–26.
  • Brams, S. J., Mutlu, H., & Ramirez, S. L. (2006). Influence in terrorist networks: From undirected to directed graphs. Studies in Conflict and Terrorism, 29(7), 703–718. https://doi.org/10.1080/10576100600701982
  • Bright, D., Brewer, R., & Morselli, C. (2021). Using social network analysis to study crime: Navigating the challenges of criminal justice records. Social Networks, 66(February), 50–64. https://doi.org/10.1016/j.socnet.2021.01.006
  • Bright, D., Whelan, C., & Harris-Hogan, S. (2020). On the Durability of Terrorist Networks: Revealing the Hidden Connections between Jihadist Cells. Studies in Conflict and Terrorism, 43(7), 638–656. https://doi.org/10.1080/1057610X.2018.1494411
  • Burcher, M., & Whelan, C. (2015). Social network analysis and small group ‘dark’ networks: an analysis of the London bombers and the problem of ‘fuzzy’ boundaries. Global Crime, 16(2), 104–122. https://doi.org/10.1080/17440572.2015.1005363
  • Bürhan, Y., Baykara, M., & Daş, R. (2017). Sosyal Ağ Analizi ve Veri Görselleştirme Araçlarının İncelenmesi ve Uygulamalı Karşılaştırılması. In 2017 International Artificial Intelligence and Data Processing Symposium (IDAP), 1–5.
  • Clauset, A., Moore, C., & Newman, M. E. J. (2008). Hierarchical structure and the prediction of missing links in networks. Nature, 453(7191), 98–101. https://doi.org/10.1038/nature06830
  • Cohen, A. K. (1955). Delinquent Boys: The Culture of The Gang. Free Press.
  • Cohen, A. K., & Short, J. F. (1958). Research in Delinquent Subcultures. Journal of Social Issues, 14(3), 20–37. https://doi.org/10.1111/j.1540-4560.1958.tb01414.x
  • Conway, M. (2002). Reality bytes: Cyberterrorism and terrorist “use” of the internet. First Monday, 7(11), 1–17.
  • Conway, M. (2006). Terrorism and the Internet: New media - New threat? Parliamentary Affairs, 59(2), 283–298. https://doi.org/10.1093/pa/gsl009
  • Danitz, T., & Strobel, W. P. (2001). Networking Dissent Cyber Activists Use The İnternet to Promote Democracy in Burma. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 129–170).
  • Dean, G., Bell, P., & Newman, J. (2012). The Dark Side of Social Media : Review of Online Terrorism. Pakistan Journal of Criminology, 3(4), 191–210. Demir, Y. (2020). Sosyal Medyanın Gündem Belirleyicileri : Twitter ’ da Gündem Belirleme Süreci Üzerine Bir Sosyal Ağ Analizi. İletişim Kuram ve Araştırma Dergisi, 51, 1–19.
  • Denning, D. E. (2001). Activism, Hactivism, And Cyberterrorism: The Internet As A Tool For Influencing Foreign Policy. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 239–288).
  • Eilstrup-Sangiovanni, M., & Jones, C. (2008). Assessing the Dangers of Illicit Networks: Why al-Qaida May Be Less Threatening Than Many Think. International Security, 32(1), 7–44.
  • Eren, Z. (2018). Biçimsel ve Biçimsel Olmayan Örgüt Yapılarının Sosyal Ağ Analizi: Öneri ve Güven Ağları Örneği. Hacettepe University Journal of Education, 34(4), 1121–1142. https://doi.org/10.16986/huje.2018041879
  • Eteman, F. S., Gürsakal, N., & Tüzüntürk, S. (2014). NodeXL ile Sosyal Ağ Analizi : # akademikzam Örneği. 15. Uluslararası Ekonometri, Yöneylem Araştırmaları ve İstatistik Sempozyumu Bildiriler Kitabı, 2016, 464–482.
  • Gençer, M. (2017). Sosyal Ağ Analizi Yöntemlerine Bir Bakış. Yıldız Social Science Review, 3(2), 19–34.
  • Gialampoukidis, I., Kalpakis, G., Tsikrika, T., Vrochidis, S., & Kompatsiaris, I. (2017). Key player identification in terrorism-related social media networks using centrality measures. Proceedings - 2016 European Intelligence and Security Informatics Conference, EISIC 2016, i, 112–115. https://doi.org/10.1109/EISIC.2016.029
  • Glasser, S. B., & Coll, S. (2005). e-Qaeda, In a Real War, a Cyber War: The Web as Weapon. Washington Post. https://www.washingtonpost.com/wp-dyn/content/article/2005/08/08/AR2005080801018.html
  • Goodman, S. E., Kirk, J. C., & Kirk, M. H. (2007). Cyberspace as a medium for terrorists. Technological Forecasting and Social Change, 74(2), 193–210. https://doi.org/10.1016/j.techfore.2006.07.007
  • Gülpınar-Demirci, V. (2020). Ağ Bilimi. In V. Gülpınar-Demirci & A. M. Çilingiroğlu (Eds.), Sosyal Ağ Analizi Yöntem ve İşletme Uygulamaları. Ekin Yayınevi.
  • Gürsakal, N. (2009). Sosyal Ağ Analizi. Dora Yayınları.
  • Güzeller, C. O., Eser, M. T., & Aksu, G. (2016). Ucinet ile Sosyal Ağa Analizi. Maya Akademi.
  • Harris-Hogan, S. (2013). Anatomy of a terrorist cell: A study of the network uncovered in Sydney in 2005. Behavioral Sciences of Terrorism and Political Aggression, 5(2), 137–154. https://doi.org/10.1080/19434472.2012.727096
  • Hashemi, M., & Hall, M. (2019). Detecting and classifying online dark visual propaganda. Image and Vision Computing, 89, 95–105. https://doi.org/10.1016/j.imavis.2019.06.001
  • Hossain, M. S. (2015). Social Media and Terrorism. South Asian Survey, 22(2), 136–155. https://doi.org/10.1177/0971523117753280 Kenney, M., Coulthart, S., & Wright, D. (2017). Structure and Performance in a Violent Extremist Network: The Small-world Solution. Journal of Conflict Resolution, 61(10), 2208–2234. https://doi.org/10.1177/0022002716631104
  • Kervankıran, İ., Sert-Eteman, F., & Çuhadar, M. (2018). Türkiye’de İç Turizm Hareketlerinin Sosyal Ağ Analizi İle İncelenmesi. Turizm Akademik Dergisi, 5(1), 29–50.
  • Khomami, N. (2017). #MeToo: how a hashtag became a rallying cry against sexual harassment. The Gardian. https://www.theguardian.com/world/2017/oct/20/women-worldwide-use-hashtag-metoo-against-sexual-harassment
  • Klausen, J. (2015). Tweeting the Jihad: Social media networks of Western foreign fighters in Syria and Iraq. Studies in Conflict and Terrorism, 38(1), 1–22. https://doi.org/10.1080/1057610X.2014.974948
  • Krebs, V. (2002). Mapping networks of terrorist cells. Connections, 24(3), 43–52.
  • Pedahzur, A., & Perliger, A. (2006). The Changing Nature of Suicide Attacks : A Social Network Perspective. Social Forces, 84(4), 1987–2008.
  • Perliger, A., & Pedahzur, A. (2011). Social network analysis in the study of terrorism and political violence. PS - Political Science and Politics, 44(1), 45–50. https://doi.org/10.1017/S1049096510001848
  • Ressler, S. (2006). Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research. Homeland Security Affairs, 2(2), 1–10.
  • Ronfeldt, D., & Arquilla, J. (2001a). Emergence And Influence Of The Zapatista Social Netwar. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 171–200).
  • Ronfeldt, D., & Arquilla, J. (2001b). Networks, Netwars, and the Fight for the Future. First Monday, 6(10). https://firstmonday.org/ojs/index.php/fm/article/download/889/798?inline=1
  • Ronfeldt, D., & Arquilla, J. (2001c). What Next For Networks And Netwars? In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 311–362).
  • Sageman, M. (2008). Explaining Terror Networks in the 21st Century. Footnotes, 36(5). https://www.asanet.org/sites/default/files/savvy/footnotes/mayjun08/terror.html
  • Schwartz, D. M., & Rouselle, T. D. A. (2009). Using social network analysis to target criminal networks. Trends in Organized Crime, 12(2), 188–207. https://doi.org/10.1007/s12117-008-9046-9
  • Sevgi, H. (2018). Sosyal Medya ve Sendi̇kalar : Almanya, Fransa, Hollanda, Polonya ve Türkiye Örneği Üzerine Bir Sosyal Ağ Analizi Araştırması. Uludağ Üniversitesi.
  • Sullivan, J. P. (2001). Gangs, Hooligans, And Anachists-The Vanguard of Netwar in The Streets. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 99–128).
  • Sykes, G. M., & Matza, D. (1957). Techniques of Neutralization : A Theory of Delinquency. American Sociological Review, 22(6), 664–670. Tunalı, V. (2016). Sosyal Ağ Analizine Giriş. Nobel Yayınevi.
  • Weimann, G. (2006). Terror on the Internet: The New Arena, the New Challenges. Https://Www.Researchgate.Net/Publication/238077713%0ATerror. https://doi.org/10.1002/j.1538-165x.2007.tb01599.x
  • Weimann, G. (2008). The psychology of mass-mediated terrorism. American Behavioral Scientist, 52(1), 69–86. https://doi.org/10.1177/0002764208321342
  • Williams, P. (2001). Transnational Criminal Networks. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 61–98).
  • Wonneberger, A., Hellsten, I. R., & Jacobs, S. H. J. (2021). Hashtag activism and the configuration of counterpublics: Dutch animal welfare debates on Twitter. Information Communication and Society, 24(12), 1694–1711. https://doi.org/10.1080/1369118X.2020.1720770
  • Yıldırım, A., & Şimşek, H. (2013). Sosyal Bilimlerde Nitel Araştırma Yöntemleri. Seçkin Yayınları.
  • Zanini, M., & Edwards, S. J. A. (2001). The Net Working of Terror in the Information Age. In Jahn Arquilla & D. Rnnfeldt (Eds.), Networks And Netwars : The Future of Terror, Crime, And Militancy (pp. 29–60).
Toplam 56 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Bölüm Araştırma
Yazarlar

Mehmet Seyman Önder 0000-0003-4317-1099

Erken Görünüm Tarihi 25 Ekim 2022
Yayımlanma Tarihi 26 Haziran 2022
Gönderilme Tarihi 18 Kasım 2021
Yayımlandığı Sayı Yıl 2022 Sayı: 106

Kaynak Göster

APA Önder, M. S. (2022). Terör Örgütlerinin Hashtag Aktivizmi Üzerinden Karşılaştırmalı Sosyal Ağ Analizi. Liberal Düşünce Dergisi(106), 169-197. https://doi.org/10.36484/liberal.1025312