(2) Sapto Priyanto
*corresponding author
AbstractPenelitian ini bertujuan untuk memberikan penjelasan komprehensif tentang bagaimana pola rekrutmen kelompok teroris MAT Indonesia melalui media sosial, antara lain; 1. Mendeskripsikan dan menganalisis metode perekrutan kelompok teror Muhajirin At-Tauhid (MAT) melalui media sosial. 2. Menganalisis penyebab media sosial dapat mendorong aksi terorisme Muhajirin At-Tauhid (MAT) di Indonesia. Penelitian ini menggunakan pendekatan kualitatif dengan pilihan narasumber secara purposive sampling. Penelitian menjelaskan bahwa kelompok teror MAT dalam melakukan perekrutan adalah sebagai berikut ; 1. Mengamati obrolan akun yang mengarah ke pemahaman ISIS, 2. Mulai menyebarkan konsep dakwah daulah islamiyah dan konsep jihad, 3. selanjutnya menawarkan dan mengukur kesediaan untuk bersedia bergabung  dengan MAT dengan sudah dijelaskan visi dan misi MAT, 4. kemudian selanjutnya ditawarkan untuk melakukan mubahalah dalam memberikan ukuran kesungguhan dari jamaah atau anggota baru, 5. kemudian anggota baru yang telah bermubahalah mendapatkan hak akses untuk bergabung di dalam grup dan mengikuti syura atau diskusi perencanaan dalam melakukan amaliyah dan tamkin.
 Keywordsperekrutan, terorisme, media sosial
|
DOIhttps://doi.org/10.31604/jips.v8i7.2021.2247-2262 |
Article metrics10.31604/jips.v8i7.2021.2247-2262 Abstract views : 0 | PDF views : 0 |
Cite |
Full Text Download
|
References
Arianti, V., & Singh, J. (2015). ISIS’Southeast Asia Unit: Raising the Security Threat. RSIS Commentary CO, 15220.
Awan, I. (2017). Cyber-extremism: Isis and the power of social media. Society, 54(2), 138-149.
Basri, H. (2014). Using qualitative research in accounting and management studies: not a new agenda. Journal of US-China Public Administration, 11(10), 831-838.
Berger, J. M. (2015). Tailored online interventions: The islamic state’s recruitment strategy. CTC Sentinel, 8(10), 19-23.
Berger, J. M., & Morgan, J. (2015). The ISIS Twitter Census: Defining and describing the population of ISIS supporters on Twitter.Conway, M. (2003). Cyberterrorism: the story so far. Journal of Information Warfare, 2(2), 33-42.
Crenshaw, M. (2004). The psychology of political terrorism (pp. 411-431). Psychology Press.
Denning, D. E. (2010). Terror’s web: how the internet is transforming terrorism. Handbook of internet crime, 194-213.
Ehrenfeld, R. (2002, March). Funding Terrorism: sources and methods. In Workshop held at Los Alamos National Laboratory March (Vol. 25, No. 29, p. 391).
FlorCruz, Michelle. (2014). Philippine Terror Group Abu Sayyaf May Be Using ISIS Link For Own Agenda. https://www.ibtimes.com/preventing-inversions-would-save-05-us-corporate-tax-revenue-1695163. Diakses 20 Mei 2021
Golose, P. R. (2015). Invasi terorisme ke cyberspace. Yayasan Pengembangan Kajian Ilmu Kepolisian.
Harrison, B. (1965). Southeast Asia: Its Historical Development. By John F. Cady. McGraw-Hill, Inc., New York, 1964. Pp. xiii, 657. Maps, Bibliography, Index. US $10.75. Journal of Southeast Asian History, 6(2), 140-143.
Helleiner, G. K. (1978). US power and the multinational corporation: The political economy of foreign direct investment: Robert Gilpin,(Basic Books, New York, 1975) pp. xii+ 291, $10.95. Journal of Development Economics, 5(2), 212-214.
Hidayat, D. N. (2003). Paradigma dan metodologi penelitian sosial empirik klasik. Jakarta: Departemen Ilmu Komunikasi FISIP Universitas Indonesia.
Jordan, J. (2009). When heads roll: Assessing the effectiveness of leadership decapitation. Security Studies, 18(4), 719-755.
McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and political violence, 20(3), 415-433.
McCusker, K., & Gunaydin, S. (2015). Research using qualitative, quantitative or mixed methods and choice based on the research. Perfusion, 30(7), 537-542.
Mohamed, Z. M., Majid, A. H. A., & Ahmad, N. (Eds.). (2010). Qualitative Research in Accounting: Malaysian Cases. Penerbit Universiti Kebangsaan Malaysia.
Moir, N. L. (2017). ISIL radicalization, recruitment, and social media operations in Indonesia, Malaysia, and the Philippines. PRISM, 7(1), 90-107.
Denzin, N. K., & Lincoln, Y. S. (Eds.). (2011). The Sage handbook of qualitative research. sage.
Golose, P. R. (2008). Seputar Kejahatan Hacking: Teori dan Studi Kasus. Yayasan Pengembangan Kajian Ilmu Kepolisian.
Horgan, J., Bloom, M., Daymon, C., Kaczkowski, W., & Tiflati, H. (2017). A new age of terror? Older fighters in the caliphate. CTC Sentinel, 10(5), 13-19.
Oots, K. L. (1989). Organizational perspectives on the formation and disintegration of terrorist groups. Studies in Conflict & Terrorism, 12(3), 139-152.
Kohlmann, E. F. (2006). The real online terrorist threat. Foreign Affairs, 115-124.
Lestari, Sri. (2014). Dukungan bagi ISIS 'mengkhawatirkan'. https://www.bbc.com/indonesia/berita_indonesia/2014/07/140724_isis_indonesia. Diakses 20 Mei 2021
Sofaer, S. (1999). Qualitative methods: what are they and why use them?. Health services research, 34(5 Pt 2), 1101.
Silke, A. (Ed.). (2018). Routledge Handbook of Terrorism and Counterterrorism. Routledge.
Sims, Alexandra. (2016). From 'blood type' to 'special skills': The 23 questions asked to prospective jihadis upon entrance into 'Islamic State'. https://www.independent.co.uk/news/world/middle-east/blood-type-special-skills-blood-type-special-skills-23-questions-asked-prospective-jihads-upon-entrance-isis-a6921881.html. Diakses 22 Mei 2021
Refbacks
- There are currently no refbacks.






Download