Results 21 to 30 of about 10,893,891 (340)

Review of “Twitter and Jihad: The Communication Strategy of ISIS” edited by Monica Maggioni and Paolo Magri [PDF]

open access: yesCyberspace Studies, 2018
Twitter and Jihad: The Communication Strategy of ISIS edited by Monica Maggioni & Paolo Magri. Milan, Italy: ISPI, 2015.
Farzad Salimifar
doaj   +1 more source

Drone imagery in Islamic State propaganda: flying like a state

open access: yesInternational Affairs, 2020
This article provides a comprehensive analysis of the Islamic State's use of images taken by drones, drawing on a dataset of ISIS propaganda images from October 2016 to December 2018.
Emil Archambault   +1 more
semanticscholar   +1 more source

The End of the Sahelian Exception: Al-Qaeda and Islamic State Clash in Central Mali

open access: yesThe International Spectator: Italian Journal of International Affairs, 2020
Until the beginning of 2020, the Sahel was something of an exception with respect to international rivalry between jihadists. This came to an end when violent clashes involving supporters of Al-Qaeda and those affiliated with the Islamic State were ...
Edoardo Baldaro, Yida Diall
semanticscholar   +1 more source

TRANSFORMATION - THE STATE ISLAMIC INSTITUTE BECOMES A STATE ISLAMIC UNIVERSITY [PDF]

open access: yesSocial Sciences and Education Research Review, 2021
This study aims to describe simply the strengthening of the concept of religious moderation and harmonization of knowledge as an effort to prevent radicalism at IAIN Pekalongan.
M. Sugeng SHOLEHUDDIN   +5 more
doaj   +1 more source

THE THREATS ANALYSIS OF THE ISLAMIC STATE NETWORK DEVELOPMENT IN SOUTHEAST ASIA REGION : Case Study of the Border of Indonesia, Malaysia, Thailand and the Philippines [PDF]

open access: yesJournal of Defense Resources Management, 2020
Development of Islam in Southeast Asia in the beginning comes from Gujarat Arab and Persia in a peaceful way; it never uses violence or war. Harry J.Benda states that Indianized Southeast Asia area, namely Indonesia and Malaysia frequently called as ...
Tri LEGIONOSUKO   +4 more
doaj  

Przemoc seksualna jako broń w konfliktach zbrojnych na przykładzie działań Państwa Islamskiego wobec Jazydek [PDF]

open access: yesNowa Polityka Wschodnia, 2020
The dissertation consists of the analysis of the criminal activity of the „Islamic State” toward Yazidis women. Religious and political reasons for the crimes committed on this religious minority will be presented.
Paula Tomaszewska, Sara Tomaszewska
doaj   +1 more source

Not Yet Dead: The Establishment and Regulation of Slavery by the Islamic State

open access: yesStudies in Conflict and Terrorism, 2020
The Islamic State is an organization at the nexus of modern slavery and terrorism. This article provides the first in-depth analysis of how it regulated slavery.
Nadia Al-Dayel, Andrew Mumford, K. Bales
semanticscholar   +1 more source

The terrorist threat forecast in 2021

open access: yesRevista UNISCI, 2021
The pandemic year 2021 is likely to witness an overall decline in global terrorism. While the threat grew in conflict zones, it diminished off-the-battlefields. However, threat groups worldwide are expanding in cyber space during the pandemic.
Liu Chunlin , Rohan Gunaratna
doaj   +1 more source

The Future of the Islamic State's Women: Assessing Their Potential Threat

open access: yesTerrorism and Counter-Terrorism Studies, 2020
All former Islamic State members pose a unique threat or lack thereof based on their individual circumstances, but female members of the Islamic State seem to generate a particularly polarized response.
Jessica Davis
semanticscholar   +1 more source

The Taliban factor in the political life of Afghanistan

open access: yesСовременная наука и инновации, 2023
The article is devoted to the analysis of the events that followed in Afghanistan after the withdrawal of US troops. The relevance of such studies is due to critical events related to the establishment of diplomatic bridges between Moscow and Kabul.
A. К. Botasheva, M. M. Abazalieva
doaj   +1 more source

Home - About - Disclaimer - Privacy