نوع مقاله : مقالات

نویسندگان

دانشکده روابط بین الملل وزارت امور خارجه

چکیده

داعش به‌عنوان مظهر تروریسم پسامدرن در عصر جهانی‌شدن از بدو پیدایش خود تلاش داشته تا از ابزارهای جهانی‌شدن نظیر فضای مجازی، به‌ویژه تارنمای خلافت بوک استفاده کند. این در حالی است که داعش به‌عنوان هویت مقاومت‌گرای غیراصیل و پیشامدرن از نظر فکری و عقیدتی خواستار تقابل با مدرنیتۀ غربی و درصد تقابل فکری با شالوده‌های ایدئولوژیک جهانی‌شدن است ولی از نظر عملکردی از ابزارهای جهانی‌شدن به‌ویژه ابزارهای ارتباطی و فضای مجازی برای عضوگیری، شکل‌دهی به شبکۀ سلول‌های تروریستی و گسترش خود براساس فرایند جهانی‌سازی هراس بهره می‌گیرد. به‌عبارت‌دیگر، جهانی‌شدن برای داعش دارای طریقت و نه مطلوبیت است. داعش به‌وسیلۀ طیفی از روش‌های تبلیغاتی پیچیده در بستر فضای مجازی برای جذب جوانان به این گروه تروریستی که خود را وفاداران به خلافت می‌نامند، منتشر می‌گردد. شبکه‌های اجتماعی اکنون به جزء جدایی‌ناپذیر از تلاش داعش برای پیشبرد اهداف نامشروع خود تبدیل شده است. در حال حاضر داعش با استفاده از رسانه‌های اجتماعی در حال گسترش جنگ به فراسوی مرزهای تحت کنترل خود است. داعش نه‌تنها به جذب نیرو اقدام می‌کند، بلکه به فرماندهی عملیات‌های تروریستی در کشورهای دیگر نیز از طریق فضای مجازی مبادرت می‌ورزد. این مقاله درصدد آن است که ضمن بررسی تقابل فکری و نظری داعش با پدیدۀ جهانی‌شدن، چگونگی بهره‌گیری این گروه تروریستی را از ابزارهای ارتباطی این پدیده واکاوی نماید.

کلیدواژه‌ها

References
A group of thinkers. (2012). Just peace, solution to confront terrorism (Proceedings of international conference against terrorism for the just peace), Tehran: Global convention of Islamic peace, First edition. (in Persian)
A group of thinkers. (2012). Terrorism, culture and media (Proceedings of international conference against terrorism for the just peace), Tehran: Global convention of Islamic peace, First edition. (in Persian)
A group of thinkers. (Eds.) (2012). Terrorism, concegtology and theoretical foundations (Proceedings of international conference against terrorism for the just peace), Tehran: Global convention of Islamic peace, First edition. (in Persian)
Adityaraj, A. (2014). Global: zation and the origion of New Terroism: perspectives and challenges. International Political Science Association’s Conference, July.
Ahmadvand, S., & Mokhtari, M. (2015). Critical review of approaches explaining the terrorism (Case study: ISIS). Proceedings of global congress of extremist and Takfiri movement from the viewpoint of Islamic scholars (8 volumes), 8, Qom, Dar-al-Am Lel-Madrasah Alhol Bait, First edition. (in Persian)
Akbari, H. (2012). The reasons of growth of terrorism in the last half century and solutions to confront it. Terrorism, concegtology and theoretical foundations (Proceedings of international conference against terrorism for the just peace), Tehran, Global convention of Islamic peace, First edition. (in Persian)
Ali, M. R. (2015). ISIS and Propaganda: How ISIS Exploits Women. Reuters Institute for the Study of Journalism (University of Qxford).
Al-Qarawee, H. H. (2015). The Discourse of ISIS: Messages, Propaganda and Indoctrination. Twitter and Jihad: the Communication Strategy of ISIS, The Italian Institute for International Political Studies (ISPI), First Edition, Milan.
Araghchi, S. A.; Dehshiri, M. R., & Jozani Kohan, SH. (2016). Terrorism and Cyberspace in the Middle East(A Case Study of Daesh(ISIS)), Karaj, Payetakht (colleague publisher: shani), First Published. (In Persian).
Araghchi, S. A., & Jozani Kohan, SH. (2017). ISIS’s Use of Cyberspace, Quarterly of Foreign Relations, 9(1), Spring. (in Persian)
Arnaboldi, M., & Vindino, L. (2015). The Caliphate, Social Media and Swarms in Europe: The Appeal of the IS Propaganda to‘Would Be’ European Jihadists. Twitter and Jihadi the Communicaton Strategy of ISIS, The Italian Institute for International Political Studies (ISPI), First Edition, Milan.
Barrett, R., et al. (2012). The Use of the Internet for Terrorist Purposes, United Nations Office on Drugs and Crime (UNODC) In Collaborating With the United Nations Counter- Terrorism Implementation Task Force, New York.
Bell, D. (2007). Cyberculture Theorists (Manuel Castells and Donna Haraway), Routledge Critical Thinkers, First Published, New York.
Bloom, R. W. (2010). Fear of Flying (Globalization, Security, and Terrorism),TR News:Globalization and transportation (Changing the World), July-August.
Castells, M. (2001). Information age: economy, society and culture (identity power) (3 volumes). 3, Hassan Chavoshian, Tarhe No, First edition. (in Persian)
Castells, M. (2011). A Network Theory of Power, International Journal of Communication, 5(5),Winter.
Cocker, C. (2002). Globalization and Terrorism. London School of Economics and Political Science, 10 June.
Daneshyar, A. (2015). Pathology of Takfiri movements and solutions to confront them form the viewpoint of the supreme leader. Proceedings of global congress of extremist and Takfiri movement from the viewpoint of Islamic scholars (8 volumes), 7, Qom, Dar-al-Am Lel-Madrasah Alhol Bait, First edition. (in Persian)
Dehshiri, M. R. (2012). The Concegtology of cultural terrorism. Terrorism, culture and media (Proceedings of international conference against terrorism for the just peace), Tehran: Global convention of Islamic peace, First edition. (in Persian).
Dehshiri, M. R., & Jozani Kohan, SH. (2016). ISIL Terrorist Cells’ Network in Central Asia, Central Asia And The Caucasus Studies, 21(4), Winter. (in Persian).
Dehshiri, M. R.; Jozani Kohan, SH., & Jozani Kohan, SH. (2018). Takfiri and extremist identities and their impact on the regional security of West Asia, Abstracts of 2nd Tehran security Conference. Regional Security in the West Asia; Emerging Challenges and Trends, Tehran, Abrare-Moaser-e-Tehran International Studies and Research Institute, First Published. (in Persian) Ebrahim Nezhad Shelmani, M., & Eskandari, H. (2012). Familiarity with the soft cyber war. Tehran, Research institute of strategic studies, Second edition. (in Persian)
Ebrahim Nezhad, M., & Farmanian, M. (2015). ISIS (critical investigation of history and thoughts). Qom, Dar-al-Am Lel-Madrasah Alhol Bait, Second edition. (in Persian)
Ebrahimi, N. (2013). Neo-Salafism and globalization of security of middle east. Tehran, Research institute of strategic studies, Second edition. (in Persian)
Esmaeili, H. (2012). Investigating the theoretical context and roots of terrorism in Iran. Set of papers about terrorism in contemporary Iran (Case study: After Islamic revolution), Tehran: Institute of studies and political researches. (in Persian)
Esmaeili, H. (Eds.) (2012). Set of papers about terrorism in contemporary Iran (Case study: After Islamic revolution). Tehran: Institute of studies and political researches. (in Persian)
Farmanian, M. (Eds.) (2015). Proceedings of global congress of extremist and Takfiri movement from the viewpoint of Islamic scholars (8 volumes), 8, Qom, Dar-al-Am Lel-Madrasah Alhol Bait, First edition. (in Persian)
Fernandez, A. M. (2015). Here to Stay and Growing: Combating ISIS Propaganda Networks (The Brookings Project on U.S Relation with the Islamic World, U.S.- Islamic World Forum Paper 2015). Center for Middle East Policy at Brookings (Washington D.C), October.
Fidler, D. P. (2015). Countering Islamic State Exploitation of the Internet. The Council on Foreign Relations (CFR), June.
Ghassemi Aliabadi, A. (2016). The deputy of media diplomacy of the foreign ministry, interview by Shahin Jozani Kohan. The method of media explication of ISIS, Interview place: The administration of information and press (media diplomacy), Foreign ministry, 16 February. (in Persian)
Giffin, A. (2015). Khelafa Book: ISIS Sapport Create Own Social Network But Site Quickly Backles. 9 March, http://www.independent.Co.Uk/ Life-style- gadgets- and- tech/news/ Khelafabook- isis- supporters- create- bans- 10095947. html (accessed on 2 February 2016).
Gohari Moghaddam, A. (2012a). Ideology based terrorism: a framework for analysis, Set of papers about terrorism in contemporary Iran (Case study: After Islamic revolution), Tehran: Institute of studies and political researches. (in Persian)
Gohari Moghaddam, A. (2012b). Globalization and new terrorism proposing a conceptual model, Political knowledge, 7(1), Spring and summer. (in Persian)
Green, K. J. (2015). ISIS: Tends in Terrorist Media and Propaganda. Centennial Library Cedarville University, April.
Gupta, A. (2015). Activist Hackers Vs ISIS: Battling The Prorerbial Frankenstein Monster In Cyberspace. Center for Air, Power Studies (CAPS) Foum for National Security Studies (FNSS), 4 December.
Hoffman, A., & Schweitzer, Y. (2015). Cyber Jihad in the Service of the Islamic State (ISIS), Strategic Assessment.
Homegrown Islamic Extremism in 2014: The Rise of ISIS & Sustained Online Recruitment, Anti- Defamation League (ADL), April 2015; See at:
Husick, L. A. (2014). The Islamic State’s Electronic Outreach. Foreign Policy Research Institute, September.
Jahani, M. (2015). Strategies to tackle the soft threats resulting from the Salafi Takfiri movements in the Islamic world. Proceedings of global congress of extremist and Takfiri movement from the viewpoint of Islamic scholars (8 volumes), 7, Qom, Dar-al-Am Lel-Madrasah Alhol Bait, First edition. (in Persian)
Kazeran, A. (2015). Takfirism psychological reasons of Takfirism,. Proceedings of global congress of extremist and Takfiri movement from the viewpoint of Islamic scholars (8 volumes), 8. Qom, Dar-al-Am Lel-Madrasah Alhol Bait, First edition. (in Persian)
Keck, M., & Sikkink, K. (2012). Transnational advocacy networks in the international politics, Translated by Alireza Tayeb, Rasekhoon, 13 November.
http://www.rasekhoon.net/artcile/print 645488/%D8%D8%D (acessed on 27 July 2016). (in Persian).
Keck, M. E., & Sikkink, K. (1998). Activists beyond Bordrs; Advocacy Networks In International Politics, Cornell University Press, First Edition, New York.
Lombardi, M. (2015a). IS 2.U and Beyond: THE Caliphate’s Communication Project. Twitter and Jihadi the Connunication Strategy of ISIS, The Italian Institute for International Political Studies (ISPI), First Edition, Milan.
Lombardi, M. (2015b). Islamic State Communication Project, Security Terrorism Society (Sicurezza, Terrorism. E Societai International Journal Team For Security, Terroistic Issues Managing Emergencies), January.
Maggioni, M., & Magri, P. (Eds.) (2015). Twitter and Jihadi the Communication Strategy of ISIS. The Italian Institute for International Political Studies (ISPI), First Edition, Milan.
Maggioni, M. (2015). The Islamic State: Not That Surprising, If You Know Where To Look. Twitter and Jihadi the Communication Strategy of ISIS, The Italian Institute for International Political Studies (ISPI), First Edition, Milan.
Mahzam, R. (2015). Electronic Digitization of ISIS: Building a Multi- Media Leagacy. S. Rajaratnam School of International studies (RSIS), 27 October.
Martell, L. (2007). The Third Wave in Globalisation Theory, International studies Review, 9(2), Summer.
Ocko, H. (2012). Terrorism and misuse of religion by terrorist groups, The translation groups of global Islamic peace convention. Just peace, solution to confront terrorism (Proceedings of international conference against terrorism for the just peace), Tehran: Global convention of Islamic peace, First edition. (in Persian)
Plebani, A., & Maggiolini, P. (2015). The Centrality of the Enemy in al- Baghdadi’s Caliphate. Twitter and Jihadi the Communication Strategy of ISIS, The Italian Institute for International Politocal Studies (ISPI), First Edition, Milan.
Pour Saied, F. (2009). Transition of terrorism in international relations. Quarterly of strategic studies, 12(4), Winter. (in Persian)
Riha, D., & Maj, A. (Eds.) (2009). The Real and the Virtual in Cybercultures, Inter- Disciplinary Press (Oxford, United Kingdom), First Edition, London.
Sabouri Khosro Shahi, H., & Azar Goun, N. (2013). Virtual space and global identity (Case study: students of Azad Islamic university), Journal of strategic studies of globalization, 4(10), Spring. (in Persian)
Schori Liang, C. (2015). Cyber Jihadi Understanding and Countering Islamic State Propaganda, Geneva Center for Security Policy (Where Knowledge Meets Experience) (GCSP), February.
Shafiei, H., & Mehrvar, M. (2012). Globalization and spreading of fundamental Salafi networks. Professional journal of poletical sciences, 8(19), Summer. (in Persian)
Shafiei, M. (2015). ISIS and bare violence: the non-rational understanding of religion and combining it with new technologies. Proceedings of global congress of extremist and Takfiri movement from the viewpoint of Islamic scholars (8 volumes), 8, Qom, Dar-al-Am Lel-Madrasah Alhol Bait, First edition. (in Persian)
Sharifat, A. (2015). ISIS, Proceedings of global congress of extremist and Takfiri movement from the viewpoint of Islamic scholars (8 volumes), 8, Qom, Dar-al-Am Lel-Madrasah Alhol Bait, First edition. (in Persian)
Siboni, G.; Cohen, D., & Koren, T. (2015). The Islamic States Strategy in Cyberspace. Military and Strategic Affairs, March.
Stibli, F. (2010). Terrorism in in the Context of Globalization, Aarms. Terrorism, 9(1), February.
Valtanen, M. (2007). Identity, Structure and Ideology- Manuel Castells’ Contribution to the Identity Policy Discussion, 28 September, http://www.inter-disciplinary.net/ati/diversity/multiculturalism/mcb1/valtanen%20paper.pdf (Accessed on 25 November 2015).
Vitale, H. M., & Keagle, J. M. (2014). A Time to Tweet, as Well as a Time ti Kill: ISIS’s Projection of Power in Irag and Syria, Institute For National Strategic Studies, October.
Woolsey, R. J. (2014). From Al- Qaeda To The Islamic State (ISIS), Jihadi Graups Engagein Cyber Jihadi Beginning With 1980, Promotion of Use of Electronic Technologies’ Up To Today’s Embrace of Social Media To Attract A New Jihadi Generation, The Middle East Media Research Institute (MEMRI) Inquiry Analysis- Jihadi and Terrorism Studies, 5 December.
CAPTCHA Image