Using a dataset of over 1.9 million messages posted on Twitter by about 25,000 ISIS sympathizers, we explore how ISIS makes use of social media to spread its propaganda and recruit militants from the Arab world and across the globe. By distinguishing between violence-driven, theological, and sectarian content, we trace the connection between online rhetoric and key events on the ground. To the best of our knowledge, ours is one of the first studies to focus on Arabic content, while most literature focuses on English content. Our findings yield new important insights about how social media is used by radical militant groups to target the Arab-speaking world, and reveal important patterns in their propaganda efforts.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
The percentages of tweets that were labeled under each of the categories and had no stem words from the other three categories ranged from 90 to 96%. This means that most of the tweets that were labeled at this step had stem words just from one category and zero from the others and that majority-rule works well in this situation.
For more on the subject, read chapter eight “The AQ-ISIS War” in .
For more on the subject, read Milestones .
Abdelaziz, S. (2014). Death and desecration in Syria: Jihadist group ‘crucifies’ bodies to send message. CNN, 2 May 2014.
Alajmi, A., Saad, E., & Darwish, R. (2012). Toward an arabic stop-words list generation. International Journal of Computer Applications, 46(8), 8–13.
Allendorfer, W. H. & Herring, S. C. (2015). ISIS vs. the US government: A war of online video propaganda. First Monday, 20(12).
Berger, J. M., & Morgan, J. (2015). The ISIS Twitter census: Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on US Relations with the Islamic World, 3(20), 1–65.
Bermingham, A., Conway, M., McInerney, L., O’Hare, N., & Smeaton, A. F. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In International conference on advances in social network analysis and mining, 2009. ASONAM’09 (pp. 231–236). IEEE.
Bodine-Baron, E., Helmus, T. C., Magnuson, M., & Winkelman, Z. (2016). Examining ISIS support and opposition networks on twitter. Technical report, RAND Corporation Santa Monica United States.
Cohen-Almagor, R. (2013). In internet’s way: Radical, terrorist Islamists on the free highway. International Journal of Cyber Warfare and Terrorism, 2(3), 39–58.
Conover, M. D., Ferrara, E., Menczer, F., & Flammini, A. (2013). The digital evolution of occupy wall street. PLoS ONE, 8(5), e64679.
Davis, C. A., Ciampaglia, G. L., Aiello, L. M., Chung, K., Conover, M. D., Ferrara, E., et al. (2016). OSoMe: The IUNI observatory on social media. PeerJ Computer Science, 2, e87.
Edwards, C., & Gribbon, L. (2013). Pathways to violent extremism in the digital era. The RUSI Journal, 158(5), 40–47.
Farwell, J. P. (2014). The media strategy of ISIS. Survival, 56(6), 49–55.
Ferrara, E. (2017). Contagion dynamics of extremist propaganda in social networks. Information Sciences, 418–419, 1–12.
Ferrara, E., Wang, W.-Q., Varol, O., Flammini, A., & Galstyan, A. (2016). Predicting online extremism, content adopters, and interaction reciprocity. In International conference on social informatics (pp. 22–39). Berlin: Springer.
Fisher, A. (2015). How jihadist networks maintain a persistent online presence. Perspectives on Terrorism, 9(3), 3–20.
Halverson, J. R., Goodall, Jr., H., & Corman, S. R. (2011). In Master narratives of Islamist extremism (pp. 137–148). Berlin: Springer.
Klausen, J. (2015). Tweeting the Jihad: Social media networks of western foreign fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22.
Lee, E., & Leets, L. (2002). Persuasive storytelling by hate groups online: Examining its effects on adolescents. American Behavioral Scientist, 45(6), 927–957.
Leuprecht, C., Hataley, T., Moskalenko, S., & McCauley, C. (2010). Winning the battle but losing the war? Narrative and counter-narratives strategy. Perspectives on Terrorism, 3(2), 42–57.
Magdy, W., Darwish, K., & Weber, I. (2016). #FailedRevolutions: Using Twitter to study the antecedents of ISIS support. First Monday, 21(2). ISSN 13960466. http://firstmonday.org/ojs/index.php/fm/article/view/6372.
Morstatter, F., Pfeffer, J., Liu, H., & Carley, K. M. (2013). Is the sample good enough? Comparing data from twitter’s streaming API with Twitter’s Firehose. In International Conference on Weblogs and Social Media (ICWSM) (pp. 400–408).
Payne, K. (2009). Winning the battle of ideas: Propaganda, ideology, and terror. Studies in Conflict & Terrorism, 32(2), 109–128.
Piazza, J. A. (2008). Incubators of terror: Do failed and failing states promote transnational terrorism? International Studies Quarterly, 52(3), 469–488.
Qutb, S. (1964). Ma’alim fi-l-tariq (milestones). Cairo: Dar al-Shuruq.
Rowe, M., & Saif, H. (2016). Mining pro-ISIS radicalisation signals from social media users. In International Conference on Weblogs and Social Media (ICWSM) (pp. 329–338).
Saad, S., Chamoun, M., & Bazan, S. B. (2015). Infowar on the web: When the caliphate goes online. In Proceedings of the ACM web science conference (Art ID. 53). ACM. https://doi.org/10.1145/2786451.2786487.
Saif, H., Dickinson, T., Kastler, L., Fernandez, M., & Alani, H. (2017). A semantic graph-based approach for radicalisation detection on social media. In European semantic web conference (pp. 571–587). Berlin: Springer.
Shane, S., & Hubbard, B. (2014). ISIS displaying a deft command of varied media. The New York Times, 30, 30 Aug 2014.
Smith, A. G., Suedfeld, P., Conway, L. G., III, & Winter, D. G. (2008). The language of violence: Distinguishing terrorist from nonterrorist groups by thematic content analysis. Dynamics of Asymmetric Conflict, 1(2), 142–163.
Stern, J., & Berger, J. M. (2015). ISIS: The state of terror. New York: HarperCollins.
Taghva, K., Elkhoury, R., & Coombs, J. (2005). Arabic stemming without a root dictionary. In International conference on information technology: Coding and computing, 2005. ITCC 2005 (Vol. 1, pp. 152–157). IEEE.
Torok, R. (2013). Developing an explanatory model for the process of online radicalisation and terrorism. Security Informatics, 2(1), 6.
Varol, O., Ferrara, E., Ogan, C. L., Menczer, F., & Flammini, A. (2014). Evolution of online user behavior during a social upheaval. In Proceedings of the 2014 ACM conference on Web science (pp. 81–90). New York: ACM.
Weber, I., Garimella, V. R. K., & Batayneh, A. (2013). Secular vs. Islamist polarization in Egypt on Twitter. In Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining (pp. 290–297). New York: ACM.
Winter, C. (2015). Documenting the virtual ‘caliphate’. Quilliam Foundation, 33, 1–50.
About this article
Cite this article
Badawy, A., Ferrara, E. The rise of Jihadist propaganda on social networks. J Comput Soc Sc 1, 453–470 (2018). https://doi.org/10.1007/s42001-018-0015-z
- Computational social science
- Social media
- Islamic radicalization