Abstract
Social Network Sites (SNS) have in recent years received significant universal attention in the way they have changed lives socially, politically and economically through distinct components that enable people from all over the world to connect instantly. This work analyses the aggressive nature in which terrorists quickly adapt to these SNS vis-à-vis governments’ approach to risk communication and situational crisis communication using the same media. It additionally examines literature on the publics’ cumulative behaviour regarding the use of SNS in the context of terror attacks and the terrorists’ use of the same media to coordinate their operations in recruiting people to join their organisations, planning and execution of terror attacks. To achieve that, this chapter investigates the online cumulative behaviour which has been witnessed recently (e.g. during the Westgate Mall attack by Al-Shabaab in Nairobi, Kenya in 2013) and the terrorists taking advantage of these platforms [e.g. the Islamic State of Iraq and Syria (ISIS)] to stimulate crises of national security.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Al Jazeera (2013a) Al-Shabaab in long-running battle with Twitter. Available online at: http://www.aljazeera.com/indepth/features/2013/12/Al-Shabaab-long-running-battle-with-twitter-2013121711271555968.html. Accessed 5 July 2015
Al Jazeera (2013b) Kenyans tell minister: Westgate facts don’t add up. Available online at: http://stream.aljazeera.com/story/201309302016-0023074. Accessed June 30 2015
Beck U (1992) Risk society: towards a new modernity. SAGE Publications, London
Berger JM (2013a) Terrorists on social media: arguments that don’t impress me, Intel wire. Availale online at: http://news.intelwire.com/2013/10/terrorists-on-social-media-arguments.html. Accessed 8 June 2015
Berger JM (2013b) Twitter’s week of reckoning. Foreign Policy. Available online at: http://www.foreignpolicy.com/articles/2013/10/01/twitters_week_of_reckoning#sthash.aObyjqaY.dpbs. Accessed 8 June 2015
Berube DM, Faber B, Scheufele DA, Cummings CL, Gardner GE, Martin KN, Martin MS, Temple NM (2010) Communicating risk in the 21st century: the case of nanotechnology. Available online at: http://www.nano.gov/sites/default/files/pub_resource/berube_risk_white_paper_feb_2010.pdf. Accessed 10 Aug 2015
Borodzicz EP (1996) Security and risk: a theoretical approach to managing loss prevention. Int J Risk Secur Crime Prev 1(2):131–143
Borodzicz EP (2005) Risk, crisis and security management. Wiley, West Sussex
Bronskill J (2001) CSIS on alert for cyber saboteurs: spy agency monitors threat to computer networks: report. Ottawa Citizen
Business Daily (2015) Facebook eyes Kenya office after South Africa. Available online at: http://www.businessdailyafrica.com/Corporate-News/Facebook-eyes-Kenya-office-after-South-Africa-entry/-/539550/2770834/-/item/0/-/n8m28wz/-/index.html. Accessed 18 July 2015
Business Insider (2015) The FBI claims technology promoted by Apple and WhatsApp is helping ISIS. Available online at: http://uk.businessinsider.com/fbi-encryption-going-dark-isis-apple-facebook-whatsapp-steinbach-lieu-2015-6. Accessed 2 Aug 2015
CNN (2013) How terror can breed through social media. Available online at: http://edition.cnn.com/2013/04/27/world/rivers-social-media-terror/. Accessed 5 July 2015
Communications Authority of Kenya (2015) Quarterly sector statistics report: third quarter of the financial year 2014/15. Available online at: http://www.ca.go.ke/images/downloads/STATISTICS/%20Sector%20Statistics%20Q3%202014-2015.pdf. Accessed 4 Aug 2015
Coombs WT (1995) Choosing the right words: the development of guidelines for the selection of the “appropriate” crisis-response strategies. Manage Commun Quarter 8:447–476
Coombs WT (1999) Ongoing crisis communication: planning, managing, and responding. Sage, Los Angeles
Coombs WT (2000) Crisis management: advantages of a relational perspective. In: Ledingham JA, Bruning SD (red). Public relations as relationship management
Coombs WT (2007) Protecting organization reputations during a crisis: the development and application of situational crisis communication theory. Corp Reputation Rev 10(3):163–176
Coombs WT, Holladay SJ (1996) Communication and attributions in a crisis: an experimental study of crisis communication. J Publ Relat Res 8:279–295
Daily Mail (2015) Fanatics are using secret message apps says anti-terror Tsar: government set to do battle with web giants including WhatsApp and Facebook after warning in landmark report. Available online at: http://www.dailymail.co.uk/news/article-3119167/Fanatics-using-secret-message-apps-says-anti-terror-tsar-Government-set-battle-web-giants-including-WhatsApp-Facebook-warning-landmark-report.html. Accessed 2 Aug 2015
Denning D (2000) Cyber terrorism special oversight panel on terrorism committee on armed services, U.S. House of representatives May 23, 2000. Available online at: http://www.stealth-iss.com/documents/pdf/CYBERTERRORISM.pdf. Accessed 3 June 2015
Denning D (2010) Terror’s web: how the internet is transforming terrorism. In: Yar M, Jewkes Y Handbook of internet crime. Willan Publishers, London, pp 194–212
Dewing M (2012) Social media: an introduction, Publication No. 2010-03-E. http://www.parl.gc.ca/content/lop/researchpublications/2010-03-e.pdf. Accessed 5 June 2015
DiMaggio PJ, Powell WW (1991) Introduction. In: DiMaggio PJ, Powell W (eds) The new institutionalism and organizational analysis. University of Chicago Press, Chicago. pp 1–38
Entman MR (2004) Projections of power: framing news, public opinion, and U.S. foreign policy. University of Chicago Press, Chicago
Facebook (undated) Community Standards. Available online at: https://www.facebook.com/communitystandards. Accessed 3 July 2015
Fischhoff B (2002) Assessing and communicating the risks of terrorism. In: Teich A, Nelson S, Lita S, Hunt A (eds) Science and technology in a vulnerable world. DC, AAAS, Washington
Fischhoff B (2006) Psychological perception of risk. In: Kamien D (ed) The McGraw-Hill homeland security handbook. McGraw Hill, New York, pp 463–492
Fox RL, Gangl A (2011) “News You Can’t Use”: politics and democracy in the new media environment. In: Le Cheminant W, Parrish JM (eds) Manipulating democracy—democratic theory, political psychology, and mass media. Routledge
Freberg K, Palenchar MJ (2013) Convergence of digital negotiation and risk challenges. In: Social media and strategic communications. pp 83–100, Palgrave Macmillan, UK
Gertz B (2013) Islamist Terrorists shifting from web to social media. The Washington Free Beacon. Available online at: http://freebeacon.com/islamist-terrorists-shifting-from-web-to-social-media/. Accessed 21 July 2015
GlobalWebIndex (2013) Twitter now the fastest growing social platform in the world. Available online at: http://blog.globalwebindex.net/twitter-now-the-fastest-growing-social-platform-in-the-world/. Accessed 10 July 2015
Gray GM, Ropeik DP (2002) Dealing with the dangers of fear: the role of risk communication. Health Aff 21(6):106–116
Guardian (2014) WhatsApp adds end-to-end encryption using TextSecure. Available online at: http://www.theguardian.com/technology/2014/nov/19/whatsapp-messaging-encryption-android-ios. Accessed 2 Aug 2015
Irwin A (1995) Citizen science: a study of people, expertise and sustainable development. Routledge, London
Kasperson RE, Kasperson JX (1996) The social amplification and attenuation of risk. In: Hunreuther H, Slovic P (eds) Challenges in risk assessment and risk management. The Annals of the American Academy, vol 545, no 1, pp 95–105
Kasperson RE, Palmlund I (2005) Evaluating risk communication. In: Kasperson JX, Kasperson RE (eds) The social contours of risk, vol 1., Publics, risk communication and the social amplification of risk earth scan, London, pp 51–67
Kohlmann E (2010) Hacking Al-Qaida: social networking, technology and terrorism. International Conference on Cyber Security (ICCS). Available online at: http://www.fordham.edu/Campus_Resources/eNewsroom/topstories_1916.asp (undated) See also http://iccs.fordham.edu/program/iccs2010/. Accessed 14 July 2015
Ledingham JA, Stephen DB (1998) Relationship management in public relations: dimensions of an organization-public relationship. Publ Relat Rev 24(1):55–65
Ledingham JA (2006) Relationship management: a general theory of public relations. In: Botan CH, Hazleton V (eds) Public relations theory II
Los Angeles Times (2013a) Twitter suspends account run by Al-Qaeda-linked Somali militants. Available online at: http://articles.latimes.com/2013/jan/25/world/la-fg-wn-twitter-suspends-shabab-20130125. Accessed 5 July 2015
Los Angeles Times (2013b) Kenya mall attack: official accounts of siege differ. Los Angeles Times. Available online at: http://www.latimes.com/world/worldnow/la-fg-wn-kenya-mall-conflicting-reports-20130924,0,7905720.story#axzz2pSZ6HQnK. Accessed 5 July 2015
Mag PC (2015) Definition of Twitter. Available online at: http://www.pcmag.com/encyclopedia/term/57880/twitter. Accessed 16 June 2015
Massey JE (2001) Managing organizational legitimacy: communications strategies for organizations in crisis. J Bus Commun 38:153–183
Nahon K, Hemsley J (2013) Going viral. Polity Press Cambridge, Cambridge
National Research Council (1989) ‘Improving Risk Communication’, National research committee on risk perceptions and communication. National Academies Press, Washington
New Statesman (2013) The Twitter Jihadis: how terror groups have turned to social media, New Statesman. Available online at: http://www.newstatesman.com/2013/08/twitter-jihadis. Accessed 3 July 2015
New York Times (1985) Thatcher urges the press to help ‘starve’ terrorists. Available online at: http://www.nytimes.com/1985/07/16/world/thatcher-urges-the-press-to-help-starve-terrorists.html. Accessed 30 May 2015
New York Times (2007) Defense secretary urges more spending for U.S. diplomacy, The New York Times. Available online at: http://www.nytimes.com/2007/11/27/washington/27gates.html?pagewanted=print&_r=0. Accessed 14 July 2015
O’Reilly T (2007) What is Web 2.0?—design patterns and business models for the next generation of soft ware. Available online at: http://yil5.inet-tr.org.tr/akgul/tmp/SSRN-id1008839.pdf. Accessed 30 May 2015
Pearson CM, Mitroff I (1993) From crisis prone to crisis prepared: a framework for crisis management. Acad Manage Executive 7(1):49–59
Perl RF (1997) Terrorism, the media and the government: perspectives trends and options for policy makers. Available online at: http://digital.library.unt.edu/ark:/67531/metacrs419/m1/1/high_res_d/97-960f_1997Oct22.htm. Accessed 3 June 2015
Portland Communications (2012) How Africa Tweets. Available online at: http://www.portland-communications.com/wp-content/uploads/2013/05/Twitter_in_Africa_PPT.pdf. Accessed 3 Aug 2015
Radio Free Europe (2013) How social networks are dealing with terrorists. Available online at: http://www.rferl.org/content/twitter-facebook-terrorists/24906583.html. Accessed 3 July 2015
Rogers MB, Amlot R, Rubin GJ, Wessely S, Krieger K (2007) Mediating the social and psychological impacts of terrorist attacks: the role of risk perception and risk communication. Int Rev Psychiatry 19(3):279–288
Russell D (1982) The causal dimension scale: a measure of how Individuals perceive causes. J Pers Soc Psychol 42:1137–1145
Schultz F, Utz S, Göritz A (2011) Is the medium the message? Perceptions of and reactions to crisis communication via Twitter, blogs and traditional media. Publ Relat Rev 37:20–27
Shari RV, Tara B, Michael JP (2011) A work-in-process literature review: incorporating social media in risk and crisis communication. J Contingencies Crisis Manag 19(2):110–122
Simon T, Goldberg A, Aharonson-Daniel L, Leykin D, Adini B (2014) Twitter in the cross fire—the use of social media in the westgate mall terror attack in Kenya. Available online at: http://www.plosone.org/article/fetchObject.action?uri=info:doi/10.1371/journal.pone.0104136&representation=PDF. Accessed 2 Aug 2015
Sky News (2013) Kenya siege: gunmen “Running and Hiding”. Available online at: http://news.sky.com/story/1145375/kenya-siege-gunmen-running-and-hiding. Accessed 6 July 2015
Standard Digital (2015) Study: terrorist groups recruiting Kenyan youth through social media. Available online at: http://www.standardmedia.co.ke/article/2000168474/study-terrorist-groups-recruiting-kenyan-youth-through-social-media?articleID=2000168474&story_title=study-terrorist-groups-recruiting-kenyan-youth-through-social-media&pageNo=1. Accessed 10 July 2015
Stewart DR, Coleman CA (2013) Legal and ethical use of social media for strategic communicators. In: Nor-Aldeen H, Hendricks JA (eds) Social media and strategic communication. Palgrave Macmillan, New York, pp 180–198
Strecher VJ, Greenwood T, Wang C, Dumont D (1999) Interactive multimedia and risk communication. J National Cancer Inst Monogr 25(134–139):135
Telegraph (2013) Twitter in numbers. Available online at: http://www.telegraph.co.uk/technology/twitter/9945505/Twitter-in-numbers.html. Accessed 10 July 2015
Wales C, Mythen G (2002) Risky discourses: the politics of GM foods. Environ Politics 11(2):121–144
Weiner B (1986) An attributional theory of motivation and emotion. Springer, New York
Weiner B, Amirkan J, Folkes VS, Verette JA (1987) An attribution analysis of excuse giving: studies of a naïve theory of emotion. J Pers Soc Psychol 53:316–324
Weiner B, Perry RP, Magnusson J (1988) An attribution analysis of reactions to stigmas. J Pers Soc Psychol 55:738–748
WhatsApp (undated) How it works. Available online at: https://www.whatsapp.com/. Accessed 28 July 2015
Wilson SR, Cruz MG, Marshall LJ, Rao N (1993) An attributional analysis of compliance-gaining interactions. Commun Monogr 60:352–372
World Economic Forum (2013) Global risks 2013. Insight report. Available online at: http://www3.weforum.org/docs/WEF_GlobalRisks_Report_2013.pdf. Accessed 22 July 2015
Wright DK, Hinson MD (2009) Examining how public relations practitioners actually are using social media. Publ Relat J 3(3):2–32
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Wewa-Wekesa, K. (2016). The Role of Social Network Sites in Security Risks and Crises: The Information Warfare of Terrorism. In: Masys, A. (eds) Exploring the Security Landscape: Non-Traditional Security Challenges. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-27914-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-27914-5_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27913-8
Online ISBN: 978-3-319-27914-5
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)