Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 6 dokumen yang sesuai dengan query
cover
Ananto Adi Trisaputro
Abstrak :
Tugas karya akhir ini akan membahas tentang Lone Wolf Terrorism, kasus LWT di Indonesia sendiri terjadi pada tahun 2016 sebanyak tiga kasus. LWT hingga saat ini masih susah terdeteksi, karena LWT bergerak secara sendiri walaupun dalam pembelajaran radikalnya diperoleh dari interaksi dalam dunia internet. Revolusi informasi dan teknologi khususnya internet sangat memberikan dampak besar pada LWT. LWT menjadikan internet sebagai media pembelajaran radikal sekaligus self radicalization. Penelitian ini menggunakan pendekatan pembelajaran sosial dari Sutherland, tipologi- tipologi LWT dari National Security Critical Issue Task Force NSCITF, proses self radicalization dan internet radicalization. Hasil tugas karya akhir ini diharapkan dapat menjadi rujukan tentang hubungan bagaimana LWT melakukan pembelajaran dan self radicalization khususnya pada informasi teknologi.
This research will be discussing about Lone Wolf Terrorism, LWT is the terrorism act that is done not in groups. There are three LWT cases that has occurred in Indonesia in the year 2016. To this day LWT is still hard to be detected, because LWT move on its own even in radical learning from interactions in the internet. Information and technology revolution especially the internet has given a big impact on LWT. LWT has made the Internet both as a media of spreading radicalism also self radicalization. This research uses social learning method by Sutherland, types of LWT from National Security Critical Issue Task Force NSCITF, self radicalization process and Internet radicalization. The result of this research is hoped to be a reference about the relationship of how LWT learns and self radicalization especially through the Internet.
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2018
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Kamilah Nuroktina Larasati
Abstrak :
Tugas karya akhir ini membahas mengenai strategi pencegahan kejahatan terhadap radikalisasi online. Radikalisasi online secara definisi adalah proses dimana individu melalui aktivitas online berinteraksi dengan menggunakan berbagai fasilitas internet, hingga menerima persepsi bahwa kekerasan sebagai metode yang tepat untuk menyelesaikan konflik sosial dan politik. Radikalisasi online dapat terjadi karena adanya penguatan dari luar. Dampak dari radikalisasi online sangat besar, karena dapat memunculkan aksi terorisme di kemudian hari. Oleh karena itu, dibutuhkan sebuah pencegahan kejahatan secara sosial yang melibatkan masyarakat. Pencegahan kejahatan secara sosial yang dapat digunakan adalah pemblokiran situs. Pemblokiran situs tentu saja dilakukan oleh kominfo berdasarkan 4 kriteria BNPT. Tujuan dari penelitian ini adalah untuk mengetahui bahwa pemblokiran dapat mencegah radikalisasi online.
This thesis discusses about crime prevention strategy of online radicalization. Online radicalization by definition is a process whereby individuals through online activities interact using various internet facilities, thus accepting the perception that violence is the right method for resolving social and political conflicts. Online radicalization can occur due to outside reinforcement. The impact of online radicalization is huge, because it can lead to terrorism in the future. Therefore, it takes a social crime prevention involving the community. Social crime prevention that can be used is blocking sites. Blocking sites done by Ministry of Communication and Information Technology RI (Kominfo RI) based on 4 criteria from National Counter Terrorism Agency (BNPT). The purpose of this research is to know that blocking can prevent online radicalization.
Depok: Fakultas Ilmu Sosial dan Ilmu Politik Universitas Indonesia, 2018
TA-Pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Avina Waliyanri
Abstrak :
Fenomena pelaku tunggal atau lone wolf terorisme merupakan masalah yang terus berkembang di Indonesia. Hal ini biasanya tidak terlepas dari pengaruh radikalisme online, yang terjadi melalui media sosial. Penelitian ini bertujuan untuk mengkaji bagaimana penggunaan media sosial dapat berpengaruh terhadap terorisme lone wolf di Indonesia menggunakan studi kasus Raden Bagaskara. Penelitian ini membahas 5 teori yang berkaitan dengan radikalisme online dan terorisme lone wolf, yaitu teori analisis jaringan sosial, echo chamber pada media sosial, piramida radikalisasi, passion obsesif dan obsesi ideologi, dan teori bathtub motivasi lone wolf.  Penelitian ini menggunakan pendekatan kualitatif. Data penelitian ini dikumpulkan melalui wawancara, dan studi dokumentasi. Teknik analisis data penelitian ini dilakukan dengan teknik analisis data kualitatif meliputi reduksi data, penyajian data, dan penarikan kesimpulan/verifikasi data. Hasil dari penelitian ini adalah bahwa seorang pengguna media sosial memasuki jaringan sosial bersifat online, dan algoritma media sosial dapat menciptakan echo chamber yang akan memaparkan konten propaganda radikalisme terhadap pengguna secara terus menerus. Dengan paparan tersebut, maka pemahamannya akan bergeser menjadi radikal dan keinginan untuk melakukan serangan akan muncul. Apabila motivasi untuk menyerang berakumulasi dan melebihi ambang batas, maka serangan terorisme lone wolf akan terjadi. ......The phenomenon of lone wolf terrorism is a problem that continues to develop in Indonesia. This usually relates to the influence of online radicalism through social media. This study aims to examine how the use of social media can influence lone wolf terrorism in Indonesia using the case study of Raden Bagaskara. This study discusses five theories related to online radicalism and lone wolf terrorism, namely the social network analysis theory, the echo chamber theory on social media, the radicalization pyramid, obsessive passion and ideological obsession, and the lone wolf motivation bathtub theory. This research uses a qualitative approach. The research data for this study were collected through interviews and documentation studies. The data analysis technique for this research was carried out using qualitative data analysis techniques, including data reduction, data presentation, and drawing conclusions/verifying data. The result of this study is that a social media user enters an online social network, and the social media algorithm can create an echo chamber that will continuously present radical propaganda contents to the user. With this exposure, their understanding will shift to become radicalized and the desire to carry out an attack will emerge. If the motivation to attack accumulates and exceeds its limits, then a lone wolf terrorist attack will occur.
Jakarta: Sekolah Kajian Stratejik dan Global Universitas Indonesia, 2023
TA-pdf
UI - Tugas Akhir  Universitas Indonesia Library
cover
Abstrak :
This book explores the interface between terrorism and the internet and presents contemporary approaches to understanding violent extremism online. The volume focuses on four issues in particular: terrorist propaganda on the internet; radicalisation and the internet; counter campaigns and approaches to disrupting internet radicalisation; and approaches to researching and understanding the role of the internet in radicalisation. The book brings together expertise from a wide range of disciplines and geographical regions including Europe, the US, Canada and Australia. These contributions explore the various roles played by the Internet in radicalisation; the reasons why terroristic propaganda may or may not influence others to engage in violence; the role of political conflict in online radicalisation; and the future of research into terrorism and the internet. By covering this broad range of topics, the volume will make an important and timely addition to the current collections on a growing and international subject. This book will be of much interest to students and researchers of cyber-security, internet politics, terrorism studies, media and communications studies, and International Relations.
London: Routledge, 2016
e20500566
eBooks  Universitas Indonesia Library
cover
Chen, Hsinchun
Abstrak :
[The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups, including web sites, forums, chat rooms, blogs, social networking sites, videos, virtual world, etc. We have developed various multilingual data mining, text mining, and web mining techniques to perform link analysis, content analysis, web metrics (technical sophistication) analysis, sentiment analysis, authorship analysis, and video analysis in our research. The approaches and methods developed in this project contribute to advancing the field of Intelligence and Security Informatics (ISI). Such advances will help related stakeholders to perform terrorism research and facilitate international security and peace. This monograph aims to provide an overview of the Dark Web landscape, suggest a systematic, computational approach to understanding the problems, and illustrate with selected techniques, methods, and case studies developed by the University of Arizona AI Lab Dark Web team members. This work aims to provide an interdisciplinary and understandable monograph about Dark Web research along three dimensions : methodological issues in Dark Web research, database and computational techniques to support information collection and data mining, and legal, social, privacy, and data confidentiality challenges and approaches. , The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups, including web sites, forums, chat rooms, blogs, social networking sites, videos, virtual world, etc. We have developed various multilingual data mining, text mining, and web mining techniques to perform link analysis, content analysis, web metrics (technical sophistication) analysis, sentiment analysis, authorship analysis, and video analysis in our research. The approaches and methods developed in this project contribute to advancing the field of Intelligence and Security Informatics (ISI). Such advances will help related stakeholders to perform terrorism research and facilitate international security and peace. This monograph aims to provide an overview of the Dark Web landscape, suggest a systematic, computational approach to understanding the problems, and illustrate with selected techniques, methods, and case studies developed by the University of Arizona AI Lab Dark Web team members. This work aims to provide an interdisciplinary and understandable monograph about Dark Web research along three dimensions : methodological issues in Dark Web research, database and computational techniques to support information collection and data mining, and legal, social, privacy, and data confidentiality challenges and approaches. ]
New York: [Springer, Springer], 2012
e20396628
eBooks  Universitas Indonesia Library
cover
Ecep Suwardaniyasa
Abstrak :
Penelitian ini ingin menganalisis migrasi atau pergeseran gerakan pelaku teror di Indonesia mulai dari perencanaan, propaganda, perekrutan, pendanaan, konsolidasi dan pelatihan, dari cara-cara konvensional ke cara-cara digital dengan memanfaatkan media baru (new media). Pertanyaan penelitian yang ingin dijawab dalam riset ini adalah bagaimana pengalaman, teknik dan metode yang digunakan para pelaku teror, serta migrasi gerakan terorisme itu sendiri, dari cara- cara konvensional ke penggunaan media baru (new media)/konvergen. Permasalahan penelitian ini dibedah dengan menggunakan teori media dan media baru, teori radikalisme, teori social movement, konsep terorisme, konsep globalisasi dan konsep migrasi. Penelitian ini menggunakan beberapa model analisis, yaitu pendekatan fenomenologi, studi kasus, dan analisis teks. Dalam pendekatan fenomenologi, kuesioner digunakan untuk mengeksplorasi pengalaman individu yang terlibat dalam gerakan terorisme. Dalam studi kasus, memfokuskan pada beberapa kasus teror di Indonesia yang dilakukan melalui cara-cara konvensional hingga bermigrasi melalui media baru/kovergen. Sedangkan dalam analisis teks, peneliti memeriksa berbagai teks yang tersebar di berbagai media mainstream dan platform sosial media, untuk memahami dan memetakan bagaimana keenam aspek gerakan teror tadi; perencanaan, propaganda, perekrutan, pendanaan, konsolidasi, hingga pelatihan dilakukan. Selain itu, semua hasil wawancara dan riset dari narasumber para pelaku teror, penulis ekstrak melalui analisis sofware deedose. Tujuannya untuk memetakan pola migrasi secara nyata dari model konvensional (cara-cara lama) ke model digital (cara-cara baru) dengan memanfaatkan media baru. Temuan penelitian menunjukkan bahwa keenam aspek gerakan teroris berubah dari cara lama ke cara baru, mulai dari perencanaan, propaganda, perekrutan, pendanaan, konsolidasi dan pelatihan melalui Google, YouTube, dan internet archive yang mereka produksi dan kemudian diviralkan melalui sosial media. Riset ini merekomendasikan pihak berwajib untuk memahami trend penggunaan media baru oleh para pelaku teror dan memperkuat deteksi dini aparat untuk menanggulanginya, serta meningkatkan literasi digital masyarakat agar mampu memilah informasi yang benar agar terhindar dari propaganda terorisme. ......This research aims to analyze the migration or shift in the movement of terror perpetrators in Indonesia starting from planning, propaganda, recruitment, funding, consolidation and training, from conventional methods to digital methods by utilizing new media. The research questions to be answered in this research are the experiences, techniques and methods used by terror perpetrators, as well as the migration of the terrorist movement itself from conventional methods to the use of new/convergent media. This research problem is dissected using media and new media theory, radicalism theory, social movement theory, the concept of terrorism, the concept of globalization and the concept of migration. This research uses several analytical models, namely phenomenological approaches, case studies, and text analysis. In the phenomenological approach, questionnaires are used to explore the experiences of individuals involved in terrorist movements. In the case study, it focuses on several terror cases in Indonesia which were carried out through conventional methods and migrated through new/convergent media. Meanwhile, in text analysis, researchers examined various texts spread across various mainstream media and social media platforms, to understand and map the six aspects of the terrorist movement; planning, propaganda, recruitment, funding, consolidation and training were carried out. Apart from that, the author extracted all the results of interviews and research from sources from terror perpetrators through deedose software analysis. The aim is to map real migration patterns from conventional models (old ways) to digital models (new ways) by utilizing new media. Research findings show that the six aspects of the terrorist movement changed from the old way to the new way, starting from planning, propaganda, recruitment, funding, consolidation and training through Google, YouTube and internet archives which they produced and then made viral through social media. This research recommends that the authorities understand the trend in the use of new media by terror perpetrators and strengthen early detection by authorities to deal with it, as well as increasing the digital literacy of the public so they are able to sort out the correct information to avoid terrorism propaganda.
Jakarta: Sekolah Kajian Stratejik Global Universitas Indonesia, 2024
D-pdf
UI - Disertasi Membership  Universitas Indonesia Library