PERSEBARAN KONTEN RADIKAL ISLAMIC STATE OF IRAQ SYRIA DI MEDIA SOSIAL SEBAGAI ANCAMAN PERANG MINDSET PADA GENERASI MUDA
DOI:
https://doi.org/10.33172/pa.v7i1.917Abstract
Kelompok teroris Islamic state of Iraq and Syria (ISIS) sangat gencar menyebarkan propaganda mereka di dunia maya. Banyaknya jumlah pengguna internet di Indonesia membuat rakyat Indonesia menjadi target besar dari persebaran propaganda ISIS melalui internet. Data menunjukan telah muncul sel terputus yang lahir dari konten radikal yang beredar di internet terutama media sosial, fenomena ini disebut sebagai perang mindset oleh Menteri pertahanan. Menanggapi hal tersebut pemerintah telah memiliki program dalam menghadapi perang mindset. Tujuan dari penelitian ini adalah menganalisis pola persebaran konten radikal ISIS di media sosial, menganalisis penetrasinya terhadap generasi muda, dan strategi pemerintah Indonesia dalam menghadapi perang mindset. Metode penelitian yang digunakan dalam penelitian ini adalah metode kualitatif deskriptif analitis, dalam melakukan wawancara secara mendalam dengan para narasumber dari aparat pemerintah. Penelitian ini menggunakan teori perang informasi, dan konsep perang mindset. Hasil dari penelitian ini menyimpulkan bahwa (1) Pola persebaran konten radikal memiliki siklus yaitu dari tahap pembuatan konten radikal, kemudian persebaran konten radikal di media sosial, kemudian patroli untuk membuat konten radikal relevan dengan isu dan trend terbaru dan memastikan konten tetap tersebar dan dapat diakses. (2) Konten radikal memenetrasi mindset generasi muda dikarenakan terdapat lima faktor yaitu efek filter bubble, usia remaja, era keterbukaan informasi, kesadaran literasi digital rendah, dan konten radikal ISIS itu sendiri. (3) Pemerintah Indonesia telah memiliki strategi yang tepat dalam menghadapi persebaran konten radikal ISIS di media sosial, namun pada implementasi ditemukan bahwa upaya pemerintah tidak akan pernah cukup untuk menghadapi kelompok teroris ISIS yang dinamis karena terus beradaptasi dan berubah dalam melakukan propaganda sampai tindak terorisme.
References
Buku
Barrett, Richard. (2014). The Islamic State. The Soufan Group.
Milton, Dan, al-`Ubaydi, Muhammad and Lahoud, Nelly. (2014). The Group that Calls Itself a State: Understanding the Evolution and Challenges of the Islamic State. Combating Terrorism Center at West Point.
Bunzel, Cole. (2015). From Paper State to Caliphate: The Ideology of the Islamic State. Brookings Institute.
Creswell, John W. (2011). Research Design: Pendekatan Kualitatif, Kuantitatif dan Mixed. Yogyakarta: Pustaka Pelajar.
Berger, J.M. & Morgan, Jonathon. (2015). The ISIS Twitter Census Defining and describing the population of ISIS supporters on Twitter. The Brookings Project on U.S. Relations with the Islamic World.
Jones, Seth & Libicki, Martin. (2008). How Terrorist Groups End: Lessons for Countering al Qa’ida. RAND Corporation.
Laub, Zachary & Masters, Jonathan. (2015). Backgrounder: The Islamic State. Council on Foreign Relations.
Libicki, Martin. (1995). What Is Information Warfare. Washington. NDU Press.
Miles, B. Matthew & Huberman, A. Michael. (2014). Qualitative Data Analysis. London: Sage Publications.
Moleong, Lexy J. (2014). Metodologi Penelitian Kualitatif. Bandung: Remaja Rosdakarya.
Nazir, Mohammad. (2011). Metode Penelitian. Jakarta: Ghalia Indonesia.
Price, Bryan. Milton, Dan. Muhammad al-`Ubaydi and Lahoud, Nelly. (2014). The Group that Calls Itself a State: Understanding the Evolution and Challenges of the Islamic State. Combating Terrorism Center at West Point.
Soekanto & Mamudji. (2006). Penelitian Hukum Normatif Suatu Tinjauan Singkat. Jakarta: Raja Grafindo Persada.
Sugiyono. (2011). Metode Penelitian Kualitatif dan R&D. Bandung: Alfabeta.
Trisutrisno, Bambang. (2016). Urgensi Komando Pertahanan Siber (Cyber Defense Command) dalam Menghadapi Peperangan Asimetris. KERIS. 1 (II), Hlm. 53-60.
Jurnal
Sulistyo, Adi (2013). Ancaman Propaganda Media Massa Terhadap Sistem Pertahanan Negara. Bogor. Jurnal Universitas Pertahanan.
Bogdanoski, M. & Petreski, D. (2013). Cyberterrorism-Global Security Threat. 1st ed.
Thurman, Maxwell P. (1992) Strategic Leadership. presentation to the Strategic Leadership Conference, US Army War College, Carlisle Barracks, PA.
Web
Gladstone, Rick & Goelmarch, Vindu. (2015). ISIS Is Adept on Twitter, Study Finds. NewYorkTimes. http://www.nytimes.com/2015/03/06/world/middleeast/isis-is-skilled-on-twitter-using-thousands-of-accounts-studysays.html?_r=1. Diakeses Pada 22 Mei 2019.
Internetworldstat. (2019). Internet Usage 2019 Stats. https://www.internetworldstats.co
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access. Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.