Research questions
This research focuses on the impact of media and internet on terrorism and helps to understand different conspiracy theories associated with counter-terrorism.
The conspiracy theory of terrorism is only one of the different theories that focus on explaining terrorism. The research topic is worth investigating as it would help to understand the phenomenon of terrorism. This research needs to be conducted to consolidate the several interpretations of conspiracy theories related to terrorism in order to deeply comprehend the issues and to anticipate the upcoming reactions. A research on the conspiracy theory of terrorism is essential as it would aid to illuminate the efforts to define terrorism. It would offer a basis to evaluate the past, present, and future endeavors to combat terrorism. It would also suggest the possible impacts on the policy-making efforts associated with terrorism (Conway 77).
The key purpose of this investigation is to demonstrate a descriptive assessment of conspiracy theories related to terrorism. The hypothetical effects of conflicting views would be assessed to offer projected outcome of political decision-making relied on conspiracy theories related to terrorism. The prospect effect would be analyzed by this study. A natural derivative of the research will offer concise data related to criminologist in attempt to comprehend how conspiracy theory associated with practice and politics (Denemark and Chubb 59). The main aim of this research is to understand the impact of media and the internet on terrorism. Following are the objectives of research:
RO1: To explore the conceptual understanding about Terrorism and the media, and terrorism and the internet
RO2: To address the role of journalism and press in counter-terrorism
RQ1: Terrorism and the media, terrorism and the internet: cross impacts and what can be done about them while upholding freedom of speech and expression
RQ2: Conspiracy theories related to terrorism/counter-terrorism: is there a need for countering them?
Hypothesis 1
H0: There is a significant relationship between the media and terrorism
H1: There is no significant relationship between the media and terrorism
Hypothesis 2
H0: There is a significant relationship between internet and terrorism
H2: There is no significant relationship between internet and terrorism
In different nations, the government shows their high involvement in the media with different media companies operating by the Communist-Party-led government. In the context of democracy, there are some religious organizations and anything probing the legitimacy of the communist party is banned from using in public and blocked on the internet. These religious organizations are the Tiananmen Square Massacre, the Arab Spring, and Hong Kong protests (Conway 77).
Moreover, web portals involving Microsoft’s MSN that comes under the criticism for supporting in these practices such as prohibition the word such as democracy from its chat-rooms. There are some social networking sites like Facebook, Twitter and Snapchat are banned as a whole and books, and international films are key concerns to active control. The search engine i.e. Google was unbanned on the 25th centenary of the annihilation. But, usage is still restricted. Beijing has lifted bans on international websites inside the free trade zone (Gilboa et al. 654). Its censorship tactics differ through the sensible way of practicing monitoring system. There is some jailed activist such as bloggers, activists, and journalist that aids to monitor the terrorism. Although, constitution deals with freedom of speech of citizens, however, the language has been unclear. Thus, it provides more freedom for the unilateral judgments and government’s arbitrary. It was the most open protest and largest for free speech and press in the year of January 2013 (Denemark and Chubb 59).
Hypotheses
According to Tierney 1, the Colloquium will involve different media actors and other applicable stakeholders like audio-visual regulatory bodies, civil society’s representatives, government representatives, and media self-regulatory bodies. Furthermore, challenges and dilemmas are faced by media experts entailing the terrorist acts, and threats in the current changing media atmosphere. In addition, it also focuses on the use of digital platform and media, and the role of internet actors. Regulation responses in such different context protect the right to freedom of expression and media freedoms and other fundamental rights.
In support of this, Gilboa et al. 654 evaluated that the right to freedom of expression with freedom of the media is a pillar of democratic security. The council endorses an enabling atmosphere for freedom of expression that is underpinned by legal guarantees. It also emphasizes on the freedom and diversity of media and the safety of journalists and other media actors. The division also makes sure the work of navigation committee on media and information society.
In the view of Tierney 1, the media and internet division issues publications on appropriate topics and also manages the activities like seminars, events, and conferences to enhance the discussions on how to best maintain the freedom of expression and information in the nation. It also makes sure the co-operation activities by providing the expertise and assistance on new-media actors, standard media and instruction to government and regulatory bodies in targeted nations. The key purpose is to enhance an enabling environment for freedom of expression by taking into account the challenges of altering the media landscape.
In opposed to this, Beckmann, Dewenter and Thomas 9 stated that work is divided on the basis of different subjects under freedom of expression like decriminalization of defamation, protection of journalism, gender equality in the media, the safety of journalists, and countering hate speech. Conspiracy theory is illustrated as an attempt to clarify the presence of terrorism as per the intensive direct and indirect efforts of two or more actors in order to attain the political goals that mat themselves differ. In this theory, one actor is engaged in different kinds of support activities and the other actor conducts terrorist activities. The primary supporting actors could be governmental and conductor of practices. These conductors may be other groups, individuals and government.
In support of this, Meleagrou-Hitchens, Audrey Alexander and Kaderbhai 1233 evaluated that counter-terrorism involves the military tactics, business, and intelligence agencies and strategy that government, military, law enforcement, techniques. It is used to prevent terrorism. A counter-terrorism strategy focuses on attempting counter-terrorism financing.
Research design
In this research, a mixed research design will be used to complete the main aim of this research. This research design would be selected as it contains the characteristics of both qualitative and quantitative research design. Qualitative research design will be beneficial for collecting the conceptual understanding of the research issues. Furthermore, quantitative research design would be selected for gathering the numeric information regarding research concern (Meleagrou-Hitchens, Audrey Alexander and Kaderbhai 1233).
In this research, both questionnaire and literature review strategies would be used to attain the research objective. Survey through questionnaire strategy would aid to gather the primary information about research issue. In addition, the literature review strategy would be used to collect secondary information regarding research issue. It would aid to obtain the more reliable and valid outcome (Tierney 1).
Research background
In this research, both primary and secondary data collection method would be used to gather information regarding upholding freedom of speech and expression and about counter-terrorism. In this way, primary data would be gathered through different sources like survey through questionnaire and interview. These sources would aid to acquire the first-hand information that is not published earlier (Archetti 49). Moreover, secondary data would be collected through different sources such as journal articles, online websites, government publications, and textbooks. This data collection method would be beneficial for gathering the authentic and reliable information about the upholding freedom of speech and expression and about counter-terrorism (Tierney 1).
Under this research, probability sampling technique would be used to choose the sample from a large amount of population. In this technique, simple random sampling will be selected as it would provide equal chances to select the respondents and also declines the biases from the investigation. For conducting the research, 50 employees will be selected from journalism industries who have participated in reporting the counter-terrorism. It would be beneficial for gathering the actual information regarding upholding freedom of speech and expression and about counter-terrorism (Beckmann, Dewenter and Thomas 9).
In this research, the researcher may face different ethical issues such as confidentiality issues and copyright issues. Hence, the researcher will not share the confidential information through anyone during and after the research to conduct the ethics investigation. Along with this, the researcher will provide a proper in-text citation to give credit to the author (Hopwood and Schutte 316). Moreover, the researcher will use own words in report writing to conduct ethical research. Moreover, the researcher will use privacy software to protect the data of customers. These all strategies would lead the researcher to conduct the investigation in an ethical way (Conway 77).
From the above discussion, it can be concluded that upholding freedom of speech and expression and about counter-terrorism is the key issue of this research. It can be evaluated that mixed research design would be selected because it contains the characteristics of both qualitative and quantitative research design. Furthermore, it can be summarised that both primary and secondary data collection method will be used to collect information about the research concern. It can be also concluded that the statistical data analysis method would be used to assess the collected information.
References
Archetti, Cristina. “Terrorism, communication and new media: Explaining radicalization in the digital age.” Perspectives on Terrorism 9.1 (2015): 49-59.
Beckmann, Klaus B., Ralf Dewenter, and Tobias Thomas. “Can news draw blood? The impact of media coverage on the number and severity of terror attacks.” Peace Economics, Peace Science and Public Policy 23.1 (2017): 9.
Conway, Maura. “Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research.” Studies in Conflict & Terrorism 40.1 (2017): 77-98.
Denemark, David, and Andrew Chubb. “Citizen attitudes towards maritime territorial disputes: traditional media and Internet usage as distinctive conduits of political views.” Information, Communication & Society 19.1 (2016): 59-79.
Gilboa, Eytan, Maria Gabrielsen Jumbert, Jason Miklian, and Piers Robinson. “Moving media and conflict studies beyond the CNN effect.” Review of International Studies 42.4 (2016): 654-672.
Hopwood, Tanya L., and Nicola S. Schutte. “Psychological outcomes in reaction to media exposure to disasters and large-scale violence: A meta-analysis.” Psychology of Violence 7.2 (2017): 316.
Meleagrou-Hitchens, Alexander, Audrey Alexander, and Nick Kaderbhai. “The impact of digital communications technology on radicalization and recruitment.” International Affairs 93.5 (2017): 1233-1249.
Tierney, Michael. “# terrorist financing: An Examination of Terrorism Financing via the Internet.” International Journal of Cyber Warfare and Terrorism (IJCWT) 8.1 (2018): 1-11.