<br />
<b>Notice</b>:  Function _load_textdomain_just_in_time was called <strong>incorrectly</strong>. Translation loading for the <code>profitmag</code> domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the <code>init</code> action or later. Please see <a href="https://developer.wordpress.org/advanced-administration/debug/debug-wordpress/">Debugging in WordPress</a> for more information. (This message was added in version 6.7.0.) in <b>/www/crimelog.it/wp-includes/functions.php</b> on line <b>6131</b><br />
{"id":179,"date":"2017-02-14T18:23:22","date_gmt":"2017-02-14T17:23:22","guid":{"rendered":"http:\/\/www.crimelog.it\/?p=179"},"modified":"2017-02-15T17:43:08","modified_gmt":"2017-02-15T16:43:08","slug":"the-distribution-platforms-of-isis-propaganda","status":"publish","type":"post","link":"https:\/\/www.crimelog.it\/?p=179","title":{"rendered":"The distribution platforms of ISIS propaganda &#8211;                                                                                                                                                                                                                                                                                                                                                                  UGC, websites, file hosting"},"content":{"rendered":"<p><span lang=\"en-US\">The skill that ISIS has acquired over the years in exploiting the web for propaganda is well known and extensively analyzed from various point of views. However, the majority of researches have been focused on the instant communication\u2019s platforms (Tweeter, Facebook, etc.) because of their power to spread quickly and \u201cstick\u201d strongly. Social Networks are usually, and rightly, identified as the main medium through which ISIS\u2019 propaganda is disseminated, but they are not always appropriate for the purpose, mainly if the message to be conveyed is complex and articulated. One of tools used by the \u201cstickiness engineering\u201d<\/span><a class=\"sdfootnoteanc\" href=\"#sdfootnote1sym\" name=\"sdfootnote1anc\"><sup>1<\/sup><\/a><span lang=\"en-US\"> is telling a story and this requires different mediums such as Youtube (footage, the s.c. \u201cdocumentaries on life in the Islamic State\u201d, etc.), Instagram (exploiting the storytelling power of images), post on forums or blogs (using words to produce the message). All of these mediums are generally indicated as UGC (User Generated Contents), defined as &#8220;any form of content such as blogs, wikis, discussion forums, posts, chats, tweets, podcasts, digital images, video, audio files, advertisements and other forms of media that was created by users of an online system or service, often made available via social media websites&#8221;<\/span><a class=\"sdfootnoteanc\" href=\"#sdfootnote2sym\" name=\"sdfootnote2anc\"><sup>2<\/sup><\/a><span lang=\"en-US\">. Contents distributed through UGC are designed to be instantly available, without any intermediary steps, and if removed by the service provider, they can be easily and quickly uploaded again by other users. Sometimes, instead, the nature of the content, such as magazines or news about the self-appointed Caliphate, requires time to be read or watched and websites and file hosting<\/span><a class=\"sdfootnoteanc\" href=\"#sdfootnote3sym\" name=\"sdfootnote3anc\"><sup>3<\/sup><\/a><span lang=\"en-US\"> best meet this purpose. Websites, registered with fake data and using free resources made available by web hosting services or microblogging platforms, best suit the need to spread news on battles and damage inflicted to the enemy, since they allow to group the data and amplify the impact of achievements. Magazines, fighters\u2019 or leaders\u2019 biographies are rather mostly distributed through links on file hosting because they offer at least 2 GB of free storage and contents are not indexed. <\/span><\/p>\n<p><em>This subject will be further developed on a forthcoming publication.<\/em><\/p>\n<div id=\"sdfootnote1\">\n<p><a class=\"sdfootnotesym\" href=\"#sdfootnote1anc\" name=\"sdfootnote1sym\">1<\/a><sup><span style=\"font-size: small;\">\u0002<\/span><\/sup><span style=\"font-size: small;\"><span lang=\"en-US\"> Heath, C., &amp; Heath, D.,\u00a0 Made to stick: Why some ideas survive and others die, Random House, 2007.<\/span><\/span><\/p>\n<\/div>\n<div id=\"sdfootnote2\">\n<p><span style=\"font-size: small;\"><a class=\"sdfootnotesym\" href=\"#sdfootnote2anc\" name=\"sdfootnote2sym\">2<\/a><sup>\u0002<\/sup><span lang=\"en-US\"> https:\/\/en.wikipedia.org\/wiki\/User-generated_content.<\/span><\/span><\/p>\n<\/div>\n<div id=\"sdfootnote3\">\n<p><span style=\"font-size: small;\"><a class=\"sdfootnotesym\" href=\"#sdfootnote3anc\" name=\"sdfootnote3sym\">3<\/a><sup>\u0002<\/sup><span lang=\"en-US\"> A <\/span><span lang=\"en-US\">file hosting service<\/span><span lang=\"en-US\">, <\/span><span lang=\"en-US\">cloud storage service<\/span><span lang=\"en-US\">, <\/span><span lang=\"en-US\">online file storage provider<\/span><span lang=\"en-US\">, or <\/span><span lang=\"en-US\">cyberlocker<\/span><span lang=\"en-US\"> is an Internet hosting service specifically designed to host user files. It allows users to upload files that could then be accessed over the internet from a different computer or other networked device (<a href=\"https:\/\/en.wikipedia.org\/wiki\/File_hosting_service\">https:\/\/en.wikipedia.org\/wiki\/File_hosting_service<\/a>).<\/span><\/span><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The skill that ISIS has acquired over the years in exploiting the web for propaganda is well known and extensively analyzed from various point of views. However, the majority of researches have been focused on the instant communication\u2019s platforms (Tweeter, Facebook, etc.) because of their power to spread quickly and \u201cstick\u201d strongly. Social Networks are usually, and rightly, identified as the main medium through which ISIS\u2019 propaganda is disseminated, but they are not always appropriate&#8230;<\/p>\n","protected":false},"author":1,"featured_media":186,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[53,25,17,55],"class_list":["post-179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-terrorism-2","tag-file-hosting","tag-isis","tag-propaganda","tag-ugc"],"_links":{"self":[{"href":"https:\/\/www.crimelog.it\/index.php?rest_route=\/wp\/v2\/posts\/179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.crimelog.it\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.crimelog.it\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.crimelog.it\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.crimelog.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=179"}],"version-history":[{"count":4,"href":"https:\/\/www.crimelog.it\/index.php?rest_route=\/wp\/v2\/posts\/179\/revisions"}],"predecessor-version":[{"id":184,"href":"https:\/\/www.crimelog.it\/index.php?rest_route=\/wp\/v2\/posts\/179\/revisions\/184"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.crimelog.it\/index.php?rest_route=\/wp\/v2\/media\/186"}],"wp:attachment":[{"href":"https:\/\/www.crimelog.it\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.crimelog.it\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.crimelog.it\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}