The announcement of Dar al-Harb in cyber media in context of the theological policy of jihad: reading the cyber-jihad and ISIS based on the pharmakon characteristic of the cyber media
‘Pharmakon’ is a dualist word which means remedy or poison, or neither remedy nor poison, and it was used by Jacques Derrida in the Pharmacy of Plato (La Pharmacie de Platon - 1972) where he made a structural analysis of Plato's dialog with Phaedrus. Some think that it is a remedy; it is benefi...
| Main Authors: | Erdem, Burcu Kaya, Bilge, Remzi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Department of Theology and Philosophy, Faculty of Islamic Studies, Universiti Kebangsaan Malaysia
2017
|
| Online Access: | http://journalarticle.ukm.my/11171/ http://journalarticle.ukm.my/11171/1/IJIT-Vol-11-June-2017_3_17-29-1-Burcu-1.pdf |
Similar Items
Contestation Of Jihad And Social Media Narrative: A Case Study Of Isis
by: Mohd Kaslan, Umi Nur Zahidah
Published: (2021)
by: Mohd Kaslan, Umi Nur Zahidah
Published: (2021)
ISIS salah faham fiqh jihad sebenar
by: Malik, Maszlee
Published: (2016)
by: Malik, Maszlee
Published: (2016)
Explaining ISIS : differences and misconception of jihad and qital
by: Umi Nur Zahidah Mohd Kaslan,, et al.
Published: (2021)
by: Umi Nur Zahidah Mohd Kaslan,, et al.
Published: (2021)
The practice of McJournalism in Indonesia’s cyber media
by: Muslikhin,, et al.
Published: (2021)
by: Muslikhin,, et al.
Published: (2021)
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)
by: Ford, Shannon
Published: (2014)
Parental awareness on cyber threats using social media
by: Nazilah Ahmad@Ahmad Arifin,, et al.
Published: (2019)
by: Nazilah Ahmad@Ahmad Arifin,, et al.
Published: (2019)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber hygiene during Covid-19 to avoid cyber attacks
by: Lee, Yvonne Yi Jin
Published: (2022)
by: Lee, Yvonne Yi Jin
Published: (2022)
Islam and the cyber world
by: Shuriye, Abdi Omar, et al.
Published: (2014)
by: Shuriye, Abdi Omar, et al.
Published: (2014)
Cyber Safety in Malaysia
by: Soon , Seng Thah
Published: (2017)
by: Soon , Seng Thah
Published: (2017)
Cyber law in Malaysia
by: Ibrahim, Azmuddin
Published: (2009)
by: Ibrahim, Azmuddin
Published: (2009)
Cyber Identity Theft
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Social media usage and awareness of cyber security issues among youths
by: Ahmad, F., et al.
Published: (2020)
by: Ahmad, F., et al.
Published: (2020)
Understanding Jihad
by: Shahidatul Ashikin Shahran,, et al.
Published: (2018)
by: Shahidatul Ashikin Shahran,, et al.
Published: (2018)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Cyber essentials for Nigerian business
by: Orunta, Nathaniel
Published: (2015)
by: Orunta, Nathaniel
Published: (2015)
Cyber laws and it-rich society
by: P.S. Sangal,
Published: (2001)
by: P.S. Sangal,
Published: (2001)
Semantics of Cyber-Physical Systems
by: Hussain, Omar, et al.
Published: (2012)
by: Hussain, Omar, et al.
Published: (2012)
Cyber cafe management system
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
by: Mohammad Nur Taufiq, Ibrahim
Published: (2014)
Cyber cafe management system
by: Mohd Khazro'ie, Jaafar
Published: (2010)
by: Mohd Khazro'ie, Jaafar
Published: (2010)
Cyber counselling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber- counseling: is it really new?
by: Zainudin, Zaida Nor, et al.
Published: (2018)
by: Zainudin, Zaida Nor, et al.
Published: (2018)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Down the cyber rabbit hole: whistleblowing as a means to fulfilling moral obligations in cyber space
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
by: Hazlina Shaik Md Noor Alam,
Published: (2020)
Keganasan menyalahi jihad
by: Abd Rahman, Saodah
Published: (2017)
by: Abd Rahman, Saodah
Published: (2017)
Jihad beyond Islam
by: Shahidatul Ashikin Shahran,, et al.
Published: (2018)
by: Shahidatul Ashikin Shahran,, et al.
Published: (2018)
The true meaning of jihad
by: Abd Razak, Dzulkifli
Published: (2006)
by: Abd Razak, Dzulkifli
Published: (2006)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
Konsep jihad Yusuf al-Qaradawi dalam karya Fiqh al-Jihad
by: Mohd Zuhdi Ahmad Khasasi,, et al.
Published: (2015)
by: Mohd Zuhdi Ahmad Khasasi,, et al.
Published: (2015)
Citizen, cyber government and the legal aspects
by: Zulhuda, Sonny
Published: (2014)
by: Zulhuda, Sonny
Published: (2014)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Cyber Conflict and Just War Theory
by: Collie, Nicholas
Published: (2023)
by: Collie, Nicholas
Published: (2023)
Defamation in the cyber age: the emerging trends
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
by: Ahangar, Mohd Altaf Hussein
Published: (2010)
Jurisdictional and definitional issues of cyber-stalking
by: Roberts, Lynne
Published: (2009)
by: Roberts, Lynne
Published: (2009)
Cyber Safety Instrumentation Systems, CSIS
by: Eren, Halit
Published: (2011)
by: Eren, Halit
Published: (2011)
Cyber-physical systems for smart grid
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
CyberReach Project Research Report
by: Hyde, Zoe, et al.
Published: (2006)
by: Hyde, Zoe, et al.
Published: (2006)
Linguistic deception of Chinese cyber fraudsters
by: Tan, Kim Hua, et al.
Published: (2017)
by: Tan, Kim Hua, et al.
Published: (2017)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
Similar Items
-
Contestation Of Jihad And Social Media Narrative: A Case Study Of Isis
by: Mohd Kaslan, Umi Nur Zahidah
Published: (2021) -
ISIS salah faham fiqh jihad sebenar
by: Malik, Maszlee
Published: (2016) -
Explaining ISIS : differences and misconception of jihad and qital
by: Umi Nur Zahidah Mohd Kaslan,, et al.
Published: (2021) -
The practice of McJournalism in Indonesia’s cyber media
by: Muslikhin,, et al.
Published: (2021) -
Conflict and Cyber-espionage: Ridding the World of Cyber War?
by: Ford, Shannon
Published: (2014)