Modelling terrorist strategy using the Business Model Canvas and the Value Proposition Canvas /

Terrorism has become rampant since the 9/11 incident. In any warfare, be it military or terrorist warfare, it is about the execution of effective strategies. The opponent has to outsmart its attackers via counter combative or counter strategies. Hence this study is timely to find out what strategies...

Full description

Saved in:
Bibliographic Details
Main Author: Mohd Arif Gulbuddin bin Abdul Halim (Author)
Format: Thesis
Language:English
Published: Kuala Lumpur : Kulliyyah of Information and Communication Technology, International Islamic University Malaysia, 2018
Subjects:
Online Access:http://studentrepo.iium.edu.my/handle/123456789/5478
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 038680000a22003010004500
008 180416s2018 my a f m 000 0 eng d
040 |a UIAM  |b eng  |e rda 
041 |a eng 
043 |a a-my--- 
050 0 0 |a HV6431 
100 0 |a Mohd Arif Gulbuddin bin Abdul Halim,  |e author 
245 1 0 |a Modelling terrorist strategy using the Business Model Canvas and the Value Proposition Canvas /  |c by Mohd Arif Gulbuddin bin Abdul Halim 
264 1 |a Kuala Lumpur :  |b Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,  |c 2018 
300 |a xiv, 137 leaves :  |b colour illustrations ;  |c 30cm. 
336 |2 rdacontent  |a text 
347 |2 rdaft  |a text file  |b PDF 
502 |a Thesis (MPSM)--International Islamic University Malaysia, 2018. 
504 |a Includes bibliographical references (leaves 100-102). 
520 |a Terrorism has become rampant since the 9/11 incident. In any warfare, be it military or terrorist warfare, it is about the execution of effective strategies. The opponent has to outsmart its attackers via counter combative or counter strategies. Hence this study is timely to find out what strategies Terrorist groups adopt and should be emulated by relevant agencies that are entrusted to combat them. This research begins by investigating two most popular models–the Business Model Canvas and the Value Proposition Canvas. This study used the qualitative methodology research method, that involved gathering of information from both primary and secondary sources. In-depth interviews involving some experts, researchers and practitioners who had experienced counter terrorism and security disputes of Malaysia was undertaken. Several Malaysian terrorist incidences in the past had also taught lessons to combat them in a political and armed forces way but this study enlightened the government security forces and intelligence agencies to engage into more ICT-friendly tactics. Canvassing or crusading via ICT has proven to be a powerful and effective way of recruiting the so-called Muslim terrorists the world over to fight or sacrifice for terrorist groups in the name of Islam. Based on the findings of this dissertation, the proposed Terrorist Business Model Canvas and the Terrorist Value Proposition Canvas are strongly recommended to be used as the model to help the intelligence and related agencies to counter the attractiveness of the terrorist groups in influencing people by making the value propositions visible, tangible and easier to discuss and managed. By using the same method, it is also an opportunity to help intelligence and related agencies to analyse and examine the behaviours of terrorist groups in influencing recruits to carry out the acts of violence as an objective to achieve their political goals. This research found that the terrorist groups are intelligent and smart in manipulating the Pains, Gains and the Jobs of their target persons via designing the best values that appeal and attract people to join and support them. In conclusion, knowledge gained from the adaptation and modification of the models is useful to the country's intelligence agencies to strategize and redress terrorist threats and attacks in the future. 
596 |a 1 
655 7 |a Theses, IIUM local 
690 |a Dissertations, Academic  |x Centre for IT Advancement (CITA)  |z IIUM 
710 2 |a International Islamic University Malaysia.  |b Centre for IT Advancement (CITA) 
856 4 |u http://studentrepo.iium.edu.my/handle/123456789/5478 
900 |a sbh-aaz 
999 |c 440512  |d 471047 
952 |0 0  |6 T HV 006431 M697M 2018  |7 0  |8 THESES  |9 762688  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o t HV 6431 M697M 2018  |p 11100406933  |r 2020-09-09  |t 1  |v 0.00  |y THESIS 
952 |0 0  |6 TS CDF HV 6431 M697M 2018  |7 0  |8 THESES  |9 857076  |a IIUM  |b IIUM  |c MULTIMEDIA  |g 0.00  |o ts cdf HV 6431 M697M 2018  |p 11100406934  |r 2020-09-09  |t 1  |v 0.00  |y THESISDIG