Explain the problem the author of the article addresses. Lawson (2018) states that the security dilemma escalates involvement of communities in Syrian in the Islamic State war. Communities support terrorist organizations when they are assured of security. ◦Explain how the author deals with the problem (the author’s methodology).

Article 1
Explain the problem the author of the article addresses. Lawson (2018) states that the security dilemma escalates involvement of communities in Syrian in the Islamic State war. Communities support terrorist organizations when they are assured of security. ◦Explain how the author deals with the problem (the author’s methodology).
According to Lawson (2018), Lawson has taken Syria as a case study to see how countries can win the war on terrorism. ◦Explain the conclusions the author reaches in the article.
Addressing the security dilemma in countries that are faced with terrorism will prevent the communities from supporting the organizations (Lawson, 2018). When security is assured the local communities will not support the ISIS. References Lawson, F. H. (2018). The assistance front versus the popular protection units versus the Islamic state: Reciprocal mobilization and the ascendance of violent non-state actors in the Syrian Civil War. In Violent Non-state Actors and the Syrian Civil War (pp. 91-106). Springer, Cham.
Article 2 Explain the problem the author of the article addresses. According to Isakhan (2018), self defence by Shia on their Holy Sites has escalated the ISIS agenda. The Shia community established a military wing to fight the ISIS who got an opportunity to get support from radicalized Shiite communities. ◦Explain how the author deals with the problem (the author’s methodology).
Event sampling methodology was done to establish why the ISIS has enormous support from the Shi’ite community (Isakhan, 2018). ◦Explain the conclusions the author reaches in the article. Isakhan (2018) concludes that the communities should stop falling for the divide and rule policy adopted by ISIS. The Shiite and Shia should engage in dialogue to stop taking sides in the ISIS issue to have the terrorist group defeated. References Isakhan, B. (2018). The Islamic State Attacks on Shia Holy Sites and the “Shrine Protection Narrative”: Threats to Sacred Space as a Mobilization Frame.Terrorism and Political Violence, 1-25.
Article 3
Explain the problem the author of the article addresses. Yesiltas (2018) noted that ISIS was a terrorist group created to eliminate the influence that the West had started having in the Middle East. ◦Explain how the author deals with the problem (the author’s methodology). A quasi experiment on the entire Middle East reveal that the ISIS and the Arab Spring was a revolt against the Western influence on the local population (Yesiltas, 2018). ◦Explain the conclusions the author reaches in the article.
According to Yesiltas (2018), the ISIS can be best defeated at a local level than a foreign level. The interference of the West on local matters has seen ISIS get sympathizers in the Middle East region making it difficult to defeat the terrorist group. References Yeşiltaş, M., & Kardaş, T. (2018). The New Middle East, ISIL and the 6th Revolt Against the West. In Non-State Armed Actors in the Middle East (pp. 147-167). Palgrave Macmillan, Cham.
Article 4
Explain the problem the author of the article addresses. Chouliaraki (2018) noted that the digital era has encouraged growth of ISIS for it can spread propaganda through it. ◦Explain how the author deals with the problem (the author’s methodology).
Content analysis has been used to evaluate online videos of ISIS that show mutilated bodies accessed globally. The online video has appealed to lone wolf terrorist in the West (Chouliaraki, 2018). ◦Explain the conclusions the author reaches in the article. According to Chouliaraki (2018), online content operators like YouTube, Facebook and Instagram should check videos being posted to avoid giving the terrorist room to operate and spread their ideology. References Chouliaraki, L., & Kissas, A. (2018). The communication of horrorism: a typology of ISIS online death videos. Critical Studies in Media Communication,35(1), 24-39.
Article 5
Explain the problem the author of the article addresses. According to (2018), the media has played a role in the success of the ISIS acts on the global scale. The media broadcasts have been used to popularize the terrorist group around the world. ◦Explain how the author deals with the problem (the author’s methodology).
Artrip (2018) used observation to note that media houses promoted the ISIS ideology on a global state. The media splashed video of the acts of violence by the group that promotes radicalization of persons globally. ◦Explain the conclusions the author reaches in the article. The media should be cautious of the message that they offer about the ISIS terrorist group. The media should vet their actions before they broadcast any information about the terrorist group.
1.Of the five articles you used ABOVE !!!!!!! select three that share a common theme discussed in the first nine chapters of our textbook.
2.In a well-written paper, provide the following for EACH article: ◦A description of the theme as our textbook discusses it. ◦What the articles you have selected say about the theme. Where do they agree? Where do they disagree? ◦Now that you have reviewed at least four sources on this theme (our textbook and the three articles), what is your perspective?
3.Papers must adhere to the following guidelines PRIOR to submission on or before the last day of Week 4:
◦The first page of your paper will be a cover sheet correctly formatted according to APA guidelines.
◦This paper will use 1-inch margins, Times New Roman 12-point font, and double spacing.
◦The citations for each article MUST be correctly formatted according to APA guidelines.
Do NOT use an automated citation manager to perform this function. Do it manually for this assignment and check your formatting against available APA resources.
◦Excluding the cover page and references, this paper must EXCEED 5 pages of written text.
◦Only COMPLETE paragraphs consisting of an introductory sentence, a full explanation of key points supported with properly cited sources, and a concluding sentence may be used.
◦Only use published articles from academic texts, such as those found at scholar.google.com or accessed through your Grantham University EBSCO host account.g.
The entire paper must be your original work. It may not include quotes, and at no time should text be copied and pasted.
◦This paper DOES require an introductory paragraph, explicit thesis statement, concluding paragraph, and references page.