Works matching DE "INTERNET %26 terrorism"
Results: 81
Polarised Security: How do Chinese Netizens Respond to the Securitisation of Terrorism?
- Published in:
- Asian Studies Review, 2020, v. 44, n. 2, p. 335, doi. 10.1080/10357823.2019.1697205
- By:
- Publication type:
- Article
Twittering the Boko Haram Uprising in Nigeria: Investigating Pragmatic Acts in the Social Media.
- Published in:
- Africa Today, 2013, v. 59, n. 3, p. 83, doi. 10.2979/africatoday.59.3.83
- By:
- Publication type:
- Article
Why the Internet Is Not Increasing Terrorism.
- Published in:
- Security Studies, 2014, v. 23, n. 2, p. 293, doi. 10.1080/09636412.2014.905353
- By:
- Publication type:
- Article
Jihad Dramatically Transformed? Sageman on Jihad and the Internet.
- Published in:
- Homeland Security Affairs, 2010, v. 6, n. 1, p. 1
- By:
- Publication type:
- Article
Selling terror: The symbolization and positioning of Jihad.
- Published in:
- Marketing Theory, 2009, v. 9, n. 2, p. 227, doi. 10.1177/1470593109103069
- By:
- Publication type:
- Article
Surenos gangs and Mexican cartel use of social networking sites.
- Published in:
- Small Wars & Insurgencies, 2010, v. 21, n. 1, p. 81, doi. 10.1080/09592310903561486
- By:
- Publication type:
- Article
CAN WE FIND AND STOP THE "JIHAD JANES"?
- Published in:
- Cardozo Journal of International & Comparative Law, 2011, v. 19, n. 1, p. 91
- By:
- Publication type:
- Article
Ten Years Later, The War Continues.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2011, v. 17, n. 3, p. 42
- By:
- Publication type:
- Article
Terrorism And The Use Of Social Media In Mumbai Attacks.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2010, v. 16, n. 4, p. 16
- By:
- Publication type:
- Article
Cinematic Terrorism: Deleuze, ISIS and Delirium.
- Published in:
- Journal for Cultural Research, 2016, v. 20, n. 4, p. 366, doi. 10.1080/14797585.2016.1168973
- By:
- Publication type:
- Article
You Too Can Be Awlaki!
- Published in:
- Fletcher Forum of World Affairs, 2011, v. 35, n. 1, p. 25
- By:
- Publication type:
- Article
SMISHING ATTACKS AND THE HUMAN ELEMENT.
- Published in:
- Bench & Bar of Minnesota, 2022, v. 79, n. 4, p. 12
- By:
- Publication type:
- Article
Evolution of the Islamic State After its Territorial Defeat.
- Published in:
- Counter Terrorist Trends & Analysis, 2018, v. 10, n. 5, p. 1
- By:
- Publication type:
- Article
Sub Saharan African Terrorist Groups' use of the Internet.
- Published in:
- Journal of Terrorism Research, 2014, v. 5, n. 1, p. 5, doi. 10.15664/jtr.825
- By:
- Publication type:
- Article
Violent Extremism Online: New Perspectives on Terrorism and the Internet.
- Published in:
- 2016
- By:
- Publication type:
- Book Review
A TALE OF TWO TREATIES: A MARITIME MODEL TO STOP THE SCOURGE OF CYBERCRIME.
- Published in:
- Boston University International Law Journal, 2021, v. 39, n. 2, p. 143
- By:
- Publication type:
- Article
Could the Issue of DPRK Hacking Benefit from Benign Neglect?
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 83, doi. 10.1353/gia.2018.0010
- By:
- Publication type:
- Article
A Rules-Based Order to Keep the Internet Open and Secure.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 76, doi. 10.1353/gia.2018.0009
- By:
- Publication type:
- Article
When Cyber Threats Loom, What Can State and Local Governments Do?
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 67, doi. 10.1353/gia.2018.0008
- By:
- Publication type:
- Article
Ensuring US Dominance in Cyberspace in a World of Significant Peer and Near-Peer Competition.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 51, doi. 10.1353/gia.2018.0007
- By:
- Publication type:
- Article
The Threat of Cyber Terrorism and What International Law Should (Try To) Do about It.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 43, doi. 10.1353/gia.2018.0006
- By:
- Publication type:
- Article
Terrorist Migration to Social Media.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2015, v. 16, n. 1, p. 180
- By:
- Publication type:
- Article
Countering terrorism or criminalizing curiosity? The troubled history of UK responses to right-wing and other extremism.
- Published in:
- Common Law World Review, 2021, v. 50, n. 1, p. 57, doi. 10.1177/1473779521989349
- By:
- Publication type:
- Article
IT for Peace? Fighting Against Terrorism in Social Media - An Explorative Twitter Study.
- Published in:
- I-com, 2017, v. 16, n. 2, p. 181, doi. 10.1515/icom-2017-0013
- By:
- Publication type:
- Article
The Islamic State's Virtual Caliphate.
- Published in:
- Middle East Quarterly, 2017, v. 24, n. 4, p. 1
- By:
- Publication type:
- Article
Mapping Transnational Extremist Networks: An Exploratory Study of the Soldiers of Odin's Facebook Network, Using Integrated Social Network Analysis.
- Published in:
- Perspectives on Terrorism, 2019, v. 13, n. 2, p. 21
- By:
- Publication type:
- Article
Terrorism Online: Politics, Law and Technology.
- Published in:
- 2015
- By:
- Publication type:
- Book Review
Use of the Internet to Counter the Appeal of Extremist Violence. Conference Summary & Follow-up/ Recommendations.
- Published in:
- 2012
- Publication type:
- Conference Paper/Materials
Rhetorical Charms: The Promise and Pitfalls of Humor and Ridicule as Strategies to Counter Extremist Narratives.
- Published in:
- Perspectives on Terrorism, 2012, v. 6, n. 1, p. 70
- By:
- Publication type:
- Article
Online Arguments against Al-Qaeda: An Exploratory Analysis.
- Published in:
- Perspectives on Terrorism, 2012, v. 6, n. 1, p. 54
- By:
- Publication type:
- Article
From Terrorist to Persona: Para-Social Interaction and the ETA Website.
- Published in:
- Perspectives on Terrorism, 2012, v. 6, n. 1, p. 23
- By:
- Publication type:
- Article
Perception Challenges Faced by Al-Qaeda on the Battlefield of Influence Warfare.
- Published in:
- Perspectives on Terrorism, 2012, v. 6, n. 1, p. 8
- By:
- Publication type:
- Article
Introduction.
- Published in:
- Perspectives on Terrorism, 2012, v. 6, n. 1, p. 5
- By:
- Publication type:
- Article
The online behaviors of Islamic state terrorists in the United States.
- Published in:
- Criminology & Public Policy, 2021, v. 20, n. 1, p. 177, doi. 10.1111/1745-9133.12537
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 1, doi. 10.1111/1745-9133.12251
- Publication type:
- Article
Terrorism and the Internet.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 93, doi. 10.1111/1745-9133.12292
- By:
- Publication type:
- Article
Terrorist Use of the Internet by the Numbers.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 99, doi. 10.1111/1745-9133.12249
- By:
- Publication type:
- Article
Countering Violent Extremism Online and Offline.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 119, doi. 10.1111/1745-9133.12267
- By:
- Publication type:
- Article
Same Kind of Different.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 127, doi. 10.1111/1745-9133.12285
- By:
- Publication type:
- Article
Becoming žiŽek's Neighbor: Alterity, Affect, and Network in Popular Culture and Policy at the 10th Anniversary of 9/11.
- Published in:
- 2012
- By:
- Publication type:
- Essay
TERRORISM ONLINE: IS SPEECH THE SAME AS IT EVER WAS?
- Published in:
- Creighton Law Review, 2011, v. 44, n. 4, p. 963
- By:
- Publication type:
- Article
The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums.
- Published in:
- International Journal of Conflict & Violence, 2013, v. 7, n. 1, p. 164
- By:
- Publication type:
- Article
Letter from the Editors.
- Published in:
- International Journal of Conflict & Violence, 2013, v. 7, n. 1, p. 3
- Publication type:
- Article
Message Boards, Public Discourse, and Historical Meaning: An Online Community Reacts to September 11.
- Published in:
- American Journalism, 2012, v. 29, n. 4, p. 9, doi. 10.1080/08821127.2012.10677846
- By:
- Publication type:
- Article
Al-Shabaab and Social Media: A Double-Edged Sword.
- Published in:
- Brown Journal of World Affairs, 2014, v. 20, n. 2, p. 309
- By:
- Publication type:
- Article
The Role of the Internet Post-9/11 in Terrorism and Counterterrorism.
- Published in:
- Brown Journal of World Affairs, 2014, v. 20, n. 2, p. 297
- By:
- Publication type:
- Article
The Convergence of Information Warfare.
- Published in:
- Strategic Studies Quarterly, 2017, v. 11, n. 1, p. 49
- By:
- Publication type:
- Article
New Reality.
- Published in:
- Government Technology, 2011, v. 24, n. 12, p. 31
- By:
- Publication type:
- Article
"Jihad Cool/Jihad Chic": The Roles of the Internet and Imagined Relations in the Self-Radicalization of Colleen LaRose (Jihad Jane).
- Published in:
- Societies (2075-4698), 2015, v. 5, n. 2, p. 354, doi. 10.3390/soc5020354
- By:
- Publication type:
- Article
Incel (E)motives: Resentment, Shame and Revenge.
- Published in:
- Studies in Conflict & Terrorism, 2021, v. 44, n. 2, p. 93, doi. 10.1080/1057610X.2020.1822589
- By:
- Publication type:
- Article