Works matching DE "INTERNET %26 terrorism"
Results: 81
Cinematic Terrorism: Deleuze, ISIS and Delirium.
- Published in:
- Journal for Cultural Research, 2016, v. 20, n. 4, p. 366, doi. 10.1080/14797585.2016.1168973
- By:
- Publication type:
- Article
Message Boards, Public Discourse, and Historical Meaning: An Online Community Reacts to September 11.
- Published in:
- American Journalism, 2012, v. 29, n. 4, p. 9, doi. 10.1080/08821127.2012.10677846
- By:
- Publication type:
- Article
Selling terror: The symbolization and positioning of Jihad.
- Published in:
- Marketing Theory, 2009, v. 9, n. 2, p. 227, doi. 10.1177/1470593109103069
- By:
- Publication type:
- Article
Al-Shabaab and Social Media: A Double-Edged Sword.
- Published in:
- Brown Journal of World Affairs, 2014, v. 20, n. 2, p. 309
- By:
- Publication type:
- Article
The Role of the Internet Post-9/11 in Terrorism and Counterterrorism.
- Published in:
- Brown Journal of World Affairs, 2014, v. 20, n. 2, p. 297
- By:
- Publication type:
- Article
Editorial:.
- Published in:
- 2010
- Publication type:
- Editorial
A TALE OF TWO TREATIES: A MARITIME MODEL TO STOP THE SCOURGE OF CYBERCRIME.
- Published in:
- Boston University International Law Journal, 2021, v. 39, n. 2, p. 143
- By:
- Publication type:
- Article
Becoming žiŽek's Neighbor: Alterity, Affect, and Network in Popular Culture and Policy at the 10th Anniversary of 9/11.
- Published in:
- 2012
- By:
- Publication type:
- Essay
Exploring the form and function of dissident Irish Republican online discourses.
- Published in:
- Media, War & Conflict, 2012, v. 5, n. 1, p. 71, doi. 10.1177/1750635211434371
- By:
- Publication type:
- Article
Uncovering the French-speaking jihadisphere: An exploratory analysis.
- Published in:
- Media, War & Conflict, 2012, v. 5, n. 1, p. 51, doi. 10.1177/1750635211434366
- By:
- Publication type:
- Article
Twittering the Boko Haram Uprising in Nigeria: Investigating Pragmatic Acts in the Social Media.
- Published in:
- Africa Today, 2013, v. 59, n. 3, p. 83, doi. 10.2979/africatoday.59.3.83
- By:
- Publication type:
- Article
CAN WE FIND AND STOP THE "JIHAD JANES"?
- Published in:
- Cardozo Journal of International & Comparative Law, 2011, v. 19, n. 1, p. 91
- By:
- Publication type:
- Article
Considering the ethics of big data research: A case of Twitter and ISIS/ISIL.
- Published in:
- PLoS ONE, 2017, v. 12, n. 12, p. 1, doi. 10.1371/journal.pone.0187155
- By:
- Publication type:
- Article
Online extremism and the communities that sustain it: Detecting the ISIS supporting community on Twitter.
- Published in:
- PLoS ONE, 2017, v. 12, n. 12, p. 1, doi. 10.1371/journal.pone.0181405
- By:
- Publication type:
- Article
Why the Internet Is Not Increasing Terrorism.
- Published in:
- Security Studies, 2014, v. 23, n. 2, p. 293, doi. 10.1080/09636412.2014.905353
- By:
- Publication type:
- Article
Could the Issue of DPRK Hacking Benefit from Benign Neglect?
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 83, doi. 10.1353/gia.2018.0010
- By:
- Publication type:
- Article
A Rules-Based Order to Keep the Internet Open and Secure.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 76, doi. 10.1353/gia.2018.0009
- By:
- Publication type:
- Article
When Cyber Threats Loom, What Can State and Local Governments Do?
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 67, doi. 10.1353/gia.2018.0008
- By:
- Publication type:
- Article
Ensuring US Dominance in Cyberspace in a World of Significant Peer and Near-Peer Competition.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 51, doi. 10.1353/gia.2018.0007
- By:
- Publication type:
- Article
The Threat of Cyber Terrorism and What International Law Should (Try To) Do about It.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 43, doi. 10.1353/gia.2018.0006
- By:
- Publication type:
- Article
Terrorist Migration to Social Media.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2015, v. 16, n. 1, p. 180
- By:
- Publication type:
- Article
Countering terrorism or criminalizing curiosity? The troubled history of UK responses to right-wing and other extremism.
- Published in:
- Common Law World Review, 2021, v. 50, n. 1, p. 57, doi. 10.1177/1473779521989349
- By:
- Publication type:
- Article
"Jihad Cool/Jihad Chic": The Roles of the Internet and Imagined Relations in the Self-Radicalization of Colleen LaRose (Jihad Jane).
- Published in:
- Societies (2075-4698), 2015, v. 5, n. 2, p. 354, doi. 10.3390/soc5020354
- By:
- Publication type:
- Article
Incel (E)motives: Resentment, Shame and Revenge.
- Published in:
- Studies in Conflict & Terrorism, 2021, v. 44, n. 2, p. 93, doi. 10.1080/1057610X.2020.1822589
- By:
- Publication type:
- Article
"I Will Tell You a Story about Jihad": ISIS's Propaganda and Narrative Advertising.
- Published in:
- Studies in Conflict & Terrorism, 2021, v. 44, n. 2, p. 115, doi. 10.1080/1057610X.2020.1799519
- By:
- Publication type:
- Article
Let's Play a Video Game: Jihadi Propaganda in the World of Electronic Entertainment.
- Published in:
- Studies in Conflict & Terrorism, 2019, v. 42, n. 4, p. 383, doi. 10.1080/1057610X.2017.1385903
- By:
- Publication type:
- Article
Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research.
- Published in:
- Studies in Conflict & Terrorism, 2017, v. 40, n. 1, p. 77, doi. 10.1080/1057610X.2016.1157408
- By:
- Publication type:
- Article
Brothers, Believers, Brave Mujahideen : Focusing Attention on the Audience of Violent Jihadist Preachers.
- Published in:
- Studies in Conflict & Terrorism, 2017, v. 40, n. 1, p. 62, doi. 10.1080/1057610X.2016.1157407
- By:
- Publication type:
- Article
The Call to Jihad: Charismatic Preachers and the Internet.
- Published in:
- Studies in Conflict & Terrorism, 2017, v. 40, n. 1, p. 44, doi. 10.1080/1057610X.2016.1157406
- By:
- Publication type:
- Article
#Westgate: A Case Study: How al-Shabaab used Twitter during an Ongoing Attack.
- Published in:
- Studies in Conflict & Terrorism, 2017, v. 40, n. 1, p. 24, doi. 10.1080/1057610X.2016.1157404
- By:
- Publication type:
- Article
Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization.
- Published in:
- Studies in Conflict & Terrorism, 2017, v. 40, n. 1, p. 1, doi. 10.1080/1057610X.2016.1157402
- By:
- Publication type:
- Article
“Electronic Jihad ”: The Internet as Al Qaeda's Catalyst for Global Terror.
- Published in:
- Studies in Conflict & Terrorism, 2017, v. 40, n. 1, p. 10, doi. 10.1080/1057610X.2016.1157403
- By:
- Publication type:
- Article
Going Dark: Terrorism on the Dark Web.
- Published in:
- Studies in Conflict & Terrorism, 2016, v. 39, n. 3, p. 195, doi. 10.1080/1057610X.2015.1119546
- By:
- Publication type:
- Article
Tweeting the Jihad : Social Media Networks of Western Foreign Fighters in Syria and Iraq.
- Published in:
- Studies in Conflict & Terrorism, 2015, v. 38, n. 1, p. 1, doi. 10.1080/1057610X.2014.974948
- By:
- Publication type:
- Article
Options and Strategies for Countering Online Radicalization in the United States.
- Published in:
- Studies in Conflict & Terrorism, 2013, v. 36, n. 6, p. 431, doi. 10.1080/1057610X.2013.784568
- By:
- Publication type:
- Article
Cyber- Fatwas and Terrorism.
- Published in:
- Studies in Conflict & Terrorism, 2011, v. 34, n. 10, p. 765, doi. 10.1080/1057610X.2011.604831
- By:
- Publication type:
- Article
The Internet, the Perpetual Beta, and the State: The Long View of the New Medium.
- Published in:
- Studies in Conflict & Terrorism, 2010, v. 33, n. 8, p. 673, doi. 10.1080/1057610X.2010.494154
- By:
- Publication type:
- Article
Terrorist Financing and the Internet.
- Published in:
- Studies in Conflict & Terrorism, 2010, v. 33, n. 4, p. 353, doi. 10.1080/10576101003587184
- By:
- Publication type:
- Article
Exploring “Stormfront”: A Virtual Community of the Radical Right.
- Published in:
- Studies in Conflict & Terrorism, 2009, v. 32, n. 11, p. 989, doi. 10.1080/10576100903259951
- By:
- Publication type:
- Article
TERRORISM ONLINE: IS SPEECH THE SAME AS IT EVER WAS?
- Published in:
- Creighton Law Review, 2011, v. 44, n. 4, p. 963
- By:
- Publication type:
- Article
The online behaviors of Islamic state terrorists in the United States.
- Published in:
- Criminology & Public Policy, 2021, v. 20, n. 1, p. 177, doi. 10.1111/1745-9133.12537
- By:
- Publication type:
- Article
Issue Information.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 1, doi. 10.1111/1745-9133.12251
- Publication type:
- Article
Terrorism and the Internet.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 93, doi. 10.1111/1745-9133.12292
- By:
- Publication type:
- Article
Countering Violent Extremism Online and Offline.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 119, doi. 10.1111/1745-9133.12267
- By:
- Publication type:
- Article
Terrorist Use of the Internet by the Numbers.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 99, doi. 10.1111/1745-9133.12249
- By:
- Publication type:
- Article
Same Kind of Different.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 127, doi. 10.1111/1745-9133.12285
- By:
- Publication type:
- Article
A Very Long View from Here.
- Published in:
- American Scholar, 2010, v. 79, n. 2, p. 14
- Publication type:
- Article
The Dynamics of the Creation, Evolution, and Disappearance of Terrorist Internet Forums.
- Published in:
- International Journal of Conflict & Violence, 2013, v. 7, n. 1, p. 164
- By:
- Publication type:
- Article
Letter from the Editors.
- Published in:
- International Journal of Conflict & Violence, 2013, v. 7, n. 1, p. 3
- Publication type:
- Article
SMISHING ATTACKS AND THE HUMAN ELEMENT.
- Published in:
- Bench & Bar of Minnesota, 2022, v. 79, n. 4, p. 12
- By:
- Publication type:
- Article