Works matching Internet %26 terrorism
Results: 178
The Role of the Internet Post-9/11 in Terrorism and Counterterrorism.
- Published in:
- Brown Journal of World Affairs, 2014, v. 20, n. 2, p. 297
- By:
- Publication type:
- Article
Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research.
- Published in:
- Studies in Conflict & Terrorism, 2017, v. 40, n. 1, p. 77, doi. 10.1080/1057610X.2016.1157408
- By:
- Publication type:
- Article
Why the Internet Is Not Increasing Terrorism.
- Published in:
- Security Studies, 2014, v. 23, n. 2, p. 293, doi. 10.1080/09636412.2014.905353
- By:
- Publication type:
- Article
Violent Extremism Online: New Perspectives on Terrorism and the Internet.
- Published in:
- 2016
- By:
- Publication type:
- Book Review
Terrorism and the Internet.
- Published in:
- Criminology & Public Policy, 2017, v. 16, n. 1, p. 93, doi. 10.1111/1745-9133.12292
- By:
- Publication type:
- Article
THE ADVOCACY OF TERRORISM ON THE INTERNET: FREEDOM OF SPEECH ISSUES AND THE MATERIAL SUPPORT STATUTES.
- Published in:
- International Journal of Terrorism & Political Hot Spots, 2016, v. 11, n. 3/4, p. 245
- By:
- Publication type:
- Article
La expansión, intensificación y seducción del terrorismo islamista a través de internet: análisis criminológico.
- Published in:
- Revista Científica General José María Córdova, 2019, v. 17, n. 26, p. 271, doi. 10.21830/19006586.431
- By:
- Publication type:
- Article
Use of the Internet to Counter the Appeal of Extremist Violence. Conference Summary & Follow-up/ Recommendations.
- Published in:
- 2012
- Publication type:
- Conference Paper/Materials
Internet connectivity and domestic terrorism in democracies.
- Published in:
- International Journal of Sociology, 2020, v. 50, n. 3, p. 201, doi. 10.1080/00207659.2020.1757297
- By:
- Publication type:
- Article
Brothers, Believers, Brave Mujahideen : Focusing Attention on the Audience of Violent Jihadist Preachers.
- Published in:
- Studies in Conflict & Terrorism, 2017, v. 40, n. 1, p. 62, doi. 10.1080/1057610X.2016.1157407
- By:
- Publication type:
- Article
Saints and soldiers: inside internet-age terrorism, from Syria to the Capitol siege.
- Published in:
- International Affairs, 2024, v. 100, n. 4, p. 1789, doi. 10.1093/ia/iiae152
- By:
- Publication type:
- Article
Saints and Soldiers: Inside Internet-Age Terrorism, from Syria to the Capitol Siege: Book of by Rita Katz, New York, Columbia University Press, 2022, 351 pp., $30 (US) (Paperback), ISBN: 9780231203500.
- Published in:
- Critical Studies on Terrorism, 2023, v. 16, n. 2, p. 419, doi. 10.1080/17539153.2023.2173863
- By:
- Publication type:
- Article
WWW.COMMERCIAL_TERRORISM.COM: A PROPOSED FEDERAL CRIMINAL STATUTE ADDRESSING THE SOLICITATION OF COMMERCIAL TERRORISM THROUGH THE INTERNET.
- Published in:
- Harvard Journal on Legislation, 2000, v. 37, n. 2, p. 159
- By:
- Publication type:
- Article
Terrorism and the Media (Including the Internet) Part 6.
- Published in:
- Perspectives on Terrorism, 2023, v. 17, n. 2, p. 126
- Publication type:
- Article
Bibliography: Terrorism and the Media (including the Internet) (Part 5).
- Published in:
- 2021
- Publication type:
- Bibliography
Bibliography: Internet-Driven Right-Wing Terrorism.
- Published in:
- 2020
- Publication type:
- Bibliography
Bibliography: Terrorism and the Media (including the Internet).
- Published in:
- 2019
- Publication type:
- Bibliography
Bibliography: Terrorism and the Media (including the Internet) (Part 2).
- Published in:
- 2014
- Publication type:
- Bibliography
Identification of Advertising Trends in The Mass Media and On the Internet Used by Modern Terrorism.
- Published in:
- Cuestiones Políticas, 2020, v. 37, n. 65, p. 382, doi. 10.46398/cuestpol.3865.26
- By:
- Publication type:
- Article
Becoming žiŽek's Neighbor: Alterity, Affect, and Network in Popular Culture and Policy at the 10th Anniversary of 9/11.
- Published in:
- 2012
- By:
- Publication type:
- Essay
Terrorism and the Internet: Resistance in the Information Age.
- Published in:
- Knowledge, Technology & Policy, 2003, v. 16, n. 1, p. 104, doi. 10.1007/s12130-003-1018-4
- By:
- Publication type:
- Article
Repeated and Extensive Exposure to Online Terrorist Content: Counter-Terrorism Internet Referral Unit Perceived Stresses and Strategies.
- Published in:
- Studies in Conflict & Terrorism, 2023, v. 46, n. 6, p. 888, doi. 10.1080/1057610X.2020.1792726
- By:
- Publication type:
- Article
A Very Long View from Here.
- Published in:
- American Scholar, 2010, v. 79, n. 2, p. 14
- Publication type:
- Article
TESTIMONY OF EVAN KOHLMANN, CHIEF INFORMATION OFFICER FLASHPOINT PARTNERS. HEARING ON "THE EVOLUTION OF TERRORIST PROPAGANDA: THE PARIS ATTACK AND SOCIAL MEDIA".
- Published in:
- International Journal of Terrorism & Political Hot Spots, 2016, v. 11, n. 3/4, p. 313
- Publication type:
- Article
Polarised Security: How do Chinese Netizens Respond to the Securitisation of Terrorism?
- Published in:
- Asian Studies Review, 2020, v. 44, n. 2, p. 335, doi. 10.1080/10357823.2019.1697205
- By:
- Publication type:
- Article
Twittering the Boko Haram Uprising in Nigeria: Investigating Pragmatic Acts in the Social Media.
- Published in:
- Africa Today, 2013, v. 59, n. 3, p. 83, doi. 10.2979/africatoday.59.3.83
- By:
- Publication type:
- Article
Jihad Dramatically Transformed? Sageman on Jihad and the Internet.
- Published in:
- Homeland Security Affairs, 2010, v. 6, n. 1, p. 1
- By:
- Publication type:
- Article
ILLUSION OF SECURITY: WHY THE AMENDED EU FRAMEWORK DECISION CRIMINALIZING "INCITEMENT TO TERRORISM" ON THE INTERNET FAILS TO DEFEND EUROPE FROM TERRORISM.
- Published in:
- Syracuse Journal of International Law & Commerce, 2010, v. 37, n. 2, p. 339
- By:
- Publication type:
- Article
Selling terror: The symbolization and positioning of Jihad.
- Published in:
- Marketing Theory, 2009, v. 9, n. 2, p. 227, doi. 10.1177/1470593109103069
- By:
- Publication type:
- Article
CYBERJIHAD: EXPRESSIONS OF TERRORISM ON THE INTERNET.
- Published in:
- Eurasian Journal of Religious Studies, 2021, v. 27, n. 3, p. 60, doi. 10.26577//EJRS.2021.v27.i3.r7
- By:
- Publication type:
- Article
Surenos gangs and Mexican cartel use of social networking sites.
- Published in:
- Small Wars & Insurgencies, 2010, v. 21, n. 1, p. 81, doi. 10.1080/09592310903561486
- By:
- Publication type:
- Article
CAN WE FIND AND STOP THE "JIHAD JANES"?
- Published in:
- Cardozo Journal of International & Comparative Law, 2011, v. 19, n. 1, p. 91
- By:
- Publication type:
- Article
Nuclear terrorism: a selection of Internet resources.
- Published in:
- 2001
- By:
- Publication type:
- Journal Article
Nuclear Terrorism: A Selection of Internet Resources.
- Published in:
- Internet Reference Services Quarterly, 2001, v. 6, n. 3/4, p. 87, doi. 10.1300/J136v06n03_07
- By:
- Publication type:
- Article
Ten Years Later, The War Continues.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2011, v. 17, n. 3, p. 42
- By:
- Publication type:
- Article
Terrorism And The Use Of Social Media In Mumbai Attacks.
- Published in:
- Journal of Counterterrorism & Homeland Security International, 2010, v. 16, n. 4, p. 16
- By:
- Publication type:
- Article
Cinematic Terrorism: Deleuze, ISIS and Delirium.
- Published in:
- Journal for Cultural Research, 2016, v. 20, n. 4, p. 366, doi. 10.1080/14797585.2016.1168973
- By:
- Publication type:
- Article
Terrorism and the internet: How dangerous is online radicalization?
- Published in:
- Frontiers in Psychology, 2022, v. 13, p. 1, doi. 10.3389/fpsyg.2022.997390
- By:
- Publication type:
- Article
You Too Can Be Awlaki!
- Published in:
- Fletcher Forum of World Affairs, 2011, v. 35, n. 1, p. 25
- By:
- Publication type:
- Article
TECHNOLOGY & TERRORISM: How the Internet Facilitates Radicalization.
- Published in:
- Forensic Examiner, 2008, v. 17, n. 4, p. 14
- By:
- Publication type:
- Article
SMISHING ATTACKS AND THE HUMAN ELEMENT.
- Published in:
- Bench & Bar of Minnesota, 2022, v. 79, n. 4, p. 12
- By:
- Publication type:
- Article
Evolution of the Islamic State After its Territorial Defeat.
- Published in:
- Counter Terrorist Trends & Analysis, 2018, v. 10, n. 5, p. 1
- By:
- Publication type:
- Article
TERRORISM FINANCING AND THE RISK OF INTERNET-BASED PAYMENT SERVICES IN INDONESIA.
- Published in:
- Counter Terrorist Trends & Analysis, 2017, v. 9, n. 2, p. 21
- By:
- Publication type:
- Article
Sub Saharan African Terrorist Groups' use of the Internet.
- Published in:
- Journal of Terrorism Research, 2014, v. 5, n. 1, p. 5, doi. 10.15664/jtr.825
- By:
- Publication type:
- Article
#TerroristFinancing: An Examination of Terrorism Financing via the Internet.
- Published in:
- International Journal of Cyber Warfare & Terrorism, 2018, v. 8, n. 1, p. 1, doi. 10.4018/IJCWT.2018010101
- By:
- Publication type:
- Article
A TALE OF TWO TREATIES: A MARITIME MODEL TO STOP THE SCOURGE OF CYBERCRIME.
- Published in:
- Boston University International Law Journal, 2021, v. 39, n. 2, p. 143
- By:
- Publication type:
- Article
Terrorism, the Internet, and Propaganda: A Deadly Combination.
- Published in:
- Journal of National Security Law & Policy, 2017, v. 9, n. 1, p. 95
- By:
- Publication type:
- Article
Saints and Soldiers: Inside Internet-age Terrorism, from Syria to the Capitol Siege.
- Published in:
- 2023
- By:
- Publication type:
- Book Review
Could the Issue of DPRK Hacking Benefit from Benign Neglect?
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 83, doi. 10.1353/gia.2018.0010
- By:
- Publication type:
- Article
A Rules-Based Order to Keep the Internet Open and Secure.
- Published in:
- Georgetown Journal of International Affairs (Georgetown University Press), 2018, v. 19, p. 76, doi. 10.1353/gia.2018.0009
- By:
- Publication type:
- Article