Suchergebnisse
Filter
16 Ergebnisse
Sortierung:
SSRN
Working paper
Domain Mapping of Contemporary Terrorism Research
In: Terrorism Informatics; Integrated Series In Information Systems, S. 3-26
Internet-Savvy U.S. and Middle Eastern Extremist Groups
In: Mobilization: An International Quarterly, Band 12, Heft 2, S. 177-192
Using an interdisciplinary perspective, this study provides a hyperlink and content analysis of 44 U.S. domestic and 40 Middle Eastern extremist groups' websites to analyze their use of computer-mediated communication (CMC) to support collective identity and mobilization. The findings contrast Middle Eastern extremist groups' use of the Internet to develop virtual communities and support their virtual command/control operations with the U.S. domestic groups' focus on communication and ideological indoctrination. Finally, the results suggest that the usages of CMC are underpinned by the geographical reach of extremist groups' campaign as well as their strategic goals, ideologies, needs, and political legitimacy, driving the various groups to use CMC in a distinctive manner.
Internet-Savvy U.S. And Middle Eastern Extremist Groups
In: Mobilization: the international quarterly review of social movement research, Band 12, Heft 2, S. 177-192
ISSN: 1086-671X
Using an interdisciplinary perspective, this study provides a hyperlink and content analysis of 44 U.S. domestic and 40 Middle Eastern extremist groups websites to analyze their use of computer-mediated communication (CMC) to support collective identity and mobilization. The findings contrast Middle Eastern extremist groups use of the Internet to develop virtual communities and support their virtual command/control operations with the US. domestic groups focus on communication and ideological indoctrination. Finally, the results suggest that the usages of CMC are underpinned by the geographical reach of extremist groups campaign as well as their strategic goals, ideologies, needs, and political legitimacy, driving the various groups to use CMC in a distinctive manner.
Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis
In: Intelligence and Security Informatics; Lecture Notes in Computer Science, S. 322-339
Terrorism research and the diffusion of ideas
In: Knowledge and Policy, Band 6, Heft 1, S. 17-37
ISSN: 1874-6314
Internet professionals: job skills for an on-line age
In: International journal of human resource management, Band 9, Heft 5, S. 910-933
ISSN: 1466-4399
Terrorism informatics: knowledge management and data mining for homeland security
In: Integrated series in information systems 18
Multimedia Content Coding and Analysis: Unraveling the Content ofJihadiExtremist Groups' Videos
In: Studies in conflict and terrorism, Band 31, Heft 7, S. 605-626
ISSN: 1521-0731
Multimedia content coding and analysis: unraveling the content of Jihadi extremist groups' videos
In: Studies in conflict & terrorism, Band 31, Heft 7, S. 605-626
ISSN: 1057-610X
World Affairs Online
Content Analysis of Jihadi Extremist Groups' Videos
In: Terrorism Informatics; Integrated Series In Information Systems, S. 267-284
Chapter 10 Social Network Analysis for Terrorism Research
In: National Security; Handbooks in Information Systems, S. 243-270
Studying Global Extremist Organizations' Internet Presence Using the DarkWeb Attribute System
In: Terrorism Informatics; Integrated Series In Information Systems, S. 237-266
Case Study of Jihad on the Web
In: Terrorism Informatics; Integrated Series In Information Systems, S. 221-235
The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web
In: Intelligence and Security Informatics; Lecture Notes in Computer Science, S. 623-624