Internet

Visible War: Information War, Surveillance and Speed

Year: 2006

Liking and hyperlinking: Community detection in online child exploitation networks

Year: 2016

‘Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research

Year: 2015

#IS_Fangirl: Exploring a New Role for Women in Terrorism

Year: 2016
Description:

Abstract: In this paper we present initial results from an ongoing study of women affiliated with pro-IS networks on Twitter and other social media. Our particular focus is on 20 – …

Comment le jihadisme est-il devenu numérique ? Évolutions, tendances et ripostes,

Author(s): Ducol-- Benjamin
Year: 2015
Description:

Abstract: Twitter constitue un terrain de jeu de prédilection pour le groupe État islamique (EI) : espace de médiatisation, de revendication et de mobilisation. Depuis sa matrice de naissance afghane – …

Toward a Framework Understanding of Online Programs for Countering Violent Extremism

Year: 2016
Description:

Abstract: There is an emerging consensus that ideologically-based narratives play a central role in encouraging and sustaining radicalization to violence, and that preventing, arresting, or reversing radicalization requires some means – …

Voices of the Caucasus Emirate: Mapping and analyzing North Caucasus insurgency websites.

Geography: Eastern Europe
Year: 2015
Description:

Abstract: This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that – …

‘Just Being Mean to Somebody Isn’t a Police Matter’: Police Perspectives on Policing Cyber-bullying

Geography: Canada
Year: 2015
Description:

Abstract: Increasing public awareness of cyberbullying, coupled with several highly publicized youth suicides linked to electronic bullying, have led lawmakers and politicians to consider new criminal legislation specifically related to – …

Spreading the message digitally: A look into extremist organizations’ use of the Internet

Year: 2015
Description:

Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups – …

TSAS WP16-05: Assessment of the state of knowledge: Connections between research on the social psychology of the Internet and violent extremism

Publisher: TSAS
Description:

This paper seeks to answer the question: How does social psychology contribute to our understanding of the link between the Internet and violent extremism?

Crime Facilitation Purposes of Social Networking Sites: A Review and Analysis of the Cyberbanging Phenomenon

Year: 2013

Framing the Online Women’s Movements in the Arab world

Author(s): Al-Rawi– Ahmed
Publisher: Routledge
Year: 2015

Cyber Warriors in the Middle East: The Case of the Syrian Electronic Army

Author(s): Al-Rawi-- Ahmed
Publisher: Elsevier
Year: 2013
Description:

This paper investigates the online hacking group, the Syrian Electronic Army (SEA), and examines its goals. (Source: Publication).

The Social Network of Hackers

Year: 2012
Description:

Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical – …

The Proliferation of Cyber Security Strategies and Their Implications for Privacy

Author(s): Dupont-- Benoit
Year: 2013
Description:

The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …

New Terrorism and New Media

Author(s): Gabriel Weimann
Year: 2014
Description:

This report examines how Al-Qaeda, its affiliates and other terrorist organizations have moved their online presence to YouTube, Twitter, Facebook, Instagram and other social media outlets, posing challenges to counter-terrorism – …

Voices of the ‘‘Caucasus Emirate’’: Mapping and Analyzing North Caucasus Insurgency Websites

Year: 2014
Description:

This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. (Source: Publication).

TSAS WP14-01: Researching Terrorism and Counter-Terrorism through a Network Lens

Publisher: TSAS
Year: 2014
Description:

In this paper, we argue that integrating network concepts and network methods to the study of terrorism and counter-terrorism are central ingredients in bringing the field forward from theoretical, empirical, – …

Radicalization – A Guide for the Perplexed

Geography: Canada, North America
Year: 2009
Description:

The RCMP, National Security Criminal Investigations Program provides an introduction to terrorist radicalization in Canada, the challenges and how it’s being addressed.

Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor

Year: 2014
Description:

It is now widely understood that extremists use the internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the terrorism and Extremism – …

FBI, Here I am!

Author(s): Elahi– Hasan
Publisher: TED Talk
Year: 2011

Informing (In)Stability: The Security Implications of a Shifting News and Media Environment

Publisher: CSIS
Geography: Canada, North America
Year: 2012
Description:

This 60-page booklet contains highlights from the February 21-22 2012 conference that was held by the Canadian Security Intelligence Service in collaboration with Policy Horizons Canada.

‘Bomb-Making for Beginners’: Inside al Al-Qaeda E-Learning Course

Author(s): Stenersen-- Anne
Year: 2013
Description:

This study explores how terrorists utilise the Internet to learn bomb-making skills. Unlike previous studies, it does not focus on assessing the quality of online bomb recipes. (Source: Publication).