Powered by Ajaxy

Frank– Richard

Sentiment-Based Identification of Radical Authors (SIRA)

Year: 2015
Description:

Abstract: As violent extremists continue to surface in online discussion forums, counter-extremism agencies search for new and innovative ways of uncovering their digital indicators. Using a sample of approximately 1 – …

Identifying Digital Threats in a Hacker Web Forum

Year: 2015

LECENing places to hide: Geo-Mapping Child Exploitation Material

Year: 2015
Subjects: Crime, Intelligence

Sentiment-Based Identification of Radical Authors (SIRA)

Year: 2015

Spreading the message digitally: A look into extremist organizations’ use of the Internet

Year: 2015
Description:

Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups – …

Terrorist and extremist organizations’ use of the internet for recruitment

Publisher: Routledge

Preliminary Analytical Considerations in Designing a Terrorism and Extremism Online Network Extractor

Year: 2014
Description:

It is now widely understood that extremists use the internet in attempts to accomplish many of their objectives. In this chapter we present a web-crawler called the terrorism and Extremism – …