Online Networks
Online networks
‘Questions about Dawlah. DM me, plz.’ The Sock Puppet Problem in Online Terrorism Research
The ecology of trust among hackers
Abstract: Malicious hackers profit from the division of labour among highly skilled associates. However, duplicity and betrayal form an intrinsic part of their daily operations. This article examines how a – …
Comment le jihadisme est-il devenu numérique ? Évolutions, tendances et ripostes,
Abstract: Twitter constitue un terrain de jeu de prédilection pour le groupe État islamique (EI) : espace de médiatisation, de revendication et de mobilisation. Depuis sa matrice de naissance afghane – …
Voices of the Caucasus Emirate: Mapping and analyzing North Caucasus insurgency websites.
Abstract: This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. Using a mixed methods research design that – …
A Pragmatic approach to the online risk assessment of violent extremists
About the Book: Advances in digital technologies have provided ample positive impacts to modern society; however, in addition to such benefits, these innovations have inadvertently created a new venue for – …
The Surveillance Of Social Networking And The Social Value Of Privacy
This chapter argues that theories about privacy would benefit from embracing deliberative democratic theory on the grounds that it addresses harms to democracy, and widens our understandings of privacy infringements – …
Spreading the message digitally: A look into extremist organizations’ use of the Internet
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups – …
A Radical Sociability: In Defense of an Online/Offline Multidimensional Approach to Radicalisation
Cyber Warriors in the Middle East: The Case of the Syrian Electronic Army
This paper investigates the online hacking group, the Syrian Electronic Army (SEA), and examines its goals. (Source: Publication).
The Social Network of Hackers
Social researchers are facing more and more challenges as criminal networks are expanding in size and moving to the Internet. Many efforts are currently under way to enhance the technical – …
The Proliferation of Cyber Security Strategies and Their Implications for Privacy
The commercial internet has now been in existence for almost fifteen years, but it seems that Western government have barely realized the extent to which this technology is redefining security – …
New Terrorism and New Media
This report examines how Al-Qaeda, its affiliates and other terrorist organizations have moved their online presence to YouTube, Twitter, Facebook, Instagram and other social media outlets, posing challenges to counter-terrorism – …
Voices of the ‘‘Caucasus Emirate’’: Mapping and Analyzing North Caucasus Insurgency Websites
This article looks at Internet use by insurgent groups in the North Caucasus in the context of a regional diffusion of violence. (Source: Publication).
TSAS WP14-01: Researching Terrorism and Counter-Terrorism through a Network Lens
In this paper, we argue that integrating network concepts and network methods to the study of terrorism and counter-terrorism are central ingredients in bringing the field forward from theoretical, empirical, – …