Narrow your search

Library

Odisee (13)

Thomas More Kempen (13)

Thomas More Mechelen (13)

UCLL (13)

VIVES (13)

LUCA School of Arts (10)

KU Leuven (8)

ULB (7)

ULiège (6)

VUB (6)

More...

Resource type

book (13)

digital (1)


Language

English (13)


Year
From To Submit

2020 (2)

2017 (4)

2013 (3)

2012 (1)

2011 (2)

More...
Listing 1 - 10 of 13 << page
of 2
>>
Sort by

Book
Terrorism and the internet
Author:
ISBN: 661288021X 1282880217 9786612880216 1607505371 9781607505372 9781282880214 9781607505365 1607505363 Year: 2010 Publisher: Amsterdam Washington, DC IOS Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first book to analyse the abuse of the internet for terrorism and crime purposes under two new perspectives: (1) The persuasion and involvement of women and children as specific target user groups, and (2) The development of new strategies to use extremist web forums as an open book in order to understand and gain insight into terrorist thinking. Web 2.0 can be even more: an open door for dialogue, deradicalisation and ultimately a way out of the cocoon of terroristic isolation. This book presents the results of a unique cooperation between Israeli and German research centers with outstanding contributions to innovative security research. Two international conferences in Berlin in 2008 brought together worldwide leading authors both from academia and government. Most recent research results challenge the actual treatment of terroristic web forums by governmental agencies. This remarkable publication will open your eyes both on the real risks of terroristic web activities and new counter strategies from analysis to dialogue.


Book
Terrorists' use of the internet
Authors: --- --- --- ---
ISBN: 1614997659 9781614997658 9781614997641 Year: 2017 Publisher: Amsterdam, Netherlands

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Terrorist use of the Internet has become a focus of media, policy, and scholarly attention in recent years. Terrorists use the Internet in a variety of ways, the most important being for propaganda purposes and operations-related content, but it is also potentially a means or target of attack. This book presents revised versions of a selection of papers delivered at the NATO Advanced Research Workshop (ARW) on "Terrorists' Use of the Internet" held in Dublin, Ireland in June 2016. One aim of the workshop was to nurture dialogue between members of the academic, policy and practitioner communities, so the 60 delegates from 13 countries who attended the workshop included representatives from each of these. The participants encompassed a wide range of expertise (including engineering, computer science, law, criminology, political science, international relations, history, and linguistics) and the chapters contained herein reflect these diverse professional and disciplinary backgrounds. The workshop also aimed to address the convergence of threats. Following an introduction which provides an overview of the various ways in which terrorists use the Internet, the book's remaining 25 chapters are grouped into 5 sections on cyber terrorism and critical infrastructure protection; cyber-enabled terrorist financing; jihadi online propaganda; online counterterrorism; and innovative approaches and responses."--


Book
Jihadism, online discourses and representations
Author:
ISBN: 3737000689 3847100688 9783847100683 Year: 2013 Publisher: Göttingen: Vandenhoeck und Ruprecht,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Jihadi online media try to mobilize, recruit, and disseminate the messages of jihadi subcultures. Understanding the mechanisms and structures of the products of these online media is essential for understanding jihadism in general. Original research into visual representations of jihadi media outlets, the subtleties of jihadi videos, the specific ways jihadis use Islamic religious language, into jihadi poetry, and the ways jihadis stage their concepts in videos of kangaroo trials is presented in this volume. Jihadis as part of the imaginary of global media production is another aspect of representations of jihadism described in one of the contributions.


Book
Jihadi audiovisuality and its entanglements meanings, aesthetics, appropriations
Authors: --- ---
ISBN: 1474467539 1474495532 1474467512 9781474495530 9781474467537 Year: 2020 Publisher: Edinburgh, Scotland : Edinburgh University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

ISIS is often described as a terrorist organisation that uses social media to empower its supporters and reinforce its message. Through 12 case studies, this book examines the different ways in which Jihadi groups and their supporters use visualisation, sound production and aesthetic means to articulate their cause in online as well as offline contexts. Divided into four thematic sections, the chapters probe Jihadi appropriation of traditional and popular cultural expressions and show how, in turn, political activists appropriate extremist media to oppose and resist the propaganda.


Book
Exploring patterns of behaviour in violent Jihadist terrorists : an analysis of six significant terrorist conspiracies in the UK
Authors: ---
ISBN: 1280126957 9786613530813 0833059637 9780833059635 9781280126956 6613530816 Year: 2011 Publisher: Santa Monica, Calif. : RAND Corporation,

Loading...
Export citation

Choose an application

Bookmark

Abstract

An examination of the groups/cells and their 38 core individuals involved in the six most serious violent Jihadist terrorist conspiracies and attacks in the UK between 2004 and 2007 to see if they exhibited any specific types of behaviour.


Multi
Social networks as the new frontier of terrorism : #terror
Author:
ISBN: 9781315668680 1315668688 9781317361848 1317361849 9781317361855 1317361857 Year: 2017 Publisher: Taylor & Francis

Loading...
Export citation

Choose an application

Bookmark

Abstract

Terrorism. Why does this word grab our attention so? Propaganda machines have adopted modern technology as a means to always have their content available. Regardless of the hour or time zone, information is being shared by somebody, somewhere. Social media is a game changer influencing the way in which terror groups are changing their tactics and also how their acts of terror are perceived by the members of the public they intend to influence.This book explores how social media adoption by terrorists interacts with privacy law, freedom of expression, data protection and surveillance legislation through an exploration of the fascinating primary resources themselves, covering everything from the Snowden Leaks, the rise of ISIS to Charlie Hebdo. The book also covers lesser worn paths such as the travel guide that proudly boasts that you can get Bounty and Twix bars mid-conflict, and the best local hair salons for jihadi brides. These vignettes, amongst the many others explored in this volume bring to life the legal, policy and ethical debates considered in this volume, representing an important part in the development of understanding terrorist narratives on social media, by framing the legislative debate.This book represents an invaluable guide for lawyers, government bodies, the defence services, academics, students and businesses.


Book
Wiki at War : Conflict in a Socially Networked World
Author:
ISBN: 1280772204 9786613682970 1603446575 9781603446570 9781603446587 1603446583 9781603445863 1603445862 9781603446563 1603446567 9781299277021 1299277020 Year: 2011 Publisher: College Station, TX, USA Texas A&M University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

In 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.WikiLeaks editor-in-chief Julian Assange has been branded "public enemy number one" by some in the United States for posting material on the World Wide Web that concerns airstrikes in Iraq, US diplomatic communications, and other sensitive matters. In Wiki at War, James Jay Carafano explains why these and other Internet-born initiatives matter and how they are likely to affect the future face of w


Book
When technocultures collide : innovation from below and the struggle for autonomy
Author:
ISBN: 1554588995 1554588987 9781554588985 9781554588992 9781554588978 1554588979 Year: 2013 Publisher: Waterloo: Wilfrid Laurier university press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

When Technocultures Collide provides rich and diverse studies of collision courses between technologically inspired subcultures and the corporate and governmental entities they seek to undermine. Gary Genosko analyzes these practices for their remarkable diversity and their innovation and leaps of imagination. He assesses the results of a number of operations, including the Canadian stories of Mafiaboy, Jeff Chapman of Infiltration, and BlackBerry users.The author provides critical accounts of highly specialized attributes, such as the prospects of deterritorialized computer mice and big toe computing, the role of electrical grid hacks in urban technopolitics, and whether info-addiction and depression contribute to tactical resistance. Beyond resistance, however, the goal of this work is to find examples of technocultural autonomy in the minor and marginal cultural productions of small cultures, ethico-poetic diversions, and sustainable withdrawals with genuine therapeutic potential to surpass accumulation, debt, and competition. The dangers and joys of these struggles for autonomy are underlined in studies of RIM’s BlackBerry and Julian Assange’s WikiLeaks website.


Book
Digital Extremisms : Readings in Violence, Radicalisation and Extremism in the Online Space
Authors: ---
ISBN: 3030301389 3030301370 Year: 2020 Publisher: Cham : Springer International Publishing : Imprint: Palgrave Macmillan,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book explores the use of the internet by (non-Islamic) extremist groups, drawing together research by scholars across the social sciences and humanities. It offers a broad overview of the best of research in this area, including research contributions that address far-right, (non-Islamic) religious, animal rights, and nationalist violence online, as well as a discussion of the policy and research challenges posed by these unique and disparate groups. It offers an academically rigorous, introductory text that addresses extremism online, making it a valuable resource for students, practitioners and academics seeking to understand the unique characteristics such risks present.


Book
Dark web : exploring and data mining the dark side of the web
Authors: ---
ISBN: 146141556X 9786613443663 128344366X 1461415578 1489992863 Year: 2012 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups, including web sites, forums, chat rooms, blogs, social networking sites, videos, virtual world, etc. We have developed various multilingual data mining, text mining, and web mining techniques to perform link analysis, content analysis, web metrics (technical sophistication) analysis, sentiment analysis, authorship analysis, and video analysis in our research. The approaches and methods developed in this project contribute to advancing the field of Intelligence and Security Informatics (ISI). Such advances will help related stakeholders to perform terrorism research and facilitate international security and peace. This monograph aims to provide an overview of the Dark Web landscape, suggest a systematic, computational approach to understanding the problems, and illustrate with selected techniques, methods, and case studies developed by the University of Arizona AI Lab Dark Web team members. This work aims to provide an interdisciplinary and understandable monograph about Dark Web research along three dimensions: methodological issues in Dark Web research; database and computational techniques to support information collection and data mining; and legal, social, privacy, and data confidentiality challenges and approaches.  It will bring useful knowledge to scientists, security professionals, counterterrorism experts, and policy makers. The monograph can also serve as a reference material or textbook in graduate level courses related to information security, information policy, information assurance, information systems, terrorism, and public policy.

Keywords

Data mining. --- Internet and terrorism. --- Internet. --- World Wide Web. --- Data mining --- Internet and terrorism --- World Wide Web --- Internet --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Computer Science --- Criminology, Penology & Juvenile Delinquency --- Terrorism. --- Web usage mining. --- Analysis, Web usage --- Analytics, Web --- Mining, Web usage --- Web analytics --- Web usage analysis --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Acts of terrorism --- Attacks, Terrorist --- Global terrorism --- International terrorism --- Political terrorism --- Terror attacks --- Terrorist acts --- Terrorist attacks --- World terrorism --- Terrorism and the Internet --- Computer science. --- Operations research. --- Decision making. --- Information technology. --- Business --- Computer Science. --- Data Mining and Knowledge Discovery. --- IT in Business. --- Operation Research/Decision Theory. --- Data processing. --- Database searching --- Direct action --- Insurgency --- Political crimes and offenses --- Subversive activities --- Political violence --- Terror --- Terrorism --- Operations Research/Decision Theory. --- Operational analysis --- Operational research --- Industrial engineering --- Management science --- Research --- System theory --- IT (Information technology) --- Technology --- Telematics --- Information superhighway --- Knowledge management --- Business—Data processing. --- Deciding --- Decision (Psychology) --- Decision analysis --- Decision processes --- Making decisions --- Management --- Management decisions --- Choice (Psychology) --- Problem solving --- Decision making --- University of Arizona.

Listing 1 - 10 of 13 << page
of 2
>>
Sort by