Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet
September 18, 2023
Why would a terrorist choose to utilize the Internet rather than the usual methods of assassination, hostage taking, and guerrilla warfare? Conway (2006) identified five major reasons why extremist groups used the Internet: virtual community building, information provision, recruitment, financing, and risk mitigation. Terrorist and extremist organizations can use the Internet to increase their visibility ...
Gender and Power in Online Communication
September 18, 2023
New communication technologies are often invested with users’ hopes for change in the social order. Thus the Internet is said to be inherently democratic, levelling traditional distinctions of social status, and creating opportunities for less powerful individuals and groups to participate on a par with members of more powerful groups. Specifically, the Internet has been ...
Interpersonal Trust on Jihadi Internet Forums
September 18, 2023
This chapter explores the effects of the trust problem on jihadi internet discussion forums. The scarcity of non-verbal cues in digital communication facilitates deceptive mimicry, which undermines the inter- personal trust required for sensitive transactions. Open-source data from Arabic-language jihadi forums between 2006 and 2011 indicate that distrust there was high and direct recruitment rare. ...
Terrorist Web Sites: Their Contents, Functioning, and Effectiveness
September 18, 2023
This extract is taken from the author’s original manuscript and has not been edited. The definitive version of this piece may be found in New Media and the New Middle East by Philip Seib which can be purchased from www.palgrave.com ...
Modified Frequency-Based Term Weighting Scheme for Accurate Dark Web Content Classification
September 18, 2023
Security informatics and intelligence computation plays a vital role in detecting and classifying terrorism contents in the web. Accurate web content classification using the computational intelligence and security informatics will increase the opportunities of the early detection of the potential terrorist activities. In this paper, we propose a modified frequency-based term weighting scheme for accurate ...
Terrorism and New Media: the Cyber-Battlespace
September 18, 2023
Chapter, “Terrorism and new media: the cyber-battlespace”, in book: Forest, James F., (ed.) Countering terrorism and insurgency in the 21st Century. ...
Von al-Zarqawi bis al-Awlaki: Das Internet als neue Form des radikalen Milieus.
September 18, 2023
Chapter in Stefan Malthaner and Peter Waldmann (eds.) Radikale Milieus: Das soziale Umfeld terroristischer Gruppen. ...
Cyberterrorism: Hype and Reality
September 18, 2023
Chapter “Cyberterrorism: hype and reality” in book: Armistead, Leigh, (ed.) Information warfare: separating hype from reality ...
Terrorism and the Making of the ‘New Middle East’: New Media Strategies of Hizbollah and al Qaeda
September 18, 2023
Chapter, “Terrorism and the making of the ‘New Middle East'”, in book: Seib, Philip, (ed.) New media and the new Middle East ...