Search
Full Listing
2120 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
VOX-Pol Blog | How and why vehicle ramming became the attack of choice for terrorists
View Abstract |
2017 | Veilleux-Lepage, Y. | View Publisher |
VOX-Pol Blog | How Big Tech Designs its Own Rules of Ethics to Avoid Scrutiny and Accountability
View Abstract |
2019 | Watts, D. | View Publisher |
Journal Article | How dark corners collude: a study on an online Chinese alt-right community
View Abstract |
2021 | Yang, T. and Fang, K. | View Publisher |
VOX-Pol Blog | How do Social Media Users Talk about Terrorism Online?
View Abstract |
2020 | Chua, A. and Banerjee, S. | View Publisher |
Report | How Do Terrorist Organizations Use Information Technologies- Understanding Cyber Terrorism
View Abstract |
2016 | Tombul, F. and Akdogan, H. | View Publisher |
VOX-Pol Blog | How Do Those Vulnerable to Terror Recruitment Respond to YouTube Counter-Narrative Videos?
View Abstract |
2021 | Speckhard, A., Ghazi, A., and Ellenberg, M. | View Publisher |