Search
Full Listing
2132 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
VOX-Pol Blog | How Big Tech Designs its Own Rules of Ethics to Avoid Scrutiny and Accountability
View Abstract |
2019 | Watts, D. | View Publisher |
Journal Article | How dark corners collude: a study on an online Chinese alt-right community
View Abstract |
2021 | Yang, T. and Fang, K. | View Publisher |
VOX-Pol Blog | How do Social Media Users Talk about Terrorism Online?
View Abstract |
2020 | Chua, A. and Banerjee, S. | View Publisher |
Report | How Do Terrorist Organizations Use Information Technologies- Understanding Cyber Terrorism
View Abstract |
2016 | Tombul, F. and Akdogan, H. | View Publisher |
VOX-Pol Blog | How Do Those Vulnerable to Terror Recruitment Respond to YouTube Counter-Narrative Videos?
View Abstract |
2021 | Speckhard, A., Ghazi, A., and Ellenberg, M. | View Publisher |
VOX-Pol Blog | How Do Violent Extremists Use Digital Media? An Analysis of Bangladeshi Extremist Lifecycles
View Abstract |
2021 | Parvez, S. | View Publisher |