
Search
Full Listing
2316 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
|
Telegram: The Mighty Application That ISIS Loves – Part II
View Abstract |
2017 | Yayla, A. S. and Speckhard, A. | View Publisher |
|
Virtual Doorstep: Journalists, Social Media and the Victims of Tragedy
View Abstract |
2017 | Cooper, G. | View Publisher |
|
Responding to Terrorists’ Use of Social Media: Legislation, Investigation and Prosecution
View Abstract |
2017 | Hill, M. | View Publisher |
|
Some Reflections on Locating Online Viewers of Jihadist Content in Policy Exchange’s ‘The New Netwar’
View Abstract |
2017 | Bodo, L. | View Publisher |
|
We Must Separate the Debates on Extremism and Encryption
View Abstract |
2017 | Morrison-Bell, T. | View Publisher |
|
Islamic State’s Twitter network is decimated, but other extremists face much less disruption
View Abstract |
2017 | Conway, M. and Lakhani, S. | View Publisher |