Search
Full Listing
2169 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
VOX-Pol Blog | Responding to Terrorists’ Use of Social Media: Legislation, Investigation and Prosecution
View Abstract |
2017 | Hill, M. | View Publisher |
VOX-Pol Blog | Some Reflections on Locating Online Viewers of Jihadist Content in Policy Exchange’s ‘The New Netwar’
View Abstract |
2017 | Bodo, L. | View Publisher |
VOX-Pol Blog | We Must Separate the Debates on Extremism and Encryption
View Abstract |
2017 | Morrison-Bell, T. | View Publisher |
VOX-Pol Blog | Islamic State’s Twitter network is decimated, but other extremists face much less disruption
View Abstract |
2017 | Conway, M. and Lakhani, S. | View Publisher |
VOX-Pol Blog | Terrorist Use of the Internet by the Numbers: Part II – Quantifying Behaviours, Patterns, and Processes Using Closed Sources
View Abstract |
2017 | Gill, P. | View Publisher |
VOX-Pol Blog | Terrorists’ Use of Messaging Applications
View Abstract |
2016 | Francis, M. and Barrett, E. | View Publisher |