
Search
Full Listing
2307 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
|
Women’s Key Role in Islamic State Online Networks, Explained
View Abstract |
2016 | Johnson, N. | View Publisher |
|
Bridging Computer Sciences and Social Sciences: The Search for Extremist Content Online
View Abstract |
2016 | Scrivens, R. | View Publisher |
|
Online Responses to Terrorist Attacks: A #niceattack Case Study – Part 1: The First 20 Minutes
View Abstract |
2016 | Lopez Abbasciano, S. | View Publisher |
|
Online Responses to Terrorist Attacks: A #niceattack Case Study – Part 2: The Aftermath
View Abstract |
2016 | Lopez Abbasciano, S. | View Publisher |
|
Some Recent Trends in the Use of the Internet/ICT for Terrorist Purposes – Part I
View Abstract |
2016 | ICT4Peace Foundation | View Publisher |
|
Some Recent Trends in the Use of the Internet/ICT for Terrorist Purposes – Part II
View Abstract |
2016 | ICT4Peace Foundation | View Publisher |