
Search
Full Listing
2212 Library Entries
Clear
Search
Type | Title | Year | Author | Links |
---|---|---|---|---|
|
“To My Brothers in the West . . .”: A Thematic Analysis of Videos Produced by the Islamic State’s al-Hayat Media Center
View Abstract |
2017 | Macnair, L. and Frank, R. | View Publisher |
|
How Journalists Verify User-Generated Content During Terrorist Crises. Analyzing Twitter Communication During the Brussels Attacks
View Abstract |
2017 | Raushfleisch, A., Artho, X., Metag, J., Post, S. and Schafer, M. | View Publisher |
|
The Evolution of Online Extremism in Malaysia
View Abstract |
2017 | Yasin, N.A.M. | View Publisher |
|
Banning Encryption to Stop Terrorists: A Worse than Futile Exercise
View Abstract |
2017 | Brantly, A. | View Publisher |
|
Terrorist Use of Virtual Currencies
View Abstract |
2017 | Goldman, Z., Maruyama, E., Rosenberg, E., Saravalle, E. and Solomon-Strauss, J. | View Publisher |
|
Countering and Understanding Terrorism, Extremism, and Radicalisation in a Big Data Age
View Abstract |
2016 | Bunnik, A. | View Publisher |