-
3
-
-
33745940972
-
-
West Point, NY: Combating Terrorism Center at West Point, U.S. Military Academy
-
Brachman, J.R. and W.F. McCants. 2006. Stealing al Qaida's Playbook. West Point, NY: Combating Terrorism Center at West Point, U.S. Military Academy (http://www.ctc.usma.edu).
-
(2006)
Stealing al Qaida's Playbook
-
-
Brachman, J.R.1
McCants, W.F.2
-
5
-
-
84937324900
-
White Supremacist Networks on the Internet
-
Burris, V., Emory Smith, and Ann Strahm. 2000. "White Supremacist Networks on the Internet." Sociological Focus 33(3): 215-235.
-
(2000)
Sociological Focus
, vol.33
, Issue.3
, pp. 215-235
-
-
Burris, V.1
Smith, E.2
Strahm, A.3
-
7
-
-
33745783788
-
Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web
-
ITSC, October 3-6, Washington, DC
-
Chen, H., J. Qin, E. Reid, W. Chung, Y. Zhou, W. Zi, G. Lai, A. Bonillas, and M. Sageman. 2004. "Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web." Proceedings of the 7th International Conference on IEEE Intelligent Transportation Systems (ITSC), October 3-6, Washington, DC.
-
(2004)
Proceedings of the 7th International Conference on IEEE Intelligent Transportation Systems
-
-
Chen, H.1
Qin, J.2
Reid, E.3
Chung, W.4
Zhou, Y.5
Zi, W.6
Lai, G.7
Bonillas, A.8
Sageman, M.9
-
9
-
-
34547290242
-
Terrorist Use of the Internet and Fighting Back: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities
-
Paper presented at the, September 8-10, Oxford, Oxford University
-
Conway, M. 2005. Terrorist Use of the Internet and Fighting Back: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities. Paper presented at the Oxford Internet Institute Conference, September 8-10, 2005, Oxford, Oxford University.
-
(2005)
Oxford Internet Institute Conference
-
-
Conway, M.1
-
10
-
-
34547332502
-
-
Consortium for Strategic Communication, Arizona State University. Retrieved from
-
Corman, S.R. and J.S. Schiefelbein. 2006. Communication and Media Strategy in the Jihadi War of Ideas. Consortium for Strategic Communication, Arizona State University. Retrieved from http://www.asu.edu/clas/commumcation/ about/terrorism/publications/jihad_comm_media.pdf
-
(2006)
Communication and Media Strategy in the Jihadi War of Ideas
-
-
Corman, S.R.1
Schiefelbein, J.S.2
-
11
-
-
85044799710
-
Terrorism and Empirical Testing: Using Indictment Data to Assess Changes in Terrorist Conduct
-
Pp, edited by M. Deflem. London: Elsevier
-
Damphouse, K.R. and B.L. Smith. 2004. "Terrorism and Empirical Testing: Using Indictment Data to Assess Changes in Terrorist Conduct." Pp. 75-92 in Terrorism and Counter terrorism: Criminological Perspectives, edited by M. Deflem. London: Elsevier.
-
(2004)
Terrorism and Counter terrorism: Criminological Perspectives
, pp. 75-92
-
-
Damphouse, K.R.1
Smith, B.L.2
-
14
-
-
84858104010
-
Social Movement Networks Virtual and Real. A New Politics? CCSS
-
Retrieved from
-
Diani, M. 1999. "Social Movement Networks Virtual and Real. A New Politics?" CCSS, University of Birmingham Conference. Retrieved from http://www.nd.edu/~dmyers/cbsm/vol2/bgham99.pdf.
-
(1999)
University of Birmingham Conference
-
-
Diani, M.1
-
15
-
-
27944483736
-
Leaderless Nexus: When Crime and Terror Converge
-
Dishman, C. 2005. "Leaderless Nexus: When Crime and Terror Converge." Studies in Conflict and Terrorism 28(3): 237-52.
-
(2005)
Studies in Conflict and Terrorism
, vol.28
, Issue.3
, pp. 237-252
-
-
Dishman, C.1
-
16
-
-
34547257683
-
Congressional Testimony. Statement of John E
-
FBI, Counter-terrorism Division, FBI. Washington, D.C
-
FBI. 2004. Congressional Testimony. Statement of John E. Lewis, Deputy Assistant Director, Counter-terrorism Division, FBI. Washington, D.C.
-
(2004)
Lewis, Deputy Assistant Director
-
-
-
18
-
-
84858083587
-
-
Retrieved November 22, 2006
-
Galeas, P. N.d. Web Mining. Retrieved November 22, 2006 (http://www.galeas.de/webmining.html).
-
Web Mining
-
-
Galeas, P.N.D.1
-
21
-
-
33745916529
-
Elucidiating the Web of Hate: The Ideological Structuring of Network Ties Among Right Wing Hate Groups on the Internet
-
Paper presented at the
-
Gustavson, T.E., and D.E. Sherkat. 2004. "Elucidiating the Web of Hate: the Ideological Structuring of Network Ties Among Right Wing Hate Groups on the Internet." Paper presented at the annual meeting of the American Sociological Association.
-
(2004)
annual meeting of the American Sociological Association
-
-
Gustavson, T.E.1
Sherkat, D.E.2
-
22
-
-
34547305364
-
-
International Crisis Group. 2006. In Their Own Words: Reading the Iraqi Insurgency. International Crisis Group, Middle East Report #50.
-
International Crisis Group. 2006. In Their Own Words: Reading the Iraqi Insurgency. International Crisis Group, Middle East Report #50.
-
-
-
-
23
-
-
34547283925
-
-
ISTS, Hanover, Institute for Security Technology Studies ISTS, Dartmouth College
-
ISTS. 2003. Examining the Cyber Capabilities of Islamic Terrorist Groups. Hanover, Institute for Security Technology Studies (ISTS), Dartmouth College. 2004.
-
(2003)
Examining the Cyber Capabilities of Islamic Terrorist Groups
-
-
-
24
-
-
34547239101
-
World Becomes the Hostage of Media-Savvy Terrorists
-
Jenkins, B. 2004. "World Becomes the Hostage of Media-Savvy Terrorists." USA Today.
-
(2004)
USA Today
-
-
Jenkins, B.1
-
27
-
-
34547315454
-
Report On Line: The Internet and Terrorism. On Line Opinion: Australia's e-journal of Social and Political Debate
-
August
-
Knight, A., and K. Ubayasiri. 2002. Report On Line: the Internet and Terrorism. On Line Opinion: Australia's e-journal of Social and Political Debate. August 2005.
-
(2002)
-
-
Knight, A.1
Ubayasiri, K.2
-
28
-
-
34547354794
-
Internet Mediation: A Theory of Alternative Globalization Movements
-
Paper presented at the, October 8, Montreal, Canada
-
Langman, L., and D. Morris. 2002. "Internet Mediation: A Theory of Alternative Globalization Movements." Paper presented at the proceedings of the 1st International Workshop on Community Informatics. October 8, 2002. Montreal, Canada.
-
(2002)
proceedings of the 1st International Workshop on Community Informatics
-
-
Langman, L.1
Morris, D.2
-
29
-
-
0037834523
-
Cyberhate: A Legal and Historical Analysis of Extremists' Use of Computer Networks in America
-
Levin, B. 2002. "Cyberhate: a Legal and Historical Analysis of Extremists' Use of Computer Networks in America." American Behavioral Scientist 45(6): 958-88.
-
(2002)
American Behavioral Scientist
, vol.45
, Issue.6
, pp. 958-988
-
-
Levin, B.1
-
31
-
-
34547264003
-
Even Near Home, a New Front Is Opening in the Terror Battle
-
Lipton, E., and E. Lichtblau. 2004. "Even Near Home, a New Front Is Opening in the Terror Battle." New York Times on the Web.
-
(2004)
New York Times on the Web
-
-
Lipton, E.1
Lichtblau, E.2
-
33
-
-
1142296991
-
Hyperlink Analyses of the World Wide Web: A Review
-
Retrieved from
-
Park, H. W., and M. Thelwall. 2003. "Hyperlink Analyses of the World Wide Web: a Review." Journal of Computer-Mediated Communication 8(4). Retrieved from http://jcmc.indiana.edu/vol8/issue4/park.html
-
(2003)
Journal of Computer-Mediated Communication
, vol.8
, Issue.4
-
-
Park, H.W.1
Thelwall, M.2
-
35
-
-
27944454388
-
-
Santa Monica, CA: RAND
-
Rabasa, A., C. Benard, P. Chalk, C.C. Fair, T.W. Karasil, R. Lai, I.O. Lesser, and D.E. Thaler. 2004. Muslim World After 9/11. Santa Monica, CA: RAND.
-
(2004)
Muslim World After 9/11
-
-
Rabasa, A.1
Benard, C.2
Chalk, P.3
Fair, C.C.4
Karasil, T.W.5
Lai, R.6
Lesser, I.O.7
Thaler, D.E.8
-
36
-
-
24944448339
-
Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites
-
Paper presented at May, Atlanta, Georgia: Springer
-
Reid, E., J. Qin, Y. Zhou, G. Lai, M. Sageman, G. Weimann, and H. Chen. 2005. "Collecting and Analyzing the Presence of Terrorists on the Web: a Case Study of Jihad Websites." Paper presented at Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005 held May 2005, Atlanta, Georgia: Springer.
-
(2005)
Intelligence and Security Informatics: IEEE International Conference on Intelligence and Security Informatics, ISI 2005 held
-
-
Reid, E.1
Qin, J.2
Zhou, Y.3
Lai, G.4
Sageman, M.5
Weimann, G.6
Chen, H.7
-
37
-
-
0000225173
-
Identity Christian Movement: Ideology of Domestic Terrorism
-
Sharpe, T. T. 2000. "Identity Christian Movement: Ideology of Domestic Terrorism." Journal of Black Studies 30(4): 604-23.
-
(2000)
Journal of Black Studies
, vol.30
, Issue.4
, pp. 604-623
-
-
Sharpe, T.T.1
-
38
-
-
84858104206
-
-
SITE (, SITE (Search for International Terrorist Entities) Institute, Washington, D.C. Retrieved from
-
SITE (2004). "Background on Terrorist Groups." SITE (Search for International Terrorist Entities) Institute, Washington, D.C. Retrieved from http://www.siteinstitute.org/index.html.
-
(2004)
Background on Terrorist Groups
-
-
-
39
-
-
34547281667
-
-
SPLC. 2004. Active U.S. Hate Groups in 2004. Southern Poverty Law Center (SPLC) Intelligence Project. Montgomery, SPLC. Retrieved from http://www.splcenter.org
-
SPLC. 2004. "Active U.S. Hate Groups in 2004." Southern Poverty Law Center (SPLC) Intelligence Project. Montgomery, SPLC. Retrieved from http://www.splcenter.org
-
-
-
-
40
-
-
14744287253
-
Italian Extreme Right On-line Network: An Exploratory Study Using an Integrated Social Network Analysis and Content Analysis Approach
-
Tateo, L. 2005. "Italian Extreme Right On-line Network: An Exploratory Study Using an Integrated Social Network Analysis and Content Analysis Approach." Journal of Computer-Mediated Communication 10(2).
-
(2005)
Journal of Computer-Mediated Communication
, vol.10
, Issue.2
-
-
Tateo, L.1
-
42
-
-
85048941387
-
Al Qaeda and the Internet the Danger of Cyberplanning
-
Thomas, T. L. 2003. "Al Qaeda and the Internet the Danger of Cyberplanning." Parameters 33: 112-23.
-
(2003)
Parameters
, vol.33
, pp. 112-123
-
-
Thomas, T.L.1
-
43
-
-
85044802641
-
Counteracting Terror: Group Design and Response Modalities
-
Pp, edited by M. Deflem. London, Elsevier
-
Thomas, M. J. 2004. "Counteracting Terror: Group Design and Response Modalities." Pp. 91-110 in Terrorism and Counterterrorism: Criminological Perspectives, edited by M. Deflem. London, Elsevier.
-
(2004)
Terrorism and Counterterrorism: Criminological Perspectives
, pp. 91-110
-
-
Thomas, M.J.1
-
45
-
-
34547278484
-
-
Weimann, G. 2004. www.terror.net: How Modern Terrorists Use the Internet. Washington, DC: U.S. Institute of Peace.
-
Weimann, G. 2004. "www.terror.net: How Modern Terrorists Use the Internet." Washington, DC: U.S. Institute of Peace.
-
-
-
-
47
-
-
0347490785
-
Far Right on the Internet
-
Pp, edited by B.D. Loader. London: Routledge
-
Whine, M. 1997. "Far Right on the Internet." Pp. 209-27 in The Governance of Cyberspace, edited by B.D. Loader. London: Routledge.
-
(1997)
The Governance of Cyberspace
, pp. 209-227
-
-
Whine, M.1
-
48
-
-
20344383501
-
CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery
-
Xu, J., and H. Chen. 2005. "CrimeNet Explorer: a Framework for Criminal Network Knowledge Discovery" ACM Transactions on Information Systems 23(2): 201-26.
-
(2005)
ACM Transactions on Information Systems
, vol.23
, Issue.2
, pp. 201-226
-
-
Xu, J.1
Chen, H.2
-
49
-
-
85008065682
-
U.S. Domestic Extremist Groups on the Web: Link and Content Analysis
-
Zhou, Y., E. Reid, J. Qin, H. Chen, and G. Lai. 2005. "U.S. Domestic Extremist Groups on the Web: Link and Content Analysis." IEEE Intelligent Systems 20(5): 44-51.
-
(2005)
IEEE Intelligent Systems
, vol.20
, Issue.5
, pp. 44-51
-
-
Zhou, Y.1
Reid, E.2
Qin, J.3
Chen, H.4
Lai, G.5
|