메뉴 건너뛰기




Volumn 59, Issue 8, 2008, Pages 1347-1359

Uncovering the Dark Web: A case study of Jjihad on the Web

Author keywords

[No Author keywords available]

Indexed keywords

ACTIVITY LEVELS; APPLIED (CO); CASE STUDIES; EFFICIENT ANALYSIS; EXPERT EVALUATION; HIGH POTENTIAL; INFORMATION COLLECTIONS; INFORMATION OVERLOADING; NOVEL METHODOLOGY; POLICY MAKING; REVERSE SIDE; TERRORIST ACTIVITIES; VISUALIZATION TECHNIQUES; WEB INFORMATION;

EID: 45849099772     PISSN: 15322882     EISSN: 15322890     Source Type: Journal    
DOI: 10.1002/asi.20838     Document Type: Article
Times cited : (127)

References (39)
  • 1
    • 33744926852 scopus 로고    scopus 로고
    • Jihad Online: Islamic Terrorists and the Internet, retrieved
    • March 26, from http://_online.pdf
    • Anti-Defamation League. (2002). Jihad Online: Islamic Terrorists and the Internet, retrieved March 26, 2008 from http://www.adl.org/internet/ jihad_online.pdf.
    • (2002)
    • League, A.-D.1
  • 2
    • 85068337433 scopus 로고    scopus 로고
    • Web posting may provide insight into Iraq insurgency
    • November 23, retrieved March 26, 2008 from
    • Blakemore, B. (November 23, 2004). Web posting may provide insight into Iraq insurgency. ABC News, retrieved March 26, 2008 from http://abcnews.go.com/ WNT/story?id=277421.
    • (2004) ABC News
    • Blakemore, B.1
  • 3
    • 45849118857 scopus 로고    scopus 로고
    • Carley, Kathleen M. Ju-Sung Lee and David Krackhardt, 2001, Destabilizing Networks, Connections, 24(3): 31-34.
    • Carley, Kathleen M. Ju-Sung Lee and David Krackhardt, 2001, Destabilizing Networks, Connections, 24(3): 31-34.
  • 5
  • 6
    • 33747561646 scopus 로고    scopus 로고
    • Web mining: Machine learning for Web applications
    • M. E. Williams Ed, Medford, NJ: Information Today, Inc
    • Chen, H., & Chau, M. (2004). Web mining: Machine learning for Web applications. In M. E. Williams (Ed.), Annual review of information science and technology (Vol. 38, pp. 289-329). Medford, NJ: Information Today, Inc.
    • (2004) Annual review of information science and technology , vol.38 , pp. 289-329
    • Chen, H.1    Chau, M.2
  • 9
    • 45849087851 scopus 로고    scopus 로고
    • Visualizing E-Business Stakeholders on the Web: A Methodology and Experimental Results
    • Chung, W. (2008). Visualizing E-Business Stakeholders on the Web: A Methodology and Experimental Results. International Journal of Electronic Business, 6(1), 2008, 25-46.
    • (2008) International Journal of Electronic Business , vol.6 , Issue.1 , pp. 25-46
    • Chung, W.1
  • 11
    • 21044443622 scopus 로고    scopus 로고
    • A visual framework for knowledge discovery on the Web: An empirical study on business intelligence exploration
    • Chung, W., Chen, H., & Nunamaker, J.F. (2005). A visual framework for knowledge discovery on the Web: An empirical study on business intelligence exploration. Journal of Management Information Systems, 21(4), 57-84.
    • (2005) Journal of Management Information Systems , vol.21 , Issue.4 , pp. 57-84
    • Chung, W.1    Chen, H.2    Nunamaker, J.F.3
  • 13
    • 0141766680 scopus 로고    scopus 로고
    • The United States Government, retrieved March 26, 2008 from
    • Department of State. (2003). Patterns of Global Terrorism 2002: The United States Government, retrieved March 26, 2008 from http://www.state.gov/s/ ct/rls/crt/2002/.
    • (2003) Patterns of Global Terrorism 2002
  • 14
    • 45849129212 scopus 로고    scopus 로고
    • Encyclopedia Britannica Online. (2007). Jihad. Retrieved March 26, 2008 from http://www.britannica.com/ebc/article-9368558, Britannica Concise Encyclopedia.
    • Encyclopedia Britannica Online. (2007). Jihad. Retrieved March 26, 2008 from http://www.britannica.com/ebc/article-9368558, Britannica Concise Encyclopedia.
  • 15
    • 0030401739 scopus 로고    scopus 로고
    • The contributions of organizational science to the development of decision support systems research subspecialties
    • Eom, S.B., & Farris, R.S. (1996). The contributions of organizational science to the development of decision support systems research subspecialties. Journal of the American Society for Information Science, 47(12), 941-952.
    • (1996) Journal of the American Society for Information Science , vol.47 , Issue.12 , pp. 941-952
    • Eom, S.B.1    Farris, R.S.2
  • 16
    • 0030288690 scopus 로고    scopus 로고
    • The World Wide Web: Quagmire or gold mine?
    • Etzioni, O. (1996). The World Wide Web: Quagmire or gold mine? Communications of the ACM, 39(11), 65-68.
    • (1996) Communications of the ACM , vol.39 , Issue.11 , pp. 65-68
    • Etzioni, O.1
  • 17
    • 0011016060 scopus 로고    scopus 로고
    • Cyber-attacks by Al Qaeda feared
    • June 27, retrieved March 26, 2008 from
    • Gellman, B. (June 27, 2002). Cyber-attacks by Al Qaeda feared. Washington Post, page A01, retrieved March 26, 2008 from http://www.washingtonpost.com/ ac2/wp-dyn/A50765-2002Jun26.
    • (2002) Washington Post
    • Gellman, B.1
  • 18
    • 0036643003 scopus 로고    scopus 로고
    • Mining a Web citation database for author co-citation analysis
    • He, Y., & Hui, S.C. (2002). Mining a Web citation database for author co-citation analysis. Information Processing and Management, 38(4), 491-508.
    • (2002) Information Processing and Management , vol.38 , Issue.4 , pp. 491-508
    • He, Y.1    Hui, S.C.2
  • 19
    • 0035655608 scopus 로고    scopus 로고
    • Knowledge maps and their use in computer-based collaborative learning
    • Kealy, W.A. (2001). Knowledge maps and their use in computer-based collaborative learning. Journal of Educational Computing Research, 25(4), 325-349.
    • (2001) Journal of Educational Computing Research , vol.25 , Issue.4 , pp. 325-349
    • Kealy, W.A.1
  • 20
    • 34547250715 scopus 로고    scopus 로고
    • July 10, USA Today, retrieved March 26, 2008 from
    • Kelley, J. (July 10, 2002). Militants Wire Web With Links to Jihad. USA Today, retrieved March 26, 2008 from http://www.usatoday.com/news/world/2002/07/ 10/web-terror-cover.htm.
    • (2002) Militants Wire Web With Links to Jihad
    • Kelley, J.1
  • 21
    • 0038401985 scopus 로고    scopus 로고
    • Mapping network of terrorist cells
    • Krebs, V.E. (2001). Mapping network of terrorist cells. Connections, 24(3), 43-52.
    • (2001) Connections , vol.24 , Issue.3 , pp. 43-52
    • Krebs, V.E.1
  • 25
    • 45849084417 scopus 로고    scopus 로고
    • Middle East Media Research Institute, Retrieved March 2004, retrieved March 26, 2008 from
    • Middle East Media Research Institute. (2004). Jihad and Terrorism Studies Project. Retrieved March 2004, retrieved March 26, 2008 from http://www.memri.org/jihad.html.
    • (2004) Jihad and Terrorism Studies Project
  • 27
    • 0035217671 scopus 로고    scopus 로고
    • Text analysis and knowledge mining system
    • Nasukawa, T., & Nagano, T. (2001). Text analysis and knowledge mining system. IBM Systems Journal, 40(4), 967-984.
    • (2001) IBM Systems Journal , vol.40 , Issue.4 , pp. 967-984
    • Nasukawa, T.1    Nagano, T.2
  • 28
    • 85037336663 scopus 로고    scopus 로고
    • Video appears to show beheading of American civilian
    • May 11
    • Newman, M. (2004, May 11). Video appears to show beheading of American civilian. The New York Times.
    • (2004) The New York Times
    • Newman, M.1
  • 30
    • 45849139490 scopus 로고    scopus 로고
    • Project for the Research of Islamist Movements, retrieved March 26, 2008 from
    • Project for the Research of Islamist Movements. (2004). PRISM, 2004, retrieved March 26, 2008 from http://www.e-prism.org.
    • (2004) PRISM , pp. 2004
  • 31
    • 84903667395 scopus 로고    scopus 로고
    • Philadelphia, PA: University of Pennsylvania Press
    • Sageman, M. (2004). Understanding terror networks. Philadelphia, PA: University of Pennsylvania Press.
    • (2004) Understanding terror networks
    • Sageman, M.1
  • 33
    • 24944576133 scopus 로고    scopus 로고
    • Technical Analysis Group, Hanover, NH: Institute for Security Technology Studies at Dartmouth College
    • Technical Analysis Group. (2004). Examining the cyber capabilities of Islamic terrorist groups. Hanover, NH: Institute for Security Technology Studies at Dartmouth College.
    • (2004) Examining the cyber capabilities of Islamic terrorist groups
  • 34
    • 85048941387 scopus 로고    scopus 로고
    • Al Qaeda and the Internet: The danger of cyberplanning
    • Spring
    • Thomas, T.L. (2003, Spring). Al Qaeda and the Internet: The danger of cyberplanning. Parameters, 112-123.
    • (2003) Parameters , pp. 112-123
    • Thomas, T.L.1
  • 35
    • 0033474337 scopus 로고    scopus 로고
    • Text mining
    • M.E. Williams Ed, Medford, NJ: Information Today, Inc
    • Trybula, W.J. (1999). Text mining. In M.E. Williams (Ed.), Annual review of information science and technology (Vol. 34, pp. 385-419). Medford, NJ: Information Today, Inc.
    • (1999) Annual review of information science and technology , vol.34 , pp. 385-419
    • Trybula, W.J.1
  • 36
    • 85023972678 scopus 로고    scopus 로고
    • retrieved March 26, 2008 from http://www.terrorism.com/, Terror on the Internet
    • Tsfati, Y., & Weimann, G. (2002). retrieved March 26, 2008 from http://www.terrorism.com/, Terror on the Internet. Studies in Conflict & Terrorism, 25, 317-332.
    • (2002) Studies in Conflict & Terrorism , vol.25 , pp. 317-332
    • Tsfati, Y.1    Weimann, G.2
  • 37
    • 20344376408 scopus 로고    scopus 로고
    • Criminal network analysis and visualization
    • Xu, J., & Chen, H. (2005). Criminal network analysis and visualization. Communications of the ACM, 48(6), 100-107.
    • (2005) Communications of the ACM , vol.48 , Issue.6 , pp. 100-107
    • Xu, J.1    Chen, H.2
  • 39
    • 10044285723 scopus 로고    scopus 로고
    • Zhu, B., & Chen, H. (2005). Chapter 4: Information Visualization. In B. Cronin (Ed.), Annual Review of Information Science and Technology (39, pp. 139-177). Medford, NJ: Information Today, Inc.
    • Zhu, B., & Chen, H. (2005). Chapter 4: Information Visualization. In B. Cronin (Ed.), Annual Review of Information Science and Technology (Vol. 39, pp. 139-177). Medford, NJ: Information Today, Inc.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.