메뉴 건너뛰기




Volumn 13, Issue 1, 2011, Pages 33-43

Information control and terrorism: Tracking the Mumbai terrorist attack through twitter

Author keywords

Information control; Mumbai terrorist attack; Situation awareness; Twitter

Indexed keywords

CONCEPTUAL FRAMEWORKS; CONTENT ANALYSIS; DECISION MAKING PROCESS; EXTREME ENVIRONMENT; INFORMATION CONTROL; LIVE MEDIA; MUMBAI TERRORIST ATTACK; REPORTING SYSTEMS; SITUATION AWARENESS; TERRORIST ATTACKS; TWITTER;

EID: 79952899403     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-010-9275-8     Document Type: Article
Times cited : (176)

References (33)
  • 1
    • 18444413402 scopus 로고    scopus 로고
    • Risk, terrorism, and the internet
    • 10.1007/s12130-003-1023-7
    • A Anderson 2003 Risk, terrorism, and the internet Knowledge, Technology, & Policy 16 2 24 33 10.1007/s12130-003-1023-7
    • (2003) Knowledge, Technology, & Policy , vol.16 , Issue.2 , pp. 24-33
    • Anderson, A.1
  • 2
    • 84898326290 scopus 로고    scopus 로고
    • Chapter II: Knowledge mangement, terrorism, and cyber terrorism
    • L.J. Janczewsk A.M. Colarik (eds). Yurchak Printing Inc. New York
    • Ariely, G. (2008). Chapter II: Knowledge mangement, terrorism, and cyber terrorism. In L. J. Janczewsk & A. M. Colarik (Eds.), Cyber warfare and cyber terrorism (pp. 7-25). New York: Yurchak Printing Inc.
    • (2008) Cyber Warfare and Cyber Terrorism , pp. 7-25
    • Ariely, G.1
  • 3
    • 84865378129 scopus 로고    scopus 로고
    • Chapter 10: Terror's Web: How the Internet is Transforming Terrorism
    • Y. Jewkes & M. Year (Eds.) Willan Publishing
    • Denning, D. E. (2009). Chapter 10: Terror's Web: How the Internet is Transforming Terrorism. In Y. Jewkes & M. Year (Eds.), Handbook on Internet Crime.Willan Publishing.
    • (2009) Handbook on Internet Crime
    • Denning, D.E.1
  • 4
    • 0029004440 scopus 로고
    • Toward a theory of situation awareness in dynamic systems
    • 10.1518/001872095779049543
    • MR Endsley 1995 Toward a theory of situation awareness in dynamic systems Human Factors 37 1 32 64 10.1518/001872095779049543
    • (1995) Human Factors , vol.37 , Issue.1 , pp. 32-64
    • Endsley, M.R.1
  • 5
    • 0029030537 scopus 로고
    • Measurement of situation awareness in dynamic systems
    • 10.1518/001872095779049499
    • MR Endsley 1995 Measurement of situation awareness in dynamic systems Human Factors 37 1 65 84 10.1518/001872095779049499
    • (1995) Human Factors , vol.37 , Issue.1 , pp. 65-84
    • Endsley, M.R.1
  • 7
    • 77956522694 scopus 로고    scopus 로고
    • http://www.contentious.com/2008/11/27/tracking-a-rumor-indian-government- twitter-and-common-sens/(AccessedJune6th,2010) Gartner (AccessedJune6th,2010)
    • Gartner (2010). Gartner Reveals Five Social Software Predictions for 2010 and Beyond, http://www.gartner.com/it/page.jsp?id=1293114 (Accessed June 6th, 2010). http://www.contentious.com/2008/11/27/tracking-a-rumor-indian-government- twitter-and-common-sens/ (Accessed June 6th, 2010).
    • (2010) Gartner Reveals Five Social Software Predictions for 2010 and beyond
  • 9
    • 79952898241 scopus 로고
    • The uncensored war
    • D Hallin 1993 The uncensored war Peace Review 51 1 51 57
    • (1993) Peace Review , vol.51 , Issue.1 , pp. 51-57
    • Hallin, D.1
  • 10
    • 33845351880 scopus 로고    scopus 로고
    • Information warfare and deception
    • W Hutchinson 2006 Information warfare and deception Informing Science 9 213 223 (Pubitemid 44884367)
    • (2006) Informing Science , vol.9 , pp. 213-223
    • Hutchinson, W.1
  • 11
    • 79952900019 scopus 로고    scopus 로고
    • Indian Ministry of External Affairs AccessedJune4th,2010
    • Indian Ministry of External Affairs. (2009). "Mumbai Terror Attacks - Dossier of Evidence," http://www.hindu.com/nic/dossier.htm (Accessed June 4th, 2010).
    • (2009) Mumbai Terror Attacks - Dossier of Evidence
  • 12
    • 79952900788 scopus 로고    scopus 로고
    • 60 dark hours at Hotel Taj
    • H. Baweja (eds). Roli Books New Delhi
    • Khetan, A. (2009). 60 dark hours at Hotel Taj. In H. Baweja (Ed.), 26/11 Mumbai attacked (pp. 46-83). New Delhi: Roli Books.
    • (2009) 26/11 Mumbai Attacked , pp. 46-83
    • Khetan, A.1
  • 13
    • 79952901775 scopus 로고    scopus 로고
    • AccessedNov.9th,2009
    • Kievit, R. (2008). "Twitter messages feed major news channels," http://static.rnw.nl/migratie/www.radionetherlands.nl/features/media/081128- twitter-redirected (Accessed Nov. 9th, 2009).
    • (2008) Twitter Messages Feed Major News Channels
    • Kievit, R.1
  • 14
    • 13944275945 scopus 로고    scopus 로고
    • Determinants of sourcing during technology growth and maturity: An empirical study of e-commerce sourcing
    • R Kishore M Agrawal HR Rao 2004-2005 Determinants of sourcing during technology growth and maturity: an empirical study of e-commerce sourcing Journal of Management Information Systems 21 3 47 82 (Pubitemid 40264569)
    • (2004) Journal of Management Information Systems , vol.21 , Issue.3 , pp. 47-82
    • Kishore, R.1    Agrawal, M.2    Rao, H.R.3
  • 16
    • 0036510429 scopus 로고    scopus 로고
    • Security 'review' and the first amendment
    • WE Lee 2002 Security 'review' and the first amendment Harvard Journal of Law & Public Policy 25 2 743 763
    • (2002) Harvard Journal of Law & Public Policy , vol.25 , Issue.2 , pp. 743-763
    • Lee, W.E.1
  • 21
    • 79952900471 scopus 로고    scopus 로고
    • Twenty-First Century Embedded Journalists: Lawful Target?
    • A. M. Tulud, A. B. Ching & C. J. Strong (Eds.) Department of Army
    • Moore, D. W. (2009). Twenty-First Century Embedded Journalists: Lawful Target?. In A. M. Tulud, A. B. Ching & C. J. Strong (Eds.), The Armay Lawyer (pp. 1-32) Department of Army.
    • (2009) The Armay Lawyer , pp. 1-32
    • Moore, D.W.1
  • 23
    • 33751170051 scopus 로고    scopus 로고
    • Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
    • DOI 10.1016/j.ijhcs.2006.08.012, PII S1071581906001285
    • J Qin Y Zhou E Reid G Lai H Chen 2007 Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity International Journal of Human Computer Studies 65 71 84 10.1016/j.ijhcs.2006. 08.012 (Pubitemid 44780146)
    • (2007) International Journal of Human Computer Studies , vol.65 , Issue.1 , pp. 71-84
    • Qin, J.1    Zhou, Y.2    Reid, E.3    Lai, G.4    Chen, H.5
  • 24
    • 79952900617 scopus 로고    scopus 로고
    • AccessedNov.15th,2009
    • Raman, B. (2009). "Mumbai terrorist attack - some aspects," http://globalpoliticsonline.com/wped/2009/01/17/mumbai-terrorist-attack-some- aspects/ (Accessed Nov. 15th, 2009).
    • (2009) Mumbai Terrorist Attack - Some Aspects
    • Raman, B.1
  • 29
    • 79952901702 scopus 로고    scopus 로고
    • Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism
    • Taipale, K. A. (2005). "Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism," Yale ISP 2005 Global Flow of Information, Draft.
    • (2005) Yale ISP 2005 Global Flow of Information, Draft
    • Taipale, K.A.1
  • 30
    • 85023972678 scopus 로고    scopus 로고
    • Www.terrorism.com: Terror on the Internet
    • 10.1080/10576100290101214
    • Y Tsfati G Weimann 2002 www.terrorism.com: terror on the Internet Studies in Conflict & Terrorism 25 317 332 10.1080/10576100290101214
    • (2002) Studies in Conflict & Terrorism , vol.25 , pp. 317-332
    • Tsfati, Y.1    Weimann, G.2
  • 33
    • 79952901701 scopus 로고    scopus 로고
    • Special Report, United States Institute of Peace
    • Weimann, G. (2004). " www.terror.net : How Modern Terrorism Uses the Internet," Special Report, United States Institute of Peace (116), pp.1-12.
    • (2004) How Modern Terrorism Uses the Internet , Issue.116 , pp. 1-12
    • Weimann, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.