메뉴 건너뛰기




Volumn 13, Issue 1, 2011, Pages 75-88

A multi-region empirical study on the internet presence of global extremist organizations

Author keywords

Extremism; Internet; Web mining

Indexed keywords

ANALYSIS RESULTS; CONTENT ANALYSIS; DARK WEB; DOMAIN EXPERTS; EMPIRICAL STUDIES; EXTREMISM; INTEGRATED APPROACH; INTERACTIVITY; INTERNET COMMUNICATION; INTERNET TECHNOLOGY; INTERNET USAGE; MEDIA RICHNESS; WEB COLLECTIONS; WEB CRAWLING; WEB DOCUMENT; WEB MINING; WEB PRESENCE;

EID: 79952900214     PISSN: 13873326     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10796-010-9277-6     Document Type: Article
Times cited : (29)

References (29)
  • 3
    • 0345327807 scopus 로고    scopus 로고
    • Internet anonymity practices in computer crime
    • 10.1108/09685220310500117
    • HL Armstrong PJ Forde 2003 Internet anonymity practices in computer crime Information Management & Computer Security 11 5 209 215 10.1108/09685220310500117
    • (2003) Information Management & Computer Security , vol.11 , Issue.5 , pp. 209-215
    • Armstrong, H.L.1    Forde, P.J.2
  • 4
    • 79952901153 scopus 로고    scopus 로고
    • Christian Science Monitor, July 28, 2004, available at
    • Bowers, F. (2004). Terrorists spread their messages online. Christian Science Monitor, July 28, 2004, available at http://www.csmonitor.com/2004/0728/ p03s01-usgn.htm.
    • (2004) Terrorists Spread Their Messages Online
    • Bowers, F.1
  • 6
    • 84937324900 scopus 로고    scopus 로고
    • White supremacist networks on the Internet
    • V Burris E Smith A Strahm 2000 White supremacist networks on the Internet Sociological Focus 33 2 215 234
    • (2000) Sociological Focus , vol.33 , Issue.2 , pp. 215-234
    • Burris, V.1    Smith, E.2    Strahm, A.3
  • 7
    • 0038738052 scopus 로고    scopus 로고
    • Comparison of three vertical search spiders
    • M Chau H Chen 2003 Comparison of three vertical search spiders IEEE Computer 36 56 62
    • (2003) IEEE Computer , vol.36 , pp. 56-62
    • Chau, M.1    Chen, H.2
  • 8
    • 44849099980 scopus 로고    scopus 로고
    • SpidersRUs: Creating specialized search engines in multiple languages
    • 10.1016/j.dss.2007.07.006
    • M Chau J Qin Y Zhou C Tseng H Chen 2008 SpidersRUs: creating specialized search engines in multiple languages Decision Support Systems 45 621 640 10.1016/j.dss.2007.07.006
    • (2008) Decision Support Systems , vol.45 , pp. 621-640
    • Chau, M.1    Qin, J.2    Zhou, Y.3    Tseng, C.4    Chen, H.5
  • 10
    • 0037596632 scopus 로고    scopus 로고
    • Interactivity and interactive functions in web-based learning systems: A technical framework for designers
    • 10.1111/1467-8535.00326
    • C Chou 2003 Interactivity and interactive functions in web-based learning systems: a technical framework for designers British Journal of Educational Technology 34 3 265 279 10.1111/1467-8535.00326
    • (2003) British Journal of Educational Technology , vol.34 , Issue.3 , pp. 265-279
    • Chou, C.1
  • 14
    • 85045164277 scopus 로고    scopus 로고
    • Hate Online: A Content Analysis of Extremist Internet Sites
    • 10.1111/j.1530-2415.2003.00013.x
    • P B Gerstenfeld D R Grant C Chiang 2003 Hate Online: A Content Analysis of Extremist Internet Sites Analyses of Social Issues and Public Policy 3 1 29 44 10.1111/j.1530-2415.2003.00013.x
    • (2003) Analyses of Social Issues and Public Policy , vol.3 , Issue.1 , pp. 29-44
    • Gerstenfeld, P.B.1    Grant, D.R.2    Chiang, C.3
  • 15
    • 79952901771 scopus 로고    scopus 로고
    • Internet Haganah available at
    • Internet Haganah, Internet Haganah report, 2005, available at http://en.wikipedia.org/wiki/Internet-Haganah.
    • Internet Haganah Report, 2005
  • 16
    • 24944576133 scopus 로고    scopus 로고
    • ISTS Report, Institute for Security Technology Studies, 2004
    • ISTS (2004). Examining the Cyber Capabilities of Islamic Terrorist Groups". Report, Institute for Security Technology Studies, 2004. http://www.ists.dartmouth.edu/
    • (2004) Examining the Cyber Capabilities of Islamic Terrorist Groups
  • 17
    • 34547239101 scopus 로고    scopus 로고
    • World becomes the hostage of media-savvy terrorists: Commentary
    • Jenkins, B. M. (2004). World becomes the hostage of media-savvy terrorists: Commentary. USA Today, August 22, 2004. http://www.rand.org/.
    • (2004) USA Today, August 22, 2004
    • Jenkins, B.M.1
  • 18
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative Sources in a Hyperlinked Environment
    • 10.1145/324133.324140
    • J Kleinberg 1999 Authoritative Sources in a Hyperlinked Environment Journal of the ACM, 46 5 604 632 10.1145/324133.324140
    • (1999) Journal of the ACM , vol.46 , Issue.5 , pp. 604-632
    • Kleinberg, J.1
  • 19
    • 79952902634 scopus 로고    scopus 로고
    • Terror Moves to the Virtual World
    • April 8, 2004, available at
    • Muriel, D. (2004). Terror Moves to the Virtual World. CNN News, April 8, 2004, available at http://edition.cnn.com/2004/TECH/04/08/internet.terror/.
    • (2004) CNN News
    • Muriel, D.1
  • 21
    • 0032010307 scopus 로고    scopus 로고
    • An emerging model of web site design for marketing
    • JW Palmer DA Griffith 1998 An emerging model of Web site design for marketing Communications of the ACM 41 3 45 51 10.1145/272287.272296 (Pubitemid 128442495)
    • (1998) Communications of the ACM , vol.41 , Issue.3 , pp. 45-51
    • Palmer, J.W.1    Griffith, D.A.2
  • 22
    • 33751170051 scopus 로고    scopus 로고
    • Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity
    • DOI 10.1016/j.ijhcs.2006.08.012, PII S1071581906001285
    • J Qin Y Zhou E Reid G Lai H Chen 2007 Analyzing terror campaigns on the internet: technical sophistication, content richness, and Web interactivity International Journal on Human Computer Studies 65 1 71 84 10.1016/j.ijhcs.2006. 08.012 (Pubitemid 44780146)
    • (2007) International Journal of Human Computer Studies , vol.65 , Issue.1 , pp. 71-84
    • Qin, J.1    Zhou, Y.2    Reid, E.3    Lai, G.4    Chen, H.5
  • 26
    • 85023972678 scopus 로고    scopus 로고
    • Www.terrorism.com: Terror on the internet
    • 10.1080/10576100290101214
    • Y Tsfati G Weimann 2002 www.terrorism.com: terror on the internet Studies in Conflict & Terrorism 25 317 332 10.1080/10576100290101214
    • (2002) Studies in Conflict & Terrorism , vol.25 , pp. 317-332
    • Tsfati, Y.1    Weimann, G.2
  • 27
    • 16344367669 scopus 로고    scopus 로고
    • Special Report, U.S. Institute of Peace. Available at http://www.usip.org/pubs/specialreports/sr116.pdf.
    • Weimann, G. (2004). www.terror.net : How modern terrorism use the internet. Special Report, U.S. Institute of Peace. Available at http://www.usip.org/pubs/specialreports/sr116.pdf.
    • (2004) How Modern Terrorism Use the Internet
    • Weimann, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.