Academic literature on the topic 'Jihadist cyber'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Jihadist cyber.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Jihadist cyber"

1

Brandea, Bianca. "Implications of the jihadist terrorism in cyberspace." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 1 (April 8, 2024): 157–65. http://dx.doi.org/10.53477/2284-9378-24-10.

Full text
Abstract:
The terrorist attack on the 11th of September, 2001, marked the change in the West’s perception of the Middle East and vice versa. Followed by the US military presence in the Middle East, this event contributed to the development of the means of terrorist actions around the world and the popularization of jihad. The hostile attitude of the West thus succeeded in maintaining the state of tension between the two spaces. Over time, jihadist and terrorist groups have been joined by members originating from the West who were convinced by the importance of the “missions” they later undertook. In the present paper, we will focus on the transposition and continuation of hostilities in both geographic and cyber spaces, with reference even to the current Israeli-Palestinian conflict.
APA, Harvard, Vancouver, ISO, and other styles
2

Balogh, Péter. "Jihadist war or a challenge of disintegration?" Belvedere Meridionale 31, no. 4 (2019): 233–50. http://dx.doi.org/10.14232/belv.2019.4.17.

Full text
Abstract:
In this paper we introduce some relevant research results about the role of social embeddedness and social resources in the sphere of social conflicts and violence. In accordance with the actual state of the investigation process the outcomes presented in this analysis are focusing on the activities of the so called ‘Islamic State’or ISIS – considered to be a rather effective terrorism exporter recently. After briefly outlining the broader – global – context of terrorist organizations, the particular characteristics of the activities of ISIS and some elements of the conceptual frame, the study highlights empirically two potential explaining factors of the success of the terrorist organization. On the one hand the influencing network – primarily linked to the cyber sphere – of the Islamic State is explored, demonstrating a notable focus on the developed countries of Europe. On the other hand the paper summarizes the main conclusions from a case study on the recruitment base of the militants in Brussels of the terrorist organization investigating the relationship between the territorial distribution of the ISIS foreign fighters in city and the extent of segregation of the Islamic population in the different districts, including also certain socio-demographic factors to shed light on the significance of the broader – unfavourable – social context.
APA, Harvard, Vancouver, ISO, and other styles
3

García Català, Maria Teresa. "Big Data Analysis of the #BringBackOurGirls Cyber-Campaign." Debats. Revista de cultura, poder i societat 5 (December 30, 2020): 261–70. http://dx.doi.org/10.28939/iam.debats-en.2020-15.

Full text
Abstract:
We used a web tool to extract Twitter API data on the #BringBackOurGirls campaign. The Twitter hashtag was used for a campaign denouncing the kidnapping of 276 schoolgirls in Chibok, Nigeria on the 14th of April 2014 by the Jihadist group Boko Haram. The data extracted covered the period spanning from the creation of the campaign (19th of May 2014) to the 16th of May 2019. The data were anonymous because they were provided in aggregate form, covering things such as: the number, content, and chronology of tweets; information on geographical area; the relevance of the users making comments; information on followers; the impact of tweets; ‘likes’; re-tweets; demographic profiles (gender); keyword information. These indications were provided in the form of mass, open data by Twitter’s API. The data was ordered and analysed by the research team during the course of the qualitative study to shed light on the cyber-campaign.
APA, Harvard, Vancouver, ISO, and other styles
4

Mozid, Ashraful, and Nelufer Yesmen. "Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review." Journal of Advanced Forensic Sciences 1, no. 1 (February 7, 2020): 1–9. http://dx.doi.org/10.14302/issn.2692-5915.jafs-20-3204.

Full text
Abstract:
Cybercrime is one of the fastest-growing criminal activities in contemporary age. The first recorded cybercrime happened in France in the year 1820. It was not as sophisticated as cybercrime we know in our world today, but, still, that was a crime. Cybercrime has evolved globally as the online platform is progressing. While progress is made in the battle against cybercrime there still remains a wide gap in the consistency of laws across international borders. The main objectives of this study are to explore the nature of cybercrime in developing countries, find out the cyber threats for terrorist activities and explain cybercrime and threats from criminological aspects. This is a descriptive study which is based on secondary data. This study is based on previous researches & studies. this paper discusses the nature of cybercrime in developing countries. It could allow developed countries to understand better the national and international effects of that cyber threats, to determine the conditions of current regional and international agreements, and to help countries create a sound legal framework. And then we notice the impact of cyber threats all over the world. At last, we discuss cybercrime from criminological point of view. Cybercrime is not limited to two neighboring countries and cross-border conflicts; an attempt could be conducted from another world. It is fearful to see cyber wars as the easiest way to carry out sabotaging rather than wars such as cold war, chemical and biological wars, terrorist wars or jihadist attacks. The international legal framework aims by the International Criminal Court to keep offenders accountable for their actions. The government has by far the biggest burden and obstacle in raising knowledge of cybercrime among the people.
APA, Harvard, Vancouver, ISO, and other styles
5

Fenton, Adam James. "Preventing Catastrophic Cyber–Physical Attacks on the Global Maritime Transportation System: A Case Study of Hybrid Maritime Security in the Straits of Malacca and Singapore." Journal of Marine Science and Engineering 12, no. 3 (March 19, 2024): 510. http://dx.doi.org/10.3390/jmse12030510.

Full text
Abstract:
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary data from 42 expert interviews, a 28 respondent survey, and two maritime security roundtables. Key findings were that ships’ critical systems are increasingly interconnected, yet aging IT infrastructure and minimal cybersecurity awareness among crews heighten risks. Meanwhile, regional terrorist groups have previously targeted shipping and shown considerable skill in exploiting online tools, aligning with broader calls for jihadist violence. Furthermore, opportunistic piracy persists in the SOMS with the potential to disrupt shipping. Experts confirmed that maritime cybersecurity lags behind other critical infrastructure sectors and needs updated governance. Initial International Maritime Organization (IMO) guidelines lack specificity but revisions and updated IMO guidance are in process, while Port state implementation of maritime cybersecurity standards varies. Crucially, information sharing remains inadequate, even as recorded attacks increase. Findings underscore that although major hybrid incidents have not occurred, simulations and threat actors’ capabilities demonstrate potential for catastrophic collisions or cascading disruption in congested waterways. Mitigating factors like redundancy and crew training are deficient currently. Some alignment between SOMS states on maritime security cooperation exists, but not on cyber threats specifically. Key recommendations include an anonymous cyber attack reporting system, reinforced training and shipboard systems, and consolidated regional frameworks. Until these priorities are addressed, the analysis concludes that hybrid vulnerabilities in this vital global chokepoint remain a serious concern.
APA, Harvard, Vancouver, ISO, and other styles
6

Mbugua, Charles, Sammy Mang'eli, and Mary Ragui. "Mentoring: A Faith Based Relational Leadership Approach in Preventing and Countering Violent Extremism in Kenya." International Journal for Innovation Education and Research 7, no. 11 (November 30, 2019): 1208–24. http://dx.doi.org/10.31686/ijier.vol7.iss11.1990.

Full text
Abstract:
The article examines the role that mentoring, a critical relational leadership process would have in preventing and countering violent extremism by first examining the contexts of radicalization into violent extremism and past violent extremist attacks. Youths and adolescents in Kenya have been radicalized into violent extremism with resultant acts of terror that have resulted in; mass fatalities, casualties, destruction of facilities, disruption of livelihoods and business, and creation of immense fear within the public. The first major attack that seemed to have opened this cycle of al Qaeda and al Shabaab-led Jihadist attacks was the August, 1998 twin-bombing of the USA embassies in Kenya and Tanzania. Since then, we have had the advent of; al Qaeda, its affiliate al Shabaab, and ISIS attacks rising within the African continent with heavy impacts of death trails, casualties, and destruction. This year, Kenya has suffered a number of attacks targeting both soft and hard targets. Among the soft targets was the attack targeting Dusit Hotel in the upmarket 14 Riverside Complex, which left 21 Kenyans and foreigners dead. By extension there have been a number of IED attacks targeting the security services of Kenya many fatalities and casualties. All these attacks have been executed by violent extremists among who are Kenyan youth who have been recruited and radicalized into violent extremism as an ideology that is leveraged on the Islam religion. This ideology of Jihadism is skewed but uses narratives that easily appeal to those targeted for radicalization. Consequently there is an urgent need to have in place relevant mentoring leadership practice to enhance worldviews and perspectives among youth and adolescents which are in tandem with what a sane world subscribes to. It then becomes imperative to have a faith-based mentoring approach that is devoid of extremism and which gives the pool of those targeted a leadership component. This deliver a countering and preventive relational leadership model enhancing resilience of individuals and communities, while countering narratives and propaganda inherent in the recruitment and radicalization to violent extremism. Following literature review and conceptualization of the variables, this article concludes that preventive and countering violent extremism measures are best deployed first amongst the youth, who form the largest and most vulnerable pool of those targeted for radicalization due to; their crave for an identity, promises of a utopian caliphate on earth and life upon death, poverty, joblessness, presence of ungoverned spaces such as the complex cyber space, and dysfunctional social systems including families.
APA, Harvard, Vancouver, ISO, and other styles
7

Stewart, Garrett. "Open-Circuit Narrative: Programmed Reading in Richard Powers." Novel 55, no. 3 (November 1, 2022): 547–65. http://dx.doi.org/10.1215/00295132-10007583.

Full text
Abstract:
Abstract Long before the eight-stranded weave of ecocritical plot in Richard Powers's Pulitzer Prize–winning The Overstory (2018) and, since then, the interlace between inset astrobiological bedtime stories and the environmentalist passions of family psychodrama in his Booker-nominated Bewilderment (2021), an important turn-of-the-millennium work by this MacArthur-lauded novelist, Plowing the Dark (2000), remains his most strenuous venture in what this article calls the open-circuit structure of his typical multi-plot narratives. Scenes of secretly funded VR aesthetics in the high-tech America of “research and development” are pitted against the contrasting affect, emphatically detached in space and time, of savage sensory deprivation suffered by an Arab American US citizen as jihadist prisoner in Beirut. Only at the eleventh hour of plot time is this man's plight revealed, by proximate cause, to render him, in retrospect, the indirect victim (spoiler alert) of electronic sophistication in American's “wired wars.” Until then, reading swerves between alternate and seemingly unrelated spaces of cyber-optic volatility and cognitive evacuation, virtual over against vitiated—with an all-too-real network of violence hard-wiring them imperceptibly to each other. Beyond the latent dialectic of these disjunct prose episodes, the novel critiques a world “formed” on quite different principles, whose geopolitical systems it confronts on fiction's own resistant verbal terms. To argue the contrary—that literary and societal forms are different from each other only in degree or scale—is, in an especially leveling sense, to rescind crucial differences between the force of depiction and world of force, which every lucid nuance of Powers's unique narrative style would resist.
APA, Harvard, Vancouver, ISO, and other styles
8

Antinori, Arije. "L'evoluzione jihadista (cyber-)globalizzata." SICUREZZA E SCIENZE SOCIALI, no. 2 (December 2017): 33–51. http://dx.doi.org/10.3280/siss2017-002004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Eunyoung. "Cognitive warfare, game and visual images: ISIS Jihadists narratives analyses." Korean Association of Criminal Psychology 19, no. 3 (September 30, 2023): 7–24. http://dx.doi.org/10.25277/kcpr.2023.19.3.7.

Full text
Abstract:
Cyberspace has emerged as a significant domain in human life, driven by technological advancements and globalization. This paradigm shift has presented terrorists and violent extremists with a new platform for conducting psychological warfare and promoting their terrorist activities. In their quest to recruit individuals and expand their causes, terrorists have integrated their propaganda narratives into diverse visual tools and games. This shift has prompted Western countries to recognize the risks associated with cyber propaganda as a threat to national security, leading to extensive research on developing effective countermeasures. However, limited attention has been given to studying the cyber propaganda and narratives of terrorist groups that utilize games and visual materials to propagate their ideologies. To bridge this gap, this study focuses on analyzing the cyber propaganda tactics employed by ISIS through visual images and internet games. The research aims to gain insights into the strategies employed and the influence exerted by such propaganda on radicalization processes and terrorist activities. The study presents its findings, including research methodologies, analysis results, and discussions, shedding light on the implications for policy development.
APA, Harvard, Vancouver, ISO, and other styles
10

Zdravkovski, Aleksander. "Cyber sheiks and grassroots jihadis: the war in Syria and the devolution of the Bosnian Salafi communities." Small Wars & Insurgencies 29, no. 5-6 (November 2, 2018): 941–63. http://dx.doi.org/10.1080/09592318.2018.1519306.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Jihadist cyber"

1

Renaut, Laurène. "Le concept d'étrangeté (ghurba) dans la construction identitaire des cyber-militants de l'Etat Islamique. Ethnographie d'une djihadosphère entre 2018 et 2022." Electronic Thesis or Diss., CY Cergy Paris Université, 2023. http://www.theses.fr/2023CYUN1274.

Full text
Abstract:
Cette thèse, au carrefour de l'Analyse du discours et des Sciences de l'information et de la communication, interroge le concept d'étrangeté (ghurba) dans le discours salafiste djihadiste en ligne et plus particulièrement dans la construction identitaire des partisans de l'EI. La recherche repose sur une enquête ethnographique dans la djihadosphère facebookienne, où nous observé, incognito, des individus pratiquant le djihad médiatique. Pour investir cette communauté sensible, un protocole (observation impliquante, grille de critères attestant d'une adhésion à l'idéologie djihadiste, méthodologie mixte de recueil des données et cadre éthique) a été élaboré au contact des enquêtés. Pour analyser les données issues de ce terrain, nous avons eu recours à une « méthodologie techno-sémio-discursive » (Rondot, 2015), fondée sur une approche discursive, tout en prenant en compte les signes non-verbaux et les caractéristiques du dispositif investi. Nous montrons qu'au-delà d'un thème dominant du discours djihadiste, le concept d'étrangeté (tel qu'il est mobilisé par ces militants) fonde une ontologie ; régit leurs représentations numériques ; et guide leurs conduites en ligne. En cela, il constitue la matrice idéologique du discours des partisans de l'EI sur Facebook. Avec ce travail, nous entendons apporter un nouvel éclairage sur l'engagement salafiste djihadiste via le prisme conceptuel de l'étrangeté
This thesis, at the crossroads of Discourse Analysis and Information and Communication Sciences, questions the concept of strangeness (ghurba) in online Salafist jihadist discourse, and more specifically in the identity construction of EI supporters. The research is based on an ethnographic survey of the Facebook jihadosphere, where we observe, incognito, individuals practicing media jihad. A protocol (involving observation, a grid of criteria attesting to adherence to jihadist ideology, a mixed methodology for data collection and an ethical framework) was drawn up in contact with the respondents. To analyze the data from this fieldwork, we used a "techno-semio-discursive methodology" (Rondot, 2015), based on a discursive approach, while taking into account non-verbal signs and the characteristics of the device invested. We show that beyond being a dominant theme of jihadist discourse, the concept of strangeness (as mobilized by these militants) founds an ontology; governs their digital representations; and guides their online conducts. In this way, it constitutes the ideological matrix of the discourse of EI supporters on Facebook. With this work, we intend to shed new light on the Salafist jihadist commitment via the conceptual prism of strangeness
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Jihadist cyber"

1

(London), Afghan Academy International, ed. Britain's national security challenges: Extremism, cyber terrorism, sectarianism and takfiri jihadism. London: Afghan Academy International, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wilner, Alex S. Transnational Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0029.

Full text
Abstract:
Transnational terrorism, an enduring phenomenon that became a hallmark of the post-cold-war era, continues to evolve. This chapter explores several emerging trends in Islamist terrorism that are likely to challenge European security institutions in the coming years and decades. The chapter argues that the Islamic State has revolutionized the jihadist landscape. ISIS has effectively eclipsed al-Qaeda, modernizing its predecessor’s hidebound model of allegiance and recruitment, sponsoring and facilitating attacks overseas, lighting sectarian fires across the Middle East and North Africa, and exploiting cyber tools and social media to propagandize itself widely. Relatedly, European foreign fighters have joined ISIS at an unprecedented clip: several thousand have fought within its ranks. Combining these trends helps illustrate how transnational terrorism challenges European security in new and complex ways.
APA, Harvard, Vancouver, ISO, and other styles
3

Sosnow, R., R. James Woolsey, and Steven Stalinsky. From Al-Qaeda to the Islamic State , Jihadi Groups Engage in Cyber Jihad: From 1980s Promotion of Use of 'Electronic Technologies' to Today's Embrace of Social Media to Attract a New Jihadi Generation. MEMRI Books, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Jihadist cyber"

1

Al-Rawi, Ahmed, and Jacob Groshek. "Jihadist Propaganda on Social Media." In Cyber Warfare and Terrorism, 1442–57. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch085.

Full text
Abstract:
This article focuses on ISIS followers on Twitter in an effort to understand the nature of their social media propaganda. The research study provides unique insight into one of the largest data sets that investigates ISIS propaganda efforts on Twitter by examining over 50 million tweets posted by more than 8 million unique users that referenced the keywords “ISIS” or “ISIL.” The authors then searched this corpus for eight keywords in Arabic that included terms of support for ISIS and the names of different Al-Qaeda leaders. A mixed research method was used, and the findings indicate that ISIS activity on Twitter witnessed a gradual decline, but the group was still able to post different types of tweets to maintain its online presence. Also, the feud between ISIS and Al-Qaeda was intense, ongoing, and prevalent in online interactions among ISIS followers. The study provides an understanding of using big data to better grasp the propaganda activities of terrorist groups.
APA, Harvard, Vancouver, ISO, and other styles
2

Denning, Dorothy E. "Cyber Conflict as an Emergent Social Phenomenon." In Corporate Hacking and Technology-Driven Crime, 170–86. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61692-805-6.ch009.

Full text
Abstract:
This chapter examines the emergence of social networks of non-state warriors launching cyber attacks for social and political reasons. It examines the origin and nature of these networks; their objectives, targets, tactics, and use of online forums; and their relationship, if any, to their governments. General concepts are illustrated with case studies drawn from operations by Strano Net, the Electronic Disturbance Theater, the Electrohippies, and other networks of cyber activists; electronic jihad as practiced by those affiliated with al-Qa’ida and the global jihadist movement associated with it; and operations by patriotic hackers from China, Russia, and elsewhere.
APA, Harvard, Vancouver, ISO, and other styles
3

Jones, David Martin. "Surveillance and Resistance." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 122–43. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9661-7.ch007.

Full text
Abstract:
This chapter provides readers with an overview and discussion of the manner in which the Internet and social media has facilitated movements, ranging from Aryan Nations and the various European Defence Leagues, to the Global Jihadist Movement and anarchist groups. As the phenomenon of netwar and online recruitment evolved after 9/11, extremist movements motivated by illiberal and apocalyptic ideologies have found the Internet a congenial space for organization, dissemination, education and radicalization. This chapter examines the difficulty liberal political democracies have in censoring these groups and the ideas they promote. Civil rights organizations immediately condemn state electronic surveillance as an invasion of civil liberties, and present the liberal democrat with an acute moral and political dilemma. This chapter finally considers the tactics democratic states might prudently adopt in order to preserve the national interest.
APA, Harvard, Vancouver, ISO, and other styles
4

Alkhouri, Laith. "Cyber Jihadism:." In Militant Jihadism, 83–100. Leuven University Press, 2019. http://dx.doi.org/10.2307/j.ctvq2vzmt.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gerdes, Anne. "Al-Qaeda on Web 2.0." In Cyber Behavior, 1598–615. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5942-1.ch083.

Full text
Abstract:
This chapter investigates al-Qaeda's use of Web 2.0 as a tool for radicalization and recruitment. The media network of al-Qaeda is described in order to demonstrate the impact of their well structured media strategy for harnessing the power of the Web. They use a strategy that makes them stand out from other extremist groups, who in most cases lack an overall approach towards branding and Web communication. It is shown why this strategy works and enables al-Qaeda to set the agenda for online global jihadism and cultivate virtual communities of engaged jihobbyists. Finally, a virtue ethical perspective demonstrates the shortcomings of the al-Qaeda Web 2.0 strategies, by which it is suggested that their Achilles' heel is exactly the ideas inherent to Web 2.0, which are reflected in a bottom up participatory perspective. Thus, the Al-Qaeda online social movement does allow for engaged user participation, but without providing opportunities for free spirited critical reflection and self articulation of goals.
APA, Harvard, Vancouver, ISO, and other styles
6

Gerdes, Anne. "Al-Qaeda on Web 2.0." In Investigating Cyber Law and Cyber Ethics, 221–38. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-132-0.ch010.

Full text
Abstract:
This chapter investigates al-Qaeda’s use of Web 2.0 as a tool for radicalization and recruitment. The media network of al-Qaeda is described in order to demonstrate the impact of their well structured media strategy for harnessing the power of the Web. They use a strategy that makes them stand out from other extremist groups, who in most cases lack an overall approach towards branding and Web communication. It is shown why this strategy works and enables al-Qaeda to set the agenda for online global jihadism and cultivate virtual communities of engaged jihobbyists. Finally, a virtue ethical perspective demonstrates the shortcomings of the al-Qaeda Web 2.0 strategies, by which it is suggested that their Achilles’ heel is exactly the ideas inherent to Web 2.0, which are reflected in a bottom up participatory perspective. Thus, the Al-Qaeda online social movement does allow for engaged user participation, but without providing opportunities for free spirited critical reflection and self articulation of goals.
APA, Harvard, Vancouver, ISO, and other styles
7

de Koning, Martijn, Annelies Moors, and Aysha Navest. "On Speaking, Remaining Silent and Being Heard: Framing Research, Positionality and Publics in the Jihadi Field." In Jihadi Audiovisuality and its Entanglements, 27–50. Edinburgh University Press, 2020. http://dx.doi.org/10.3366/edinburgh/9781474467513.003.0002.

Full text
Abstract:
In April 2016 we published an explorative article about the marriages of Dutch-speaking women in jihadi-held areas in Syria. In January 2017, this article became the focus of a huge media hype in the Netherlands and beyond, after a national newspaper presented our work as a case of how cyber-jihadists had been able to influence academic research. Within days, a series of parliamentary questions were asked, followed by an audit commissioned by the Board of the University of Amsterdam. The Board concluded that we had complied with all ethics requirements. In this multi-vocal contribution, we reflect on this affair by making extensive use of posts from our three-person WhatsApp group. We present the unfolding of the affair, how we were addressed, individually and collectively, and how we responded. While we argued against publicly investigating personal (including religious) backgrounds of researchers, the force of the security discourse rendered it nearly impossible to engage in a discussion about content. Not only did we need to engage with different publics, we were also addressed in different ways by the very same publics. Only by persistently addressing sub-publics and publishing about the affair, we were able to undo some of the damage.
APA, Harvard, Vancouver, ISO, and other styles
8

Lohlker, Rüdiger. "IS, Internet, and Terror." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 237–53. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9755-2.ch014.

Full text
Abstract:
The chapter presents insights into the non-linear development of the Islamic State (IS) online. Starting with the pre-IS period of Jihadi online activities, the emergence of IS online is analyzed as a swarm-like process across the platforms of the internet supporting the cause of IS via videos, texts, audio, and graphic files. The organizational aspect of these activities is included in the analysis. The online presence of IS is shown as resilient, being able to reconfigure its activities when needed. A coordinated effort of a non-hegemonic network is needed to confront the flexible online activities of IS built on evidence-based research, using multi-lingual sources, understanding the theological framework of IS and the internet.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Jihadist cyber"

1

Chen, Hsinchun, Sven Thoms, and Tianjun Fu. "Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups." In 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008). IEEE, 2008. http://dx.doi.org/10.1109/isi.2008.4565037.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography