Добірка наукової літератури з теми "Jihadist cyber"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Jihadist cyber".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Jihadist cyber"
Brandea, Bianca. "Implications of the jihadist terrorism in cyberspace." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 1 (April 8, 2024): 157–65. http://dx.doi.org/10.53477/2284-9378-24-10.
Повний текст джерелаBalogh, Péter. "Jihadist war or a challenge of disintegration?" Belvedere Meridionale 31, no. 4 (2019): 233–50. http://dx.doi.org/10.14232/belv.2019.4.17.
Повний текст джерелаGarcía Català, Maria Teresa. "Big Data Analysis of the #BringBackOurGirls Cyber-Campaign." Debats. Revista de cultura, poder i societat 5 (December 30, 2020): 261–70. http://dx.doi.org/10.28939/iam.debats-en.2020-15.
Повний текст джерелаMozid, Ashraful, and Nelufer Yesmen. "Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review." Journal of Advanced Forensic Sciences 1, no. 1 (February 7, 2020): 1–9. http://dx.doi.org/10.14302/issn.2692-5915.jafs-20-3204.
Повний текст джерелаFenton, Adam James. "Preventing Catastrophic Cyber–Physical Attacks on the Global Maritime Transportation System: A Case Study of Hybrid Maritime Security in the Straits of Malacca and Singapore." Journal of Marine Science and Engineering 12, no. 3 (March 19, 2024): 510. http://dx.doi.org/10.3390/jmse12030510.
Повний текст джерелаMbugua, Charles, Sammy Mang'eli, and Mary Ragui. "Mentoring: A Faith Based Relational Leadership Approach in Preventing and Countering Violent Extremism in Kenya." International Journal for Innovation Education and Research 7, no. 11 (November 30, 2019): 1208–24. http://dx.doi.org/10.31686/ijier.vol7.iss11.1990.
Повний текст джерелаStewart, Garrett. "Open-Circuit Narrative: Programmed Reading in Richard Powers." Novel 55, no. 3 (November 1, 2022): 547–65. http://dx.doi.org/10.1215/00295132-10007583.
Повний текст джерелаAntinori, Arije. "L'evoluzione jihadista (cyber-)globalizzata." SICUREZZA E SCIENZE SOCIALI, no. 2 (December 2017): 33–51. http://dx.doi.org/10.3280/siss2017-002004.
Повний текст джерелаKim, Eunyoung. "Cognitive warfare, game and visual images: ISIS Jihadists narratives analyses." Korean Association of Criminal Psychology 19, no. 3 (September 30, 2023): 7–24. http://dx.doi.org/10.25277/kcpr.2023.19.3.7.
Повний текст джерелаZdravkovski, Aleksander. "Cyber sheiks and grassroots jihadis: the war in Syria and the devolution of the Bosnian Salafi communities." Small Wars & Insurgencies 29, no. 5-6 (November 2, 2018): 941–63. http://dx.doi.org/10.1080/09592318.2018.1519306.
Повний текст джерелаДисертації з теми "Jihadist cyber"
Renaut, Laurène. "Le concept d'étrangeté (ghurba) dans la construction identitaire des cyber-militants de l'Etat Islamique. Ethnographie d'une djihadosphère entre 2018 et 2022." Electronic Thesis or Diss., CY Cergy Paris Université, 2023. http://www.theses.fr/2023CYUN1274.
Повний текст джерелаThis thesis, at the crossroads of Discourse Analysis and Information and Communication Sciences, questions the concept of strangeness (ghurba) in online Salafist jihadist discourse, and more specifically in the identity construction of EI supporters. The research is based on an ethnographic survey of the Facebook jihadosphere, where we observe, incognito, individuals practicing media jihad. A protocol (involving observation, a grid of criteria attesting to adherence to jihadist ideology, a mixed methodology for data collection and an ethical framework) was drawn up in contact with the respondents. To analyze the data from this fieldwork, we used a "techno-semio-discursive methodology" (Rondot, 2015), based on a discursive approach, while taking into account non-verbal signs and the characteristics of the device invested. We show that beyond being a dominant theme of jihadist discourse, the concept of strangeness (as mobilized by these militants) founds an ontology; governs their digital representations; and guides their online conducts. In this way, it constitutes the ideological matrix of the discourse of EI supporters on Facebook. With this work, we intend to shed new light on the Salafist jihadist commitment via the conceptual prism of strangeness
Книги з теми "Jihadist cyber"
(London), Afghan Academy International, ed. Britain's national security challenges: Extremism, cyber terrorism, sectarianism and takfiri jihadism. London: Afghan Academy International, 2010.
Знайти повний текст джерелаWilner, Alex S. Transnational Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0029.
Повний текст джерелаSosnow, R., R. James Woolsey, and Steven Stalinsky. From Al-Qaeda to the Islamic State , Jihadi Groups Engage in Cyber Jihad: From 1980s Promotion of Use of 'Electronic Technologies' to Today's Embrace of Social Media to Attract a New Jihadi Generation. MEMRI Books, 2019.
Знайти повний текст джерелаЧастини книг з теми "Jihadist cyber"
Al-Rawi, Ahmed, and Jacob Groshek. "Jihadist Propaganda on Social Media." In Cyber Warfare and Terrorism, 1442–57. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch085.
Повний текст джерелаDenning, Dorothy E. "Cyber Conflict as an Emergent Social Phenomenon." In Corporate Hacking and Technology-Driven Crime, 170–86. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61692-805-6.ch009.
Повний текст джерелаJones, David Martin. "Surveillance and Resistance." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 122–43. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9661-7.ch007.
Повний текст джерелаAlkhouri, Laith. "Cyber Jihadism:." In Militant Jihadism, 83–100. Leuven University Press, 2019. http://dx.doi.org/10.2307/j.ctvq2vzmt.8.
Повний текст джерелаGerdes, Anne. "Al-Qaeda on Web 2.0." In Cyber Behavior, 1598–615. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5942-1.ch083.
Повний текст джерелаGerdes, Anne. "Al-Qaeda on Web 2.0." In Investigating Cyber Law and Cyber Ethics, 221–38. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-61350-132-0.ch010.
Повний текст джерелаde Koning, Martijn, Annelies Moors, and Aysha Navest. "On Speaking, Remaining Silent and Being Heard: Framing Research, Positionality and Publics in the Jihadi Field." In Jihadi Audiovisuality and its Entanglements, 27–50. Edinburgh University Press, 2020. http://dx.doi.org/10.3366/edinburgh/9781474467513.003.0002.
Повний текст джерелаLohlker, Rüdiger. "IS, Internet, and Terror." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 237–53. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-9755-2.ch014.
Повний текст джерелаТези доповідей конференцій з теми "Jihadist cyber"
Chen, Hsinchun, Sven Thoms, and Tianjun Fu. "Cyber extremism in Web 2.0: An exploratory study of international Jihadist groups." In 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008). IEEE, 2008. http://dx.doi.org/10.1109/isi.2008.4565037.
Повний текст джерела