• Publications
  • Influence
Terrorism and the Internet: New Media—New Threat?
The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are informationExpand
  • 101
  • 10
  • PDF
Combining Social Network Analysis and Sentiment Analysis to Explore the Potential for Online Radicalisation
The increased online presence of jihadists has raised the possibility of individuals being radicalised via the Internet. Expand
  • 147
  • 7
  • PDF
From al-Zarqawi to al-Awlaki : T he Emergence of the I nternet as a N ew F orm of Violent R adical M ilieu
The vast majority of research into violent online political extremism produced to date has focused on the new media practices of violent jihadis and their supporters (see, for example, Brachman &Expand
  • 24
  • 6
  • PDF
From al-Zarqawi to al-Awlaki: The emergence and development of an online radical milieu
Radical milieus have been described as specific social environ¬ments whose culture, narratives, and symbols shape both individuals and groups, and the social networks and relationships out of whichExpand
  • 26
  • 5
  • PDF
Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns and Processes
Public interest and policy debates surrounding the role of the Internet in terrorist activities is increasing. Criminology has said very little on the matter. By using a unique data set of 223Expand
  • 58
  • 4
  • PDF
Terrorism and Internet governance: core issues
Both global governance and the sub-set of issues that may be termed 'internet governance' are vast and complex issue areas. The difficulties of trying to 'legislate' at the global level – effortsExpand
  • 19
  • 4
  • PDF
Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research
ABSTRACT Some scholars and others are skeptical of a significant role for the Internet in processes of violent radicalization. There is increasing concern on the part of other scholars, andExpand
  • 92
  • 3
  • PDF
What is Cyberterrorism
  • 29
  • 3
Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet
  • M. Conway
  • Computer Science
  • First Monday
  • 4 November 2002
This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from non–violent ‘use’ at one end to ‘cyberterrorism’ at the other. Rejecting the idea that cyberterrorism isExpand
  • 47
  • 3
  • PDF
Implicit chaining in cotton-top tamarins (Saguinus oedipus) with elements equated for probability of reinforcement
Three experiments examined the implicit learning of sequences under conditions in which the elements comprising a sequence were equated in terms of reinforcement probability. In Experiment 1Expand
  • 10
  • 2