Skip to main content
77
Views
207
Downloads
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Reviewed article

Terrorist ‘Use’ of the Internet and Fighting Back

How to cite:
Maura Conway
"Terrorist ‘Use’ of the Internet and Fighting Back"
Information & Security: An International Journal,
19,
(2006):
9-30.
http://dx.doi.org/10.11610/isij.1901

Terrorist ‘Use’ of the Internet and Fighting Back

Authors:

Maura Conway

Source:

Information & Security: An International Journal,
Volume: 19,
p.9-30
(2006)

Abstract:

The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and is illustrated with examples of each. The final section of the paper describes the responses of government, law enforcement, intelligence agencies, and others to the terrorism-Internet nexus.

77
Views
207
Downloads
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
44
Citations
Journal of Turkish Social Sciences Research
8,
no. 1
(2023):
Faculty of Humanities and Social Sciences
(2022):
Legal Readings, "A Platform for Learning"
(2021):
Perspective - Expert insights on a timely policy issue
(2021):
Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide
4,
no. 2
(2015):
121-133.
6th International Conference on Information Warfare and Security, ICIW 2011
(2011):
Cyber Behavior: Concepts, Methodologies, Tools, and Applications
(2014):
1260-1294 .
Journal of South India Medicolegal Association
2,
no. 2
(2010):
60-63.
Cyberterrorism: Understanding, Assessment, and Response
(2014):
155-173.
Parliamentary Affairs
59,
no. 2
(2006):
283-298.
Jurnal Komunikasi: Malaysian Journal of Communication
34,
no. 2
(2018):
137-151.
Counter-Radicalisation: Critical Perspectives
(2014):
Violence and Gender in the Globalized World: The Intimate and the Extimate
(2015):
The Handbook of the Criminology of Terrorism
(2016):
Social Networks, Terrorism and Counter-terrorism
(2015):
International Journal of Science and Engineering Applications
5,
no. 6
(2016):
Fight, Flight, Mimic: Identity Signalling in Armed Con icts, forthcoming
(2014):
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection
(2014):