Skip to main content
78
Views
211
Downloads
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Reviewed article

Terrorist ‘Use’ of the Internet and Fighting Back

How to cite:
Maura Conway
"Terrorist ‘Use’ of the Internet and Fighting Back"
Information & Security: An International Journal,
19,
(2006):
9-30.
http://dx.doi.org/10.11610/isij.1901

Terrorist ‘Use’ of the Internet and Fighting Back

Authors:

Maura Conway

Source:

Information & Security: An International Journal,
Volume: 19,
p.9-30
(2006)

Abstract:

The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and is illustrated with examples of each. The final section of the paper describes the responses of government, law enforcement, intelligence agencies, and others to the terrorism-Internet nexus.

78
Views
211
Downloads
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
44
Citations
Journal of Turkish Social Sciences Research
8,
no. 1
(2023):
Legal Readings, "A Platform for Learning"
(2021):
Faculty of Humanities and Social Sciences
(2022):
Perspective - Expert insights on a timely policy issue
(2021):
Jurnal Komunikasi: Malaysian Journal of Communication
34,
no. 2
(2018):
137-151.
Dynamics of Asymmetric Conflict: Pathways toward Terrorism and Genocide
4,
no. 2
(2015):
121-133.
6th International Conference on Information Warfare and Security, ICIW 2011
(2011):
Cyber Behavior: Concepts, Methodologies, Tools, and Applications
(2014):
1260-1294 .
Journal of South India Medicolegal Association
2,
no. 2
(2010):
60-63.
Cyberterrorism: Understanding, Assessment, and Response
(2014):
155-173.
Parliamentary Affairs
59,
no. 2
(2006):
283-298.
Counter-Radicalisation: Critical Perspectives
(2014):
Violence and Gender in the Globalized World: The Intimate and the Extimate
(2015):
The Handbook of the Criminology of Terrorism
(2016):
Social Networks, Terrorism and Counter-terrorism
(2015):
International Journal of Science and Engineering Applications
5,
no. 6
(2016):
Fight, Flight, Mimic: Identity Signalling in Armed Con icts, forthcoming
(2014):
Comprehensive Approach as "Sine Qua Non" for Critical Infrastructure Protection
(2014):