Atjaunināt sīkdatņu piekrišanu

E-grāmata: Online Terrorist Propaganda, Recruitment, and Radicalization

Edited by (TechWrite, Pomeroy, Ohio, USA)
  • Formāts: 532 pages
  • Izdošanas datums: 30-Jul-2019
  • Izdevniecība: CRC Press
  • ISBN-13: 9781351691369
  • Formāts - PDF+DRM
  • Cena: 83,89 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 532 pages
  • Izdošanas datums: 30-Jul-2019
  • Izdevniecība: CRC Press
  • ISBN-13: 9781351691369

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists online presence is utilized for terrorism funding, communication, and recruitment purposes. The book offers an in-depth coverage of the history and development of online "footprints" to target new converts, broaden their messaging, and increase their influence. Chapters present the emergence of various groups; the advancement of terrorist groups online presences; their utilization of video, chat room, and social media; and the current capability for propaganda, training, and recruitment.

With contributions from leading experts in the fieldincluding practitioners and terrorism researchersthe coverage moves from general factors to specific groups practices as relate to Islamic State of Iraq and the Levant (ISIL), and numerous other groups. Chapters also examine the lone wolf phenomenon as a part of the disturbing trend of self-radicalization. A functional, real-world approach is used regarding the classification of the means and methods by which an online presence is often utilized to promote and support acts of terrorism.

Online Terrorist Propaganda, Recruitment, and Radicalization examines practical solutions in identifying the threat posed by terrorist propaganda and U.S. government efforts to counter it, with a particular focus on ISIS, the Dark Web, national and international measures to identify, thwart, and prosecute terrorist activities online. As such, it will be an invaluable resources for intelligence professionals, terrorism and counterterrorism professionals, those researching terrorism funding, and policy makers looking to restrict the spread of terrorism propaganda online.
Foreword xi
Preface xiii
Acknowledgments xxi
Editor xxiii
Contributors xxv
Section I Introduction
1 Online Utilization for Terrorist Self-Radicalization Purposes
3(30)
R. Allen Anderson
2 Online Radicalization: Contested Terms and Conceptual Clarity
33(14)
Stuart MacDonald
Joe Whittaker
3 The Relationship between Social Media and Radicalization
47(18)
Cori E. Dauber
Kemal Ilter
4 Rule-of-Law and Respect for Human Rights Considerations
65(16)
Omi Hodwitz
Section II A Transnational Recruitment Problem of Violent Online Extremist Terrorists
5 How Homegrown Violent Extremism Will Likely Continue to Evolve as a Significant Threat
81(22)
Cori E. Dauber
Mark D. Robinson
6 Counterterrorism Strategy from an Extended Global Online Level
103(10)
Jose de Arimateia da Cruz
7 Tools to Study Complexity in the Virtual World of Counterrorism: Lessons Learned from the Stuxnet and Shamoon Viruses
113(12)
Sheila Ronis
Richard J. Chasdi
Section III Policy and Legislative Frameworks Responses to Threats Presented by Online Terrorists
8 Legislation Specifically Targeting the Use of the Internet to Recruit Terrorists
125(12)
Thomas J. Holt
Joshua D. Freilich
Steven M. Chermak
9 Legal Restrictions and Challenges for Police and Law Enforcement Authorities
137(12)
Omi Hodwitz
10 Web Vulnerability-Based Spear Phishing: A Modern Combination of Tools in Cyberterrorism
149(16)
Emin Huseynov
Section IV Investigations and Intelligence Gathering of Terrorism-Related Online Activities
11 Investigations of Terrorist Cases Involving the Internet
165(14)
Allison Miller
Yannis A. Stivachtis
12 Terrorism Recruitment and Radicalization into the 21st Century
179(18)
James M. Smith
Maeghin Alarid
13 Domestic Terrorism and Digital Media: Planning in Cyberspace
197(18)
David Woodring
Kevin M. Fitzpatrick
Jeff Gruenewald
Brent Smith
Section V Online Terrorist Propaganda
14 Metaphors of Radicalization: A Computational and Qualitative Analysis of Jihadi Propaganda
215(12)
Ben Miller
Weeda Mehran
Yassin Kosay Alsahlani
Haroon Qahtan
15 An Information, Motivation, and Behavioral Skills Perspective on Terrorist Propaganda
227(12)
Rebecca A. Wilson
Anthony F. Lemieux
16 The Relationship between Personal Data Protection and Use of Information to Fight Online Terrorist Propaganda, Recruitment, and Radicalization
239(28)
Paolo Balboni
Milda Macenaite
17 Online Terrorist Propaganda: Strategic Messaging Employed by Al Qaeda and ISIS
267(24)
Elena Pokalova
18 Daesh's Multimodal Strategies of Online Propaganda
291(14)
Carol K. Winkler
Jonathan Pieslak
19 Supporting the Authentication of Digital Evidence
305(12)
Sarbari Gupta
Section VI ISIS and the Dark Web
20 How IS Virtual Planners Use the Dark Web to Recruit, Direct, and Inspire Attacks in Europe and North America
317(24)
Anthony Celso
21 Monitoring and Tracking ISIS on the Dark Web
341(10)
William F. Gross Jr
22 ISIS and Russia: The Use of Threat for Spreading of Influence and ISIS's Future
351(22)
Dmitry Shlapentokh
Section VII International Cooperation with Online Terrorism
23 Instruments and Arrangements against Online Terrorism Relating to International Cooperation
373(16)
Ali Dizboni
Christian Leuprecht
24 Intelligence Sharing Among Agencies and Internationally
389(12)
Jose de Arimateia da Cruz
25 Role of Prosecutors in Online Terrorism Cases
401(14)
Becky K. da Cruz
Section VIII Private Sector Cooperation and Responsibility for Countering the Use of the Internet for Terrorist Purposes
26 A Typology of Public-Private Partnerships and Its Implications for Counterterrorism and Cyber-security
415(28)
Richard J. Chasdi
27 Public-Private Partnerships and the Private Sector's Role in Countering the Use of the Internet for Terrorist Purposes
443(18)
Allison Miller
Yannis A. Stivachtis
Section IX Appendices
Appendix A: List of Top Online Counterterrorism Organizations
461(12)
Appendix B: List of Miscellaneous Online Counterterrorism Resources
473(8)
Appendix C: Glossary
481(6)
Index 487
John R. Vacca is an information technology consultant, researcher, professional writer, editor, reviewer and internationally-known, best-selling author based in Pomeroy, Ohio. Since 1982, he has authored 81 books and more than 600 articles in the areas of advanced storage, computer security, and aerospace technology. He is also a former configuration management specialist, computer specialist, and computer security official (CSO) for NASAs space station program, Freedom, and the International Space Station Program from 1988 until his retirement from NASA in 1995. In addition, he is also an independent online book reviewer. Finally, he was one of the security consultants for the MGM movie titled "AntiTrust," which was released in January 2001. A detailed copy of the authors bio can be viewed at http://www.johnvacca.com.