Academic literature on the topic 'Jihadist cyber'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Jihadist cyber.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Jihadist cyber"

1

Brandea, Bianca. "Implications of the jihadist terrorism in cyberspace." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 1 (2024): 157–65. http://dx.doi.org/10.53477/2284-9378-24-10.

Full text
Abstract:
The terrorist attack on the 11th of September, 2001, marked the change in the West’s perception of the Middle East and vice versa. Followed by the US military presence in the Middle East, this event contributed to the development of the means of terrorist actions around the world and the popularization of jihad. The hostile attitude of the West thus succeeded in maintaining the state of tension between the two spaces. Over time, jihadist and terrorist groups have been joined by members originating from the West who were convinced by the importance of the “missions” they later undertook. In the
APA, Harvard, Vancouver, ISO, and other styles
2

Balogh, Péter. "Jihadist war or a challenge of disintegration?" Belvedere Meridionale 31, no. 4 (2019): 233–50. http://dx.doi.org/10.14232/belv.2019.4.17.

Full text
Abstract:
In this paper we introduce some relevant research results about the role of social embeddedness and social resources in the sphere of social conflicts and violence. In accordance with the actual state of the investigation process the outcomes presented in this analysis are focusing on the activities of the so called ‘Islamic State’or ISIS – considered to be a rather effective terrorism exporter recently. After briefly outlining the broader – global – context of terrorist organizations, the particular characteristics of the activities of ISIS and some elements of the conceptual frame, the study
APA, Harvard, Vancouver, ISO, and other styles
3

García Català, Maria Teresa. "Big Data Analysis of the #BringBackOurGirls Cyber-Campaign." Debats. Revista de cultura, poder i societat 5 (December 30, 2020): 261–70. http://dx.doi.org/10.28939/iam.debats-en.2020-15.

Full text
Abstract:
We used a web tool to extract Twitter API data on the #BringBackOurGirls campaign. The Twitter hashtag was used for a campaign denouncing the kidnapping of 276 schoolgirls in Chibok, Nigeria on the 14th of April 2014 by the Jihadist group Boko Haram. The data extracted covered the period spanning from the creation of the campaign (19th of May 2014) to the 16th of May 2019. The data were anonymous because they were provided in aggregate form, covering things such as: the number, content, and chronology of tweets; information on geographical area; the relevance of the users making comments; info
APA, Harvard, Vancouver, ISO, and other styles
4

Mozid, Ashraful, and Nelufer Yesmen. "Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review." Journal of Advanced Forensic Sciences 1, no. 1 (2020): 1–9. http://dx.doi.org/10.14302/issn.2692-5915.jafs-20-3204.

Full text
Abstract:
Cybercrime is one of the fastest-growing criminal activities in contemporary age. The first recorded cybercrime happened in France in the year 1820. It was not as sophisticated as cybercrime we know in our world today, but, still, that was a crime. Cybercrime has evolved globally as the online platform is progressing. While progress is made in the battle against cybercrime there still remains a wide gap in the consistency of laws across international borders. The main objectives of this study are to explore the nature of cybercrime in developing countries, find out the cyber threats for terror
APA, Harvard, Vancouver, ISO, and other styles
5

Fenton, Adam James. "Preventing Catastrophic Cyber–Physical Attacks on the Global Maritime Transportation System: A Case Study of Hybrid Maritime Security in the Straits of Malacca and Singapore." Journal of Marine Science and Engineering 12, no. 3 (2024): 510. http://dx.doi.org/10.3390/jmse12030510.

Full text
Abstract:
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary data from 42 expert interviews, a 28 respondent survey, and two maritime security roundtables. Key findings were that ships’ critical systems are increasingly interconnected, yet aging IT infrastructure and minimal cybersecurity awareness among crews heighten risks. Meanwhile, regional terrorist groups have previously targeted shipping and sho
APA, Harvard, Vancouver, ISO, and other styles
6

Mbugua, Charles, Sammy Mang'eli, and Mary Ragui. "Mentoring: A Faith Based Relational Leadership Approach in Preventing and Countering Violent Extremism in Kenya." International Journal for Innovation Education and Research 7, no. 11 (2019): 1208–24. http://dx.doi.org/10.31686/ijier.vol7.iss11.1990.

Full text
Abstract:
The article examines the role that mentoring, a critical relational leadership process would have in preventing and countering violent extremism by first examining the contexts of radicalization into violent extremism and past violent extremist attacks. Youths and adolescents in Kenya have been radicalized into violent extremism with resultant acts of terror that have resulted in; mass fatalities, casualties, destruction of facilities, disruption of livelihoods and business, and creation of immense fear within the public. The first major attack that seemed to have opened this cycle of al Qaeda
APA, Harvard, Vancouver, ISO, and other styles
7

Stewart, Garrett. "Open-Circuit Narrative: Programmed Reading in Richard Powers." Novel 55, no. 3 (2022): 547–65. http://dx.doi.org/10.1215/00295132-10007583.

Full text
Abstract:
Abstract Long before the eight-stranded weave of ecocritical plot in Richard Powers's Pulitzer Prize–winning The Overstory (2018) and, since then, the interlace between inset astrobiological bedtime stories and the environmentalist passions of family psychodrama in his Booker-nominated Bewilderment (2021), an important turn-of-the-millennium work by this MacArthur-lauded novelist, Plowing the Dark (2000), remains his most strenuous venture in what this article calls the open-circuit structure of his typical multi-plot narratives. Scenes of secretly funded VR aesthetics in the high-tech America
APA, Harvard, Vancouver, ISO, and other styles
8

Antinori, Arije. "L'evoluzione jihadista (cyber-)globalizzata." SICUREZZA E SCIENZE SOCIALI, no. 2 (December 2017): 33–51. http://dx.doi.org/10.3280/siss2017-002004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Eunyoung. "Cognitive warfare, game and visual images: ISIS Jihadists narratives analyses." Korean Association of Criminal Psychology 19, no. 3 (2023): 7–24. http://dx.doi.org/10.25277/kcpr.2023.19.3.7.

Full text
Abstract:
Cyberspace has emerged as a significant domain in human life, driven by technological advancements and globalization. This paradigm shift has presented terrorists and violent extremists with a new platform for conducting psychological warfare and promoting their terrorist activities. In their quest to recruit individuals and expand their causes, terrorists have integrated their propaganda narratives into diverse visual tools and games. This shift has prompted Western countries to recognize the risks associated with cyber propaganda as a threat to national security, leading to extensive researc
APA, Harvard, Vancouver, ISO, and other styles
10

Zdravkovski, Aleksander. "Cyber sheiks and grassroots jihadis: the war in Syria and the devolution of the Bosnian Salafi communities." Small Wars & Insurgencies 29, no. 5-6 (2018): 941–63. http://dx.doi.org/10.1080/09592318.2018.1519306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!