To see the other types of publications on this topic, follow the link: Jihadist cyber.

Journal articles on the topic 'Jihadist cyber'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 journal articles for your research on the topic 'Jihadist cyber.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Brandea, Bianca. "Implications of the jihadist terrorism in cyberspace." BULLETIN OF "CAROL I" NATIONAL DEFENCE UNIVERSITY 13, no. 1 (2024): 157–65. http://dx.doi.org/10.53477/2284-9378-24-10.

Full text
Abstract:
The terrorist attack on the 11th of September, 2001, marked the change in the West’s perception of the Middle East and vice versa. Followed by the US military presence in the Middle East, this event contributed to the development of the means of terrorist actions around the world and the popularization of jihad. The hostile attitude of the West thus succeeded in maintaining the state of tension between the two spaces. Over time, jihadist and terrorist groups have been joined by members originating from the West who were convinced by the importance of the “missions” they later undertook. In the
APA, Harvard, Vancouver, ISO, and other styles
2

Balogh, Péter. "Jihadist war or a challenge of disintegration?" Belvedere Meridionale 31, no. 4 (2019): 233–50. http://dx.doi.org/10.14232/belv.2019.4.17.

Full text
Abstract:
In this paper we introduce some relevant research results about the role of social embeddedness and social resources in the sphere of social conflicts and violence. In accordance with the actual state of the investigation process the outcomes presented in this analysis are focusing on the activities of the so called ‘Islamic State’or ISIS – considered to be a rather effective terrorism exporter recently. After briefly outlining the broader – global – context of terrorist organizations, the particular characteristics of the activities of ISIS and some elements of the conceptual frame, the study
APA, Harvard, Vancouver, ISO, and other styles
3

García Català, Maria Teresa. "Big Data Analysis of the #BringBackOurGirls Cyber-Campaign." Debats. Revista de cultura, poder i societat 5 (December 30, 2020): 261–70. http://dx.doi.org/10.28939/iam.debats-en.2020-15.

Full text
Abstract:
We used a web tool to extract Twitter API data on the #BringBackOurGirls campaign. The Twitter hashtag was used for a campaign denouncing the kidnapping of 276 schoolgirls in Chibok, Nigeria on the 14th of April 2014 by the Jihadist group Boko Haram. The data extracted covered the period spanning from the creation of the campaign (19th of May 2014) to the 16th of May 2019. The data were anonymous because they were provided in aggregate form, covering things such as: the number, content, and chronology of tweets; information on geographical area; the relevance of the users making comments; info
APA, Harvard, Vancouver, ISO, and other styles
4

Mozid, Ashraful, and Nelufer Yesmen. "Term Paper on The Nature of Cyber Crime and Cyber Threats: A Criminological Review." Journal of Advanced Forensic Sciences 1, no. 1 (2020): 1–9. http://dx.doi.org/10.14302/issn.2692-5915.jafs-20-3204.

Full text
Abstract:
Cybercrime is one of the fastest-growing criminal activities in contemporary age. The first recorded cybercrime happened in France in the year 1820. It was not as sophisticated as cybercrime we know in our world today, but, still, that was a crime. Cybercrime has evolved globally as the online platform is progressing. While progress is made in the battle against cybercrime there still remains a wide gap in the consistency of laws across international borders. The main objectives of this study are to explore the nature of cybercrime in developing countries, find out the cyber threats for terror
APA, Harvard, Vancouver, ISO, and other styles
5

Fenton, Adam James. "Preventing Catastrophic Cyber–Physical Attacks on the Global Maritime Transportation System: A Case Study of Hybrid Maritime Security in the Straits of Malacca and Singapore." Journal of Marine Science and Engineering 12, no. 3 (2024): 510. http://dx.doi.org/10.3390/jmse12030510.

Full text
Abstract:
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary data from 42 expert interviews, a 28 respondent survey, and two maritime security roundtables. Key findings were that ships’ critical systems are increasingly interconnected, yet aging IT infrastructure and minimal cybersecurity awareness among crews heighten risks. Meanwhile, regional terrorist groups have previously targeted shipping and sho
APA, Harvard, Vancouver, ISO, and other styles
6

Mbugua, Charles, Sammy Mang'eli, and Mary Ragui. "Mentoring: A Faith Based Relational Leadership Approach in Preventing and Countering Violent Extremism in Kenya." International Journal for Innovation Education and Research 7, no. 11 (2019): 1208–24. http://dx.doi.org/10.31686/ijier.vol7.iss11.1990.

Full text
Abstract:
The article examines the role that mentoring, a critical relational leadership process would have in preventing and countering violent extremism by first examining the contexts of radicalization into violent extremism and past violent extremist attacks. Youths and adolescents in Kenya have been radicalized into violent extremism with resultant acts of terror that have resulted in; mass fatalities, casualties, destruction of facilities, disruption of livelihoods and business, and creation of immense fear within the public. The first major attack that seemed to have opened this cycle of al Qaeda
APA, Harvard, Vancouver, ISO, and other styles
7

Stewart, Garrett. "Open-Circuit Narrative: Programmed Reading in Richard Powers." Novel 55, no. 3 (2022): 547–65. http://dx.doi.org/10.1215/00295132-10007583.

Full text
Abstract:
Abstract Long before the eight-stranded weave of ecocritical plot in Richard Powers's Pulitzer Prize–winning The Overstory (2018) and, since then, the interlace between inset astrobiological bedtime stories and the environmentalist passions of family psychodrama in his Booker-nominated Bewilderment (2021), an important turn-of-the-millennium work by this MacArthur-lauded novelist, Plowing the Dark (2000), remains his most strenuous venture in what this article calls the open-circuit structure of his typical multi-plot narratives. Scenes of secretly funded VR aesthetics in the high-tech America
APA, Harvard, Vancouver, ISO, and other styles
8

Antinori, Arije. "L'evoluzione jihadista (cyber-)globalizzata." SICUREZZA E SCIENZE SOCIALI, no. 2 (December 2017): 33–51. http://dx.doi.org/10.3280/siss2017-002004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Eunyoung. "Cognitive warfare, game and visual images: ISIS Jihadists narratives analyses." Korean Association of Criminal Psychology 19, no. 3 (2023): 7–24. http://dx.doi.org/10.25277/kcpr.2023.19.3.7.

Full text
Abstract:
Cyberspace has emerged as a significant domain in human life, driven by technological advancements and globalization. This paradigm shift has presented terrorists and violent extremists with a new platform for conducting psychological warfare and promoting their terrorist activities. In their quest to recruit individuals and expand their causes, terrorists have integrated their propaganda narratives into diverse visual tools and games. This shift has prompted Western countries to recognize the risks associated with cyber propaganda as a threat to national security, leading to extensive researc
APA, Harvard, Vancouver, ISO, and other styles
10

Zdravkovski, Aleksander. "Cyber sheiks and grassroots jihadis: the war in Syria and the devolution of the Bosnian Salafi communities." Small Wars & Insurgencies 29, no. 5-6 (2018): 941–63. http://dx.doi.org/10.1080/09592318.2018.1519306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Finlayson, Mark. "Corpus Annotation in Service of Intelligent Narrative Technologies." Proceedings of the AAAI Conference on Artificial Intelligence and Interactive Digital Entertainment 7, no. 2 (2011): 17–20. http://dx.doi.org/10.1609/aiide.v7i2.12459.

Full text
Abstract:
Annotated corpora have stimulated great advances in the language sciences. The time is ripe to bring that same stimulation, and consequent benefits, to computational approaches to narrative. I describe an effort to construct a corpus of semantically annotated stories. I outline the structure of the corpus, a structure which colloquially can be described as a "handful of handfuls." One handful of the corpus has already been constructed, viz., 18k words of Russian folktales. There are two handfuls under construction: legal cases focused on the area of probable cause, and stories from Islamist Ex
APA, Harvard, Vancouver, ISO, and other styles
12

Jabbarinasir, H. "Cooperation Between Iran and Russia in the Fight Against International Terrorism: the Current State, Opportunities and Prospects." World Economy and International Relations 67, no. 1 (2023): 90–100. http://dx.doi.org/10.20542/0131-2227-2023-67-1-90-100.

Full text
Abstract:
The expansion of terrorism in the Middle East in the context of the Arab Spring has become a factor of unprecedented military-political rapprochement between Iran and Russia. This article studies the anti-terrorist cooperation between the two states. The author argues that the new level of cooperation between Tehran and Moscow is a consequence of structural conditions of the international environment, which has come under pressure of international terrorism. To combat terrorism, Iran and Russia are trying to use instruments of not only “hard” but also “soft” power by creating platforms for int
APA, Harvard, Vancouver, ISO, and other styles
13

Khokhlov, N., A. Vasiliev, A. Belichenko, P. Kirdyankina, and A. Korotayev. "Echo of Arab Spring in Western Europe." International Trends / Mezhdunarodnye protsessy 19, no. 2 (2021): 21–49. http://dx.doi.org/10.17994/it.2021.19.2.65.7.

Full text
Abstract:
Our analysis allows us to talk about two waves of the echo of the Arab spring in Western Europe. The first wave was observed in 2011 and was expressed in the explosive growth of mainly peaceful protests. Taking into account the data on the direct impact of the events of the Arab Spring on the protest activity in Western Europe, the explosive increase in the number of anti-government demonstrations, riots and general strikes recorded in Western Europe in 2011 can be attributed to the influence of the Arab Spring up to a very considerable extent. In 2012–2014 the protest movement in Western Euro
APA, Harvard, Vancouver, ISO, and other styles
14

Anzalone, Christopher. "Salafism in Nigeria: Islam, Preaching, and Politics." American Journal of Islamic Social Sciences 35, no. 3 (2018): 98–103. http://dx.doi.org/10.35632/ajiss.v35i3.489.

Full text
Abstract:
The global spread of Salafism, though it began in the 1960s and 1970s, only started to attract significant attention from scholars and analysts outside of Islamic studies as well as journalists, politicians, and the general public following the September 11, 2001 terrorist attacks perpetrated by Al-Qaeda Central. After the attacks, Salafism—or, as it was pejoratively labeled by its critics inside and outside of the Islamic tradition, “Wahhabism”—was accused of being the ideological basis of all expressions of Sunni militancy from North America and Europe to West and East Africa, the Arab world
APA, Harvard, Vancouver, ISO, and other styles
15

Anzalone, Christopher. "Salafism in Nigeria: Islam, Preaching, and Politics." American Journal of Islam and Society 35, no. 3 (2018): 98–103. http://dx.doi.org/10.35632/ajis.v35i3.489.

Full text
Abstract:
The global spread of Salafism, though it began in the 1960s and 1970s, only started to attract significant attention from scholars and analysts outside of Islamic studies as well as journalists, politicians, and the general public following the September 11, 2001 terrorist attacks perpetrated by Al-Qaeda Central. After the attacks, Salafism—or, as it was pejoratively labeled by its critics inside and outside of the Islamic tradition, “Wahhabism”—was accused of being the ideological basis of all expressions of Sunni militancy from North America and Europe to West and East Africa, the Arab world
APA, Harvard, Vancouver, ISO, and other styles
16

الأردن, مكتب المعهد في. "عروض مختصرة". الفكر الإسلامي المعاصر (إسلامية المعرفة سابقا) 8, № 29 (2002): 158–47. http://dx.doi.org/10.35632/citj.v8i29.2847.

Full text
Abstract:

 
 الجماعات الوظيفية اليهودية: نموذج تفسيري جديد. عبد الوهاب المسيري. القاهرة: دار الشروق، 2002م، ص551.
 
 الفلسفة المادية وتفكيك الإنسان. عبد الوهاب المسيري. دمشق: دار الفكر، 2002م، 240 ص.
 
 اليهودية بين حضانة الشرق الثقافية وحضانة الغرب السياسية. عفيف فراج، بيروت: دار الآداب، 2002م، 232 ص
 
 ديني مدارس مين تعليم: كيفيت، مسائل، امكانات. سليم منصور خالد. إسلام أباد، باكستان: المعهد العالمي للفكر الإسلامي ومركز دراسات السياسة، 2002م، 471 ص.
 
 Hyperterrorisme: La Nouvelle Guerre. Francois Heisbourg. Paris : Odile Jacob. 2001, 270 pages.
APA, Harvard, Vancouver, ISO, and other styles
17

"Aspects of Counterterrorism: New Approaches to Countering Terrorism: Designing and Evaluating Counter-Radicalization and De-Radicalization Programs; Hacking ISIS: How to Destroy the Cyber Jihad; Inside Al-Shabaab: The Secret History of Al-Qaeda’s Most Powerful Ally." International Dialogue 10, no. 1 (2020). http://dx.doi.org/10.32873/uno.dc.id.10.1.1178.

Full text
Abstract:
Terrorism and the term ‘jihadism’ have become a global phenomenon, a product of modernity and globalization which shows no sign of abating. The number of radicalized young people in Western and non-Western countries who are willing to travel overseas in the cause of jihad and violent extremism has increased significantly since 9/11. In the 20 years since the largely driven U.S. counter-terrorism efforts began in response, jihadism in force and numbers has risen at least by fourfold in terms of the numbers of Sunni jihadist fighters in the field from the Middle East to North Africa, Afghanistan
APA, Harvard, Vancouver, ISO, and other styles
18

Belkacem, Iratni. "The Evolution Of Terrorism In The Middle East From Jihadists To Cyber Criminals." المجلة الجزائرية للعلوم الاجتماعية والانسانية, 2020, 439. http://dx.doi.org/10.52125/2237-008-001-023.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!