To see the other types of publications on this topic, follow the link: Terrorist networks.

Journal articles on the topic 'Terrorist networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Terrorist networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Karjaya, Lalu Putrwandi, Mohammad Sood, and Purnami Safitri. "Narcoterrorism dan Perdagangan Senjata Ilegal sebagai Penghubung Jaringan Terorisme Internasional." Nation State Journal of International Studies 1, no. 1 (December 31, 2018): 91–113. http://dx.doi.org/10.24076/nsjis.2018v1i1.91.

Full text
Abstract:
The international terrorism usually has intercourse with the illegal trade to available funds them that group can survive. Various terrorist network generally has a very different ways with the others, so it was hard to figure relation between one and the other. Nevertheless, in a manner funding had then we can see how a terrorist network was in a continent can be connected with terrorists in other continents through this funding. Terrorist financing itself obtained from illegal trade like as drug trafficking and illegal weapons. Drug trafficking by terrorists is then called narcoterrorism where business assisted by user in the world. The user uses the links between terrorist networks on the continents.
APA, Harvard, Vancouver, ISO, and other styles
2

Damayanti, Angel, and Melda Yanny. "Gender-Based Counter-Terrorism Policing." International Journal of Scientific Research and Management 10, no. 08 (August 22, 2022): 1210–21. http://dx.doi.org/10.18535/ijsrm/v10i8.sh01.

Full text
Abstract:
Since 2016, terrorist networks and acts in Indonesia have made women the executor of terror acts who carry out heinous attacks on targets, even through suicide bombings. This violence is actually manifested by women who are often perceived as gentle, motherly, and far from anarchic actions and act as wives who support the terrors of their husbands. This paper tries to explain the shift in the role and involvement of women in acts of terrorism carried out by the transnational terrorism group ISIS and its networks in Indonesia. This research explores the characteristics of terrorist networks and acts in Indonesia, the cases that occurred, the background of life, and the process of radicalization targeting women. By using a qualitative methodology in the form of case studies and gender concepts with a counter-terrorism approach, this article offers a solution in the form of gender-based counter-terrorism policing as a sharper and more focused approach to preventing acts of terrorism carried out by female terrorists.
APA, Harvard, Vancouver, ISO, and other styles
3

Pavlik, Mihail, and Konstantin Borichev. "The terrorism of individuals: the main trends and features of counteraction." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2020, no. 1 (April 8, 2020): 106–12. http://dx.doi.org/10.35750/2071-8284-2020-1-106-112.

Full text
Abstract:
The article is devoted to the consideration of the current phenomenon – «the terrorism of individuals». In particular, it is presented the definition of the concept in question, its main specificity and current trends. The article describes the terrorist acts committed by loner terrorists in the period from 2017 to 2020 in Europe, as well as an analysis of similar crimes from 2000 to 2014. Special attention is paid to the role of international terrorist organizations in their work with their followers in the form of individual terrorists.The features of preparation of the investigated terrorist acts, including the means, tools and methods of their commission, are considered. It was done the analysis of the ideological component in the illegal activities of loner terrorists, and were identified the main directions of their terrorist ideology. The role of the Internet, social networks and messengers in terrorist activities was studied. Proposals to counteract the terrorism of individuals and improve the effectiveness of counter-terrorism measures in general are presented. As a result of the study, the fundamental directions of anti-terrorist activities in Russia in the sphere of countering the terrorist threat posed by loner terrorists were identified. Special attention is paid to the prevention of lone-person terrorism and the participation of representatives of public and religious associations and national diasporas in this activity.The features of preparation of the investigated terrorist acts, including the means, tools and methods of their commission, are considered. It was done the analysis of the ideological component in the illegal activities of loner terrorists, and were identified the main directions of their terrorist ideology. The role of the Internet, social networks and messengers in terrorist activities was studied. Proposals to counteract the terrorism of individuals and improve the effectiveness of counter-terrorism measures in general are presented. As a result of the study, the fundamental directions of anti-terrorist activities in Russia in the sphere of countering the terrorist threat posed by loner terrorists were identified. Special attention is paid to the prevention of lone-person terrorism and the participation of representatives of public and religious associations and national diasporas in this activity.
APA, Harvard, Vancouver, ISO, and other styles
4

Khokhlov, I. "Some Approaches to Interpretation of Terrorism Phenomenon." World Economy and International Relations, no. 5 (2015): 19–28. http://dx.doi.org/10.20542/0131-2227-2015-5-19-28.

Full text
Abstract:
In this work the author discusses certain motivation aspects of the lower- and medium-level members of terrorist networks. It should be noted that the analysis of drivers for terrorist activity cannot be reduced to a single factor; in each case, a range of reasons, often interdependent and complementary, should be taken into account, as well as social, political and economic conditions "favorable" for the development of terrorism. Since the 1990s, and especially after 9/11, the studies of terrorism became more and more relevant. In this period, enormous research has been conducted regarding the logistics of a terrorist network, recruiting techniques and terrorist finance tracking. It has to be said that such research has greatly influenced the methods used today to fight terrorists in deep hiding. However, despite the ample analysis, scholars often miss one of the key elements of terrorism – the motivation of rank-and-file members of terrorist organizations that makes them give up their ambitions within the limits of universally accepted social behavior and seek to give way to their energy in the form of terrorism. Unlike the traditional criminal path which is chosen for lucrative reasons, participation in terrorist activities cannot be explained the same way.
APA, Harvard, Vancouver, ISO, and other styles
5

Rostokinsky, A. V., and S. V. Danelyan. "Terror by franchise, or separation of the name from the bodies." Law Нerald of Dagestan State University 40, no. 4 (2021): 129–33. http://dx.doi.org/10.21779/2224-0241-2021-40-4-129-133.

Full text
Abstract:
The article is devoted to the consideration of the current trend of interaction of international terrorist communities and organizations with lone terrorists who, on their own initiative, plan crimes at their location. The use of the Internet, social networks and messengers by these persons in terrorist activities, as well as the mutual interests of interacting subjects, is studied. The article analyzes the impact of international terrorists on their supporters in the following forms: agitation, propaganda and approval of terrorism, distribution of relevant extremist materials, involvement in the activities of existing terrorist cells and gangs, distance learning techniques and methods of conducting terrorist activities, up to leadership in the preparation of a specific crime by a certain person and the organization of "mosquito" attacks.
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Saurabh, Shashikant Verma, and Akhilesh Tiwari. "An innovative approach for identification of pivotal node in terrorist network using promethee method (an anti-terrorism approach)." International Journal of Engineering & Technology 7, no. 1 (January 27, 2018): 95. http://dx.doi.org/10.14419/ijet.v7i1.8828.

Full text
Abstract:
Terrorist network analysis is vital for intelligence analysis and for deriving useful information from available raw data. Computer Science and Graph Theory provide instructive tools for the study and graphical interpretation of these networks. In this paper, we examine the 26/11 Mumbai attack terrorist network dataset and employ the Preference Ranking Organization Method for Enrichment of Evaluation (PROMETHEE) for identification of key node on the terrorist network. PROMETHEE is an effective multi-criteria decision-making model. It provides a framework to find the most suitable alternative by integrating the quantitative and qualitative factors to the decision problem and facilitates easy computation. From the 26/11 Mumbai attacks data set of terrorist network. It is found that out of several terrorists in the network “Wassi” was the focal actor. Based on the PROMETHEE framework, it is resolved that the obtained terrorist nodes can be instrumental for the intelligence and law enforcement agencies to confine their focus on important members of the terrorist network which can deter the functioning of these networks.
APA, Harvard, Vancouver, ISO, and other styles
7

Kaminski, Stacey, Steven Beres, and Richard Hayes. "Negotiating the Non-Negotiable: Dealing with Absolutist Terrorists." International Negotiation 8, no. 3 (2003): 451–67. http://dx.doi.org/10.1163/1571806031310824.

Full text
Abstract:
AbstractTerrorism has taken on a new form in which loss of life is par for the course and where terrorist demands are often impossible to meet. To combat these new absolutist terrorists, the US government has developed innovative approaches to defend national security, including negotiating with state sponsors of terrorism with the threat of force for noncompliance, isolating the violent actors by offering financial rewards for assistance in combating terror, and offering and employing international intelligence assistance. Each of these approaches, whether it results in a reward or punishment, involves some form of negotiation with the terrorists or those who support them to gain the information necessary to disrupt terrorist networks and convict those responsible.
APA, Harvard, Vancouver, ISO, and other styles
8

Gaivoronskaya, I. B., T. F. Fomina, and B. А. Amanzholova. "Online Recruitment into Extremist and Terrorist Organizations." Psychology and Law 10, no. 4 (2020): 152–65. http://dx.doi.org/10.17759/psylaw.2020100411.

Full text
Abstract:
This article addresses extremism and terrorism as forms of violent actions, intense recruitment of individuals into the rank-and-file membership of organized formations and using those individuals as direct perpetrators of unlawful acts, as well as most common psychological traps for engaging into international terrorist organizations. It has been noted that extremism and terrorism have become a serious challenge for the modern world, increasingly threatening the security of many countries. A mechanism is outlined for drawing individuals into international terrorist organizations using social networks. The article describes in detail that most vulnerable to suggestions are teenagers, young people who haven't found their place in life and who have psychological problems, young girls who haven't been successful in their personal lives and of those who use the internet for games. Additionally, the article raises the issue of fighting against the modern-day terrorism which makes use of various tools to bring into play the recruits and make them perform terrorist acts. Strategies of fighting against terrorists are described.
APA, Harvard, Vancouver, ISO, and other styles
9

Spyropoulos, Alexandros Z., Charalampos Bratsas, Georgios C. Makris, Evangelos Ioannidis, Vassilis Tsiantos, and Ioannis Antoniou. "Entropy and Network Centralities as Intelligent Tools for the Investigation of Terrorist Organizations." Entropy 23, no. 10 (October 13, 2021): 1334. http://dx.doi.org/10.3390/e23101334.

Full text
Abstract:
In recent years, law enforcement authorities have increasingly used mathematical tools to support criminal investigations, such as those related to terrorism. In this work, two relevant questions are discussed: “How can the different roles of members of a terrorist organization be recognized?” and “are there early signs of impending terrorist acts?” These questions are addressed using the tools of entropy and network theory, more specifically centralities (degree, betweenness, clustering) and their entropies. These tools were applied to data (physical contacts) of four real terrorist networks from different countries. The different roles of the members are clearly recognized from the values of the selected centralities. An early sign of impending terrorist acts is the evolutionary pattern of the values of the entropies of the selected centralities. These results have been confirmed in all four terrorist networks. The conclusion is expected to be useful to law enforcement authorities to identify the roles of the members of terrorist organizations as the members with high centrality and to anticipate when a terrorist attack is imminent, by observing the evolution of the entropies of the centralities.
APA, Harvard, Vancouver, ISO, and other styles
10

Spyropoulos, Alexandros Z., Charalampos Bratsas, Georgios C. Makris, Evangelos Ioannidis, Vassilis Tsiantos, and Ioannis Antoniou. "Entropy and Network Centralities as Intelligent Tools for the Investigation of Terrorist Organizations." Entropy 23, no. 10 (October 13, 2021): 1334. http://dx.doi.org/10.3390/e23101334.

Full text
Abstract:
In recent years, law enforcement authorities have increasingly used mathematical tools to support criminal investigations, such as those related to terrorism. In this work, two relevant questions are discussed: “How can the different roles of members of a terrorist organization be recognized?” and “are there early signs of impending terrorist acts?” These questions are addressed using the tools of entropy and network theory, more specifically centralities (degree, betweenness, clustering) and their entropies. These tools were applied to data (physical contacts) of four real terrorist networks from different countries. The different roles of the members are clearly recognized from the values of the selected centralities. An early sign of impending terrorist acts is the evolutionary pattern of the values of the entropies of the selected centralities. These results have been confirmed in all four terrorist networks. The conclusion is expected to be useful to law enforcement authorities to identify the roles of the members of terrorist organizations as the members with high centrality and to anticipate when a terrorist attack is imminent, by observing the evolution of the entropies of the centralities.
APA, Harvard, Vancouver, ISO, and other styles
11

Edi Prastiyo, Wawan, and I. Ketut Rai Setiabudhi. "Children Involvement in Terrorism Activities: Perpetrator or a Victim? (A Study in the Circle of Violence)." PADJADJARAN Jurnal Ilmu Hukum (Journal of Law) 8, no. 2 (2021): 213–31. http://dx.doi.org/10.22304/pjih.v8n2.a3.

Full text
Abstract:
Terrorism is an extraordinary crime since it violates human rights. However, it will be different if children commit it. The legal approach is not necessarily taken against children who become terrorists. The problem of children's involvement in terrorist activities does not end there. Another important issue that must also be considered is children of terrorist parents. They must be rescued from a violent social environment. In this study, we will discuss the position of children as victims in the cycle of violence of terrorism and criminal policies in overcoming the involvement of children in terrorism activities. This research is normative legal research that examines the availability of provisions regulating the involvement of children in terrorism activities. Legal materials come from primary and secondary legal materials that are collected through literature study. Children who become terrorists are actually victims indoctrinated to commit terrorism which is believed as a struggle. Therefore, a human rights approach is needed to provide child protection. The criminal policy in tackling the involvement of children in terrorism activities is carried out by regulating the rehabilitation of radicalized children who are perpetrators and the placement of children whose parents are members of terrorism networks in a safe place.
APA, Harvard, Vancouver, ISO, and other styles
12

Yashlavskii, A. "The Problem of Terrorist Activity of Jihadists from Central Asia in the West." Russia and New States of Eurasia, no. 4 (2020): 133–48. http://dx.doi.org/10.20542/2073-4786-2020-4-133-148.

Full text
Abstract:
A number of terrorist acts committed in different parts of Europe and America by radical immigrants from the post-Soviet states of Central Asia, as well as other manifestations of extremist activity, on the one hand, fit into the general global context of jihadist terrorism, and on the other hand, represent a phenomenon with its own specific features. In part, this specificity is determined by the policy of the Central Asian governments to “squeeze out” radicals and extremists from their countries, and in part, it is connected with the high migration mobility of people from the region. At the same time, against the background of attempts by transnational terrorist networks to use the terrorist activity of immigrants from the Central Asian region for their propaganda purposes, it should be noted that the phenomenon of “lone terrorists” will grow in this environment.
APA, Harvard, Vancouver, ISO, and other styles
13

Singh, Saurabh, Shashi Kant Verma, and Akhilesh Tiwari. "A novel approach for finding crucial node using ELECTRE method." International Journal of Modern Physics B 34, no. 09 (April 10, 2020): 2050076. http://dx.doi.org/10.1142/s0217979220500769.

Full text
Abstract:
Terrorist network may be defined as collection of suspected terrorist nodes which may function in disguise towards accomplishing a terrorist activity. They use extensive communication channel for sharing crucial information. Terrorist network analysis is highly efficacious for intelligence analysis and deriving useful conclusions from available data. Computer Science and Network analysis act as pertinent fields for the study and graphical interpretation of these networks. In this paper, we examine the 26/11 Mumbai attack terrorist network dataset and employ the ELECTRE method for identification of key node in the terrorist network. ELECTRE is an effective multi-criteria decision-making model. It provides a framework for structuring a decision problem integrates the quantitative and qualitative factors of the problem and facilitates easy computation. From the 26/11 Mumbai attack dataset of terrorist network, we have determined that out of several terrorists in the network “Wassi” was the momentous and mastermind of all. The proposed work also demonstrates improvement of result in terms of concurrence, generalization accuracy and genuineness. Based on the solution of ELECTRE framework, it is resolved that the obtained (terrorist) nodes will step up the work of law enforcement agencies and enable them to confine their focus on important members of the terrorist network. Identification of key terrorist is highly important for developing long-term strategies to counter forthcoming terrorist attacks. It can be better implemented during the development of smart city especially for India.
APA, Harvard, Vancouver, ISO, and other styles
14

Spyropoulos, Alexandros Z., Charalampos Bratsas, Georgios C. Makris, Evangelos Ioannidis, Vassilis Tsiantos, and Ioannis Antoniou. "Investigation of Terrorist Organizations Using Intelligent Tools: A Dynamic Network Analysis with Weighted Links." Mathematics 10, no. 7 (March 28, 2022): 1092. http://dx.doi.org/10.3390/math10071092.

Full text
Abstract:
Law enforcement authorities deal with terrorism in two ways: prevention and legal procedures to establish the offence of forming a terrorist organization. Setting up the offence of a terrorist organization requires proof that the members of the organization acquire distinct roles in the organization. Until today, this procedure has been based on unreliable, biased or subjective witness statements, resulting in questionable criminal court proceedings. A quantitative, unbiased methodology based on Network Theory is proposed in order to address three research questions: “How can the presence of distinct roles among the members of a terrorist organization be revealed?”, “Is the presence of distinct roles related to terrorist activity?”and “Are there early signs of imminent terrorist activity?”. These questions are addressed using selected global indices from network theory: density, small worldness, centralization, average centrality and standard deviation of centrality. These indices are computed for four real networks of terrorist organizations from four different countries.
APA, Harvard, Vancouver, ISO, and other styles
15

Li, Zhanfeng, Bo Li, and Duoyong Sun. "The evolutionary dynamics of group-level terrorist network." MATEC Web of Conferences 309 (2020): 02011. http://dx.doi.org/10.1051/matecconf/202030902011.

Full text
Abstract:
In the age of globalization and information, terrorist groups cooperate and interact with each other frequently and have formed a complex and dynamic system. For the purpose to explore the evolutionary dynamics of transnational terrorism, the paper mapped location-based networks to model the terrorism system, followed with preference attachment model to discover laws that how terrorism developed. The work gave an outline about how terrorist groups evolved and explained how terrorism would develop and expand. The findings would supply significant suggestion to counterterrorism organizations.
APA, Harvard, Vancouver, ISO, and other styles
16

Magouirk, Justin, Scott Atran, and Marc Sageman. "Connecting Terrorist Networks." Studies in Conflict & Terrorism 31, no. 1 (January 4, 2008): 1–16. http://dx.doi.org/10.1080/10576100701759988.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Spezzano, Francesca, V. S. Subrahmanian, and Aaron Mannes. "Reshaping terrorist networks." Communications of the ACM 57, no. 8 (August 2014): 60–69. http://dx.doi.org/10.1145/2632661.2632664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Asal, Victor, and R. Karl Rethemeyer. "Researching Terrorist Networks." Journal of Security Education 1, no. 4 (October 20, 2006): 65–74. http://dx.doi.org/10.1300/j460v01n04_06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bakti, Agus Surya, Hafied Cangara, Dwia Aries Tina Palubuhu, and Eriyanto Eriyanto. "Social Network Strategy to Counter Acts of Terrorism in Indonesia: A Structural Hole Study." Jurnal Komunikasi Ikatan Sarjana Komunikasi Indonesia 6, no. 2 (December 17, 2021): 312–23. http://dx.doi.org/10.25008/jkiski.v6i2.603.

Full text
Abstract:
The ISIS terrorist group still poses a serious threat in Indonesia, especially because it operates in a network (net-terrorism) so that the handling of this terrorist group often does not reach its roots. The research is aimed to reveal the social network strategy in resolving terrorist acts in Indonesia using a structural hole theory. The research method is a qualitative research approach with secondary data analysis from four sources: books, journal articles, previous related research, and the Law of the Republic of Indonesia. The data above is then processed with Ucinet-Draw to calculate the linkage score between members in the network and then see the movement map for each ISIS network in Indonesia: Jakarta, Poso, and Surabaya. Thus, this study proves that there is a gap in the structure of the ISIS group's communication network in Indonesia. The research results revealed that many terrorist acts in Indonesia had the same pattern, namely the strong communication network between terrorist actors. Terrorist actors carried out at least three tertius strategies, namely tertius gaudens, tertius inguens, and a combination of the two. Through the tertius strategy, the government will be able to play its most crucial role in taking preventive actions against actors in terrorist networks. Therefore, the government needed to carry out various integration strategies with various institutions to conduct deradicalization appropriately.
APA, Harvard, Vancouver, ISO, and other styles
20

Nwanga, E. M., K. C. Okafor, G. A. Chukwudebe, and I. E. Achumba. "Computational Robotics: An Alternative Approach for Predicting Terrorist Networks." International Journal of Robotics and Automation Technology 8 (November 24, 2021): 1–11. http://dx.doi.org/10.31875/2409-9694.2021.08.1.

Full text
Abstract:
Increasing terrorist activities globally have attracted the attention of many researchers, policy makers and security agencies towards counterterrorism. The clandestine nature of terrorist networks have made them difficult for detection. Existing works have failed to explore computational characterization to design an efficient threat-mining surveillance system. In this paper, a computationally-aware surveillance robot that auto-generates threat information, and transmit same to the cloud-analytics engine is developed. The system offers hidden intelligence to security agencies without any form of interception by terrorist elements. A miniaturized surveillance robot with Hidden Markov Model (MSRHMM) for terrorist computational dissection is then derived. Also, the computational framework for MERHMM is discussed while showing the adjacency matrix of terrorist network as a determinant factor for its operation. The model indicates that the terrorist network have a property of symmetric adjacency matrix while the social network have both asymmetric and symmetric adjacency matrix. Similarly, the characteristic determinant of adjacency matrix as an important operator for terrorist network is computed to be -1 while that of a symmetric and an asymmetric in social network is 0 and 1 respectively. In conclusion, it was observed that the unique properties of terrorist networks such as symmetric and idempotent property conferred a special protection for the terrorist network resilience. Computational robotics is shown to have the capability of utilizing the hidden intelligence in attack prediction of terrorist elements. This concept is expected to contribute in national security challenges, defense and military intelligence.
APA, Harvard, Vancouver, ISO, and other styles
21

Mel'nikova, A. "Media Communication and Terrorism: Areas of Intersection." Scientific Research and Development. Modern Communication Studies 9, no. 1 (February 4, 2020): 57–61. http://dx.doi.org/10.12737/2587-9103-2020-57-61.

Full text
Abstract:
Globalization has increased the breadth of coverage of the audience of modern mass media, which is used by terrorists, increasing the scale and demonstrative cruelty of terrorist actions, conducting them with the expectation of maximum publicity. Analysis of the specifics of modern media reveals a shift in emphasis from the beautiful to the shocking, ugly, frightening. At the same time, the situation when the mass media make the culture of murder and violence an integral part of the mass consciousness, leads to the fact that information about terrorist acts becomes for the media not so much frightening or terrifying as a desirable object that raises the rating. In addition to the use of media resources to intimidate, intimidate the population, the article also examines the use of the Internet to create a new image of a terrorist as a fighter for faith and freedom, as well as the use of social networks to recruit new members of terrorist organizations. The last two areas are related to a new phenomenon - the fusion of terrorism with the Internet, this phenomenon is called “electronic Jihad”or “ cyberjihad”.
APA, Harvard, Vancouver, ISO, and other styles
22

Singh, Saurabh, Shashi Kant Verma, and Akhilesh Tiwari. "A novel method for destabilization of terrorist network." Modern Physics Letters B 34, no. 27 (June 3, 2020): 2050298. http://dx.doi.org/10.1142/s021798492050298x.

Full text
Abstract:
Criminal network investigation is an ignited research area nowadays. There are several types of criminal network. Terrorist network is one of them. Exploring terrorist network is a demand of several investigating agencies. Different properties of network can be better considered to probe network properly using multi criteria decision-making methods. Grey Relational Analysis (GRA) method is a structural technique for organizing and analyzing complex decisions based on typical mathematics. This process can be employed for analyzing available datasets and designing useful conclusions. If network is explored and visualized, it can be destabilized efficiently. Identified members can be studied and thus their future actions can be prevented. These generalized designs can be used by government agencies for destabilization of terrorist group. This system is especially useful for countries like India that face a constant threat from various group of terrorists. This generalization can further be used to destabilize various criminal networks and their activities can be prevented. Thus, life and property of individuals can be saved.
APA, Harvard, Vancouver, ISO, and other styles
23

Tawadros, Amira S. N. "Mapping terrorist groups using network analysis: Egypt case study." Journal of Humanities and Applied Social Sciences 2, no. 2 (January 25, 2020): 141–59. http://dx.doi.org/10.1108/jhass-09-2019-0050.

Full text
Abstract:
Purpose The purpose of this study is twofold; first, it aims to understand the underlying dynamics of the organizations behind the terrorist attacks, and second, to investigate the dynamics of terrorist organizations in relation to one another to detect whether there exist shared patterns of terror between different organizations. Design/methodology/approach To achieve this purpose, the researcher proposes a computational algorithm that extracts data from global terrorism database (GTD); calculates similarity indices between different terrorist groups; generates a network data file from the calculated indices; and apply network analysis techniques to the extracted data. The proposed algorithm includes applying SQL database codes for data extraction, building a tailored C# computer software to calculate similarity indices and generate similarity networks and using GEPHI software to visualize the generated network and calculate network metrics and measures. Findings Applying the proposed algorithm to Egypt, the results reveal different shared patterns of terror among different terrorist groups. This helps us in creating a terror landscape for terrorist groups playing in Egypt. Originality/value The importance of the study lies in that it proposes a new algorithm that combines network analysis with other data-manipulation techniques to generate a network of similar terror groups.
APA, Harvard, Vancouver, ISO, and other styles
24

Uddin, M. Irfan, Nazir Zada, Furqan Aziz, Yousaf Saeed, Asim Zeb, Syed Atif Ali Shah, Mahmoud Ahmad Al-Khasawneh, and Marwan Mahmoud. "Prediction of Future Terrorist Activities Using Deep Neural Networks." Complexity 2020 (April 22, 2020): 1–16. http://dx.doi.org/10.1155/2020/1373087.

Full text
Abstract:
One of the most important threats to today’s civilization is terrorism. Terrorism not only disturbs the law and order situations in a society but also affects the quality of lives of humans and makes them suppressed physically and emotionally and deprives them of enjoying life. The more the civilizations have advanced, the more the people are working towards exploring different mechanisms to protect the mankind from terrorism. Different techniques have been used as counterterrorism to protect the lives of individuals in society and to improve the quality of life in general. Machine learning methods have been recently explored to develop techniques for counterterrorism based on artificial intelligence (AI). Since deep learning has recently gained more popularity in machine learning domain, in this paper, these techniques are explored to understand the behavior of terrorist activities. Five different models based on deep neural network (DNN) are created to understand the behavior of terrorist activities such as is the attack going to be successful or not? Or whether the attack is going to be suicide or not? Or what type of weapon is going to be used in the attack? Or what type of attack is going to be carried out? Or what region is going to be attacked? The models are implemented in single-layer neural network (NN), five-layer DNN, and three traditional machine learning algorithms, i.e., logistic regression, SVM, and Naïve Bayes. The performance of the DNN is compared with NN and the three machine learning algorithms, and it is demonstrated that the performance in DNN is more than 95% in terms of accuracy, precision, recall, and F1-Score, while ANN and traditional machine learning algorithms have achieved a maximum of 83% accuracy. This concludes that DNN is a suitable model to be used for predicting the behavior of terrorist activities. Our experiments also demonstrate that the dataset for terrorist activities is big data; therefore, a DNN is a suitable model to process big data and understand the underlying patterns in the dataset.
APA, Harvard, Vancouver, ISO, and other styles
25

Hendroy, Faruq Arjuna. "The US National Efforts to Counter Domestic Terrorism: Progress and Controversy." Jurnal Global Strategis 12, no. 2 (November 30, 2018): 69. http://dx.doi.org/10.20473/jgs.12.2.2018.69-80.

Full text
Abstract:
The article examines the increasing domestic terrorism threat within the U.S. borders and how the U.S. government responded to it. The robust maneuver of the U.S. ledcoalition in the Middle East to coercively hunt down the terrorist groups does not fully stop them from posing the threat. Ironically, the terrorist groups direct their attacks to the U.S. homeland through their small networks. It is not difcult to build networks in the U.S. homeland, since the the advance of millennium technology enables them to radicalize people from long distance. The U.S. surely concerns about the increasing number of terrorist attacks within its borders, that it recently issued a set of national counter-terrorism strategy combining both coercive and soft approach. However, the approval of discriminatory and controversial travel ban policy was believed to hamper the existing national strategy, mistarget the main causes, and create new problems.
APA, Harvard, Vancouver, ISO, and other styles
26

Han, Na, Runhua Tang, and Jianjun Wang. "The Communication Characteristics and Intervention of Terrorism-related Public Opinion An Analysis of Manchester Bombing Terrorist Attack." Tobacco Regulatory Science 7, no. 5 (September 30, 2021): 3671–84. http://dx.doi.org/10.18001/trs.7.5.1.144.

Full text
Abstract:
[Purpose / Significance] The crisis of misinformation will increase in 5G.The spread of terrorism-related information in sudden violent and terrorist incidents in social networks has a great impact on national security and counter-terrorism work. The communication characteristics and impact of terrorism-related information is the guarantee of counter-terrorism work. The construction of counter-terrorism intelligence intervention strategy is in line with the scope of national security, which also is the embodiment of the national security governance system and counter-terrorism capabilities. [Methods/Procedures] Based on the social network analysis method and analyzing the communication characteristic of terrorism-related information and the factors of intervention, this paper proposed an intervention mechanism for terror-related information based on online social network. The proposed mechanism consists of three aspects: communication topic, communication structure and opinion leaders. [Results/Conclusion] The study finds out that we should strengthen the role of opinion leaders in information diffusion of news and government media, in terrorist incident, the network structure is loose and free on the whole, the spread of information influences the network structure and interaction. Government should supervise a real-time control on information emotional trend and hot topic according to different types of network structure characteristics, guiding the positive information and cooling down the harmful ones.
APA, Harvard, Vancouver, ISO, and other styles
27

Issaev, Leonid M., Marat B. Aisin, Ilya A. Medvedev, and Andrey V. Korotayev. "Islamic Terrorism in the Middle East and its Impact on Global Security." RUDN Journal of Political Science 22, no. 4 (December 15, 2020): 713–30. http://dx.doi.org/10.22363/2313-1438-2020-22-4-713-730.

Full text
Abstract:
This paper examines the impact of the increase in terrorist activity in the Middle East after the Arab Spring on the terrorist threat in other parts of the world. The aim of the work is to clarify, using quantitative methods, the factors, mechanisms and scale of the spread of Islamist terrorism from the Middle East. A qualitative study of time series with partial formalization is used to identify time lags between the rise of Islamist terrorism in the Middle East and its intensification in other parts of the world. It has been demonstrated that the rapid growth in the number of terrorist attacks recorded in the world after 2010 was primarily due to the explosive growth of Islamist terrorist activity in the Afrasian zone of instability in general and in the Middle East in particular. There is considerable evidence to suggest that this spurred terrorist activity after 2013 in the U.S., Western Europe, Turkey and Russia. The analysis shows that the Islamic State (ISIS) and its affiliates (prohibited in Russian Federation) have acted as the main export agent of terrorism to these countries and regions in an attempt to retaliate military strikes carried out by foreign powers in the Middle East. Among these foreign countries, Turkey was particularly hard hit by the increase in terrorist activities - the level of terrorist activity in Turkey between 2013 and 2014 grew 14 times. In the United States and Western Europe, the onslaught of Islamist terrorism has been accompanied by a threefold increase in the number of terrorist attacks recorded. A similar scale of the Middle East terrorist echo was observed in the Russian Federation. The ISIS efforts to expand and develop terrorist networks in Russia also resulted in the tripling of a number of terrorist attacks in this country. However, it would be wrong to exaggerate the scale of the Middle East terrorist echo in Russia. The previous waves of the terrorist threat between 2002 and 2004, as well as the second half of the 2000s (an echo effect of the Chechen wars) were much larger.
APA, Harvard, Vancouver, ISO, and other styles
28

Eiselt, H. A. "Destabilization of terrorist networks." Chaos, Solitons & Fractals 108 (March 2018): 111–18. http://dx.doi.org/10.1016/j.chaos.2018.01.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Gregori, Matteo, and Ugo Merlone. "Comparing operational terrorist networks." Trends in Organized Crime 23, no. 3 (March 31, 2020): 263–88. http://dx.doi.org/10.1007/s12117-020-09381-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Quanandi, Jodi, Susaningtyas N. H. Kertopati, and Fauzia Gustarina Cempaka Timur. "Keterlibatan dan Pola Pergerakan Teroris Perempuan dalam Jaringan Terorisme di Indonesia." Journal of Education, Humaniora and Social Sciences (JEHSS) 5, no. 2 (November 8, 2022): 1189–99. http://dx.doi.org/10.34007/jehss.v5i2.1356.

Full text
Abstract:
This article aims to analyze analytically the processes that influence the involvement of women in acts of terrorism in Indonesia. The problem is focused on the case of suicide bombings with female terrorist actors who are often with terrorist networks and received news coverage by various media describing the pattern of relationships between the influence of religious concepts, action orientation and patriarchal domination in Indonesian society. To approach this problem, theoretical references and literature studies from previous journals are used. The data were collected and analyzed descriptively qualitatively. The results of this study indicate that the data on women who participated in acts of terrorism and also know the factors that influence women's participation in acts of terrorism carried out through suicide bombings, one of which is the Jamaah Ansharut Daulah network which is suspected to be affiliated with ISIS. This study also elaborates on the extent to which women's involvement in suicide cases is determined by how they interpret jihad and the orientation of their actions as well as the domination of the patriarchy that surrounds them and their pattern of movement in supporting terrorist acts.
APA, Harvard, Vancouver, ISO, and other styles
31

Veretenko, Tetiana, Anton Trebe, and Olena Bieloliptseva. "FORMATION OF HIGH SCHOOL STUDENTS’SAFE BEHAVIOUR WHILE TERRORIST ATTACKS." SOCIETY. INTEGRATION. EDUCATION. Proceedings of the International Scientific Conference 1 (May 28, 2021): 732–41. http://dx.doi.org/10.17770/sie2021vol1.6476.

Full text
Abstract:
The attention is drawn to the possibility of terrorist attacks in Ukraine. The essence of safe behaviour during a terrorist attack is revealed in the article. The purpose of the article is to determine the rules of behaviour for high school students in the case of a terrorist attack, the action algorithm of high school students on receiving information about a terrorist threat; rules of safe behaviour in social networks, which are actively used by terrorists, who attack high school students to participate in their groups and terrorist acts; to present a formation program of high school students’safe behaviour while terrorist attacks and show its effectiveness.The results of the experimental implementation of the program for formation of high school students’safe behaviour during terrorist attacks and emergencies are analyzed after asurvey carried out. According to the results summarised a conclusion is made to activate social and pedagogical work in the field of forming students’safe behaviour while terrorist attacks and emergencies.
APA, Harvard, Vancouver, ISO, and other styles
32

Machitidze, G. "Comparative Analyses of Terrorist Threats under Conditions of COVID-19." World Economy and International Relations 64, no. 11 (2020): 5–12. http://dx.doi.org/10.20542/0131-2227-2020-64-11-5-12.

Full text
Abstract:
The coronavirus pandemic has already caused high numbers of deaths, massive economic disruption, and had a huge impact on daily lives of millions of people. In short, – this is everything terrorist organizations affiliated with the ISIL and Al-Qaida would want to achieve with their attacks. The global pandemic serves as inspiration and influences the modus operandi of terrorists, both in terms of tactics and target selection. Since the pandemic started, the ISIL and Al-Qaida have persisted in operations across African, Asian and European countries, leaving hundreds of people dead. These attacks clearly show that terrorism has continued worldwide during the COVID 19 pandemic. Terrorist groups are looking at ways to take advantage of instability, increase recruitment and sympathizers among the vulnerable and terrified, encourage conventional and even biological attacks. Terrorist networks have encouraged followers to weaponise their own illness by trying to infect others. Terrorist groups also use the pandemic to gain visibility. The ISIL has been exploiting hashtags related to the coronavirus to redirect users to its radical propaganda. Terrorists have also found inspiration in the global pandemic with regard to their target selection, in particular critical health infrastructures. In Afghanistan, the Taliban has adopted a different approach to COVID 19 assisting efforts to limit the spread of the virus, including by declaring ceasefires in areas under its control. Hezbollah is working to fight the virus and maintain order within Lebanon. Because they control informal economies, groups like the Taliban or Lebanon’s Hezbollah are better placed to benefit from coronavirus than the ISIL or Al-Qaida. In general, terrorist groups are taking advantage of COVID 19 lockdowns to spread hatred and intensify social media efforts to recruit young people spending more time online.
APA, Harvard, Vancouver, ISO, and other styles
33

Trager, Robert F., and Dessislava P. Zagorcheva. "Deterring Terrorism: It Can Be Done." International Security 30, no. 3 (January 2006): 87–123. http://dx.doi.org/10.1162/isec.2005.30.3.87.

Full text
Abstract:
Many scholars and policymakers argue that deterrence strategies have no significant role to play in counterterrorism. The case against deterrence rests on three pillars: terrorists are irrational; they value their political ends far above anything deterring states could hold at risk; and they are impossible tofind. Each pillar is either incorrect or its implications for deterrence have been misunderstood. Under certain conditions, deterrence is preferable to the use of force. Analysis of the structure of terrorist networks and the processes that produce attacks, as well as the multiple objectives of terrorist organizations, suggests that some deterrence strategies are more effective than those of the past. In particular, many terrorist groups and elements of terrorist support networks can likely be deterred from cooperating with the most threatening terrorist groups, such as al-Qaida. Although the use of force against multiple groups creates common interests among them, an appropriate deterrence strategy could fracture global terrorist networks. The current policy of the U.S. and Philippine governments toward the Moro Islamic Liberation Front (MILF) and the Abu Sayyaf Group illustrates the potential of this approach and the risks of using force. Not only can groups such as the MILF be deterred from cooperating with al-Qaida, they may even be coerced into providing local intelligence on operatives linked to it.
APA, Harvard, Vancouver, ISO, and other styles
34

Neag, Mihai Marcel. "Physiognomy of the Operations Against Terrorism." International conference KNOWLEDGE-BASED ORGANIZATION 23, no. 1 (June 20, 2017): 220–26. http://dx.doi.org/10.1515/kbo-2017-0035.

Full text
Abstract:
Abstract In current conflicts, the terrorist networks already represent a major player and the terrorist threats remain highly topical. In the physiognomy of the actions of the forces engaged in counter-terrorism operations offfensive actions must prevail, but there will be situations in which the military forces will have to undertake defensive actions aswell, because the neutralization of the terrorist entities does not necessarily mean removal of their infrastructure. The operations against terrorism require, for the military structures present in theaters, the review and reconsideration of their own tasks, forms and methods of action, profound transformation of the adopted strategies, a multi-dimensional vision on the effects to be achieved, a comprehensive approach to planning operations, that will help the management of the situations and achievement of the desired end state.
APA, Harvard, Vancouver, ISO, and other styles
35

Syafiq, Muhammad. "Proses Perubahan Diri Seorang Teroris menjadi Aktivis Perdamaian." Jurnal Ilmiah Psyche 15, no. 2 (December 10, 2021): 73–92. http://dx.doi.org/10.33557/jpsyche.v15i2.1564.

Full text
Abstract:
This qualitative study was aimed at exploring the experience of a former member of a terrorist organization in Indonesia who have left his terrorist group and abandoned the extremist ideology. A life history method which focuses on the process of self-change and life transition of the former member of the terrorist group was employed A participant whose age is 40 years old and was a former active member of Jamaah Islamiyah (JI), a terrorist group, was recruited. He was captured in 2014 and served a sentence in prison for almost 4 years. He has been involved in counter-terrorism campaign organized by a non-government organization (NGO) since his release from prison until recently. Interviews were conducted to collect data which were then analyzed using a narrative analysis. Some written documents in the forms of articles and a published book produced by the participant as well as online news covering the participant’ stories were also examined. The findings inform how he became involved in the terrorist networks. The need for self-significance and adventurous experience seems to be the main drivers. After his capture, and during his imprisonment, he contemplated his participation in the terrorist networks. His meetings with religious experts and academicians facilitated by prison officers, and his awareness of burden he had inflicted on his family because of his terrorism case had opened his mind. He experienced a turning life moment which made him keeping distance from other terrorist inmates with the risk of receiving negative view from them. After his release, he found passion in writing and eventually reached a NGO and joined it as a credible voice in the campaigns of counter violent extremism through writing and public speaking.
APA, Harvard, Vancouver, ISO, and other styles
36

el-Nawawy, Mohammed, and Basel Alameer Hasan. "Terrorism, Islamophobia and White supremacy: Comparing CNN and the BBC coverage of the Christchurch mosque shooting." Journal of Arab & Muslim Media Research 15, no. 1 (April 1, 2022): 65–85. http://dx.doi.org/10.1386/jammr_00041_1.

Full text
Abstract:
This qualitative textual analysis used framing theory to compare 80 online articles from Cable News Network (CNN) and British Broadcasting Company (BBC) dealing with the 2019 Christchurch mosque shooting in New Zealand. The study examined themes of Islamophobia and White supremacy and the media representation of the White perpetrator who carried out the attack. The analysis over eight days following the shooting identified the most prominent frames used by both network, and how these frames were employed to serve a specific context. The study found that the attack was too shocking to the extent that BBC and CNN adopted a new non-classical narrative that was not typical of western news coverage of attacks committed by White perpetrators. This shift was represented by adopting frames of ‘terrorist’ and ‘terrorism’ and avoiding the frame of ‘mentally sick perpetrator’ that used to be prevalent in western media coverage of similar attacks. Both networks associated the perpetrator with White supremacy and engaging in a terrorist attack. While both CNN and BBC framed the shooting as a terrorist attack driven by Islamophobic sentiments, the terrorism framing was more obvious on CNN than on the BBC. The White supremacist motive was highlighted by CNN, while the right-wing framing was central in the BBC coverage.
APA, Harvard, Vancouver, ISO, and other styles
37

Trăistaru, Marius. "Involving cross-border organized crime networks from ex-Soviet sources in support of terrorism and their influence on regional economic development." Proceedings of the International Conference on Business Excellence 14, no. 1 (July 1, 2020): 975–83. http://dx.doi.org/10.2478/picbe-2020-0092.

Full text
Abstract:
AbstractThis paper indicates how the actions of organized crime networks (especially the former the former Soviet Union) can affect, from an economic point of view, the elaboration of policies to combat transnational terrorism. Transnational organized crime poses a significant and growing threat to national and international security, with dire implications for public safety, public health, democratic institutions, and economic stability across the globe. Not only are criminal networks expanding, but they also are diversifying their activities, resulting in the convergence of threats that were once distinct and today have explosive and destabilizing effects. Ex-soviet organized crime networks represent a significant threat to economic growth and democratic institutions. Nuclear material trafficking is an especially prominent concern in the former Soviet Union. Because some terrorist-extremist organizations are criminal groups that have a specific organization, logistics, specific training and education systems that cannot work without having material and financial resources. As a result, one of the most effective ways to fight the threat of terrorist organizations is to combat terrorism financing. Within the European Union, the primary responsibility for combating terrorist financing lies with the Member States. However, the EU can and should play a supporting role in helping to respond to the transnational nature of the threat.
APA, Harvard, Vancouver, ISO, and other styles
38

Li, Ze, Duoyong Sun, Bo Li, Zhanfeng Li, and Aobo Li. "Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition." Discrete Dynamics in Nature and Society 2018 (2018): 1–16. http://dx.doi.org/10.1155/2018/5676712.

Full text
Abstract:
Predicting terrorist attacks by group networks is an important but difficult issue in intelligence and security informatics. Effective prediction of the behavior not only facilitates the understanding of the dynamics of organizational behaviors but also supports homeland security’s missions in prevention, preparedness, and response to terrorist acts. There are certain dynamic characteristics of terrorist groups, such as periodic features and correlations between the behavior and the network. In this paper, we propose a comprehensive framework that combines social network analysis, wavelet transform, and the pattern recognition approach to investigate the dynamics and eventually predict the attack behavior of terrorist group. Our ideas rely on social network analysis to model the terrorist group and extract relevant features for group behaviors. Next, based on wavelet transform, the group networks (features) are predicted and mutually checked from two aspects. Finally, based on the predicted network, the behavior of the group is recognized based on the correlation between the network and behavior. The Al-Qaeda data are investigated with the proposed framework to show the strength of our approaches. The results show that the proposed framework is highly accurate and is of practical value in predicting the behavior of terrorist groups.
APA, Harvard, Vancouver, ISO, and other styles
39

FIELD, ANTONY. "Tracking terrorist networks: problems of intelligence sharing within the UK intelligence community." Review of International Studies 35, no. 4 (October 2009): 997–1009. http://dx.doi.org/10.1017/s0260210509990416.

Full text
Abstract:
AbstractThe 7/7 terrorist attacks demonstrated that there were some clear deficiencies with the organisation of the United Kingdom's counter-terrorism intelligence community. In the aftermath of the attacks, there were moves to develop a more robust ‘counter-terrorism network’ in the United Kingdom that would facilitate better communication and intelligence sharing. While recent developments are to be welcomed, the reforms have not addressed some of the fundamental cultural, institutional and technological issues at the heart of the problem. The creation of an effective counter-terrorism network demands that information flows more freely through the intelligence community and that institutional boundaries are broken down. Until these obstacles have been overcome, the new counter-terrorism network will continue to be hampered by the same old problems of intelligence sharing.
APA, Harvard, Vancouver, ISO, and other styles
40

Fellman, Philip Vos. "The complexity of terrorist networks." International Journal of Networking and Virtual Organisations 8, no. 1/2 (2011): 4. http://dx.doi.org/10.1504/ijnvo.2011.037158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

SCHMIDLE, ROBERT E. "Positioning Theory and Terrorist Networks." Journal for the Theory of Social Behaviour 40, no. 1 (March 2010): 65–78. http://dx.doi.org/10.1111/j.1468-5914.2009.00421.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Siqueira, Kevin, and Todd Sandler. "Terrorist networks, support, and delegation." Public Choice 142, no. 1-2 (July 25, 2009): 237–53. http://dx.doi.org/10.1007/s11127-009-9487-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bogerts, Bernhard, Maria Schöne, and Stephanie Breitschuh. "Brain alterations potentially associated with aggression and terrorism." CNS Spectrums 23, no. 2 (August 14, 2017): 129–40. http://dx.doi.org/10.1017/s1092852917000463.

Full text
Abstract:
A large proportion of the persons who join terrorist groups as well as lone-acting terrorists have a history of violent behavior or mental disorder that predated their becoming terrorists. This suggests that brain alterations found to occur in violent perpetrators may also be present in a significant percentage of terrorists. After a short delineation of phylogenetically old neuronal networks that are important for the generation of aggressive behavior in inconspicuous brains, this review summarizes structural and functional brain-imaging studies in violent offenders published over the last 10 years. Depending on the subtype of violence (impulsive or instrumental), deviations in structure or function were mainly found in the prefrontal, orbitofrontal, and insular cortex, as well as in temporolimbic structures (e.g., the amygdala, hippocampus, and parahippocampus). These brain areas are essentially responsible for the control of the archaic neuronal generators of aggression located in the hypothalamus and limbic system. This regional distribution of brain alterations also shows a remarkable overlap with those brain regions that are crucial for such prosocial traits as empathy and compassion. Feelings of superiority, dominance, and satisfaction gained by performing violent and terroristic attacks suggest that a hedonistic component via an activation of brain reward systems plays an additional role. In our current debate about the causes of terrorism, aspects of brain dysfunction should receive more attention.
APA, Harvard, Vancouver, ISO, and other styles
44

Rostokinsky, Alexander V., and Rita S. Danelyan. "About armed rebellions of singles or features of individual terrorist activity." Law Нerald of Dagestan State University 42, no. 2 (2022): 153–57. http://dx.doi.org/10.21779/2224-0241-2022-42-2-153-157.

Full text
Abstract:
This article analyzes some forms of individual terrorist activity caused by personal and micro - group conflicts in modern society. The definition of a lone terrorist is given and the inadmissibility of downplaying the danger of their actions is justified due to the special difficulty of timely detection and prevention, special integration into the world terrorist movement, the growth of opportunities for independent preparation and implementation of these crimes, including using global information networks. It is noted that these manifestations are not characterized by the simultaneous presence of all those signs of a terrorist attack that have been fixed in the Russian criminal law, the scenario of attacks, fragmented and closed contacts of future terrorists, their better awareness, integration into local communities, the use of available weapons and other means of committing crimes, the prevalence of mental pathologies among delinquents.
APA, Harvard, Vancouver, ISO, and other styles
45

., R. D. Gaharwar. "THE IMPLEMENTATION OF TERRORIST WEB MINER FOR THE TERRORIST NETWORKS." International Journal of Research in Engineering and Technology 04, no. 11 (November 25, 2015): 268–71. http://dx.doi.org/10.15623/ijret.2015.0411047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Polo, Sara M. T. "How Terrorism Spreads: Emulation and the Diffusion of Ethnic and Ethnoreligious Terrorism." Journal of Conflict Resolution 64, no. 10 (June 10, 2020): 1916–42. http://dx.doi.org/10.1177/0022002720930811.

Full text
Abstract:
Previous research on the causes of domestic terrorism has tended to focus on domestic determinants. Although this approach can be helpful to understand many causes of terrorism, it implicitly disregards how the tactical choices made by similar nonstate actors elsewhere influence a group’s decision to resort to terrorist tactics. This study argues that the adoption of terrorism among ethnic and ethnoreligious groups results from a process of conditional emulation. Groups are more likely to emulate the terrorist choice of others with whom they are connected by shared political grievances and spatial networks. The theory is tested on a new and original group-level data set of ethnic and ethnoreligious terrorism (1970 to 2009) using geospatial analysis and spatial econometric models. The results provide strong support for the hypothesized mechanism leading to the diffusion of terrorism and suggest that emulation—more than domestic and contextual factors—substantially influences dissidents’ tactic choice.
APA, Harvard, Vancouver, ISO, and other styles
47

Andrusyshyn, Julia, and Valeria Barannik. "INFORMATION TERRORISM AS A CONTEMPORARY THREAT TO THE INFORMATION SECURITY OF MAN, SOCIETY AND THE STATE." Information Security of the Person, Society and State, no. 31-33 (December 20, 2021): 6–15. http://dx.doi.org/10.51369/2707-7276-2021-(1-3)-1.

Full text
Abstract:
The article discusses the content and characteristics of information terrorism as a threat to national and international security in contemporary circumstances. The relevance of the topic stems from the fact that information is currently considered a strategic resource, and deliberate manipulation of public opinion and the commission of terrorist acts to that end has become one of the most dangerous manifestations of hybrid confrontation in the contemporary international arena. Due to the impossibility of clear distinction with ordinary computer crimes and domestic manipulation in mass media, the concepts of «information terrorism» and «cyberterrorism» do not have a clear interpretation. Therefore, information terrorism is viewed in a broad sense (manipulation of public consciousness to create tension, instability, chaos aimed at achieving political or economic objectives in the interests of terrorists) and in narrow terms (cyberattacks on critical government infrastructure information systems to disable them, which can lead to economic, environmental and other disasters). The general characteristics of information terrorism (organized form of violence, psychological influence, drawing attention to a particular problem, demonstrative nature) are defined and specific characteristics inherent only in terrorist acts in the information sphere: (secrecy, size, synchrony, remoteness, internationality and publicity) are singled out. The methods of information terrorism are described, which are aimed at influencing people’s consciousness on a large scale and at imposing their will on society and State institutions through the use of disinformation, propaganda, diversification of public opinion, psychological pressure, rumours, manipulation, intimidation. The forms of information terrorism are described: in particular: information-psychological (media-terrorism) and information-technical (cyberterrorism). It is noted that media terrorism / media killer activity involves the organization of special media campaigns to create an atmosphere of civil disobedience, public distrust of the actions and intentions of the government and its law enforcement agencies by using a number of models of communicative influence (nationalist, religious, inciting model). Cyberterrorism is presented as a socially dangerous activity with the use of computers and telecommunication networks to harm or commit actions / threats that threaten society and lead to other serious consequences, through the use of the following methods: APT-attacks, malware, DoS / DDoS-attacks, unauthorized access, ransomware. It is summarized and concluded that today virtual space and mass media are widely used by various terrorist-oriented groups for their own purposes, because accessibility, the absence of censorship, the large potential audience of users, the speed with which information is disseminated and the complexity with which it is presented and received are all contributing to the spread of information terrorism in today’s world. The threat of terrorism through the use of media and cyberspace is a complex challenge of our time. The danger of such terrorism lies in the absence of geographical and national borders, since terrorist acts can be carried out from anywhere in the world, as well as in the difficulty of identifying the identity of the terrorist in the information space and establishing his whereabouts, because cyber and media attacks are carried out by hackers indirectly through the use of computer technology. Therefore, in view of the further development of technology and mass media, the issue of countering information terrorism will be particularly relevant.
APA, Harvard, Vancouver, ISO, and other styles
48

Olomojobi, Yinka, and Odusanya Temitope Omotola. "Social Media." International Journal of Cyber Warfare and Terrorism 11, no. 1 (January 2021): 31–44. http://dx.doi.org/10.4018/ijcwt.2021010103.

Full text
Abstract:
Terrorism is ubiquitous. Most states around the world have experienced some form of terrorism. Terrorism has undermined the profile of Nigeria and has generated a tense and fragile political system. This paper underscores that the prevalence of grievance and the lack of an innovative economic base in Nigeria are amongst the key factors that stimulate terrorism in the state. In Nigeria, terrorist activities have become endemic. A cursory look on these activities has proven that social media has become a source for propagating terrorism. This has generated multifarious security challenges as well. This paper is aimed at analyzing terrorism and social media. It further proceeds to examine the main thrust of the paper submitting that social media is a viable tool for terrorists. From this standpoint, the paper explores a case study analysis to further explain and evaluate the symbiotic relationship between social media and terrorism in Nigeria.
APA, Harvard, Vancouver, ISO, and other styles
49

Arrobi, Mohammad Zaki. "The Making of Islamist-inspired Terrorism and It’s Counter-terrorism in Indonesia." Politik Indonesia: Indonesian Political Science Review 3, no. 2 (July 15, 2018): 217–38. http://dx.doi.org/10.15294/ipsr.v3i2.13673.

Full text
Abstract:
The study attempts to uncover the making of Islamist-inspired terrorism and its state-led counter-terrorism responses in the modern history of Indonesia. It argues that Islamist-inspired terrorism and its counter-terrorism have been inextricably linked in complex ways within political and historical contexts. Instead of regarding Islamist-inspired terrorism and counter-terrorism as separated and unrelated entities, or perceiving the latter as just response to the former, it suggests that they have been intertwined and shaped each other throughout Indonesia’s modern history. By discussing Islamist-inspired terrorism in the three Indonesian historical periods, namely the resurgence of Darul Islam during 1940-60s, the re-emergence of Darul Islam networks and its series of terrorist attacks in 1980s, and the Jemaah Islamiyah-related terrorist activities in the 2000s as illustrative cases, the study has delineated the ways in which Islamist-inspired terrorism and its state-led counter-terrorism have been bound up within particular political, historical, and sociological context. In addition to that, the study also reveals that both Islamist-inspired terrorism and its state-led counter-terrorism have been shaped by the dynamic interplay of local, national, and global contexts.
APA, Harvard, Vancouver, ISO, and other styles
50

Takeyh, Ray, and Nikolas Gvosdev. "Do terrorist networks need a home?" Washington Quarterly 25, no. 3 (September 2002): 97–108. http://dx.doi.org/10.1162/01636600260046262.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography