M Cheong, VCS Lee - Information Systems Frontiers, 2011 - Springer
The study of terrorism informatics utilizing the Twitter microblogging service has not been given apt attention in the past few years. Twitter has been identified as both a potential …
ML Leenuse, DS Pankaj - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Twitter is one of the prominent social media applications which influence civilians due to its fast information dissemination. Researchers have shown that the majority of the tweets …
A Parlakkılıç - International Journal of Information Security Science, 2018 - dergipark.org.tr
This paper deals with the categorical cyber terrorism threats on social media and preventive approach to minimize their issues. While dealing with the threat of cyber terrorism in social …
P Gupta, MJ Nene - … Technology for Intelligent Systems (ICTIS 2017) …, 2018 - Springer
Social media proved to be a medium to document our daily lives. It is a virtual tool used by an individual or organizations for various communications and information exchanges. Data …
W Jeberson, L Sharma - Compusoft, 2015 - researchgate.net
Terrorist activities is a big issue for the whole humanity, and as the whole world is moving rapidly by utilizing IT innovations, similarly terrorist groups are also using IT technologies as …
D Bieda, L Halawi - Issues in Information Systems, 2015 - commons.erau.edu
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and proliferating propaganda and terrorism. Moreover, this study explores how the …
U Dikwatta, TGI Fernando - 2019 - dr.lib.sjp.ac.lk
Social media has become a vital part of humans' day to day life. Different users engage with social media differently. With the increased usage of social media, many researchers have …
J Bartlett, L Reynolds - 2015 - preventviolentextremism.info
This paper is a review of how information and insight can be drawn from open social media sources. It focuses on the specific research techniques that have emerged, the capabilities …
L Chen, J Chen, C Xia - Journal of Information Security and Applications, 2022 - Elsevier
The scope of cyberspace weapons is expanding from the physical network domain to the cognitive information domain. Technologies such as network penetration, public opinion …