Fifty years of scholarly research on terrorism: Intellectual progression, structural composition, trends and knowledge gaps of the field

M Haghani, E Kuligowski, A Rajabifard… - International Journal of …, 2022 - Elsevier
Scholarly literature on terrorism is analysed in its full scope with three main goals:(i) to
objectively determine the structural makeup of the field,(ii) to document its current and past …

[图书][B] Youth and violent extremism on social media: mapping the research

S Alava, D Frau-Meigs, G Hassan - 2017 - books.google.com
The Internet offers significant possibilities for supporting the fulfillment of the 2030
Sustainable Development Agenda and advancing all human rights, including access to …

[HTML][HTML] Digital evidence: Unaddressed threats to fairness and the presumption of innocence

R Stoykova - Computer Law & Security Review, 2021 - Elsevier
Contemporary criminal investigation assisted by computing technology imposes challenges
to the right to a fair trial and the scientific validity of digital evidence. This paper identifies …

Terrorism and homeland security

JR White - (No Title), 2006 - cir.nii.ac.jp
" The purpose of this book is to introduce criminal justice and other social science students
to the field of terrorism and homeland security. This book is also meant to provide a …

Geopolitics of technology: A new battleground?

K Khan, CW Su, M Umar, W Zhang - Technological and Economic …, 2022 - aviation.vgtu.lt
This study aims to consider the causality between global geopolitical risk (GPR) and
technology (TEC) using the rolling window approach. The results reveal that GPR has a …

Searching for signs of extremism on the web: an introduction to Sentiment-based Identification of Radical Authors

R Scrivens, G Davies, R Frank - Behavioral sciences of terrorism …, 2018 - Taylor & Francis
As violent extremists continue to surface in online discussion forums, law enforcement
agencies search for new ways of uncovering their digital indicators. Researchers have both …

Exploring design and governance challenges in the development of privacy-preserving computation

N Agrawal, R Binns, M Van Kleek, K Laine… - Proceedings of the …, 2021 - dl.acm.org
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …

El cibercrimen: Fenomenología y criminología de la delincuencia en el ciberespacio

F Miró Llinares - 2012 - torrossa.com
Prólogo marginales». Se trata de actividades que bien no son punibles o son legales, pero
que la gente sigue tratando de ocultar de los demás. Probablemente, las actividades …

[图书][B] Freedom of connection, freedom of expression: the changing legal and regulatory ecology shaping the Internet

WH Dutton - 2011 - books.google.com
As this publication explains, freedom of expression is not just a by-product of technical
change; it must be protected by legal and regulatory measures that balance a variety of …

Public opinion on National Security Agency surveillance programs: A multi-method approach

CG Reddick, AT Chatfield, PA Jaramillo - Government Information Quarterly, 2015 - Elsevier
This paper examines public opinion on National Security Agency (NSA) mass surveillance
programs of Americans. A new theory, developed and tested in this paper, explicates the …