J Monahan - The handbook of the criminology of terrorism, 2016 - Wiley Online Library
This chapter synthesizes the existing evidence base on the individual risk assessment of terrorism, focusing critical attention on recent developments in the identification of valid risk …
J Prier - Information warfare in the age of cyber conflict, 2020 - taylorfrancis.com
“Commanding the trend” represents a relatively novel and increasingly dangerous means of persuasion within social media. A trending topic transcends networks and becomes the …
A De Ruiter - Philosophy & Technology, 2021 - Springer
Deepfake technology presents significant ethical challenges. The ability to produce realistic looking and sounding video or audio files of people doing or saying things they did not do or …
At the time, there was no single work that addressed this increasingly vexatious issue of domestic and international security in an authoritative, yet accessible, way. My intention had …
G Weimann - Studies in Conflict & Terrorism, 2016 - Taylor & Francis
ABSTRACT The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. One can describe …
In Making Sense of Media and Politics, Gadi Wolfsfeld introduces readers to the most important concepts for examining the interrelationship of media and politics. Five major …
G Weimann - Perspectives on Terrorism, 2016 - JSTOR
The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. The deepest layers of the …
Since the 1970s, there have been three challenges to traditional, homogeneous" national" identities across the Western world: political and socioeconomic inequality; neoliberal …
Although the production of videogames by extremist and terrorist groups has markedly declined since a high point in the 2000s, game-based interventions remain highly …