Description |
1 online resource (613 pages) |
Contents |
Title Page; Copyright Page; Book Series; Editorial Advisory Board; Table of Contents; Detailed Table of Contents; Foreword; Preface; Acknowledgment; Section 1: Exploitation of the Internet by Violent Extremists; Chapter 1: Understanding the Psychology of Persuasive Violent Extremist Online Platforms; Chapter 2: Persuasion and Propaganda in War and Terrorism; Chapter 3: Social Media and the Use of Discursive Markers of Online Extremism and Recruitment; Chapter 4: ISIS Discourse in Radical Islamic Online News Media in Indonesia; Chapter 5: Using the Internet to Plan for Terrorist Attack |
|
Section 2: Understanding the "Person" within Online Violent ExtremismChapter 6: Understanding Personality and Person-Specific Predictors of Cyber-Based Insider Threat; Chapter 7: Getting out of the Armchair; Chapter 8: Why Is ISIS so Psychologically Attractive?; Chapter 9: Psychological Effects of the Threat of ISIS; Chapter 10: Western Female Migrants to ISIS; Chapter 11: An Internet-Mediated Pathway for Online Radicalisation; Section 3: Countering Violent Extremism and Radicalisation; Chapter 12: Framing the Challenges of Online Violent Extremism |
|
Chapter 13: Towards a Comprehensive Approach to Combating Violent Extremist Ideology in the Digital SpaceChapter 14: Countering Online Violent Extremism; Chapter 15: Building National Resilience in the Digital Era of Violent Extremism; Chapter 16: Social Media Analytics for Intelligence and Countering Violent Extremism; Chapter 17: "On the Internet, Nobody Knows You're a Dog"; Chapter 18: Detecting Linguistic Markers of Violent Extremism in Online Environments; Chapter 19: Internet Use and Violent Extremism; Chapter 20: A Supplementary Intervention to Deradicalisation |
|
Section 4: Emerging TrendsChapter 21: Cyberterrorism; Chapter 22: Death by Hacking; Chapter 23: Spear Phishing; Section 5: Summary and Future Directions; Chapter 24: What We Know and What Else We Need to Do to Address the Problem of Violent Extremism Online; Compilation of References; About the Contributors; Index; Optional Back Ad |
Summary |
"This book is an essential reference for the latest research on the utilization of online tools by terrorist organizations to communicate with and recruit potential extremists and examines effective countermeasures employed by law enforcement agencies to defend against such threats"--Provided by publisher |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Cyberterrorism.
|
|
Internet and terrorism.
|
|
Extremist Web sites.
|
|
Terrorists -- Recruiting.
|
|
Radicalism.
|
|
Terrorism -- Prevention.
|
|
radicalism.
|
|
Cyberterrorism
|
|
Extremist Web sites
|
|
Internet and terrorism
|
|
Radicalism
|
|
Terrorism -- Prevention
|
|
Terrorists -- Recruiting
|
Form |
Electronic book
|
Author |
Neo, Loo Seng
|
|
Ong, Gabriel
|
|
Mingyi, Eunice Tan
|
|
Chin, Jeffery
|
ISBN |
9781522501572 |
|
1522501576 |
|