Treffer: Analyzing terror campaigns on the internet : Technical sophistication. content richness, and Web interactivity

Title:
Analyzing terror campaigns on the internet : Technical sophistication. content richness, and Web interactivity
Source:
Information security in the knowledge economyInternational journal of human-computer studies. 65(1):71-84
Publisher Information:
London: Elsevier, 2007.
Publication Year:
2007
Physical Description:
print, 32 ref
Original Material:
INIST-CNRS
Subject Terms:
Computer science, Informatique, Psychology, psychopathology, psychiatry, Psychologie, psychopathologie, psychiatrie, Sciences exactes et technologie, Exact sciences and technology, Sciences appliquees, Applied sciences, Informatique; automatique theorique; systemes, Computer science; control theory; systems, Logiciel, Software, Systèmes informatiques et systèmes répartis. Interface utilisateur, Computer systems and distributed systems. User interface, Organisation des mémoires. Traitement des données, Memory organisation. Data processing, Gestion des mémoires et des fichiers (y compris la protection et la sécurité des fichiers), Memory and file management (including protection and security), Systèmes d'information. Bases de données, Information systems. Data bases, Analyse contenu, Content analysis, Análisis contenido, Analyse quantitative, Quantitative analysis, Análisis cuantitativo, Comportement utilisateur, User behavior, Comportamiento usuario, Document électronique, Electronic document, Documento electrónico, Interface utilisateur, User interface, Interfase usuario, Internet, Multilinguisme, Multilingualism, Multilingüismo, Multimédia, Multimedia, Perspective, Perspectiva, Réseau web, World wide web, Red WWW, Site Web, Web site, Sitio Web, Système réparti, Distributed system, Sistema repartido, Sécurité informatique, Computer security, Seguridad informatica, Terrorisme, Terrorism, Terrorismo, Web collection building, Web content analysis, Web usage analysis
Document Type:
Konferenz Conference Paper
File Description:
text
Language:
English
Author Affiliations:
Department of Management, University of Massachusetts Lowell, Lowell, MA 01854, United States
Information Systems and Technology Management, George Washington University, Washington, DC 20052, United States
Department of Management Information Systems, The University of Arizona, Tucson, AZ 85721, United States
Systems and Industrial Engineering Department, The University of Arizona, Tucson, AZ 85721, United States
ISSN:
1071-5819
Rights:
Copyright 2007 INIST-CNRS
CC BY 4.0
Sauf mention contraire ci-dessus, le contenu de cette notice bibliographique peut être utilisé dans le cadre d’une licence CC BY 4.0 Inist-CNRS / Unless otherwise stated above, the content of this bibliographic record may be used under a CC BY 4.0 licence by Inist-CNRS / A menos que se haya señalado antes, el contenido de este registro bibliográfico puede ser utilizado al amparo de una licencia CC BY 4.0 Inist-CNRS
Notes:
Computer science; theoretical automation; systems
Accession Number:
edscal.18357102
Database:
PASCAL Archive

Weitere Informationen

Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multi-lingual and multimedia terrorist/extremist collections and advanced analytical methodologies, our empirical understanding of their Internet usage is still very limited. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist Web contents. We also propose a Dark Web Attribute System (DWAS) to enable quantitative Dark Web content analysis from three perspectives: technical sophistication, content richness, and Web interactivity. Using the proposed methodology, we identified and examined the Internet usage of major Middle Eastern terrorist/extremist groups. More than 200,000 multimedia Web documents were collected from 86 Middle Eastern multi-lingual terrorist/extremist Web sites. In our comparison of terrorist/extremist Web sites to US government Web sites, we found that terrorists/extremist groups exhibited similar levels of Web knowledge as US government agencies. Moreover, terrorists/extremists had a strong emphasis on multimedia usage and their Web sites employed significantly more sophisticated multimedia technologies than government Web sites. We also found that the terrorists/ extremist groups are as effective as the US government agencies in terms of supporting communications and interaction using Web technologies. Advanced Internet-based communication tools such as online forums and chat rooms are used much more frequently in terrorist/extremist Web sites than government Web sites. Based on our case study results, we believe that the DWAS is an effective tool to analyse the technical sophistication of terrorist/extremist groups' Internet usage and could contribute to an evidence-based understanding of the applications of Web technologies in the global terrorism phenomena.