2007
DOI: 10.1016/j.ijhcs.2006.08.012
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
34
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 60 publications
(35 citation statements)
references
References 12 publications
1
34
0
Order By: Relevance
“…Terrorism researches dealing with terrorists' uses of website seem to center around two approaches: content analysis of terrorists' web documents (Tsfati and Weimann 2002;Weimann 2004;Denning 2009;Anderson 2003) and explication of terrorists' web technologies in supporting communication, interaction, and presentation (Qin et al 2007).…”
Section: Cyber Terrorismmentioning
confidence: 99%
“…Terrorism researches dealing with terrorists' uses of website seem to center around two approaches: content analysis of terrorists' web documents (Tsfati and Weimann 2002;Weimann 2004;Denning 2009;Anderson 2003) and explication of terrorists' web technologies in supporting communication, interaction, and presentation (Qin et al 2007).…”
Section: Cyber Terrorismmentioning
confidence: 99%
“…Collectively this qualitative and quantitative research finds a diverse but sophisticated set of materials that often contains vivid imagery, efforts to enhance legitimacy, and many links to like-minded sites. For example, in one of the most comprehensive analyses to date, Qin et al (2007) found that extremist groups use more sophisticated multimedia technology than government websites, particularly when it comes to technologies that allow interaction and feedback.…”
Section: Introductionmentioning
confidence: 99%
“…A 2016 study focusing on Austria, Norway, Sweden and Switzerland, and combining protest event analysis with online data and network analysis (another technique coming from social movement studies and rarely applied to the radical right until recently, e.g. Qin et al, 2007;Zhou et al, 2005), explained why Pegida mustered low-level support in some countries and failed in others, revealing the pivotal importance of the organizers' agency and their relations with other radical right players (Berntzen and Weisskircher, 2016). Unlike the sui generis case in Dresden, the Pegida label has become a rallying point, appropriated by pre-established radical right activists using it for their own mobilization efforts.…”
Section: Who Mobilizes On the Radical Right? When Individual Values Amentioning
confidence: 99%
“…The networks that radical right organizations are able to build either at the national or at the international level are considered important for right-wing mobilization (e.g. on networks built online, see Burris et al, 2000;Qin et al, 2007;Zhou et al, 2005). In the USA, for example, the Tea Party has been found to maintain its members through a loose, reticular organization with (albeit uneasy) relations with both the Republican Party and radical right groups (Skocpol and Williamson, 2012).…”
Section: How Mobilizing? Organizations and Leaders Of The Radical Rightmentioning
confidence: 99%