Author of the publication

Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity.

, , , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 4-15. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mapping the contemporary terrorism research domain., and . Int. J. Hum. Comput. Stud., 65 (1): 42-56 (2007)US Domestic Extremist Groups on the Web: Link and Content Analysis., , , , and . IEEE Intelligent Systems, 20 (5): 44-51 (2005)Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity., , , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 4-15. Springer, (2006)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Uncovering the dark Web: A case study of Jihad on the Web., , , , , and . J. Assoc. Inf. Sci. Technol., 59 (8): 1347-1359 (2008)Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity., , , , and . Int. J. Hum. Comput. Stud., 65 (1): 71-84 (2007)Business stakeholder analyzer: An experiment of classifying stakeholders on the Web., , and . J. Assoc. Inf. Sci. Technol., 60 (1): 59-74 (2009)Introduction to special issue on terrorism informatics., , , and . Inf. Syst. Frontiers, 13 (1): 1-3 (2011)The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 623-624. Springer, (2005)Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 322-339. Springer, (2005)