Author of the publication

Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity.

, , , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 4-15. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity., , , , and . Int. J. Hum. Comput. Stud., 65 (1): 71-84 (2007)Uncovering the dark Web: A case study of Jihad on the Web., , , , , and . J. Assoc. Inf. Sci. Technol., 59 (8): 1347-1359 (2008)Unraveling International Terrorist Groups' Exploitation of the Web: Technical Sophistication, Media Richness, and Web Interactivity., , , , and . WISI, volume 3917 of Lecture Notes in Computer Science, page 4-15. Springer, (2006)Terrorism Knowledge Discovery Project: A Knowledge Discovery Approach to Addressing the Threats of Terrorism., , , , , , , and . ISI, volume 3073 of Lecture Notes in Computer Science, page 125-145. Springer, (2004)Web-based data collection for the analysis of hidden relationships (Web mining of hypertext links).. ICIS, page 739-740. Association for Information Systems, (2000)Mapping the Contemporary Terrorism Research Domain: Researchers, Publications, and Institutions Analysis., and . ISI, volume 3495 of Lecture Notes in Computer Science, page 322-339. Springer, (2005)The Dark Web Portal Project: Collecting and Analyzing the Presence of Terrorist Groups on the Web., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 623-624. Springer, (2005)Exploring the Dark Side of the Web: Collection and Analysis of U.S. Extremist Online Forums., , , , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 621-626. Springer, (2006)Content Analysis of Jihadi Extremist Groups' Videos., , and . ISI, volume 3975 of Lecture Notes in Computer Science, page 615-620. Springer, (2006)Studying the presence of terrorism on the web: an knowledge portal approach., , , , and . JCDL, page 402. ACM, (2005)