Metrika članka

  • citati u SCindeksu: 0
  • citati u CrossRef-u:0
  • citati u Google Scholaru:[=>]
  • posete u poslednjih 30 dana:12
  • preuzimanja u poslednjih 30 dana:4
članak: 6 od 242  
Back povratak na rezultate
Vojno delo
2019, vol. 71, br. 4, str. 126-136
jezik rada: srpski
vrsta rada: neklasifikovan
objavljeno: 16/11/2019
doi: 10.5937/vojdelo1904126K
Internet kao platforma za radikalizaciju
Ministarstvo unutrašnjih poslova Republike Srbije, Policijska uprava u Šapcu

Sažetak

Cilj ovog rada je da ukaže na način na koji terorističke grupe koriste internet kako bi podstakli individualne radikalizacione procese i kako se oslanjaju na specifične praktične mogućnosti koje im on pruža. U radu se analizira i pojedini načini na koje teroristi koriste internet kao deo svojih širih medijskih strategija, gde se analizira online kampanje za regrutovanje, kao i korišćenje interneta u cilju olakšavanja radikalizacije ekstremističkih grupa. Analiziraju se, takođe, i aktuelni stavovi o strahu od radikalizacije preko interneta, kao i o njenim uzrocima i procesima.

Ključne reči

Reference

Aly, A. (2011) The Internet as Ideological Battleground. Edith Cowan University-Security Research Institute (SRI), 52(1), 69-86
Aly, A., Weimann-Saks, D., Weimann, G. (2014) Making 'noise' online: An analysis of the say noto terror online campaign. Perspective on Terrorism, 8(5): 33-47
Bargh, J.A., McKenna, K.Y.A. (2004) The Internet and Social Life. Annual Review of Psychology, 55(1): 573-590
Behr, I., Reding, A., Edwards, C., Gribbon, L. (2013) Radicalisation in the digital age: The useof the internet in 15 cases of terrorism and extremism. Santa Monica, CA: RAND Corporation
Benson, D.C. (2014) Why the Internet Is Not Increasing Terrorism. Security Studies, 23(2): 293-328
Bergin, A., Sulastri, O., Ungerer, C.O., Azlin, N., Yasin, M. (2009) Countering internet radicalisation in Southeast Asia. Australian Strategic Policy Institute
Briggs, R., Birdwell, J. (2009) Radicalisation among Muslims in the UK. Microcon Policy Working Paper, 7
Charvat, J. (2010) Radicalization on the Internet. Defence Against Terrorism Review, Vol. 3, No. 2, Fall 2010, pp. 75-85
Chen, H. (2012) Dark Dark Web: Exploring and Data Mining the Dark Side of the Web. New York: Springer
Cilluffo, F., Cardash, S., Whitehead, S. (2006) Radicalization: Beyond bars and beyond borders. Washington, DC, USA: George Washington University-Homeland Security Policy Institute
Cohen-Almagor, R. (2011) Fighting Hate and Bigotry on the Internet. Policy & Internet, 3(3): 89-114
Community Oriented Policing Services (COPS)-Office of Community Oriented Policing Services (2014) Online radicalisation to violent extremism: Awareness brief. Washington, DC
Conway, M. (2006) Terrorist 'use' of the Internet and fighting back. u: Conference Cyber safety: Safety and Security in a Networked World: Balancing Cyber-Rights and Responsibilities, Oxford Internet Institute (OII), Oxford University, UK, 8-10 September, 2006
Conway, M. (2006) Terrorism and the Internet: New Media-New Threat?. Parliamentary Affairs, 59(2): 283-298
Conway, M. (2007) Terrorism and Internet Governance: Core Issues. Disarmament Forum, 23-34
Conway, M. (2012) From al-Zarqawi to al-Awlaki: The emergence and development of an online radical milieu. CTX: Combating Terrorism Exchange, 2(4): 12-22
Conway, M. (2017) Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research. Studies in Conflict & Terrorism, 40(1): 77-98
Correa, D., Sureka, A. (2013) Solutions to Detect and Analyze Online Radicalization: A Survey. CoRR, abs/1301.491
Edwards, C., Gribbon, L. (2013) Pathways to Violent Extremism in the Digital Era. RUSI Journal, 158(5): 40-47
General Intelligence and Security Service (AIVD) (2012) Jihadism on the Web: A breeding ground for jihad in the modern age. The Hague
Grieve, L.B. (2013) A psychological perspective on virtual communities supporting terrorist & extremist ideologies as a tool for recruitment. Security Informatics, 2(9)
Hegghammer, T. (2014) Interpersonal trust on jihadi internet forums. u: D. Gambetta [ur.] Fight, flight, mimic: Identity signalling in armed conflicts, Academic Press
Huey, L. (2015) This is Not Your Mother's Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming. Journal of Terrorism Research, 6(2)
Hussain, G., Saltman, E.M. (2014) Jihad trending: A comprehensive analysis of online extremism and how to counter it. Quilliam Foundation
Koehler, D. (2014) The Radical Online: Individual Radicalization Processes and the Role of the Internet. Winter 2014/15, Nr. 1
Lennings, C.J., Amon, K.L., Brummert, H., Lennings, N.J. (2010) Grooming for Terror: The Internet and Young People. Psychiatry, Psychology and Law, 17(3): 424-437
Liang, C.S. (2015) Cyber Jihad: Understanding and Countering Islamic State Propaganda. GSCP Policy Paper, no. 2 (February 2015)
Lungu, A.M. (2001) WAR.COM: The Internet and Psychological Operations. Defense Technical Information Center, paper submitted to the Faculty of the Naval War College (2001) pp.1
Majeed, K., Seng, N., Ong, G., Mingyi, E., Chin, J. (2016) Combating Violent Extremism and Radicalization in the Digital Era. IGI Global
McCauley, C., Moskalenko, S. (2011) Friction: How radicalization happens to them and us. New York: Oxford University Press
Mealer, M. (2012) Internet Radicalization: Actual Threat or Phantom Menace?. Naval Postgraduate School, PP.2 Neumann and Stevens, 2009:5)
Neumann, P., Stevens, T. (2009) Countering Online Radicalisation: A Strategy for Action. London: ICSR
Neumann, P. (2008) Recruitment for the Islamist Militant Movement in Europe. Brussels: European Commission, with Brooke Rogers
Passy, F. (2000) Socialization, recruitment, and the structure/agency gap: A specification of the impact of networks on participation in social movements. http://www.nd.edu/~dmyers/lomond/passy.pdf Ravndal, 2013
Ravndal, J.A. (2013) Anders Behring Breivik's use of the Internet and social media. Journal Exit-Deutschland. Zeitschrift für Deradikalisierung und demokratische Kultur, Bd. 2 (2013)1
Saifudeen, O.A. (2015) Islamic state and its online recruitment formula. Singapore: S. Rajaratnam School of International Studies, RSIS Commentaries (090/2015)
Silke, A. (2010) The Internet & Terrorist Radicalisation: The Psychological Dimension. u: Hans-Liudger Dienel, Yair Sharan, Christian Rapp, Niv Ahituv [ur.] Terrorism and the Internet: Threats, Target groups, Deradicalisation strategies, pp. 27-40
Sinai, J.A. (2016) Framework for Assessing the Mobilization of Westerners by Jihadists in Syria and Intervention Points for Counter-Measures. Vol 10, No 3 (2016)
START The Use of Social Media by United States Extremists. Research brief; URL: http://www.start.umd.edu/pubs/START_PIRUS_UseOfSocialMediaByUSExtremists_ResearchBrief _July2018.pdf
Taarnby, M. (2005) Recruitment of Islamist Terrorists in Europe: Trends and Perspectives. Research Report funded by the Danish Ministry of Justice Submitted 14 January, 2005
Thompson, R. (2012) Radicalization and the Use of Social Media. Journal of Strategic Security, 4(4): 167-190
Torok, R. (2013) Developing an explanatory model for the process of online radicalisation and terrorism. Security Informatics, 2(1): 1-10
United States Congress House-Committee on Homeland Security-Subcommittee on Intelligence (2009) Using the Web as a weapon: The Internet as a tool for violent radicalization and homegrown terrorism. u: Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, House of Representatives, One Hundred Tenth Congress, first s, I. Sharing
Weimann, G. (2004) How modern terrorism uses the Internet. Washington: United States Institute for Peace, http://www.usip.org/pubs/specialreports/sr116.html
Weimann, G. (2006) Virtual Disputes: The Use of the Internet for Terrorist Debates. Studies in Conflict & Terrorism, 29(7): 623-639
Weimann, G. (2015) From Theaters to Cyberspace: Mass-Mediated Terrorism. U.S.A: Global Connections Foundation, Winter 2015: Volume 13, Number 1
Weimann, G. (2008) The Psychology of Mass-Mediated Terrorism. American Behavioral Scientist, 52(1): 69-86
Weimann, G. (2009) Virtual Sisters: How Terrorists Target Women Online. InSITE, 2(1), 19-22
Weimann, G. (2012) Lone Wolves in Cyberspace. Journal of Terrorism Research, 3(2), 75-90. 405
Weimann, G., von Knop, K. (2008) Applying the Notion of Noise to Countering Online Terrorism. Studies in Conflict & Terrorism, 31(10): 883-902