The aim of this article is to analyse how terrorist organizations use new technology and the internet. The empirical references are the AQAP and ISIS organizations. The article addresses the following themes: filming military action by the Chechen troops and functions of such films as well as the typology of films produced by jihadi organizations. Furthermore, the most significant and active media activities of terrorist organizations are described. The article presents a number of reasons why the internet has become such an important tool for terrorists, and what they use it for. Summary fragments are official publications of the three major terrorist organizations. Artykuł dotyczy sposobów używania nowoczesnych technologii i Inter...
The rapid development of information and communication technologies in the last 20 years contributed...
Modern databases of criminals based on information technology. They are very efficient. They allow e...
The paper presents the considerations about the police use of information obtained from open source...
The aim of this article is to analyse how terrorist organizations use new technology and the interne...
The article discusses the issues to take under consideration when dealing with information technolog...
The article is concerned first and foremost with the media activity of terrorist groups. In the art...
The article describes the phenomenon of contemporary terrorism in the context of science and perform...
The aim of the article is to present threats in the health security system which originate from the ...
The article attempts to capture basic elements related to threats to social security incyberspace. A...
The aim of the text is to present and systematize the most important reasons for the „Islamic State”...
The development of electronics, the Internet, the use of public networks to send information for ind...
The article attempts to capture basic elements related to threats to social security in cyberspace. ...
The article presents the possible employment of multiple criteria optimisation methods in the proces...
Either in information transmitted by the mass media or discussions concerning the phenomenon of terr...
W artykule przedstawiono rosyjskie i chińskie doświadczenia w walce z terroryzmem oraz wspólne prze...
The rapid development of information and communication technologies in the last 20 years contributed...
Modern databases of criminals based on information technology. They are very efficient. They allow e...
The paper presents the considerations about the police use of information obtained from open source...
The aim of this article is to analyse how terrorist organizations use new technology and the interne...
The article discusses the issues to take under consideration when dealing with information technolog...
The article is concerned first and foremost with the media activity of terrorist groups. In the art...
The article describes the phenomenon of contemporary terrorism in the context of science and perform...
The aim of the article is to present threats in the health security system which originate from the ...
The article attempts to capture basic elements related to threats to social security incyberspace. A...
The aim of the text is to present and systematize the most important reasons for the „Islamic State”...
The development of electronics, the Internet, the use of public networks to send information for ind...
The article attempts to capture basic elements related to threats to social security in cyberspace. ...
The article presents the possible employment of multiple criteria optimisation methods in the proces...
Either in information transmitted by the mass media or discussions concerning the phenomenon of terr...
W artykule przedstawiono rosyjskie i chińskie doświadczenia w walce z terroryzmem oraz wspólne prze...
The rapid development of information and communication technologies in the last 20 years contributed...
Modern databases of criminals based on information technology. They are very efficient. They allow e...
The paper presents the considerations about the police use of information obtained from open source...