During the last two decades, the growing threat of Islamic terrorism has raised numerous security challenges for both states and non-state actors. Cyberspace is weaponized by actors who conduct malicious activities, in order to achieve their goals. Terrorist organizations reflect the darker side of cyberspace. Terrorists use cyberspace to collect data, raise funds, conduct propaganda, spread radical ideologies and hate speech as well as for the purposes of radicalization, recruitment and operational planning. Social media platforms provide a fertile ground to extend the radical ideologies, to spread terror and to connect with people who share the same views. ISIS is considered a pioneer in utilizing the benefits that cyberspace offers. The ...
The article gives general characterisation of the ways in which these organizations use modern comm...
The use of social media as a weapon in contemporary conflicts poses serious threats to global securi...
The following paper is a review article. It is an attempt to analyze the most widely available publi...
During the last two decades, the growing threat of Islamic terrorism has raised numerous security ch...
This paper investigates whether the counter-terrorism measures developed and implemented within the ...
The rise of ICT (Information and Communication Technologies) in the age of globalization significant...
This paper examines some of the most widely researched trends and developments within the phenomenon...
This research delves into the profound impact of Information and Communication Technology (ICT) on t...
Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety a...
Terrorism is designed to attract attention to the terrorist’s cause and to spread fear and anxiety a...
Terrorism in our days poses new challenges to the European governments and citizens as well, because...
Cyberspace has expanded the arena within which extremists and terrorists operate, posing a range of ...
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and prol...
Modern terrorism is global and decentralized like cyberspace. While the Darknet is mostly used by te...
The post 11 September 2001 era has changed governments, policy-makers religious leaders, the media a...
The article gives general characterisation of the ways in which these organizations use modern comm...
The use of social media as a weapon in contemporary conflicts poses serious threats to global securi...
The following paper is a review article. It is an attempt to analyze the most widely available publi...
During the last two decades, the growing threat of Islamic terrorism has raised numerous security ch...
This paper investigates whether the counter-terrorism measures developed and implemented within the ...
The rise of ICT (Information and Communication Technologies) in the age of globalization significant...
This paper examines some of the most widely researched trends and developments within the phenomenon...
This research delves into the profound impact of Information and Communication Technology (ICT) on t...
Terrorism is designed to attract attention to the terrorist's cause and to spread fear and anxiety a...
Terrorism is designed to attract attention to the terrorist’s cause and to spread fear and anxiety a...
Terrorism in our days poses new challenges to the European governments and citizens as well, because...
Cyberspace has expanded the arena within which extremists and terrorists operate, posing a range of ...
This paper discusses how cyberspace has become a venue for terrorists groups for recruiting and prol...
Modern terrorism is global and decentralized like cyberspace. While the Darknet is mostly used by te...
The post 11 September 2001 era has changed governments, policy-makers religious leaders, the media a...
The article gives general characterisation of the ways in which these organizations use modern comm...
The use of social media as a weapon in contemporary conflicts poses serious threats to global securi...
The following paper is a review article. It is an attempt to analyze the most widely available publi...