2017
DOI: 10.9770/jssi.2017.7.2(1)
|View full text |Cite
|
Sign up to set email alerts
|

Role of Internet in Lone Wolf Terrorism

Abstract: For the last two decades, lone wolf terrorists in Western countries have been significantly changing their modus operandi. Part of these changes and possibly even one of their causes is the increasing use of the internet by lone wolves. This article reviews the role of the internet in the preparation of a terrorist attack as well as during the process of radicalisation of lone wolves. The possibilities and methodical flaws of lone wolf identification on the internet are also discussed. Based on current knowled… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
1
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 18 publications
0
9
1
1
Order By: Relevance
“…Tavani (1999) points out that some privacy analysts began distinguishing between 'informational privacy' concerns and a separate category related to intrusion and interference that is sometimes referred to as 'psychological privacy' . Recently, Zeman et al (2017) and other authors also focus on various aspects of military and anti-terrorism cyber security activities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Tavani (1999) points out that some privacy analysts began distinguishing between 'informational privacy' concerns and a separate category related to intrusion and interference that is sometimes referred to as 'psychological privacy' . Recently, Zeman et al (2017) and other authors also focus on various aspects of military and anti-terrorism cyber security activities.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Although scholars are still divided on the extent and practical significance of the internet, there is little doubt on the fact that the internet is commonly used for terrorist purposes. 49 Another point of agreement is that "radicalisation of opinion" should be separated from "radicalisation of action". 50 Due to the wide array of prohibited conduct under the studied provisions, it is useful to make a distinction between (a) seeking actual manuals and other information that provide practical assistance in the preparation of a terrorist offence, and (b) accessing websites that provide inciting propaganda texts, images and videos or viewing/obtaining certain material (no practical assistance, e.g.…”
Section: The Empirical Link Between the Conduct And The Undesired Harmful Resultsmentioning
confidence: 99%
“…Útoky páchané osamělými vlky nemají jednotný rámec, nicméně lze je rozdělit do několika základních oblastí dle způsobu provedení a prevence, respektive maření těchto útoků je tak odvislé od zamýšlené realizace útoku, komunikace a prostředí pachatele (7,14).…”
Section: Prevenceunclassified