Results 11 to 20 of about 4,199 (192)
An NLP-Based Framework to Spot Extremist Networks in Social Media
Governments and law enforcement agencies (LEAs) are increasingly concerned about growing illicit activities in cyberspace, such as cybercrimes, cyberespionage, cyberterrorism, and cyberwarfare.
Andrés Zapata Rozo +4 more
doaj +2 more sources
Criminal justice interventions for preventing radicalisation, violent extremism and terrorism: An evidence and gap map. [PDF]
Abstract Background Criminal justice agencies are well positioned to help prevent the radicalisation of individuals and groups, stop those radicalised from engaging in violence, and reduce the likelihood of terrorist attacks. This Evidence and Gap Map (EGM) presents the existing evidence and gaps in the evaluation research.
Sydes M +5 more
europepmc +2 more sources
Objective: the development of wireless technologies and digital infrastructure has radically changed the human habitat, giving rise to a new type of space -a cyberspace.
Ya. A. Abdelkarim
doaj +1 more source
WHERE ARE THE CHANGES IN EU CYBERSECURITY LEGISLATION LEADING?
Cybersecurity policy is a response to the growing instability of the virtual world and the threats emanating from this area. This article tries to show how changes in legislative and strategic provisions can affect the EU’s cybersecurity policy.
Izabela OLEKSIEWICZ +1 more
doaj +1 more source
Towards the Legal Protection of Critical Infrastructure in Africa Against Cyberwar and Cyberterrorism [PDF]
This article reviews the legal framework governing the protection of critical infrastructure in Africa with an emphasis on threats like cyberwar and cyberterrorism. As African governments and businesses increasingly depend on the internet and information
Bernard Ngalim
doaj +1 more source
ABSTRACT India's annexation of Indian‐administered Jammu and Kashmir in August 2019 has generated debates within Critical Kashmir Studies regarding the kind of settler colonialism that is operating in this disputed Himalayan region. To illuminate the current relationship between land dispossession and narratives that legitimize land grab (for the ...
Haris Zargar, Goldie Osuri
wiley +1 more source
Slowness as warfare: Towards a relational approach to political violence in the West Bank
Abstract Engaging with recent applications of the concept of slow violence to the ongoing political developments in the West Bank, this review article argues that the relational approach offered by feminist geopolitics facilitates the conception of slow violence and warfare as part of a single complex of violence.
Dorota Golańska
wiley +1 more source
Computer crime motives: Do we have it right?
Abstract Academic, legal and practitioner responses to cyber threats have been predominantly reactive, punitive, and deterrence‐based, with limited attention given to the motives underlying computer criminals' behaviors. This paper reasons that new and better theoretical perspectives are needed to explain computer criminals' motives. Following a review
Derrick Neufeld
wiley +1 more source
Understanding the European Union's Perception of the Threat of Cyberterrorism: A Discursive Analysis
Abstract This article analyses the European Union's (EU) construction of the threat of cyberterrorism. Through the application of interpretive discourse analysis, the article identifies several key strands that underpin the construction of the cyberterrorist threat within the political and security institutions of the EU.
Christopher Baker‐Beall, Gareth Mott
wiley +1 more source
Internet safety, online radicalisation and young people with learning disabilities
Accessible Summary A lot of people with learning disabilities enjoy using the Internet every day and use social media on their mobile phones. Staying safe online is important. This research used interviews and focus groups to find out what children, young people, their parents and teachers thought about Internet safety, extremism and online ...
Sue Caton, Roderick Landman
wiley +1 more source

