Results 41 to 50 of about 4,199 (192)

PROTOCOL: Interventions to Prevent Cognitive and Behavioural Violent Radicalisation: A Systematic Review and Multilevel Meta‐Analysis

open access: yesCampbell Systematic Reviews, Volume 21, Issue 3, September 2025.
ABSTRACT This is a protocol for a Campbell systematic review. This review aims to systematically evaluate the available evidence on the effectiveness of various interventions aimed at reducing violent radicalisation and terrorism. Quantitative analysis will be employed to assess the overall impact and identify the factors that influence it.
Sara Valdebenito, Manuel Eisner
wiley   +1 more source

Cyberterrorism

open access: yes, 2011
42 p. There is a great increase in the perception of terrorism after 9/11 and this includes cyber threats. In order to counter cyberterrorism, we need to understand how cyberterrorism work and how to counter it. This dissertation will explain what cyberterrorism is, differing views of what cyberterrorism comprises, the perpetrators of cyberterrorism ...
  +5 more sources

Cyberterrorism: the story so far [PDF]

open access: yes, 2003
This paper is concerned with the origins and development of the concept of cyberterrorism. It seeks to excavate the story of the concept through an analysis of both popular/media renditions of the term and scholarly attempts to define the borders of same.
Conway, Maura
core  

PROTOCOL: Situational Crime Prevention Measures to Prevent Terrorist Attacks Against Soft Targets and Crowded Places: An Evidence and Gap Map

open access: yesCampbell Systematic Reviews, Volume 21, Issue 2, June 2025.
ABSTRACT This is the protocol for a Campbell systematic review. The objectives are as follows. The EGM has three main objectives: (1) Identify the strength (in terms of evidence quality) and depth (in terms of volume of evidence) of evidence base on the efficacy of situational crime prevention measures in preventing terrorist attacks against soft ...
Zoe Marchment   +2 more
wiley   +1 more source

Combating Cybercrime and Cyberterrorism in Indonesia

open access: yesJurnal Hubungan Internasional, 2023
Cybercrime poses a serious risk to national security in Indonesia. The pervasive nature of cybercrime calls into question the efficacy of current regulatory measures.
Cynthia Shafira Hartati, Ali Muhammad
doaj   +1 more source

Meeting the Challenge of Cyberterrorism: Defining the Military Role in a Democracy [PDF]

open access: yes, 2002
Denna forskningskonsumtion strävar efter att utifrån två frågeställningar undersöka dels var det deliberativa samtalets möjligheter och begränsningar ligger, dels undersöka hur det deliberativa samtalet påverkar lärarrollen i klassrummet.
Dunlap, Charles J., Jr.
core   +1 more source

PROTOCOL: Effectiveness of Educational Programmes to Prevent and Counter Online Violent Extremist Propaganda in English, French, Spanish, Portuguese, German and Scandinavian Language Studies: A Systematic Review

open access: yesCampbell Systematic Reviews, Volume 21, Issue 2, June 2025.
ABSTRACT This protocol outlines a systematic review that aims to understand the effectiveness of educational programmes, delivered both online and offline, designed to prevent and counter the effects of online violent extremist propaganda in multiple languages. The primary objective is to assess the impact of interventions on reducing violent extremist
Felipe Pathé Duarte   +4 more
wiley   +1 more source

Cyberterrorism: content, forms and promising countermeasures

open access: yesBulletin of Kharkiv National University of Internal Affairs, 2023
The purpose of the study is to clarify the concept of cyber terrorism, its typical features and main forms, and to develop proposals for improving the system of countermeasures.
D. S. Melnyk
doaj   +1 more source

CYBERTERRORYZM ,,KONIEM TROJAŃSKIM” W DOBIE GLOBALIZACJI [PDF]

open access: yes, 2019
The aim of the article is the general characterization of cyberterrorism as a new and constantly evolving form of terrorism. The phenomenon was described in the context of globalization processes and the main definitions of terrorism were cited, followed
MAZURKIEWICZ, Bartosz
core   +2 more sources

Saudi Arabia and Iran: Spoilers or Enablers of Conflict?

open access: yesMiddle East Policy, Volume 32, Issue 1, Page 38-53, Spring 2025.
Abstract Saudi Arabia and Iran played roles, inadvertently or not, in enabling the Hamas terrorist attack on Israel in October 2023. Before the war that ensued, Tehran aided and funded Hamas and its military wing, the Izz al‐Din al‐Qassam Brigades. Riyadh shunned the group by arresting and extraditing its members in a bid to join the US‐backed Abraham ...
Banafsheh Keynoush
wiley   +1 more source

Home - About - Disclaimer - Privacy