ADDITIONAL RESOURCES
The International Cyber Terrorism Regulation Project (ICTRP)
Deborah Housen-Couriel, Boaz Ganor, Uri Ben Yaakov, Stevie Weinberg and Dafne Beri, RUSI, The Global Research Network on Terrorism and Technology (GRNTT), 31 July 2019
Terrorism, Social Media, and the El Paso Tragedy
David P. Fidler, Council on Foreign Relations, August 6, 2019
Analysis: What can we learn from the online response to the Halle terrorist attack?
Tech Against Terrorism, October 15, 2019
Following the Whack-a-Mole: Britain First’s Visual Strategy from Facebook to Gab
Lella Nouri, Nuria Lorenzo-Dus, and Amy-Louise Watkin, Global Research Network on Terrorism and Technology: Paper No. 4, RUSI, July 4, 2019
EUROPOL: Terrorism Situation and Trend Report (TE-SAT) 2019
European Union Agency for Law Enforcement Cooperation (EUROPOL), 2019
Shedding Light on Terrorist and Extremist Content Removal
Isabelle van der Vegt, Paul Gill, Stuart Macdonald and Bennett Kleinberg, Global Research Network on Terrorism and Technology: Paper No. 3, RUSI, July 3, 2019
Regulating Terrorist Content on Social Media: Automation and the Rule of Law
Stuart Macdonald, Sara Giro Correia and Amy-Louise Watkin, International Journal of Law in Context, 15 (2): 183-197 (2019)
An Examination of a Potential Connection between the Trafficking of Women on the Darknet and the Financing of Terrorism
Nadine Liv, International Institute for Counter-Terrorism (ICT), April 18, 2019
Hate Speech on Social Media: Global Comparisons
Zachary Laub, Council on Foreign Relations, June 7, 2019
Encrypted Extremism – Inside the English-Speaking Islamic State Ecosystem on Telegram
Bennett Clifford and Helen Powell, Program on Extremism, The George Washington University, June 2019
The Urgent Need to Counter Terrorism on the Internet
Nikhil Raj Aggrawal, Observer Research Foundation, May 28, 2019
Social Learning and Social Control in the Off- and Online Pathways to Hate Crime and Terrorist Violence
Colleen E. Mills, Joshua D. Freilich, Steven M. Chermak, Thomas J. Holt & Gary LaFree, Studies in Conflict & Terrorism, (2019).
Doxing and Defacements: Examining the Islamic State’s Hacking Capabilities
Audrey Alexander and Bennett Clifford, Combating Terrorism Center, CTCSENTINEL, Volume 12, Issue 4, April 2019
Threats and Legal Response Against Cyber Terrorism
Vaishnavi Aggarwal, International Journal of Research and Analytical Reviews (IJRAR), 6(1): 124-128, March 4, 2019
Crossroads: Counter-terrorism and the Internet
Brian Fishman, Texas National Security Review, The Strategist, Volume 2, Issue 2, April 2019
Disrupting Daesh: Measuring Takedown of Online Terrorist Material and Its Impacts
Maura Conway, Moign Khawaja, Suraj Lakhani, Jeremy Reffin, Andrew Robertson and David Weir, Studies in Conflict & Terrorism, 42 (1-2): 141-160 (2019)
Cyber Crime and Cyber Terrorism
Robert W. Taylor, Eric J. Fritsch, John Liederbach, Michael R., William Tayofa, Pearson Education, Fourth Edition, 2019
Locating Cyberterrorism: How Terrorism Researchers Use and View the Cyber Lexicon
Lee Jarvis and Stuart Macdonald, Perspectives on Terrorism, 8(3): 52-65, (2014)
Terrorist Incitement on the Internet
Alexander Tsesis, Loyola University School of Law, Fordham Law Review, 86(2): 367-377 (2017)
Analysis: New Zealand attack and the terrorist use of the internet
Tech Against Terrorism, March 26, 2019
Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research
Maura Conway, Studies in Conflict & Terrorism, 40(1): 77-98 (2017)
Introduction to the Special Issue: Terrorist Online Propaganda and Radicalization
Anne Aly, Stuart Macdonald, Lee Jarvis & Thomas M. Chen, Studies in Conflict & Terrorism, 40(1): 1-9 (2017)
Public–Private Collaboration to Counter the Use of the Internet for Terrorist Purposes: What Can be Learnt from Efforts on Terrorist Financing?
Florence Keen, Royal United Services Institute for Defence and Security Studies (RUSI), Global Research Network on Terrorism and Technology: Paper No. 1, 2019
The European Union’s Policies on Counter-Terrorism: Relevance, Coherence and Effectiveness
The Policy Department for Citizens’ Rights and Constitutional Affairs. The European Parliament, Committee on Civil Liberties, Justice and Home Affairs, January 2017
Where the Truth Lies – News in the Era of Social Media and “the Economy of Attention”
Tim Stuchtey and Alexander Szanto, the American Institute for Contemporary German Studies (AICGS), February 11, 2019
Statement for the Record: Worldwide Threat Assessment of the US Intelligence Community
Daniel R. Coats, Director of National Intelligence, Office of the Director of National Intelligence, United States of America, January 29, 2019
Developing an explanatory model for the process of online radicalisation and terrorism
Robyn Torok, Security Informatics, 2(6): 1-10 (2013)
Recommendations for the European Parliament’s Draft Report on the Regulation on preventing the dissemination of terrorist content online
European Digital Rights (EDRI), December 2018
New EU Proposal on the Prevention of Terrorist Content Online: An Important Mutation of the E-Commerce Intermediaries’ Regime
Joan Barata, Intermediary Liability Fellow, The Center for Internet and Society (CIS), Stanford Law, October 2018
Terrorist Use of the Internet by the Numbers: Quantifying Behaviors, Patterns, and Processes
Paul Gill, Emily Corner, Maura Conway, Amy Thornton, Mia Bloom, John Horgan, Criminology & Public Policy, 16(1): 99-117 (2017)
Germany’s NetzDG: A Key Test for Combatting Online Hate
William Echikson and Olivia Knodt, Centre for European Policy Studies (CEPS), November 2018
ENISA Threat Landscape Report 2018: 15 Top Cyberthreats and Trends
The European Union Agency for Network and Information Security (ENISA), January 28, 2019
Applying Local Image Feature Descriptors to Aid the Detection of Radicalization Processes in Twitter
Paper presented at the 2nd European Counter-Terrorism Centre (ECTC) Advisory Group conference, Europol Headquarters, The Hague, April 17-18, 2018
Using Fuzzy Sets for Detecting Cyber Terrorism and Extremism in the Text
Vahide Nida Uzel, Esra Saraç Eşsiz, Selma Ayşe Özel, Innovations in Intelligent Systems and Applications Conference (ASYU), October 4-6, 2018
Fighting Cyber Terrorism: Comparison of Turkey and Russia
Melih Burak Bicak, Daria Bogdanova, International Congress on Big Data, Deep Learning and Fighting Cyber Terrorism, Ankara, Turkey, December 3-4, 2018
Who disseminates Rumiyah? Examining the relative influence of sympathiser and non-sympathiser Twitter users
Paper presented at the 2nd European Counter Terrorism Centre (ECTC) Advisory Group conference, Europol Headquarters, The Hague, April 17-18, 2018
2018 Addenda to the 2015 Madrid Guiding Principles
The United Nations, December 27, 2018
The Proposed Regulation on Preventing the Dissemination of Terrorist Content Online: Safeguards and Risks for Freedom of Expression
Dr. Aleksandra Kuczerawy, The Center for Democracy and Technology (CDT), December 6, 2018
Going Darker? The Challenge of Dark Net Terrorism
Prof. Gabriel Weimann, Woodrow Wilson International Center For Scholars, 2018
Regulating Cybercrime through Law Enforcement and Industry Mechanisms
Thomas J. Holt, Annals, The American Academy of Political and Social Science, 679(1): 140-157 (2018)
Cyber Terrorism: Assessment of the Threat to Insurance
Cambridge Centre for Risk Studies, Cyber Terrorism Insurance Futures, November 2017
United to Deter: Dealing With New Means of Supporting Terror
Frank A. Florio, University of Miami International and Comparative Law Review, 25(1): 127-157 (2018)
Extremist Content and the ICT Sector: A Global Network Initiative Policy Brief
Global Network Initiative, November 2016
Cyber Terrorism in Indonesia
Katya Lindi Chandrika, Risky Perdana Adiperkasa, and Yana Ningtyas, Bulletin of Social Informatics Theory and Application, 2(2): 65-72 (2018)
Cyberizing Counter-terrorism Legislation and Policy: National and International Developments
Deborah Housen-Couriel, September 25, 2017
Digital Counterterrorism: Fighting Jihadists Online
Bipartisan Policy Center, March 2018
To Catch a Hacker: Toward a comprehensive strategy to identify, pursue, and punish malicious cyber actors
Mieke Eoyang, Allison Peters, Ishan Mehta, and Brandon Gaskew, Third Way, 29 October, 2018
The Psychological Effects of Cyber Terrorism
Michael L. Gross, Daphna Canetti, and Dana R. Vashdi, Bull At Sci., 72(5): 284–291 (2016)
Countering Islamic State Exploitation of the Internet
David P. Fidler, Council of Foreign Affairs, June 18, 2015.
The Emerging Threat of Cyberterrorism
Kendall Galbraith, Australian Institute of International Affairs, 29 June, 2018
A Public Policy Perspective of the Dark Web
Michael Chertoff, Journal of Cyber Policy, 2(1): 26-38 (2017)