13_tinnes

IV. Resources

Bibliography: Terrorism and the Media (including the Internet)
(Part 3)

Compiled and selected by Judith Tinnes

[Bibliographic Series of Perspectives on Terrorism - BSPT-JT-2016-5]

Abstract

This bibliography contains journal articles, book chapters, books, edited volumes, theses, grey literature, bibliographies and other resources on the multi-faceted relationship between terrorism and the media, including social media and the Internet. To keep up with the rapidly changing media landscape (particularly social media) and the technological developments in the online environment, more recent publications have been prioritized during the selection process. The literature has been retrieved by manually browsing more than 200 core and periphery sources in the field of Terrorism Studies. Additionally, full-text and reference retrieval systems have been employed to expand the search.

Keywords: bibliography; resources, literature; media; Internet; social media; terrorism; electronic jihad; cyberterrorism; narratives; counter-narratives

NB: All websites were last visited on 17.09.2016. This subject bibliography is conceptualized as a multi-part series (for earlier bibliographies, see: Part 1 and Part 2). To avoid duplication, this compilation only includes literature not contained in the previous parts. However, meta-resources, such as bibliographies, were also included in the sequels.–See also Note for the Reader at the end of this literature list.

Bibliographies and other Resources

Alali, Andy Odasuo; Byrd, Gary W. (1994): Terrorism and the News Media: A Selected, Annotated Bibliography. Jefferson: McFarland.

Al-Tamimi, Aymenn Jawad (2012, November-): Aymenn Jawad Al-Tamimi’s Blog. URL: http://www.aymennjawad.org

Al-Zaky, Ahmad (2009, March-): @AhmadAlZ. URL: https://twitter.com/ahmadalz

Andrusyszyn, Greta H. (2009, December): Cyber and High Tech. In: Terrorism: A Selected Bibliography. Carlisle: U.S. Army War College Library, 15-17. URL: http://www.carlisle.army.mil/library/bibs/terror09.pdf

Anonymous (2013, May-): Erasmus Monitor. URL: http://erasmus-monitor.blogspot.de

Anzalone, Christopher (2005, March-): Views from the Occident. URL: http://occident.blogspot.de

Anzalone, Christopher (2009, May-): @IbnSiqilli. URL: https://twitter.com/IbnSiqilli

Berger, J. M. (2004-): INTELWIRE. URL: http://intelwire.com

Cyberterrorism Project, The (2012, September-): The Cyberterrorism Project Site. URL: http://www.cyberterrorism-project.org

El Damanhoury, Karim (2009, June-): @karimdamanhoury. URL: https://twitter.com/karimdamanhoury

Flade, Florian (2010, September-): [email protected] URL: http://ojihad.wordpress.com

Fossum, Lori (2013, September): Cyber Conflict Bibliography. (GWU Law School Public Law Research Paper). DOI: http://dx.doi.org/10.2139/ssrn.2320598

Hassan, Muhammad Haniff (2007, March-): counterideology 2. URL: http://counterideology2.wordpress.com

Hegghammer, Thomas (2015, May-). The Bored Jihadi. URL: http://boredjihadi.tumblr.com

Higgins, Eliot et al. (2014, July-): Bellingcat. URL: https://www.bellingcat.com

IntelCenter (2002-): Free Reports & Maps. URL: http://intelcenter.com/reports-charts.html

International Institute for Counter-Terrorism (ICT)’s Jihadi Websites Monitoring Group (JWMG) (2008, September-): JWMG Reviews. URL: www.ict.org.il/ContentWorld.aspx?ID=21

J. Faraday (2012, August-): @CTstudies. URL: https://twitter.com/CTstudies

Kohlmann, Evan (2009, March-): @IntelTweet. URL: https://twitter.com/IntelTweet

Lohlker, Rüdiger (2013, May-): Cybarabia. URL: https://arabiacyberia.wordpress.com

McCants, William et al. (Eds.) (2008, May-): Jihadica. URL: http://www.jihadica.com

Mendelsohn, Barak et al. (2010-): Global Terrorism Research Project (GTRP). URL: http://gtrp.haverford.edu

Musharbash, Yassin (2012, March-): Abu Susu’s Blog. URL: http://www.abususu.blogspot.de

Nanninga, Pieter (2009, March-): @pieternanninga. URL: https://twitter.com/pieternanninga

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part I. Political Communication, 4(1), 65-69. DOI: http://dx.doi.org/10.1080/10584609.1987.9962808

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part II. Political Communication, 4(2), 141-152. DOI: http://dx.doi.org/10.1080/10584609.1987.9962816

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part III. Political Communication, 4(3), 217-221. DOI: http://dx.doi.org/10.1080/10584609.1987.9962824

Picard, Robert G.; Sheets, Rhonda S. (1987): Terrorism and the News Media: A Research Bibliography Part IV. Political Communication, 4(4), 325-326. DOI: http://dx.doi.org/10.1080/10584609.1987.9962832

Price, Eric (2012, March): Literature on Terrorism, Media, Propaganda & Cyber-Terrorism. Perspectives on Terrorism, 6(1), 92-103. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/price-literature-terrorism-media

Prucha, Nico (2015, February-). @NicoPrucha. URL: https://twitter.com/NicoPrucha

Pye, Graeme; Korstanje, Maximiliano (Eds.-in-Chief) (2011-): International Journal of Cyber Warfare and Terrorism (IJCWT). (p-ISSN: 1947-3435, e-ISSN: 1947-3443). URL: http://www.igi-global.com/journal/international-journal-cyber-warfare-terrorism/1167

Roggio, Bill et al. (Eds.) (2007-): The Long War Journal. URL: http://www.longwarjournal.org

Signorielli, Nancy; Gerbner, George (1988): Violence and Terror in the Mass Media: An Annotated Bibliography. (Bibliographies and Indexes in Sociology, No. 13). West Port: Greenwood Press.

SITE Intelligence Group (2002-). SITE Services. URL: http://www.siteintelgroup.com

Tehan, Rita (2015, April): Cybersecurity: Authoritative Reports and Resources, by Topic. (CRS Report for Congress R42507). URL: http://www.fas.org/sgp/crs/misc/R42507.pdf

Terrormonitor.org (2015, March-): @Terror_Monitor. URL: https://twitter.com/Terror_Monitor

Tinnes, Judith (2013, February): Terrorism and the Media (including the Internet): An Extensive Bibliography. Perspectives on Terrorism, 7(1, Suppl.), S1-S295. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/247

Tinnes, Judith (2014, August): Bibliography on Islamist Narratives and Western Counter-Narratives (Part 1). Perspectives on Terrorism, 8(4), 111-145. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/366

Tinnes, Judith (2014, December): Bibliography: Terrorism and the Media (including the Internet) (Part 2). Perspectives on Terrorism, 8(6), 82-113. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/392

Tinnes, Judith (2016, February-): Counting Lives Lost – Statistics of Camera-Recorded Extrajudicial Executions by the „Islamic State“. [Monitoring Project]. Perspectives on Terrorism, 10(1). URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/483

USC Center on Public Diplomacy (CPD); Clingendael Institute (2014, Summer): The Digital Diplomacy Bibliography. CPD Monitor, 6(3). URL: http://uscpublicdiplomacy.org/pdin_monitor_issue/digital-diplomacy-bibliography

Van Dijk, Teun A. (2006, March): Bibliography Terrorism and the Mass Media. (Version 2.0). URL: http://www.discursos.org/Bib/Biblio-Terrorism-Media.htm

Van Ostaeyen, Pieter (2012, October-): pietervanostaeyen: Musings on Arabism, Islamicism, History and Current Affairs. URL: https://pietervanostaeyen.wordpress.com

VOX-Pol Network of Excellence (NoE) (2014-): VOX-Pol Online Library. URL: http://voxpol.eu/library

Winter, Charlie (2013, July-): @charliewinter. URL: https://twitter.com/charliewinter

WNYC – On The Media (2016, May 27). Kidnapped. [Radio Program Episode]. URL: http://www.wnyc.org/story/on-the-media-2016-05-27

Zelin, Aaron Y. (2008, July-): @azelin. URL: https://twitter.com/azelin

Zelin, Aaron Y. (2010, June-): Jihadology. URL: http://jihadology.net

Zelin, Aaron Y. et al. (2010, November-): al-Wasat. URL: https://thewasat.wordpress.com

Books and Edited Volumes

Aggarwal, Neil Krishan (2016): The Taliban’s Virtual Emirate: The Culture and Psychology of an Online Militant Community. New York: Columbia University Press.

Aly, Anne et al. (Eds.) (2016): Violent Extremism Online: New Perspectives on Terrorism and the Internet. (Media, War and Security). Abingdon: Routledge.

Ansorge, Josef Teboho (2016): Identify and Sort: How Digital Power Changed World Politics. New York: Oxford University Press.

Atwan, Abdel Bari (2015): Islamic State: The Digital Caliphate. (Updated ed.). London: Saqi Books.

Bartlett, Jamie (2014): The Dark Net. London: William Heinemann.

Beifuss, Artur; Bellini, Francesco Trivini (2013): Branding Terror: The Logotypes and Iconography of Insurgent Groups and Terrorist Organizations. New York: Merrell.

Berman, Paul (2011): The Flight of the Intellectuals: The Controversy over Islamism and the Press. Brooklyn: Melville House.

Bharat, Meenakshi (2016): Troubled Testimonies: Terrorism and the English Novel in India. Abingdon: Routledge.

Bouchard, Martin (Ed.) (2015): Social Networks, Terrorism and Counter-Terrorism: Radical and Connected. (Contemporary Terrorism Studies). Abingdon: Routledge.

Briant, Emma Louise (2015): Propaganda and Counter-Terrorism: Strategies for Global Change. Manchester: Manchester University Press.

Chen, Thomas M.; Jarvis, Lee; Macdonald, Stuart (Eds.) (2014): Cyberterrorism: Understanding, Assessment, and Response. New York: Springer.

Cohen-Almagor, Raphael (2015): Confronting the Internet’s Dark Side: Moral and Social Responsibility on the Free Highway. New York: Cambridge University Press.

Committee to Protect Journalists (CPJ) (2015): Attacks on the Press: Journalism on the World’s Front Lines. (2015 Edition). Hoboken: John Wiley & Sons.

Cunningham, Daniel; Everton, Sean; Murphy, Philip (2016): Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis. Lanham: Rowman & Littlefield.

Grishman, Paul (2010): Cyber Terrorism: The Use of the Internet for Terrorist Purpose. New Delhi: Axis Publications.

Hawkins, Virgil (2008): Stealth Conflicts: How the World’s Worst Violence is Ignored. Aldershot: Ashgate.

Hochberg, Gil Z. (2015): Visual Occupations: Violence and Visibility in a Conflict Zone. (Perverse Modernities). Durham: Duke University Press.

Hoffmann, Julia; Hawkins, Virgil (2015): Communication and Peace: Mapping an Emerging Field. (Routledge Studies in Peace and Conflict Resolution). Abingdon: Routledge.

Holt, Thomas J.; Burruss, George W.; Bossler, Adam M. (2015): Policing Cybercrime and Cyberterror. Durham: Carolina Academic Press.

Jarvis, Lee; Macdonald, Stuart; Chen, Thomas M. (2015): Terrorism Online: Politics, Law and Technology. (Routledge Studies in Conflict, Security and Technology). Abingdon: Routledge.

Jeffords, Susan; Al-Sumait, Fahed (Eds.) (2015): Covering Bin Laden: Global Media and the World’s Most Wanted Man. Urbana: University of Illinois Press.

Just, Janis (2015): Jihad 2.0: The Impact of Social Media on the Salafist Scene and the Nature of Terrorism. Hamburg: Anchor Academic Publishing.

Kampf, Zohar; Liebes, Tamar (Eds.) (2013): Transforming Media Coverage of Violent Conflicts: The New Face of War. Basingstoke: Palgrave Macmillan.

Keles, Janroj Yilmaz (2015): Media, Diaspora and Conflict: Nationalism and Identity amongst Turkish and Kurdish Migrants in Europe. (International Library of Migration Studies). London: I.B. Tauris.

Kelsey, Darren (2015): Media, Myth and Terrorism: A Discourse-Mythological Analysis of the “Blitz Spirit” in British Newspaper Responses to the July 7th Bombings. Basingstoke: Palgrave Macmillan.

Khader, Majeed et al. (2016): Combating Violent Extremism and Radicalization in the Digital Era. Hershey: IGI Global. DOI: http://doi.org/10.4018/978-1-5225-0156-5

Kuntsman, Adi; Stein, Rebecca L. (2015): Digital Militarism: Israel’s Occupation in the Social Media Age. (Stanford Studies in Middle Eastern and Islamic Societies and Cultures). Stanford: Stanford University Press.

Linera, Rafael et al. (Eds.) (2016, May): Counter-Da’esh Influence Operations: Cognitive Space Narrative Simulation Insights. (SMA White Paper). Boston: NSI. URL: http://nsiteam.com/social/wp-content/uploads/2016/06/C-ISIL-Simulation-Whitepaper-Jun2016-Final5.compressed.pdf

Lohlker, Rüdiger; Abu-Hamdeh, Tamara (Eds.) (2014): Jihadi Thought and Ideology. (Jihadism and Terrorism, Vol. 1). Berlin: Logos.

Mastors, Elena (2014): Breaking Al-Qaeda: Psychological and Operational Techniques. (2nd ed.). Boca Raton: CRC Press.

Matusitz, Jonathan (2015): Symbolism in Terrorism: Motivation, Communication, and Behavior. (Security and Professional Intelligence Education Series). Lanham: Rowman & Littlefield.

McLeod, Douglas M.; Shah, Dhavan V. (2015): News Frames and National Security: Covering Big Brother. (Communication, Society and Politics). New York: Cambridge University Press.

Miller, Flagg (2015): The Audacious Ascetic: What the Bin Laden Tapes Reveal about Al-Qa’ida. New York: Oxford University Press.

Nacos, Brigitte L. (2016): Mass-Mediated Terrorism: Mainstream and Digital Media in Terrorism and Counterterrorism. (3rd ed.). Lanham: Rowman & Littlefield.

Nasr, Sara; Abdelmoula, Ezzeddine (2013): Academic Research about Al Jazeera: PhDs, Masters, Books & Research Papers 1996-2012. (2nd ed.). [e-Book]. Beirut: Arab Scientific Publishers. URL: http://studies.aljazeera.net/mritems/Documents/2013/8/5/20138582257502580EN%20-%20Academic%20Research.pdf

Ogun, Mehmet Nesip (Ed.) (2015): Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses. (NATO Science for Peace and Security Series – D: Information and Communication Security, Vol. 42). Amsterdam: IOS Press.

Pak Institute for Peace Studies (PIPS) (2014): Media Safety in Pakistan: A Study of Threats to Journalists in Pakistan. [e-Book]. Islamabad: Pak Institute for Peace Studies (PIPS); International Media Support (IMS). URL: http://san-pips.com/download.php?f=251.pdf

Pieslak, Jonathan (2015): Radicalism and Music: An Introduction to the Music Cultures of al-Qa’ida, Racist Skinheads, Christian-Affiliated Radicals, and Eco-Animal Rights Militants. Middletown: Wesleyan University Press.

Ressa, Maria A. (2013): From Bin Laden to Facebook: 10 Days of Abduction, 10 Years of Terrorism. (International ed.). London: Imperial College Press.

Sgrena, Giuliana (2006): Friendly Fire: The Remarkable Story of a Journalist Kidnapped in Iraq, Rescued by an Italian Secret Service Agent, and Shot by U.S. Forces. Chicago: Haymarket Books.

Shaw, Tony (2015): Cinematic Terror: A Global History of Terrorism on Film. New York: Bloomsbury Academic.

Smith, Allison G. (Ed.) (2013): The Relationship between Rhetoric and Terrorist Violence. Abingdon: Routledge.

Stevens, David; O’Hara, Kieron (2015): The Devil’s Long Tail: Religious and other Radicals in the Internet Marketplace. London: Hurst.

Tuck, Henry; Silverman, Tanya (2016): The Counter-Narrative Handbook. [e-Book]. London: Institute for Strategic Dialogue (ISD). URL: http://www.strategicdialogue.org/wp-content/uploads/2016/06/Counter-narrative-Handbook_1.pdf

Weimann, Gabriel (2015): Terrorism in Cyberspace: The Next Generation. Washington, DC; New York: Woodrow Wilson Center Press; Columbia University Press.

Theses

Alshathry, Talal (2015): A Comparative Framing Analysis of ISIL in the Online Coverage of CNN and Al-Jazeera. (Master’s Thesis, Iowa State University, Ames, United States). URL: http://lib.dr.iastate.edu/etd/14683

Anaya, Kala Kristina Hartman (2015, July): Persuasion Strategies in Terrorist Recruitment: The Case of ISIS. (Master’s Thesis, Leiden University, Leiden, The Netherlands). URL: https://openaccess.leidenuniv.nl/handle/1887/35008

Anfinson, Nadia Adnan (2015, July): “In the Words of the Enemy”: Mediatising the Islamic State in Dabiq. (Master’s Thesis, University of Hong Kong, Hong Kong). URL: http://hdl.handle.net/10722/221289

Anonymous (2015, August): Beyond Consumption of Violence: Performativity of ISIS’ Atrocities against Hostages in Execution Videos from 2014-2015. (Master’s Thesis, Utrecht University, Utrecht, The Netherlands). URL: http://dspace.library.uu.nl:8080/handle/1874/317723

Campbell, Sasha K. (2015): Domestic Terrorism in the Canadian News Media: A Framing Analysis of Canadian-Connected Terrorism in 2013 Newspaper Articles. (Master’s Thesis, University of Waterloo, Waterloo, Canada). URL: http://hdl.handle.net/10012/10240

Cannata, Katie (2014, November): Jihad in the Global Village: Al-Qaeda’s Digital Radicalization and Recruitment Campaign. (Honors Thesis, University of Nevada, Las Vegas, United States). URL: http://digitalscholarship.unlv.edu/honors_theses/22

Carter, Savannah (2015, June): An Analysis of the Parallel Frames in the Media Used to Describe Communism in the Early Cold War and Terrorism in the Post-9/11 Era. (Bachelor’s Thesis, University of Oregon, Eugene, United States). URL: http://hdl.handle.net/1794/19070

DeFoster, Ruth (2015, June): Terrorizing the Masses: Identity, Mass Shootings, and the Media Construction of “Terror”. (Doctoral Thesis, University of Minnesota, Minneapolis, United States). URL: http://hdl.handle.net/11299/175415

Ducol, Benjamin (2015, February): Devenir jihadiste à l’ère numérique: Une approche processuelle et situationnelle de l’engagement jihadiste au regard du Web. (Doctoral Thesis, Université Laval, Quebec, Canada). URL: http://www.theses.ulaval.ca/2015/31398

Gobran, Ashraf (2015, May): Cyber Terrorism Threats. (Master’s Thesis, Utica College, Utica, United States). URL: http://pqdtopen.proquest.com/pqdtopen/doc/1683128117.html?FMT=ABS&pubnum=1588500

Hider, Brian Paul (2015, Fall): Symbolic Warfare: ISIL Visual Rhetoric in “Flames of War”. (Master’s Thesis, San Diego State University, San Diego, United States). URL: http://hdl.handle.net/10211.3/163220

Kapuscinski, Grzegorz (2014, May): The Effects of News Media on Leisure Tourists’ Perception of Risk and Willingness to Travel, with Specific Reference to Events of Terrorism and Political Instability. (Doctoral Thesis, Bournemouth University, Poole, United Kingdom). URL: http://eprints.bournemouth.ac.uk/21778

Martin, Matthew Allen (2015, December): Conflict Politics Surrounding the Advent of ISIS: An Iranian Media Perspective. (Master’s Thesis, The University of Texas at Austin, Austin, United States). URL: http://hdl.handle.net/2152/34150

Morris, William Travis (2011, July): Breaking the Criminogenic Code: A Frame Analysis of Neo-Nazi and Violent Jihadi Propaganda. (Doctoral Thesis, University of Nebraska Omaha, Omaha, United States). URL: http://pqdtopen.proquest.com/pubnum/3465747.html

Neiteler, Vincent (2014, December): The Justification of the New Terrorism Label: Al-Qaeda’s Application of New Media as Defining Factor of New Terrorism. (Master’s Thesis, Leiden University, Leiden, The Netherlands). URL: http://hdl.handle.net/1887/32227

Prucha, Nico (2015): Online Territories of Terror – How Jihadist Movements Project Influence on the Internet and Why it Matters Off-line. (Doctoral Thesis, Universität Wien, Vienna, Austria). URL: http://othes.univie.ac.at/36565

Sahhar, Micaela Elise (2015, October): Occupied Narrative: On Western Media Collusion with Israel’s “Wars” and Recovering the Palestinian Story. (Doctoral Thesis, University of Melbourne, Melbourne, Australia). URL: http://hdl.handle.net/11343/58374

Samerdyke, Olivia (2016, May): Information vs. Propaganda: An Analysis of the Washington Post’s Reporting of the Islamic State. (Master’s Thesis, Bowling Green State University, Bowling Green, United States). URL: http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1459512198

Shuaibi, Nourah (2015): Symbiotic Relationship Revisited: A Study on the Impact of Mass Media on Terrorism in the Transatlantic Region. (Master’s Thesis, University of North Carolina at Chapel Hill, Chapel Hill, United States). URL: https://cdr.lib.unc.edu/record/uuid:6fde3a6d-ca7b-4b9d-a639-47a51d4c41b3

Swiffen, Timothy (2010, September): Spectacular Sacrifice: Death in Images. (Master’s Thesis, University of Windsor, Windsor, Canada). URL: http://scholar.uwindsor.ca/etd/58

Thomas, Lisa (2014, November): The UK Media-State Nexus in the Context of Post-9/11 Terrorism Policy. (Doctoral Thesis, University of Bedfordshire, Luton, United Kingdom). URL: http://hdl.handle.net/10547/565808

Tuckey, Britt Rina (2016, Spring): Cultivating Collective Identity Online: An Analysis of Pro-Islamic State Discourse on Twitter. (Master’s Thesis, Simon Fraser University, Burnaby, Canada). URL: http://summit.sfu.ca/item/16241

Veerasamy, Namosha (2014, September): CLC – Cyberterrorism Life Cycle Model. (Doctoral Thesis, University of Johannesburg, Johannesburg, South Africa). URL: http://hdl.handle.net/10210/12393

Verhaar, Paul (2016, June): Radical Reddits: Into the Minds of Online Radicalised Communities. (Master’s Thesis, Utrecht University, Utrecht, The Netherlands). URL: http://dspace.library.uu.nl/handle/1874/336681

Walli, Jamil (2015, June): The Psychology of Detachment and Hyperreality: Analysing ISIL’s Propaganda. (Bachelor’s Thesis, Linnaeus University, Växjö, Sweden). URL: http://lnu.diva-portal.org/smash/record.jsf?pid=diva2%3A820361&dswid=6327

Witmer, Eric W. (2016, August): Terror on Twitter: A Comparative Analysis of Gender and the Involvement in Pro-Jihadist Communities on Twitter. (Master’s Thesis, University of Western Ontario, London, Canada). URL: http://ir.lib.uwo.ca/sociology_masrp/8/

Zhang, Xu (2015, August): Media Coverage of the ISIS Threat: Transnational Media and Global Journalism. (Master’s Thesis, Texas Tech University, Lubbock, United States). URL: http://hdl.handle.net/2346/63649

Journal Articles and Book Chapters

Abdul-Nabi, Zainab (2015, December): Based on the Peace Journalism Model: Analysis of Al-Jazeera’s Coverage of Bahrain’s Uprising and Syria’s Chemical Attack. Global Media and Communication, 11(3), 271-302. DOI: http://doi.org/10.1177/1742766515606300

Adelkhah, Nima (2016, May): Iran and its Cyber-Terrorism Strategies. Terrorism Monitor, 14(10), 6-7. URL: http://www.jamestown.org/uploads/media/Terrorism_Monitor_Volume_XIV_Issue_02.pdf

Agarwal, Swati; Sureka, Ashish (2015): Topic-Specific YouTube Crawling to Detect Online Radicalization. In: Wanming Chu; Shinji Kikuchi; Subhash Bhalla (Eds.): Databases in Networked Information Systems: 10th International Workshop, DNIS 2015, Aizu-Wakamatsu, Japan, March 23-25, 2015: Proceedings. (Lecture Notes in Computer Science, Vol. 8999). Cham: Springer, 133-151. DOI: http://doi.org/10.1007/978-3-319-16313-0_10

Agarwal, Swati; Sureka, Ashish (2015): Using KNN and SVM Based One-Class Classifier for Detecting Online Radicalization on Twitter. In: Raja Natarajan; Gautam Barua; Manas Ranjan Patra (Eds.): Distributed Computing and Internet Technology: 11th International Conference, ICDCIT 2015, Bhubaneswar, India, February 5-8, 2015: Proceedings. (Lecture Notes in Computer Science, Vol. 8956). Cham: Springer, 431-442. DOI: http://doi.org/10.1007/978-3-319-14977-6_47

Aistrope, Tim (2016): Social Media and Counterterrorism Strategy. Australian Journal of International Affairs, 70(2), 121-138. DOI: http://doi.org/10.1080/10357718.2015.1113230

Alagha, Joseph (2013, January): Jihad through “Music”: The Taliban and Hizbullah. Performing Islam, 1(2), 263-289. DOI: http://doi.org/10.1386/pi.1.2.263_1

Al-Khateeb, Samer; Agarwal, Nitin (2015, March): Analyzing Deviant Cyber Flash Mobs of ISIL on Twitter. In: Nitin Agarwal; Kevin Xu; Nathaniel Osgood (Eds.): Social Computing, Behavioral-Cultural Modeling, and Prediction: 8th International Conference, SBP 2015, Washington, DC, USA, March 31-April 3, 2015: Proceedings. (Lecture Notes in Computer Science, Vol. 9021). Cham: Springer, 251-257. DOI: http://doi.org/10.1007/978-3-319-16268-3_26

Al-Khateeb, Samer; Agarwal, Nitin (2015, November): Examining Botnet Behaviors for Propaganda Dissemination: A Case Study of ISIL’s Beheading Videos-Based Propaganda. In: Peng Cui et al. (Eds.): 15th IEEE International Conference on Data Mining Workshop (ICDMW 2015), 14-17 November 2015, Atlantic City, New Jersey: Proceedings. [e-Book]. Los Alamitos: IEEE, 51-57. DOI: http://doi.org/10.1109/ICDMW.2015.41

Al Mazari, Ali et al. (2016): Cyber Terrorism Taxonomies: Definition, Targets, Patterns, Risk Factors, and Mitigation Strategies. International Journal of Cyber Warfare and Terrorism, 6(1), 1-12. DOI: http://doi.org/10.4018/IJCWT.2016010101

Al Nahed, Sumaya (2016, April): Framing the Libyan Uprising: A Comparison between Al Jazeera Arabic’s and BBC Arabic’s Coverage of the 2011 Uprising and Ensuing NATO Intervention. Journal of Arab & Muslim Media Research, 9(1), 119-137. DOI: http://doi.org/10.1386/jammr.9.1.119_1

al-Qarawee, Harith Hasan (2016, March): The Media, Methods and Messages of the Islamic State’s Communication Strategy. In: Hedwig Giusto (Ed.): Daesh and the Terrorist Threat: From the Middle East to Europe. [e-Book]. Brussels; Rome: Foundation for European Progressive Studies (FEPS); Fondazione Italianieuropi, 97-107. URL: http://www.feps-europe.eu/en/publications/details/376

Al Raffie, Dina (2015, February): Straight from the Horse’s Mouth: Exploring De-Radicalization Claims of Former Egyptian Militant Leaders. Perspectives on Terrorism, 9(1), 27-48. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/400

Al-Rawi, Ahmed K. (2013): The Anti-Terrorist Advertising Campaigns in the Middle East. The Journal of International Communication, 19(2), 182-195. DOI: http://doi.org/10.1080/13216597.2013.833534

Al-Rawi, Ahmed K. (2016): Anti-ISIS Humor: Cultural Resistance of Radical Ideology. Politics, Religion & Ideology, 17(1), 52-68. DOI: http://doi.org/10.1080/21567689.2016.1157076

Aly, Anne; Weimann-Saks, Dana; Weimann, Gabriel (2014, October): Making “Noise” Online: An Analysis of the Say No to Terror Online Campaign. Perspectives on Terrorism, 8(5), 33-47. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/376

Alzoubaidi, Abdel Rahman; Prodan-Palade, Doina; Ekici, Siddik (2016): Terrorist Recruitment and Counter Measures in the Cyber World. In: Sıddık Ekici et al. (Eds.): Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism Operations. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 125). Amsterdam: IOS Press, 55-66. DOI: http://doi.org/10.3233/978-1-61499-613-2-55

Amble, John C. (2014): Jihad Online: What Militant Groups Say about Themselves and What it Means for Counterterrorism Strategy. In: Christopher Hobbs; Matthew Moran; Daniel Salisbury (Eds.): Open Source Intelligence in the Twenty-First Century: New Approaches and Opportunities. (New Security Challenges). Basingstoke: Palgrave Macmillan, 168-184. DOI: http://doi.org/10.1057/9781137353320_10

An, Jisun et al. (2016): Are You Charlie or Ahmed? Cultural Pluralism in Charlie Hebdo Response on Twitter. In: Krishna P. Gummadi et al. (Chairs): Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). Palo Alto: The AAAI Press, 2-11. URL: http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/12997

Andre, Virginie (2014): The Janus Face of New Media Propaganda: The Case of Patani Neojihadist YouTube Warfare and its Islamophobic Effect on Cyber-Actors. Islam and Christian–Muslim Relations, 25(3), 335-356. DOI: http://doi.org/10.1080/09596410.2014.900948

Andre, Virginie (2015): Violent Jihad and Beheadings in the Land of Al Fatoni Darussalam. Religions, 6(4), 1203-1216. DOI: http://doi.org/10.3390/rel6041203

Archer, Emerald M. (2014): Crossing the Rubicon: Understanding Cyber Terrorism in the European Context. The European Legacy, 19(5), 606-621. DOI: http://dx.doi.org/10.1080/10848770.2014.943495

Archetti, Cristina (2015): Terrorism, Communication and the Media. In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. London: SAGE, 134-152.

Archetti, Cristina (2015, February): Terrorism, Communication and New Media: Explaining Radicalization in the Digital Age. Perspectives on Terrorism, 9(1), 49-59. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/401

Archie, Benjamin (2016): Tweeting Situational Awareness during the Sydney Siege. Journal of Policing, Intelligence and Counter Terrorism, 11(1), 14-29. DOI: http://doi.org/10.1080/18335330.2016.1161223

Argomaniz, Javier (2015, June): European Union Responses to Terrorist Use of the Internet. Cooperation and Conflict, 50(2), 250-268. DOI: http://doi.org/10.1177/0010836714545690

Arianti, V.; Yasin, Nur Azlin (2016, May): Women’s Proactive Roles in Jihadism in Southeast Asia. Counter Terrorist Trends and Analysis, 8(5), 9-15. URL: http://www.rsis.edu.sg/wp-content/uploads/2016/05/CTTA-May-2016.pdf

Armborst, Andreas (2014, October): Radicalisation and De-Radicalisation of Social Movements: The Comeback of Political Islam? Crime, Law and Social Change, 62(3), 235-255. DOI: http://doi.org/10.1007/s10611-013-9464-8

Armoudian, Maria (2016, August): Introducing New Datasets on Northern Ireland’s Media in the Peace Process and a Test of Newsworthiness in Times of “Troubles”. Media, War & Conflict, 9(2), 137-161. DOI: http://doi.org/10.1177/1750635216643112

Artz, Lee (2014, September): Banal Balance, Selective Identification and Factual Omissions: The New York Times Coverage of the 2014 War in Gaza. Journal of Arab & Muslim Media Research, 7(2-3), 97-112. DOI: http://doi.org/10.1386/jammr.7.2-3.97_1

Asal, Victor; Deloughery, Kathleen; Murdie, Amanda (2016): Responding to Terrorism? Human Rights Organization Shaming and Terrorist Attacks. Studies in Conflict & Terrorism, 39(3), 240-259. DOI: http://doi.org/10.1080/1057610X.2015.1093887

Asal, Victor et al. (2016, March): Killing the Messenger: Regime Type as a Determinant of Journalist Killing, 1992-2008. Foreign Policy Analysis. Advance Online Publication. DOI: http://dx.doi.org/10.1093/fpa/orw007

Atef, Abuelenin (2016): Toward Understanding the Linguistics of Terrorist and Radical Groups. Journal of Applied Security Research, 11(1), 101-110. DOI: http://doi.org/10.1080/19361610.2016.1104283

Avriel, Gil (2016): Terrorism 2.0: The Rise of the Civilitary Battlefield. Harvard National Security Journal, 7, 199-240. URL: http://harvardnsj.org/wp-content/uploads/2016/02/Avriel-PUBLISH.pdf

Awan, Imran; Rahman, Mohammed (2016): Portrayal of Muslims Following the Murders of Lee Rigby in Woolwich and Mohammed Saleem in Birmingham: A Content Analysis of UK Newspapers. Journal of Muslim Minority Affairs, 36(1), 16-31. DOI: http://doi.org/10.1080/13602004.2016.1147151

Ayalon, Ami; Popovich, Elad; Yarchi, Moran (2016): From Warfare to Imagefare: How States should Manage Asymmetric Conflicts with Extensive Media Coverage. Terrorism and Political Violence, 28(2), 254-273. DOI: http://doi.org/10.1080/09546553.2014.897622

Bacallao-Pino, Lázaro M. (2014, September): Mediatized Solidarity, Governmental Support and Metacommunicational Narratives: The War on Gaza in Leftist Latin American Media. Journal of Arab & Muslim Media Research, 7(2-3), 113-126. DOI: http://doi.org/10.1386/jammr.7.2-3.113_1

Bachmann, Sascha-Dominik; Gunneriusson, Håkan (2014, Spring): Terrorism and Cyber Attacks as Hybrid Threats: Defining a Comprehensive Approach for Countering 21st Century Threats to Global Peace and Security. The Journal on Terrorism and Security Analysis, 9, 26-36. URL: http://satsa.syr.edu/wp-content/uploads/2014/03/JTSA_Spring_2014.pdf

Baines, Paul R.; O’Shaughnessy, Nicholas J. (2014, May): Al-Qaeda Messaging Evolution and Positioning, 1998-2008: Propaganda Analysis Revisited. Public Relations Inquiry, 3(2), 163-191. DOI: http://doi.org/10.1177/2046147X14536723

Baken, Denise N.; Mantzikos, Ioannis (2015): The Internet: The Personalization of Terrorism. In: Denise N. Baken; Ioannis Mantzikos (Eds.): Al Qaeda: The Transformation of Terrorism in the Middle East and North Africa. (PSI Guides to Terrorists, Insurgents, and Armed Groups). Santa Barbara: Praeger, 97-116.

Ball, Mike (2012): Documenting Acts of Cruelty: The Practice of Violent Criminals Making Visual Records of their Crimes. Visual Anthropology, 25(5), 421-438. DOI: http://doi.org/10.1080/08949468.2012.720206

Barna, Cristian (2015): The Road to Jihad in Syria – Using SOCMINT to Counter the Radicalization of Muslim Youth in Romania. In: Marco Lombardi et al. (Eds.): Countering Radicalisation and Violent Extremism among Youth to Prevent Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 118). Amsterdam: IOS Press, 190-197. DOI: http://doi.org/10.3233/978-1-61499-470-1-190

Baum, Matthew A.; Zhukov, Yuri M. (2015, May): Filtering Revolution: Reporting Bias in International Newspaper Coverage of the Libyan Civil War. Journal of Peace Research, 52(3), 384-400. DOI: http://doi.org/10.1177/0022343314554791 URL: https://www.hks.harvard.edu/fs/mbaum/documents/BaumZhokov_FilteringRevolution_JPR.pdf

Benavides, Abraham David; Keyes, Laura M.; Pulley, Brittany (2016): Understanding the Recruitment Methods and Socialization Techniques of Terror Networks by Comparing them to Youth Gangs: Similarities and Divergences. In: Sıddık Ekici et al. (Eds.): Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism Operations. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 125). Amsterdam: IOS Press, 40-54. DOI: http://doi.org/10.3233/978-1-61499-613-2-40

Ben-Dror, Elad (2016): The Poets of Marj al-Zuhur: Poetry as the Psychological, Political, and Ideological Weapon of the Hamas Members Deported to Lebanon in 1992. Terrorism and Political Violence, 28(1), 157-179. DOI: http://doi.org/10.1080/09546553.2014.886576

Berger, J. M. (2015, August): The Metronome of Apocalyptic Time: Social Media as Carrier Wave for Millenarian Contagion. Perspectives on Terrorism, 9(4), 61-71. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/444

Berger, J. M. (2015, October): Tailored Online Interventions: The Islamic State’s Recruitment Strategy. CTC Sentinel, 8(10), 19-23. URL: https://www.ctc.usma.edu/v2/wp-content/uploads/2015/10/CTCSentinel-Vol8Iss1036.pdf

Berger, J. M. (2016, July 3): The Decapitation will not be Televised. Foreign Policy. URL: http://foreignpolicy.com/2016/07/03/isis-roller-ball-hunger-games-cinema

Bernatis, Vincent (2014, December): The Taliban and Twitter: Tactical Reporting and Strategic Messaging. Perspectives on Terrorism, 8(6), 25-35. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/389

Bertram, Luke (2016, Summer): Terrorism, the Internet and the Social Media Advantage: Exploring how Terrorist Organizations Exploit Aspects of the Internet, Social Media and how these same Platforms could be Used to Counter-Violent Extremism. Journal for Deradicalization, 7, 225-252. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/63

Bertram, Stewart K. (2015, September): Authority and Hierarchy within Anonymous Internet Relay Chat Networks. Journal of Terrorism Research, 6(3), 15-34. DOI: http://doi.org/10.15664/jtr.1089

Bettwy, Samuel W. (2014, November): The Moving Image: The Potential of Transnational Cinema to Counter Islamic Extremism. CTX, 4(4). URL: https://globalecco.org/the-moving-image-potential-of-transnational-cinema-to-counter-islamic-extremism

Bettwy, Samuel W. (2015, April): Evolving Transnational Cinematic Perspectives of Terrorism. Perspectives on Terrorism, 9(2), 42-60. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/418

Blaker, Lisa (2015): The Islamic State’s Use of Online Social Media. Military Cyber Affairs, 1(1), Article 4. URL: http://scholarcommons.usf.edu/mca/vol1/iss1/4/

Bloch-Elkon, Yaeli; Nacos, Brigitte L. (2014, October): News and Entertainment Media: Government’s Big Helpers in the Selling of Counterterrorism. Perspectives on Terrorism, 8(5), 18-32. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/375

Bloom, Mia M. (2013): In Defense of Honor: Women and Terrorist Recruitment on the Internet. Journal of Postcolonial Cultures and Societies, 4(1), 150-195. URL: http://www.jpcs.in/upload/311356232BLOOM.pdf

Bloom, Mia; Horgan, John; Winter, Charlie (2016, February): Depictions of Children and Youth in the Islamic State’s Martyrdom Propaganda, 2015-2016. CTC Sentinel, 9(2), 29-32. URL: https://www.ctc.usma.edu/v2/wp-content/uploads/2016/02/CTC-SENTINEL-Vol9Iss214.pdf

Bole, Robert; Kallmyer, Kevin (2016): Combatting the Islamic State’s Digital Dominance: Revitalizing U.S. Communication Strategy. The Washington Quarterly, 39(1), 29-48. DOI: http://doi.org/10.1080/0163660X.2016.1170478 URL: https://twq.elliott.gwu.edu/sites/twq.elliott.gwu.edu/files/downloads/TWQ_Spring2016_Bole-Kallmeyer.pdf

Bologna, Sandro; Lazari, Alessandro; Mele, Stefano (2015): Improving Critical Infrastructure Protection and Resilience against Terrorism Cyber Threats. In: Denis Čaleta; Vesela Radović (Eds.): Comprehensive Approach as “Sine Qua Non” for Critical Infrastructure Protection. (NATO Science for Peace and Security Series – D: Information and Communication Security, Vol. 39). Amsterdam: IOS Press, 79-90. DOI: http://doi.org/10.3233/978-1-61499-478-7-79

Braddock, Kurt; Horgan, John (2016): Towards a Guide for Constructing and Disseminating Counternarratives to Reduce Support for Terrorism. Studies in Conflict & Terrorism, 39(5), 381-404. DOI: http://doi.org/10.1080/1057610X.2015.1116277

Branson, Kayla (2014): Islamist Cyber-Activism: Contesting the Message, Redefining the Public. The Journal of North African Studies, 19(5), 713-732. DOI: http://doi.org/10.1080/13629387.2014.976513

Brantly, Aaron; al-’Ubaydi, Muhammad (2015, May): Extremist Forums Provide Digital OpSec Training. CTC Sentinel, 8(5), 10-13. URL: https://www.ctc.usma.edu/v2/wp-content/uploads/2015/05/CTCSentinel-Vol8Issue53.pdf

Bratchford, Gary (2014, September): Visualizing a Society on the Brink: Gaza and Hebron. Journal of Arab & Muslim Media Research, 7(2-3), 145-162. DOI: http://dx.doi.org/10.1386/jammr.7.2-3.145_1

Briant, Emma L. (2015, April): Allies and Audiences: Evolving Strategies in Defense and Intelligence Propaganda. The International Journal of Press/Politics, 20(2), 145-165. DOI: http://doi.org/10.1177/1940161214552031

Brookes, Gwen; Pooley, Julie Ann; Earnest, Jaya (2015): Terrorist Attacks, Community-Level Effects, the Media and how Governments Respond. In: Terrorism, Trauma and Psychology: A Multilevel Victim Perspective of the Bali Bombings. (Explorations in Social Psychology). Abingdon: Routledge, 143-158.

Brooten, Lisa; Ashraf, Syed Irfan; Akinro, Ngozi Agwaziam (2015, December): Traumatized Victims and Mutilated Bodies: Human Rights and the “Politics of Immediation” in the Rohingya Crisis of Burma/Myanmar. International Communication Gazette, 77(8), 717-734. DOI: http://doi.org/10.1177/1748048515611022

Brown, Harry, III (2016): SPCTA: An Analytical Framework for Analyzing Cyber Threats by Non-State Actors. International Journal of Cyber Warfare and Terrorism, 6(2), 41-60. DOI: http://doi.org/10.4018/IJCWT.2016040104

Bruijn, Mirjam de; Pelckmans, Lotte; Sangare, Boukary (2015, June): Communicating War in Mali, 2012: On-Offline Networked Political Agency in Times of Conflict. Journal of African Media Studies, 7(2), 109-128. DOI: http://doi.org/10.1386/jams.7.2.109_1 URL: https://openaccess.leidenuniv.nl/bitstream/handle/1887/36297/Mali.pdf

Bunnik, Anno (2016): Countering and Understanding Terrorism, Extremism, and Radicalisation in a Big Data Age. In: Anno Bunnik et al. (Eds.): Big Data Challenges: Society, Security, Innovation and Ethics. London: Palgrave Macmillan, 85-96.

Burgoon, Brian et al. (2015): From Media Attention to Negotiated Peace: Human Rights Reporting and Civil War Duration. International Interactions, 41(2), 226-255. DOI: http://doi.org/10.1080/03050629.2014.942898

Burnap, Pete; Williams, Matthew L. (2015, June): Cyber Hate Speech on Twitter: An Application of Machine Classification and Statistical Modeling for Policy and Decision Making. Policy & Internet, 7(2), 223-242. DOI: http://dx.doi.org/10.1002/poi3.85

Campana, Aurélie; Ducol, Benjamin (2015): Voices of the “Caucasus Emirate”: Mapping and Analyzing North Caucasus Insurgency Websites. Terrorism and Political Violence, 27(4), 679-700. DOI: http://doi.org/10.1080/09546553.2013.848797

Canadian Security Intelligence Service (CSIS) (2016, January): The Jihadist Digital Empowerment Revolution. In: The Foreign Fighters Phenomenon and Related Security Trends in the Middle East: Highlights from the Workshop. (World Watch: Expert Notes Series Publication No. 2016-01-01), 45-52. URL: https://www.csis-scrs.gc.ca/pblctns/wrldwtch/2016/20160129-en.pdf

Canadian Security Intelligence Service (CSIS) (2016, May): Offline Propaganda by ISIL. In: Al-Qaeda, ISIL and their Offspring: Understanding the Reach and Expansion of Violent Islamist Extremism: Highlights from the Workshop. (World Watch: Expert Notes Series Publication No. 2016-05-02), 65-77. URL: https://www.csis-scrs.gc.ca/pblctns/wrldwtch/2016/2016-05-02/ISLAMIC%20STATE_REPORT_ENGLISH.pdf

Carvalho, Claudia (2014): “Okhti” Online: Spanish Muslim Women Engaging Online Jihad – A Facebook Case Study. online: Heidelberg Journal of Religions on the Internet, 6, 24-41. URL: http://heiup.uni-heidelberg.de/journals/index.php/religions/article/view/17358

Caton, John (2016, Spring): The Digital Dye Pack: Confronting Crypto-Currencies and the Modern Terrorist. The Journal on Terrorism and Security Analysis, 11, 19-32. URL: http://satsa.syr.edu/wp-content/uploads/2016/02/SU-Maxwell_SASTA_Journal_bb.pdf

Chalmers, Dana Lori (2015, Fall): Ideologically Challenging Entertainment (ICE). Journal for Deradicalization, 4, 71-119. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/26

Chan, Anton (2015, May): The Call of ISIS: The Medium and the Message Attracting Southeast Asians. Counter Terrorist Trends and Analysis, 7(4), 4-9. URL: http://www.rsis.edu.sg/wp-content/uploads/2015/06/CTTA-May-2015.pdf

Chatfield, Akemi Takeoka; Reddick, Christopher G.; Brajawidagda, Uuf (2015): Tweeting Propaganda, Radicalization and Recruitment: Islamic State Supporters Multi-Sided Twitter Networks. In: Karen Mossberger et al. (Chairs): Proceedings of the 16th Annual International Conference on Digital Government Research. [e-Book]. New York: ACM, 239-249. DOI: http://dx.doi.org/10.1145/2757401.2757408

Cheterian, Vicken (2015): ISIS and the Killing Fields of the Middle East. Survival, 57(2), 105-118. DOI: http://doi.org/10.1080/00396338.2015.1026089

Chinn, Jacquelyn; Kluver, Randy (2014, December): Texas A&M University Media Monitoring: Representations of ISIL in Arabic Language Social Media. In: Hriar Cabayan; Sarah Canna (Eds.): Multi-Method Assessment of ISIL. (SMA White Volume). Boston: NSI, 120-125. URL: http://nsiteam.com/social/wp-content/uploads/2016/01/Multi-Method-Assessment-of-ISIL.pdf

Christoph, Stefan (2015, Fall): Funktionslogik terroristischer Propaganda im bewegten Bild. Journal for Deradicalization, 4, 145-205. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/29

Clini, Clelia (2015): International Terrorism? Indian Popular Cinema and the Politics of Terror. Critical Studies on Terrorism, 8(3), 337-357. DOI: http://doi.org/10.1080/17539153.2015.1070531

Cohen, Jared (2015, November-December): Digital Counterinsurgency: How to Marginalize the Islamic State Online. Foreign Affairs. URL: https://www.foreignaffairs.com/articles/middle-east/digital-counterinsurgency

Cohen, Katie et al. (2014): Detecting Linguistic Markers for Radical Violence in Social Media. Terrorism and Political Violence, 26(1), 246-256. DOI: http://doi.org/10.1080/09546553.2014.849948

Cohen, Yoel (2014, September): Foreign Correspondents in Israel, and the Arab–Israeli Conflict and Peace Process. Journal of Arab & Muslim Media Research, 7(2-3), 127-143. DOI: http://doi.org/10.1386/jammr.7.2-3.127_1

Conversi, Daniele (2012): Irresponsible Radicalisation: Diasporas, Globalisation and Long-Distance Nationalism in the Digital Age. Journal of Ethnic and Migration Studies, 38(9), 1357-1379. DOI: http://doi.org/10.1080/1369183X.2012.698204

Conway, Maura; Walker, Clive (2015): Countering Terrorism via the Internet. In: Genevieve Lennon; Clive Walker (Eds.): Routledge Handbook of Law and Terrorism. (Routledge Handbooks). Abingdon: Routledge, 416-431.

Corman, Steven (2014, December): De-Romanticizing the Islamic State’s Vision of the Caliphate. In: Hriar Cabayan; Sarah Canna (Eds.): Multi-Method Assessment of ISIL. (SMA White Volume). Boston: NSI, 143-149. URL: http://nsiteam.com/social/wp-content/uploads/2016/01/Multi-Method-Assessment-of-ISIL.pdf

Costello, Matthew et al. (2016, October): Who Views Online Extremism? Individual Attributes Leading to Exposure. Computers in Human Behavior, 63, 311-320. DOI: http://dx.doi.org/10.1016/j.chb.2016.05.033

Cottee, Simon (2016, June 28): The Jihad will be Televised: The Sinister Narcissism of ISIS and its Lone-Wolf Emulators. The Atlantic. URL: http://www.theatlantic.com/international/archive/2016/06/terrorism-execution-film/489152

Cozine, Keith (2016, Winter): Social Media and the Globalization of the Sicarii. Global Security Studies, 7(1), 1-12. URL: http://globalsecuritystudies.com/Cozine%20Sacarii.pdf

Cram, Ian (2009): Constraints on Newsgathering and the Coercion of Media Organisations: Production/Source Disclosure Orders. In: Terror and the War on Dissent: Freedom of Expression in the Age of Al-Qaeda. Dordrecht: Springer, 107-130. DOI: http://doi.org/10.1007/978-3-642-00637-1_5

Crenshaw, Emlyn (2014): American and Foreign Terrorists: An Analysis of Divergent Portrayals in US Newspaper Coverage. Critical Studies on Terrorism, 7(3), 363-378. DOI: http://doi.org/10.1080/17539153.2014.953306

Creswell, Robyn; Haykel, Bernard (2015, June 8 & 15): Battle Lines: Want to Understand the Jihadis? Read their Poetry. The New Yorker. URL: http://www.newyorker.com/magazine/2015/06/08/battle-lines-jihad-creswell-and-haykel

Dauber, Cori E. (2015, July): ISIS and the Family Man. Small Wars Journal, 7/2015. URL: http://smallwarsjournal.com/jrnl/art/isis-and-the-family-man

Davies, Garth et al. (2016, Spring): Toward a Framework Understanding of Online Programs for Countering Violent Extremism. Journal for Deradicalization, 6, 51-86. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/43

Davis, Joel L. et al. (2016, August): Induced Negative Subliminal Reactions to Radical Media and Propaganda: Countering Recruiting Efforts in a Congested Media Environment. Small Wars Journal, 8/2016. URL: http://smallwarsjournal.com/jrnl/art/induced-negative-subliminal-reactions-to-radical-media-and-propaganda-countering-recruiting

Della Ratta, Donatella (2015): Violence and Visibility in Contemporary Syria: An Ethnography of the “Expanded Places”. CyberOrient, 9(1). URL: http://www.cyberorient.net/article.do?articleId=9557

Del Vicario, Michela et al. (2016, January): The Spreading of Misinformation Online. Proceedings of the National Academy of Sciences, 113(3), 554-559. DOI: http://doi.org/10.1073/pnas.1517441113

Dinerman, Alan (2015, October): Defeating ISIL in the Information Environment. Small Wars Journal, 10/2015. URL: http://smallwarsjournal.com/jrnl/art/defeating-isil-in-the-information-environment-0

Dixit, Priya (2016): Interrogating Representations of “Militants” and “Terrorists” in the United States’ Militant Imagery Project and the Counterterrorism Calendar. Critical Studies on Terrorism, 9(1), 97-119. DOI: http://doi.org/10.1080/17539153.2016.1147761

Drissel, David (2015): Reframing the Taliban Insurgency in Afghanistan: New Communication and Mobilization Strategies for the Twitter Generation. Behavioral Sciences of Terrorism and Political Aggression, 7(2), 97-128. DOI: http://doi.org/10.1080/19434472.2014.986496

Edogor, Ignatius Obi et al. (2015): Users’ Perception of Crisis Portrayals on Social Media: A Study of Boko Haram Insurgency in Nigeria. New Media and Mass Communication, 35, 85-97. URL: http://www.iiste.org/Journals/index.php/NMMC/article/view/20831

Edwards, Jonathan J. (2015): Figuring Radicalization: Congressional Narratives of Homeland Security and American Muslim Communities. Communication and Critical/Cultural Studies, 12(1), 102-120. DOI: http://doi.org/10.1080/14791420.2014.996168

Eid, Mahmoud (2014): The Media amid Terrorism and Counterterrorism. [Review Essay]. Terrorism and Political Violence, 26(5), 842-854. DOI: http://doi.org/10.1080/09546553.2014.968025

Eiselt, H. A.; Bhadury, J. (2015, January): The Use of Structures in Communication Networks to Track Membership in Terrorist Groups. Journal of Terrorism Research, 6(1), 1-18. URL: http://jtr.st-andrews.ac.uk/articles/10.15664/jtr.1073

Ellis, Clare et al. (2016, April): Analysing the Processes of Lone-Actor Terrorism: Research Findings. Perspectives on Terrorism, 10(2), 33-41. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/499

Ette, Mercy (2016, August): Condensational Symbols in British Press Coverage of Boko Haram. International Communication Gazette, 78(5), 451-468. DOI: http://doi.org/10.1177/1748048516640209

Fair, Christine; Hamza, Ali (2016): From Elite Consumption to Popular Opinion: Framing of the US Drone Program in Pakistani Newspapers. Small Wars & Insurgencies, 27(4), 578-607. DOI: http://doi.org/10.1080/09592318.2016.1189491

Falkheimer, Jesper; Olsson, Eva-Karin (2015, April): Depoliticizing Terror: The News Framing of the Terrorist Attacks in Norway, 22 July 2011. Media, War & Conflict, 8(1), 70-85. DOI: http://doi.org/10.1177/1750635214531109

Farwell, James P. (2014): The Media Strategy of ISIS. Survival, 56(6), 49-55. DOI: http://doi.org/10.1080/00396338.2014.985436

Fattal, Alex (2014, May): Hostile Remixes on YouTube: A New Constraint on Pro-FARC Counterpublics in Colombia. American Ethnologist, 41(2), 320-335. DOI: http://doi.org/10.1111/amet.12078

Favat, Pete; Price, Bryan C. (2015, July): The Truth Campaign and the War of Ideas. CTC Sentinel, 8(7), 9-12. URL: https://www.ctc.usma.edu/v2/wp-content/uploads/2015/07/CTCSentinel-Vol8Iss73.pdf

Feinstein, Anthony (2013): Mexican Journalists and Journalists Covering War: A Comparison of Psychological Wellbeing. Journal of Aggression, Conflict and Peace Research, 5(2), 77-85. DOI: http://doi.org/10.1108/17596591311313672

Feinstein, Anthony; Starr, Stephen (2015): Civil War in Syria: The Psychological Effects on Journalists. Journal of Aggression, Conflict and Peace Research, 7(1), 57-64. DOI: http://doi.org/10.1108/JACPR-04-2014-0119

Fekete, Emily (2015): The Shifting Nature of Cyberwarfare in Middle Eastern States. CyberOrient, 9(1). URL: http://www.cyberorient.net/article.do?articleId=9520

Fernandez, Alberto (2014, February): Confronting the Changing Face of al-Qaeda Propaganda. In: Matthew Levitt (Ed.): From the Boston Marathon to the Islamic State: Countering Violent Extremism. (Washington Institute for Near East Policy, Policy Focus 139). Washington, DC: Washington Institute for Near East Policy, 32-37. URL: http://www.washingtoninstitute.org/policy-analysis/view/from-the-boston-marathon-to-the-islamic-state-countering-violent-extremism

Fisher, Ali (2015, June): Swarmcast: How Jihadist Networks Maintain a Persistent Online Presence. Perspectives on Terrorism, 9(3), 3-20. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/426

Fisogni, Primavera (2014): Lone Wolves: Updating the Concept of Enemy in the Social Media Age. International Journal of Cyber Warfare and Terrorism, 4(1), 36-44. DOI: http://doi.org/10.4018/ijcwt.2014010105

Foster, Freya (2015, Winter): The Price of News from the Front Line: Rethinking the Protection of Media Personnel under International Humanitarian Law. Journal of Conflict and Security Law, 20(3), 451-480. DOI: http://doi.org/10.1093/jcsl/krv008

Foy, Kelli (2015): Framing Hostage Negotiations: Analysing the Discourse of the US Government and the Islamic State. Critical Studies on Terrorism, 8(3), 516-531. DOI: http://doi.org/10.1080/17539153.2015.1091655

Frank, Richard et al. (2015): Spreading the Message Digitally: A Look into Extremist Organizations’ Use of the Internet. In: Russell G. Smith; Ray Chak-Chung Cheung; Laurie Yiu-Chung Lau (Eds.): Cybercrime Risks and Responses: Eastern and Western Perspectives. (Palgrave Macmillan’s Studies in Cybercrime and Cybersecurity). New York: Palgrave Macmillan, 130-145. DOI: http://doi.org/10.1057/9781137474162_9

Freelon, Deen; Lynch, Marc; Aday, Sean (2015, May): Online Fragmentation in Wartime: A Longitudinal Analysis of Tweets about Syria, 2011-2013. The ANNALS of the American Academy of Political and Social Science, 659(1), 166-179. DOI: http://doi.org/10.1177/0002716214563921

Friis, Simone Molin (2015, July): “Beyond Anything We Have Ever Seen”: Beheading Videos and the Visibility of Violence in the War against ISIS. International Affairs, 91(4), 725-746. DOI: http://doi.org/10.1111/1468-2346.12341 URL: https://www.chathamhouse.org/sites/files/chathamhouse/field/field_document/INTA91_4_03_Friis.pdf

Galily, Yair; Yarchi, Moran; Tamir, Ilan (2015): From Munich to Boston, and from Theater to Social Media: The Evolutionary Landscape of World Sporting Terror. Studies in Conflict & Terrorism, 38(12), 998-1007. DOI: http://doi.org/10.1080/1057610X.2015.1076640

Gates, Scott; Podder, Sukanya (2015, August): Social Media, Recruitment, Allegiance and the Islamic State. Perspectives on Terrorism, 9(4), 107-116. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/446

Gerhards, Jürgen; Schäfer, Mike S. (2014, February): International Terrorism, Domestic Coverage? How Terrorist Attacks are Presented in the News of CNN, Al Jazeera, the BBC, and ARD. International Communication Gazette, 76(1), 3-26. DOI: http://doi.org/10.1177/1748048513504158 URL: http://www.polsoz.fu-berlin.de/soziologie/arbeitsbereiche/makrosoziologie/mitarbeiter/lehrstuhlinhaber/dateien/Gerhards-_-Schaefer-2014-International-Terrorism---International-Communication-Gazette.pdf

Ghajar-Khosravi, Shadi et al. (2016, May): Quantifying Salient Concepts Discussed in Social Media Content: An Analysis of Tweets Posted by ISIS Fangirls. Journal of Terrorism Research, 7(2), 79-90. DOI: http://doi.org/10.15664/jtr.1241

Giacomello, Giampiero (2014): Close to the Edge: Cyberterrorism Today. In: Raul Caruso; Andrea Locatelli (Eds.): Understanding Terrorism: A Socio-Economic Perspective. (Contributions to Conflict Management, Peace Economics and Development, Vol. 22). Bingley: Emerald, 217-236.

Gill, Paul (2015): The Role of the Internet. In: Lone-Actor Terrorists: A Behavioural Analysis. (Political Violence). Abingdon: Routledge, 86-102.

Gohdes, Anita R. (2015, May): Pulling the Plug: Network Disruptions and Violence in Civil Conflict. Journal of Peace Research, 52(3), 352-367. DOI: http://doi.org/10.1177/0022343314551398

Goussios, Charalampos (2014, September): Rhetorical Use of Fear in Presidential Speeches: The War on Terror Discourse. Journal of Arab & Muslim Media Research, 7(2-3), 163-183. DOI: http://doi.org/10.1386/jammr.7.2-3.163_1

Graham, Robert (2016, June): How Terrorists Use Encryption. CTC Sentinel, 9(6), 20-25. URL: https://www.ctc.usma.edu/v2/wp-content/uploads/2016/06/CTC-SENTINEL_Vol9Iss614.pdf

Greenwood, Keith; Jenkins, Joy (2015): Visual Framing of the Syrian Conflict in News and Public Affairs Magazines. Journalism Studies, 16(2), 207-227. DOI: http://dx.doi.org/10.1080/1461670X.2013.865969 URL: http://www.researchgate.net/profile/Joy_Jenkins/publication/266912688_Visual_Framing_of_the_Syrian_Conflict_in_News_and_Public_Affairs_Magazines/links/543f4a1a0cf2eaec07e813b9.pdf

Günther, Christoph (2014, March): The Land of the Two Rivers under the Black Banner: Visual Communication of al-Qa’ida in Iraq. International Journal of Contemporary Iraqi Studies, 8(1), 35-53. DOI: http://doi.org/10.1386/ijcis.8.1.35_1

Günther, Christoph (2015): Presenting the Glossy Look of Warfare in Cyberspace – The Islamic State’s Magazine Dabiq. CyberOrient, 9(1). URL: http://www.cyberorient.net/article.do?articleId=9538

Gvirsman, Shira Dvir et al. (2016): The Longitudinal Effects of Chronic Mediated Exposure to Political Violence on Ideological Beliefs about Political Conflicts among Youths. Political Communication, 33(1), 98-117. DOI: http://doi.org/10.1080/10584609.2015.1010670 URL: http://www.rcgd.isr.umich.edu/aggr/articles/Huesmann/2015.GvirsmanHuesmannDubowEtAl.LongitudinalEffectsOfChronicMediatedExposOnBeliefs.PolComm.pdf

Hadji-Janev, Metodi (2015): Protecting Critical Information Infrastructure from Terrorist Attacks in South East Europe: How Real is the Threat? In: Denis Čaleta; Vesela Radović (Eds.): Comprehensive Approach as “Sine Qua Non” for Critical Infrastructure Protection. (NATO Science for Peace and Security Series – D: Information and Communication Security, Vol. 39). Amsterdam: IOS Press, 91-106. DOI: http://doi.org/10.3233/978-1-61499-478-7-91

Hale, W. Chris (2012): Extremism on the World Wide Web: A Research Review. Criminal Justice Studies, 25(4), 343-356. DOI: http://doi.org/10.1080/1478601X.2012.704723

Hänni, Adrian (2016): “Read it in the Papers, Seen it on TV…”: The 1981 Libyan Hit Squad Scare as a Case of Simulated Terrorism in the United States. Critical Studies on Terrorism, 9(1), 54-75. DOI: http://doi.org/10.1080/17539153.2016.1178523

Harding, Sue-Ann Jane (2012): Making a Difference? Independent Online Media Translations of the 2004 Beslan Hostage Disaster. The Translator, 18(2), 339-361. DOI: http://doi.org/10.1080/13556509.2012.10799514

Hardy, Keiran; Williams, George (2014): What is “Cyberterrorism”? Computer and Internet Technology in Legal Definitions of Terrorism. In: Tomas M. Chen; Lee Jarvis; Stuart Macdonald (Eds.): Cyberterrorism: Understanding, Assessment, and Response. New York: Springer, 1-24. DOI: http://doi.org/10.1007/978-1-4939-0962-9_1

Harmanşah, Ömür (2015, September): ISIS, Heritage, and the Spectacles of Destruction in the Global Media. Near Eastern Archaeology, 78(3), 170-177. DOI: http://doi.org/10.5615/neareastarch.78.3.0170

Hawkins, Virgil (2014, December): Beheadings and the News Media: Why some Conflict Atrocities Receive more Coverage than others. Conflict Trends, 4/2014, 3-9. URL: http://dspace.africaportal.org/jspui/bitstream/123456789/34911/1/ACCORD-Conflict-Trends-2014-4%20%281%29.pdf

Hegghammer, Thomas (in press): Interpersonal Trust on Jihadi Internet Forums. Draft chapter to be included in Diego Gambetta (Ed.), Fight, Flight, Mimic: Identity Signalling in Armed Conflicts, forthcoming. URL: http://hegghammer.com/_files/Interpersonal_trust.pdf

Heinke, Daniel H.; Fouad, Hazim (2015): Das Dabiq-Magazin als Rekrutierungswerkzeug des IS. In: Janusz Biene; Martin Schmetz (Eds.): Kalifat des Terrors: Interdisziplinäre Perspektiven auf den Islamischen Staat. (Sicherheitspolitik-Blog Fokus). Frankfurt: Sicherheitspolitik-Blog, 7-12. URL: http://www.sicherheitspolitik-blog.de/files/2015/07/Kalifat-des-Terrors.pdf

Hill, Andrew (2009): Hostage Videos: “Scenes of Slaughter”. In: Re-Imagining the War on Terror: Seeing, Waiting, Travelling. (New Security Challenges). Basingstoke: Palgrave Macmillan, 59-73.

Holbrook, Donald (2014, May): Approaching Terrorist Public Relations Initiatives. Public Relations Inquiry, 3(2), 141-161. DOI: http://doi.org/10.1177/2046147X14536179

Holbrook, Donald (2015): A Critical Analysis of the Role of the Internet in the Preparation and Planning of Acts of Terrorism. Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide, 8(2), 121-133. DOI: http://doi.org/10.1080/17467586.2015.1065102

Holbrook, Donald (2015, October): Designing and Applying an “Extremist Media Index”. Perspectives on Terrorism, 9(5), 57-68. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/461

Holt, Thomas J. (2013): Exploring the Intersections of Technology, Crime, and Terror. In: James J. F. Forest (Ed.): Intersections of Crime and Terror. Abingdon: Routledge, 167-184.

Holt, Tom et al. (2015): Political Radicalization on the Internet: Extremist Content, Government Control, and the Power of Victim and Jihad Videos. Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide, 8(2), 107-120. DOI: http://doi.org/10.1080/17467586.2015.1065101

Houen, Alex (2014): Martyrdom and Hostage Executions in the Iraq War: The Cases of Kenneth Bigley and Margaret Hassan. In: Dominic Janes; Alex Houen (Eds.): Martyrdom and Terrorism: Pre-Modern to Contemporary Perspectives. Oxford: Oxford University Press, 252-270.

Huey, Laura (2015, May): This is not your Mother’s Terrorism: Social Media, Online Radicalization and the Practice of Political Jamming. Journal of Terrorism Research, 6(2), 1-16. DOI: http://doi.org/10.15664/jtr.1159

Hughson, Holly (2015, January): Unmasking the Executioner: What this Gesture Means and how it can Help in the Fight against ISIS. Small Wars Journal, 1/2015. URL: http://smallwarsjournal.com/jrnl/art/unmasking-the-executioner-what-this-gesture-means-and-how-it-can-help-in-the-fight-against-

Huhtinen, Aki-Mauri (2015): The Double Edge of the Information Sword. International Journal of Cyber Warfare and Terrorism, 5(2), 21-30. DOI: http://doi.org/10.4018/IJCWT.2015040102

Hussain, Shabbir (2014): Reporting on Terror: Why are the Voices of Peace Unheard? Conflict & Communication Online, 13(2). URL: http://www.cco.regener-online.de/2014_2/abstr_engl/hussain_abstr_engl.html

Ingram, Haroro J. (2014): Three Traits of the Islamic State’s Information Warfare. The RUSI Journal, 159(6), 4-11. DOI: http://dx.doi.org/10.1080/03071847.2014.990810

Ingram, Haroro J. (2015): An Analysis of the Taliban in Khurasan’s Azan (Issues 1-5). Studies in Conflict and Terrorism, 38(7), 560-579. DOI: http://doi.org/10.1080/1057610X.2015.1022093

Ingram, Haroro J. (2015): The Strategic Logic of Islamic State Information Operations. Australian Journal of International Affairs, 69(6), 729-752. DOI: http://dx.doi.org/10.1080/10357718.2015.1059799

Ingram, Haroro J. (2016): An Analysis of Islamic State’s Dabiq Magazine. Australian Journal of Political Science. Advance Online Publication. DOI: http://dx.doi.org/10.1080/10361146.2016.1174188 URL: http://www.internationalaffairs.org.au/an-analysis-of-islamic-states-dabiq-magazine

Ismail, Amani; Yousef, Mervat; Berkowitz, Dan (2009, August): “American” in Crisis: Opinion Discourses, the Iraq War and the Politics of Identity. Media, War & Conflict, 2(2), 149-170. DOI: http://doi.org/10.1177/1750635209104652

Iyer, Aarti et al. (2015, December): Fight and Flight: Evidence of Aggressive Capitulation in the Face of Fear Messages from Terrorists. Political Psychology, 36(6), 631-648. DOI: http://doi.org/10.1111/pops.12182

Jacob, Jacob Udo-Udo; Akpan, Idorenyin (2015): Silencing Boko Haram: Mobile Phone Blackout and Counterinsurgency in Nigeria’s Northeast Region. Stability, 4(1), Article 8. DOI: http://doi.org/10.5334/sta.ey

Jamal, Amaney A. et al. (2015, March): Anti-Americanism and Anti-Interventionism in Arabic Twitter Discourses. Perspectives on Politics, 13(1), 55-73. DOI: http://doi.org/10.1017/S1537592714003132 URL: http://scholar.harvard.edu/files/dtingley/files/aatext.pdf

Janbek, Dana; Williams, Valerie (2014, Spring-Summer): The Role of the Internet Post-9/11 in Terrorism and Counterterrorism. Brown Journal of World Affairs, 20(2), 297-308. URL: https://www.brown.edu/initiatives/journal-world-affairs/202-spring%E2%80%93summer-2014/role-internet-post-911-terrorism-and-counterterrorism

Jarvis, Lee; MacDonald, Stuart (2015): Cyberterrorism: What Is it and what Threat does it Pose? In: Caroline Kennedy-Pipe; Gordon Clubb; Simon Mabon (Eds.): Terrorism and Political Violence. London: SAGE, 53-68.

Jarvis, Lee; MacDonald, Stuart (2015): What Is Cyberterrorism? Findings from a Survey of Researchers. Terrorism and Political Violence, 27(4), 657-678. DOI: http://doi.org/10.1080/09546553.2013.847827

Jarvis, Lee; MacDonald, Stuart; Nouri, Lella (2015, September): State Cyberterrorism: A Contradiction in Terms? Journal of Terrorism Research, 6(3), 62-75. DOI: http://doi.org/10.15664/jtr.1162

Jarvis, Lee; MacDonald, Stuart; Whiting, Andrew (2015, February): Constructing Cyberterrorism as a Security Threat: A Study of International News Media Coverage. Perspectives on Terrorism, 9(1), 60-75. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/402

Jarvis, Lee; Nouri, Lella; Whiting, Andrew (2015): Terrorism, Violence and Conflict in the Digital Age. In: Ioannis Tellidis; Harmonie Toros (Eds.): Researching Terrorism, Peace and Conflict Studies: Interaction, Synthesis, and Opposition. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 203-218.

Jiries, Tanja Dramac (2016, Spring): Rise of Radicalization in the Global Village: Online Radicalization vs. In-Person Radicalization – Is there a Difference? Journal for Deradicalization, 6, 206-230. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/48

John, Nicholas A.; Dvir-Gvirsman, Shira (2015, December): “I don’t Like you any more”: Facebook Unfriending by Israelis during the Israel–Gaza Conflict of 2014. Journal of Communication, 65(6), 953-974. DOI: http://doi.org/10.1111/jcom.12188

Johnson, N. F.; Johnson, D. E.; Restrepo, E. M. (2016, June): Modelling Insurgent Attack Dynamics across Geographic Scales and in Cyberspace. European Journal of Applied Mathematics, 27, 357-376. DOI: http://doi.org/10.1017/S0956792515000388

Johnson, N. F. et al. (2016, June): New Online Ecology of Adversarial Aggregates: ISIS and beyond. Science, 352(6292), 1459-1463. DOI: http://doi.org/10.1126/science.aaf0675 URL: http://andrewgelman.com/wp-content/uploads/2016/06/New-Online-Ecology-of-Adversarial-Aggregates-ISIS-and-Beyond.pdf

Jones, David Martin; Smith, M. L. R. (2016): The Rise of Dark Americana: Depicting the “War on Terror” On-Screen. Studies in Conflict & Terrorism, 39(1), 1-21. DOI: http://doi.org/10.1080/1057610X.2015.1084802

Juergensmeyer, Mark (2014): Killing before an Audience: Terrorism and Group Violence. In: James Hawdon; John Ryan; Marc Lucht (Eds.): The Causes and Consequences of Group Violence: From Bullies to Terrorists. Lanham: Lexington Books, 125-140.

Kaati, Lisa; Johansson, Fredrik (2016): Countering Lone Actor Terrorism: Weak Signals and Online Activities. In: Michael Fredholm (Ed.): Understanding Lone Actor Terrorism: Past Experience, Future Outlook, and Response Strategies. (Contemporary Terrorism Studies). Abingdon: Routledge, 266-279.

Kabir, Shah Nister; Hamid, M. Obaidul (2015): Muslims in Western Media: New Zealand Newspapers’ Construction of 2006 Terror Plot at Heathrow Airport and beyond. Journal of Muslim Minority Affairs, 35(4), 469-485. DOI: http://doi.org/10.1080/13602004.2015.1112120

Kailemia, Wilson Mwenda (2016, May): The Spectacle of Terrorism: Exploring the Impact of “Blind Acting Out” and “Phatic Communication”. Journal of Terrorism Research, 7(2), 91-102. DOI: http://doi.org/10.15664/jtr.1192

Karniel, Yuval; Lavie-Dinur, Amit; Azran, Tal (2015, March): Broadcast Coverage of Gaddafi’s Final Hours in Images and Headlines: A Brutal Lynch or the Desired Death of a Terrorist? International Communication Gazette, 77(2), 171-188. DOI: http://doi.org/10.1177/1748048514562686

Kaufmann, Mareile (2015, October): Resilience 2.0: Social Media Use and (Self-)Care during the 2011 Norway Attacks. Media, Culture & Society, 37(7), 972-987. DOI: http://doi.org/10.1177/0163443715584101

Kendall, Elisabeth (2015): Yemen’s Al-Qa’ida and Poetry as a Weapon of Jihad. In: Elisabeth Kendall; Ewan Stein (Eds.): Twenty-First Century Jihad: Law, Society and Military Action. (Library of Modern Religion, Vol. 38). London: I.B. Tauris, 247-269.

Kendall, Elisabeth (2016): Jihadist Propaganda and its Exploitation of the Arab Poetic Tradition. In: Elisabeth Kendall; Ahmad Khan (Eds.): Reclaiming Islamic Tradition: Modern Interpretations of the Classical Heritage. Edinburgh: Edinburgh University Press, 223-246. URL: https://www.academia.edu/27983658/Jihadist_Propaganda_and_its_Exploitation_of_the_Arab_Poetic_Tradition

Kenney, Michael (2015): Cyber-Terrorism in a Post-Stuxnet World. Orbis, 59(1), 111-128. DOI: http://doi.org/10.1016/j.orbis.2014.11.009

Kennis, Andrew (2015, August): Indexing State–Corporate Propaganda? Evaluating the Indexing, Propaganda and Media Dependence Models on CNN and CNN en Español’s Coverage of Fallujah, Iraq. Global Media and Communication, 11(2), 103-130. DOI: http://doi.org/10.1177/1742766515589054

Kessler, Gary C. (2015): Lone Operator Cyberterrorism from the Perspective of a Hacker. In: Aaron Richman; Yair Sharan (Eds.): Lone Actors – An Emerging Security Threat. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics). Amsterdam: IOS Press, 45-50. DOI: http://doi.org/10.3233/978-1-61499-585-2-45

Khalvatgar, Abdul Mujeeb (2014): Freedom of Expression under Threat in Afghanistan? Stability, 3(1), Article 38. DOI: http://doi.org/10.5334/sta.el

Kibble, David G. (2016, March-April): Beheading, Raping, and Burning: How the Islamic State Justifies its Actions. Military Review, 3-4/2016, 28-35. URL: http://usacac.army.mil/CAC2/MilitaryReview/Archives/English/MilitaryReview_20160430_art008.pdf

Kimmelman, E. Kweilen (2015): The Internet – A Force Multiplier for Modern Insurgencies. In: Albrecht Schnabel; Rohan Gunaratna (Eds.): Wars from Within: Understanding and Managing Insurgent Movements. (Imperial College Press Insurgency & Terrorism Series, Vol. 4). London: Imperial College Press, 119-142.

Klausen, Jytte (2015): Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq. Studies in Conflict & Terrorism, 38(1), 1-22. DOI: http://doi.org/10.1080/1057610X.2014.974948 URL: https://bir.brandeis.edu/bitstream/handle/10192/28992/KlausenArticle2014.pdf

Klein, John J. (2015, Winter): Deterring and Dissuading Cyberterrorism. Journal of Strategic Security, 8(4), 23-38. DOI: http://dx.doi.org/10.5038/1944-0472.8.4.1460

Klonk, Charlotte (2014): Image Terror. In: Sue Malvern; Gabriel Koureas (Eds.): Terrorist Transgressions: Gender and the Visual Culture of the Terrorist. (International Library of Cultural Studies, Vol. 37). London: I.B. Tauris, 15-38.

Kluver, Randy; Chinn, Jacquelyn (2015, September): Responses to ISIL in the Arabic Twittersphere. In: Allison Astorino-Courtois et al. (Eds.): White Paper on SMA Support to SOCCENT: ISIL Influence and Resolve. (SMA Periodic Publication). Boston: NSI, 11-14. URL: http://nsiteam.com/social/wp-content/uploads/2016/01/ISIL-Influence-and-Resolve.pdf

Knox, Emily Goldberg (2014, December): The Slippery Slope of Material Support Prosecutions: Social Media Support to Terrorists. Hastings Law Journal, 66, 295-330. URL: http://www.hastingslawjournal.org/wp-content/uploads/Goldberg-66.1.pdf

Koerner, Brendan I. (2016, April): Why ISIS is Winning the Social Media War. WIRED. URL: https://www.wired.com/?p=1989823

Köhler, Daniel (2014-2015, Winter): The Radical Online: Individual Radicalization Processes and the Role of the Internet. Journal for Deradicalization, 1, 116-134. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/8

Kovacs, Attila (2015): Visual Representation, Propaganda and Cyberspace: The Case of the Palestinian Islamist Movements. CyberOrient, 9(1). URL: http://www.cyberorient.net/article.do?articleId=9559

Kowalski, Jeremy D. (2013): “Framing” the Toronto 18: Government Experts, Corporate Media, and the Orientalizing of the Other. In: Jenna Hennebry; Bessma Momani (Eds.): Targeted Transnationals: The State, the Media, and Arab Canadians. Vancouver: UBC Press, 129-156.

Labanieh, Mohamad Fateh; Zulhuda, Sonny (2016): Utilization of Cyberspace by Terrorist Groups and the Applicability of the Malaysian Law on Terrorism. Journal of Asian and African Social Science and Humanities, 2(2), 31-54. URL: http://www.aarcentre.com/index.php/aarcentre/article/view/60

Lee, Benjamin (2015): A Day in the “Swamp”: Understanding Discourse in the Online Counter-Jihad Nebula. Democracy and Security, 11(3), 248-274. DOI: http://doi.org/10.1080/17419166.2015.1067612

Lee, Bryan (2016, April): The Impact of Cyber Capabilities in the Syrian Civil War. Small Wars Journal, 4/2016. URL: http://smallwarsjournal.com/jrnl/art/the-impact-of-cyber-capabilities-in-the-syrian-civil-war

Leep, Matthew Coen (2015): Partisan Discourse, Polarization, and the Politics of Military Fatalities in Iraq. Democracy and Security, 11(4), 329-352. DOI: http://doi.org/10.1080/17419166.2015.1078733

Leman, Johan (2016, March): The History, Motivations, Framing and Processes of Belgian Jihadism: The Molenbeek Case. In: Hedwig Giusto (Ed.): Daesh and the Terrorist Threat: From the Middle East to Europe. [e-Book]. Brussels; Rome: Foundation for European Progressive Studies (FEPS); Fondazione Italianieuropei, 126-134. URL: http://www.feps-europe.eu/en/publications/details/376

Levin, Brian (2015, November): The Original Web of Hate: Revolution Muslim and American Homegrown Extremists. American Behavioral Scientist, 59(12), 1609-1630. DOI: http://doi.org/10.1177/0002764215588815

Ligon, Gina Scott; Harms, Mackenzie; Derrick, Douglas C. (2015, Spring-Summer): Lethal Brands: How VEOs Build Reputations. Journal of Strategic Security, 8(1-2), 27-42. URL: http://doi.org/10.5038/1944-0472.8.1.1436

Ligon, Gina Scott et al. (2015, September): ISIL Futures: An Organizational Leadership and Cyber Profile. In: Allison Astorino-Courtois et al. (Eds.): White Paper on SMA Support to SOCCENT: ISIL Influence and Resolve. (SMA Periodic Publication). Boston: NSI, 15-18. URL: http://nsiteam.com/social/wp-content/uploads/2016/01/ISIL-Influence-and-Resolve.pdf

Liu, Brooke Fisher; Fraustino, Julia Daisy; Jin, Yan (2015): How Disaster Information Form, Source, Type, and Prior Disaster Exposure Affect Public Outcomes: Jumping on the Social Media Bandwagon? Journal of Applied Communication Research, 43(1), 44-65. DOI: http://doi.org/10.1080/00909882.2014.982685

Lohlker, Rüdiger (2015): The Syrian Electronic Army: Propaganda Warfare and Cyber Espionage. Journal for Intelligence, Propaganda and Security Studies, 9(1), 121-128.

Lohlker, Rüdiger (2016): Dschihadismus im Internet – Gespräche aus Österreich. Journal for Intelligence, Propaganda and Security Studies, 10(1), 103-108.

Lombardi, Marco (2015): Islamic State Communication Project. Sicurezza, Terrorismo e Società, 1, 99-133. URL: http://www.sicurezzaterrorismosocieta.it/wp-content/uploads/2015/05/SICTERSOC-1-2015-Lombardi-Islamic.pdf

Lombardi, Marco (2015): Violent Radicalization Concerns in the Euro-Mediterranean Region. In: Marco Lombardi et al. (Eds.): Countering Radicalisation and Violent Extremism among Youth to Prevent Terrorism. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 118). Amsterdam: IOS Press, 83-100. DOI: http://doi.org/10.3233/978-1-61499-470-1-83

Lopez, François (2016, February): If Publicity is the Oxygen of Terrorism – Why do Terrorists Kill Journalists? Perspectives on Terrorism, 10(1), 65-77. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/490

Lynch, Jake; McGoldrick, Annabel (2015, December): Psychophysiological Audience Responses to War Journalism and Peace Journalism. Global Media and Communication, 11(3), 201-217. DOI: http://doi.org/10.1177/1742766515606295

Lynch, Marc (2015, October): After the Arab Spring: How the Media Trashed the Transitions. Journal of Democracy, 26(4), 90-99. URL: http://www.journalofdemocracy.org/article/after-arab-spring-how-media-trashed-transitions

Lynton J., Eddy; Gullion, Greg; Williams, James L. (2016): Countering Terrorist Recruitment: Social Media, Cyber Terror, and Peaceful Platforms. In: Sıddık Ekici et al. (Eds.): Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism Operations. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 125). Amsterdam: IOS Press, 67-81. DOI: http://doi.org/10.3233/978-1-61499-613-2-67

MacFarlane, Jerrod S. (2014): Desperate Times and Desperate Measures: False-Representation and Distortion of Terrorism in Post-9/11 Superhero Films. Critical Studies on Terrorism, 7(3), 446-455. DOI: http://doi.org/10.1080/17539153.2014.956460

Magdy, Walid; Darwish, Kareem; Weber, Ingmar (2016, February): #FailedRevolutions: Using Twitter to Study the Antecedents of ISIS Support. First Monday, 21(2). DOI: http://dx.doi.org/10.5210/fm.v21i2.6372

Malinsky, Ayelet (2015): Death is in the Eye of the Beholder: A Study of Casualty Count Framing in the 2014 Israel–Gaza Conflict. Critical Studies on Terrorism, 8(3), 491-502. DOI: http://doi.org/10.1080/17539153.2015.1096653

Malka, Vered; Ariel, Yaron; Avidar, Ruth (2015, December): Fighting, Worrying and Sharing: Operation “Protective Edge” as the First WhatsApp War. Media, War & Conflict, 8(3), 329-344. DOI: http://doi.org/10.1177/1750635215611610

Malmvig, Helle (2016): Eyes Wide Shut: Power and Creative Visual Counter-Conducts in the Battle for Syria, 2011–2014. Global Society, 30(2), 258-278. DOI: http://dx.doi.org/10.1080/13600826.2016.1150810

Mandaville, Peter (2009): Hip-Hop, Nasheeds, and “Cool” Sheikhs: Popular Culture and Muslim Youth in the United Kingdom. In: Christiane Timmerman et al. (Eds.): In-Between Spaces: Christian and Muslim Minorities in Transition in Europe and the Middle East. (Gods, Humans, and Religions, Vol. 18). Brussels: Peter Lang, 149-168.

Manrique, Pedro et al. (2016, June): Women’s Connectivity in Extreme Networks. Science Advances, 2(6), Article e1501742. DOI: http://doi.org/10.1126/sciadv.1501742

Matthews, Jamie (2015): Framing Alleged Islamist Plots: A Case Study of British Press Coverage since 9/11. Critical Studies on Terrorism, 8(2), 266-283. DOI: http://doi.org/10.1080/17539153.2015.1042305

Matusitz, Jonathan; Olufowote, James (2016): Visual Motifs in Islamist Terrorism: Applying Conceptual Metaphor Theory. Journal of Applied Security Research, 11(1), 18-32. DOI: http://doi.org/10.1080/19361610.2016.1104276

Maxfield, Brett (2016, Spring): Fighting Terrorism Online. The Journal on Terrorism and Security Analysis, 11, 79-104. URL: http://satsa.syr.edu/wp-content/uploads/2016/02/SU-Maxwell_SASTA_Journal_bb.pdf

McCauley, Tom (2015): The War of Ideas on the Internet: An Asymmetric Conflict in which the Strong Become Weak. Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide, 8(1), 79-90. DOI: http://doi.org/10.1080/17467586.2014.1002511

McClure, Kyla N. (2014): When do People Pay Attention? Violence and Non-Violence in Political Movements and the Differential Media Attention Provided. Critical Studies on Terrorism, 7(3), 394-410. DOI: http://doi.org/10.1080/17539153.2014.954821

Menkhaus, Ken (2014, Spring-Summer): Al-Shabaab and Social Media: A Double-Edged Sword. Brown Journal of World Affairs, 20(2), 309-327. URL: https://www.brown.edu/initiatives/journal-world-affairs/202-spring%E2%80%93summer-2014/al-shabaab-and-social-media-double-edged-sword

Miller, Greg; Mekhennet, Souad (2015, November 20): Inside the Surreal World of the Islamic State’s Propaganda Machine. The Washington Post. URL: https://www.washingtonpost.com/world/national-security/inside-the-islamic-states-propaganda-machine/2015/11/20/051e997a-8ce6-11e5-acff-673ae92ddd2b_story.html

Mirrlees, Tanner (2015): The Canadian Armed Forces “YouTube War”: A Cross-Border Military-Social Media Complex. Global Media Journal: Canadian Edition, 8(1), 71-93. URL: http://www.gmj.uottawa.ca/1501/v8i1_mirrlees_abstract.html

Mitra, Saumava (2014): Re-Thinking Visuals: Understanding Discursive Reformulation of Visuals to Inform Peace Journalism. conflict & communication online, 13(2). URL: http://www.cco.regener-online.de/2014_2/abstr_engl/mitra_abstr_engl.html

Moir, Nathaniel L. (2014): An Analysis of Taliban Propaganda and Perspectives on Village Stability Operations from January 2011 to January 2013. Journal for Intelligence, Propaganda and Security Studies, 8(2), 101-120.

Möller, Patrick (2015): Im Netz gegen Dschihadismus: Prävention mittels sozialer Medien. In: Janusz Biene; Martin Schmetz (Eds.): Kalifat des Terrors: Interdisziplinäre Perspektiven auf den Islamischen Staat. (Sicherheitspolitik-Blog Fokus). Frankfurt: Sicherheitspolitik-Blog, 89-93. URL: http://www.sicherheitspolitik-blog.de/files/2015/07/Kalifat-des-Terrors.pdf

Molloy, Declan (2015): Framing the IRA: Beyond Agenda Setting and Framing towards a Model Accounting for Audience Influence. Critical Studies on Terrorism, 8(3), 478-490. DOI: http://doi.org/10.1080/17539153.2015.1096654

Morris, Travis (2016): Achieving Complete Intelligence from Violent Extremist Communications: Integrating the Propaganda Analysis Nexus. Journal of Policing, Intelligence and Counter Terrorism, 11(1), 1-13. DOI: http://doi.org/10.1080/18335330.2016.1161227

Mortensen, Mette (2015): Citizen Investigation and Eyewitness Images: The Boston Marathon Bombing (2013). In: Journalism and Eyewitness Images: Digital Media, Participation, and Conflict. (Routledge Research in Journalism, Vol. 8). New York: Routledge, 144-159.

Mott, Gareth (2016): Terror from behind the Keyboard: Conceptualising Faceless Detractors and Guarantors of Security in Cyberspace. Critical Studies on Terrorism, 9(1), 33-53. DOI: http://doi.org/10.1080/17539153.2016.1147773

Mozes-Sadeh, Tomer; Avraham, Eli (2014): The Use of Offensive Public Relations during a Conflict: Hamas’s Efforts to Damage Israel’s Image during the 2010 Flotilla. conflict & communication online, 13(2). URL: http://www.cco.regener-online.de/2014_2/abstr_engl/mozes-sadeh-avraham_abstr_engl.html

Mueller, John; Stewart, Mark G. (2015): Terrorism, Counterterrorism, and the Internet: The American Cases. Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide, 8(2), 176-190. DOI: http://doi.org/10.1080/17467586.2015.1065077 URL: http://politicalscience.osu.edu/faculty/jmueller/HorganSagemanTaylorfin.pdf

Munch, Randall et al. (2015, September): Analysis of the ISIL Influence Network. In: Allison Astorino-Courtois et al. (Eds.): White Paper on SMA Support to SOCCENT: ISIL Influence and Resolve. (SMA Periodic Publication). Boston: NSI, 56-58. URL: http://nsiteam.com/social/wp-content/uploads/2016/01/ISIL-Influence-and-Resolve.pdf

Nacos, Brigitte L. (2016): Part III: Terrorism and Counterterrorism in News Media and Internet. In: Terrorism and Counterterrorism. (5th ed.). New York: Routledge, 351-418.

Neumann, Peter R. (2013): Options and Strategies for Countering Online Radicalization in the United States. Studies in Conflict & Terrorism, 36(6), 431-459. DOI: http://dx.doi.org/10.1080/1057610X.2013.784568 URL: https://counterideology2.files.wordpress.com/2013/06/options-n-strategies-for-countering-online-radicalization-in-the-us.pdf

Nevalsky, Eric Chien (2015): Developing Terrorism Coverage: Variances in News Framing of the January 2015 Attacks in Paris and Borno. Critical Studies on Terrorism, 8(3), 466-477. DOI: http://dx.doi.org/10.1080/17539153.2015.1096656

Nissen, Thomas Elkjer (2014): Terror.com – IS’s Social Media Warfare in Syria and Iraq. Contemporary Conflicts, 2(2). URL: http://www.fak.dk/en/news/magazine/Documents/ISSUE%2002,%20VOLUME%2002/Terror_com_ISs_Social_Media_Warfare_in_Syria_and_Iraq.pdf

Nouri, Lella; Whiting, Andrew (2015): Prevent and the Internet. In Christopher Baker-Beall; Charlotte Heath-Kelly; Lee Jarvis (Eds.): Counter-Radicalisation: Critical Perspectives. (Routledge Critical Terrorism Studies). Abingdon: Routledge, 175-189.

Novenario, Celine Marie I. (2016): Differentiating Al Qaeda and the Islamic State through Strategies Publicized in Jihadist Magazines. Studies in Conflict & Terrorism, 39(11), 953-967. DOI: http://dx.doi.org/10.1080/1057610X.2016.1151679

O’Callaghan, Derek et al. (2014): Online Social Media in the Syria Conflict: Encompassing the Extremes and the In-Betweens. In: Xindong Wu; Martin Ester; Guandong Xu (Eds.): Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining – ASONAM2014. Piscataway: IEEE, 409-416. URL: http://arxiv.org/abs/1401.7535

O’Donnell, Wendy M.; Farnsworth, Sarah W. (1988): Prime Time Hostages: A Case Study of Coverage during Captivity. Political Communication, 5(4), 237-248. DOI: http://doi.org/10.1080/10584609.1988.9962856

O’Hara, Kieron; Stevens, David (2015, December): Echo Chambers and Online Radicalism: Assessing the Internet’s Complicity in Violent Extremism. Policy & Internet, 7(4), 401-422. DOI: http://doi.org/10.1002/poi3.88

O’Loughlin, Ben (2016): Media Coverage of Terrorism. In: Richard Jackson (Ed.): Routledge Handbook of Critical Terrorism Studies. (Routledge Handbooks). Abingdon: Routledge, 276-286.

Orji, Uchenna Jerome (2014, Spring-Fall): Deterring Cyberterrorism in the Global Information Society: A Case for the Collective Responsibility of States. Defence Against Terrorism Review, 6(1), 31-45. URL: http://www.coedat.nato.int/publication/datr/volume9/02-Deterring_Cyberterrorism_in_the_Global_Information_Society.pdf

Ottosen, Rune (2014): Underreporting the Legal Aspects of Drone Strikes in International Conflicts: A Case Study of how Aftenposten and The New York Times Cover Drone Strike. conflict & communication online, 13(2). URL: http://www.cco.regener-online.de/2014_2/abstr_engl/ottosen_abstr_engl.html

Özdemir, Özlem (٢٠١٥): UK National Print Media Coverage of Sexual and Gender-Based Violence (SGBV) against Refugee Women in Syrian Refugee Camps. Syria Studies, 7(4), 53-72. URL: https://ojs.st-andrews.ac.uk/index.php/syria/issue/download/127/1

Ozohu-Suleiman, Yakubu; Ishak, Sidin Ahmad (2014): Local Media in Global Conflict: Southeast Asian Newspapers and the Politics of Peace in Israel/Palestine. International Journal of Conflict and Violence, 8(2), 284-295. URL: http://www.ijcv.org/index.php/ijcv/article/view/287

Parkin, William S.; Green, David A. (2016): Terrorism in the News: The Efficiency and Impact of Sampling Methods on Data Collection and Content Analysis. Studies in Conflict & Terrorism, 39(7-8). DOI: http://doi.org/10.1080/1057610X.2016.1141019

Pastorello, Mauro (2015): How Cyberspace is Used by Terrorist Organization: Possible Threats to Critical Infrastructures? The Most Recent Activities of Cyber Counterterrorism. Sicurezza, Terrorismo e Società, 2, 117-134. URL: http://www.sicurezzaterrorismosocieta.it/wp-content/uploads/2015/12/Pastorello_SicTerSoc_book-8.pdf

Patrick, Sarah May (2014): Framing Terrorism: Geography-Based Media Coverage Variations of the 2004 Commuter Train Bombings in Madrid and the 2009 Twin Suicide Car Bombings in Baghdad. Critical Studies on Terrorism, 7(3), 379-393. DOI: http://doi.org/10.1080/17539153.2014.957009

Pears, Louise (2016): Ask the Audience: Television, Security and Homeland. Critical Studies on Terrorism, 9(1), 76-96. DOI: http://doi.org/10.1080/17539153.2016.1147774

Pearson, Elizabeth (2016, March): The Case of Roshonara Choudhry: Implications for Theory on Online Radicalization, ISIS Women, and the Gendered Jihad. Policy & Internet, 8(1), 5-33. DOI: http://doi.org/10.1002/poi3.101

Pelevin, Mikhail; Weinreich, Matthias (2012): The Songs of the Taliban: Continuity of Form and Thought in an Ever-Changing Environment. Iran and the Caucasus, 16(1), 45-70. DOI: http://doi.org/10.1163/160984912X13309560274055

Picart, Caroline Joan S. (2015): The Radicalization of American Lone Wolves in Real/Reel Worlds: Strategically Mapping the Role of the Internet, and beyond, in the Cases of Colleen LaRose (Jihad Jane) and the Tsarnaev Brothers (the Boston Marathon Bombers). In: Aaron Richman, Yair Sharan (Eds.): Lone Actors – An Emerging Security Threat. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics). Amsterdam: IOS Press, 58-74. DOI: http://doi.org/10.3233/978-1-61499-585-2-58

Pohl, Gabriela (2015): Media and Terrorist Choice: A Risk-Reward Analysis. Journal of Applied Security Research, 10(1), 60-76. DOI: http://doi.org/10.1080/19361610.2015.972271

Post, Jerrold M. (2015): Terrorism and Right-Wing Extremism: The Changing Face of Terrorism and Political Violence in the 21st Century: The Virtual Community of Hatred. International Journal of Group Psychotherapy, 65, 242-271. DOI: http://doi.org/10.1521/ijgp.2015.65.2.242

Powell, Kimberly A. (2011): Framing Islam: An Analysis of U.S. Media Coverage of Terrorism since 9/11. Communication Studies, 62(1), 90-112. DOI: http://doi.org/10.1080/10510974.2011.533599

Powers, Marina (2014): Sticks and Stones: The Relationship between Drone Strikes and al-Qaeda’s Portrayal of the United States. Critical Studies on Terrorism, 7(3), 411-421. DOI: http://doi.org/10.1080/17539153.2014.954822

Powers, Shawn; O’Loughlin, Ben (2015, August): The Syrian Data Glut: Rethinking the Role of Information in Conflict. Media, War & Conflict, 8(2), 172 -180. DOI: http://doi.org/10.1177/1750635215584286

Prati, Giulia (2015, March): Between Propaganda and Public Relations: An Analysis of Bashar al-Assad’s Digital Communications Campaign. Journal of International Affairs. URL: http://jia.sipa.columbia.edu/online-articles/propaganda-public-relations-analysis-bashar-al-assads-digital-communications-campaign

Pretorius, Barend; van Niekerk, Brett (2016): Cyber-Security for ICS/SCADA: A South African Perspective. International Journal of Cyber Warfare and Terrorism, 6(3), 1-16. DOI: http://doi.org/10.4018/IJCWT.2016070101

Prucha, Nico (2015): Jihadist Innovation and Learning by Adapting to the “New” and “Social Media” Zeitgeist. In: Magnus Ranstorp; Magnus Normark (Eds.): Understanding Terrorism Innovation and Learning: Al-Qaeda and beyond. (Political Violence). Abingdon: Routledge, 117-136.

Quiggle, Doyle (2015, February): The ISIS Beheading Narrative. Small Wars Journal, 2/2015. URL: http://smallwarsjournal.com/jrnl/art/the-isis-beheading-narrative

Ramsay, Gilbert; Holbrook, Donald (2015): The Representation of Violence by Insurgent Political Actors: The “Violent” Part of “Violent Extremism”? Behavioral Sciences of Terrorism and Political Aggression, 7(1), 84-96. DOI: http://doi.org/10.1080/19434472.2014.980837

Ray, Nathan T. (2016, February): Public Disclosure Websites and Extremist Threats. Army War College Review, 2(1), 26-39. URL: http://www.strategicstudiesinstitute.army.mil/pubs/AWCreview/Issues/Feb2016.pdf

Richards, Imogen (2016): “Flexible” Capital Accumulation in Islamic State Social Media. Critical Studies on Terrorism, 9(2), 205-225. DOI: http://dx.doi.org/10.1080/17539153.2015.1125642

Richey, Melonie K.; Binz, Mathias (2015): Open Source Collection Methods for Identifying Radical Extremists Using Social Media. International Journal of Intelligence and CounterIntelligence, 28(2), 347-364. DOI: http://doi.org/10.1080/08850607.2014.962374

Rød, Espen Geelmuyden; Weidmann, Nils B. (2015, May): Empowering Activists or Autocrats? The Internet in Authoritarian Regimes. Journal of Peace Research, 52(3), 338-351. DOI: http://doi.org/10.1177/0022343314555782 URL: https://kops.uni-konstanz.de/bitstream/handle/123456789/31334/Rod_0-289404.pdf

Rowe, Matthew; Saif, Hassan (2016): Mining Pro-ISIS Radicalisation Signals from Social Media Users. In: Krishna P. Gummadi et al. (Chairs): Proceedings of the Tenth International AAAI Conference on Web and Social Media (ICWSM 2016). Palo Alto: The AAAI Press, 329-338. URL: http://www.aaai.org/ocs/index.php/ICWSM/ICWSM16/paper/view/13023

Rowling, Charles M.; Gilmore, Jason; Sheets, Penelope (2015, October): When Threats Come from within: National Identity, Cascading Frames, and the U.S. War in Afghanistan. The International Journal of Press/Politics, 20(4), 478-497. DOI: http://doi.org/10.1177/1940161215599384

Ruggiero, Aino; Vos, Marita (2013, September): Terrorism Communication: Characteristics and Emerging Perspectives in the Scientific Literature 2002-2011. Journal of Contingencies and Crisis Management, 21(3), 153-166. DOI: http://doi.org/10.1111/1468-5973.12022

Russell, Brian (2015, October): Information War with the Islamic State in Iraq and the Levant: An Indirect Approach. Small Wars Journal, 10/2015. URL: http://smallwarsjournal.com/jrnl/art/information-war-with-the-islamic-state-in-iraq-and-the-levant-an-indirect-approach

Saber, Dima (2016, April): From Pan-Arab Nationalism to Political Islam: A Ricoeurian Reading of Al Jazeera’s Coverage of the “6th Arab-Israeli War” in Lebanon. Journal of Arab & Muslim Media Research, 9(1), 81-98. DOI: http://doi.org/10.1386/jammr.9.1.81_1

Sadar, Pina (2014, March): Exotic Beauties, Victims and Terrorists: Representations of Veiled Women in the British Press (2001-14). Journal of Arab & Muslim Media Research, 7(1), 59-73. DOI: http://doi.org/10.1386/jammr.7.1.59_1

Samuel-Azran, Tal; Lavie-Dinur, Amit; Karniel, Yuval (2015, April): Narratives Used to Portray In-Group Terrorists: A Comparative Analysis of the Israeli and Norwegian Press. Media, War & Conflict, 8(1), 3-19. DOI: http://doi.org/10.1177/1750635214531106

Sanz Sabido, Ruth (2015, September): Palestine in the British Press: A Postcolonial Critical Discourse Analysis. Journal of Arab & Muslim Media Research, 8(3), 199-216. DOI: http://doi.org/10.1386/jammr.8.3.199_1

Satti, Mohamed (2015, March): Framing the Islamic State on Al Jazeera English and the BBC Websites. Journal of Arab & Muslim Media Research, 8(1), 37-53. DOI: http://doi.org/10.1386/jammr.8.1.37_1

Saunders, Robert A. (2015): Media and Terrorism. In: Randall D. Law (Ed.): The Routledge History of Terrorism. (The Routledge Histories). Abingdon: Routledge, 428-441.

Schliefsteiner, Paul (2015): Dabiq, Mujatweets und Drohvideos: Ausgewählte Beispiele deutschsprachiger Propaganda des Islamischen Staates. Journal for Intelligence, Propaganda and Security Studies, 9(2), 110-129.

Schmetz, Martin (2015): Zwischen Paranoia & Propaganda: Dschihadistische Gruppierungen und ihre IT-Sicherheit. In: Janusz Biene; Martin Schmetz (Eds.): Kalifat des Terrors: Interdisziplinäre Perspektiven auf den Islamischen Staat. (Sicherheitspolitik-Blog Fokus). Frankfurt: Sicherheitspolitik-Blog, 55-61. URL: http://www.sicherheitspolitik-blog.de/files/2015/07/Kalifat-des-Terrors.pdf

Schmid, Alex P. (2015): Challenging the Narrative of the “Islamic State”. In: Sara Zeiger; Anne Aly (Eds.): Countering Violent Extremism: Developing an Evidence-Base for Policy and Practice. [e-Book]. Abu Dhabi; Perth: Hedayah; Curtin University; People against Violent Extremism (PaVE), 67-80. URL: http://www.hedayah.ae/research/publications/cve-developing-an-evidence-base-for-policy-and-practice

Schritt, Jannik (2015): The “Protests against Charlie Hebdo” in Niger: A Background Analysis. Africa Spectrum, 50(1), 49-64. URL: http://nbn-resolving.org/urn/resolver.pl?urn:nbn:de:gbv:18-4-8285

Schultz, Robert (2015, November): Countering Extremist Groups in Cyberspace: Applying Old Solutions to a New Problem. CTX, 5(4). URL: https://globalecco.org/countering-extremist-groups-in-cyberspace-applying-old-solutions-to-a-new-problem-ltc-robert-schultz-us-army

Schwalbe, Carol B.; Dougherty, Shannon M. (2015, April): Visual Coverage of the 2006 Lebanon War: Framing Conflict in Three US News Magazines. Media, War & Conflict, 8(1), 141-162. DOI: http://doi.org/10.1177/1750635215571204

Sedgwick, Mark (2015, April): Jihadism, Narrow and Wide: The Dangers of Loose Use of an Important Term. Perspectives on Terrorism, 9(2), 34-41. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/417

Sela-Shayovitz, Revital (2015, March): Police Legitimacy under the Spotlight: Media Coverage of Police Performance in the Face of a High Terrorism Threat. Journal of Experimental Criminology, 11(1), 117-139. DOI: http://doi.org/10.1007/s11292-014-9213-8

Shane, Scott (2016, July): The Enduring Influence of Anwar al-Awlaki in the Age of the Islamic State. CTC Sentinel, 9(7), 15-19. URL: https://www.ctc.usma.edu/v2/wp-content/uploads/2016/07/CTC-SENTINEL_Vol9Iss73.pdf

Shanty, Frank (2012): International Media: A Critical Tool in the Battle against Terrorism. In: Counterterrorism: From the Cold War to the War on Terror. (Vol. 1: Combating Modern Terrorism [1968-2011], Praeger Security International). Santa Barbara: Praeger, 282-286.

Shanty, Frank (2012): Terrorism, Counterterrorism, and the Internet. In: Counterterrorism: From the Cold War to the War on Terror. (Vol. 1: Combating Modern Terrorism [1968-2011], Praeger Security International). Santa Barbara: Praeger, 331-336.

Shapiro, Jacob N.; Siegel, David A. (2015, May): Coordination and Security: How Mobile Communications Affect Insurgency. Journal of Peace Research, 52(3), 312-322. DOI: http://doi.org/10.1177/0022343314559624

Shapiro, Jacob N.; Weidmann, Nils B. (2015, Spring): Is the Phone Mightier than the Sword? Cellphones and Insurgent Violence in Iraq. International Organization, 69(2), 247-274. DOI: http://doi.org/10.1017/S0020818314000423 URL: https://kops.uni-konstanz.de/bitstream/handle/123456789/31043/Shapiro_0-289382.pdf

Sheets, Penelope; Rowling, Charles M.; Jones, Timothy M. (2015, December): The View from above (and below): A Comparison of American, British, and Arab News Coverage of US Drones. Media, War & Conflict, 8(3), 289-311. DOI: http://doi.org/10.1177/1750635215593973

Simon, Jeffrey D. (2015): Lone Wolf Terrorism: Understanding the Growing Threat. In: Aaron Richman; Yair Sharan (Eds.): Lone Actors – An Emerging Security Threat. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics). Amsterdam: IOS Press, 3-10. DOI: http://doi.org/10.3233/978-1-61499-585-2-3

Simons, Greg (2016, July): Rethinking Communication within the Global War on Terrorism. Small Wars Journal, 7/2016. URL: http://smallwarsjournal.com/jrnl/art/rethinking-communication-within-the-global-war-on-terrorism

Skillicorn, D. B. (2015): Empirical Assessment of Al Qaeda, ISIS, and Taliban Propaganda. In: Lina Zhou et al. (Eds.): IEEE ISI 2015: IEEE International Conference on Intelligence and Security Informatics: Securing the World through an Alignment of Technology, Intelligence, Humans and Organizations: May 27-29, 2015, Baltimore, MD: Proceedings. Piscataway: IEEE, 61-66. DOI: http://doi.org/10.1109/ISI.2015.7165940

Smith, Benjamin K. et al. (2016, August): Framing Daesh: Failures and Consequences. Perspectives on Terrorism, 10(4), 42-52. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/526

Sorenson, David S. (2014, Autumn): Priming Strategic Communications: Countering the Appeal of ISIS. Parameters, 44(3), 25-36. URL: http://strategicstudiesinstitute.army.mil/pubs/parameters/issues/Autumn_2014/6_SorensonDavid_Priming%20Strategic%20Communications%20Countering%20the%20Appeal%20of%20ISIS.pdf

Speckhard, Anne (2014, December): The Militant Jihadi Message Propagated by ISIL is a Contagiously Virulent Meme in the West—the Ebola of Terrorism. In: Hriar Cabayan; Sarah Canna (Eds.): Multi-Method Assessment of ISIL. (SMA White Volume). Boston: NSI, 126-134. URL: http://nsiteam.com/social/wp-content/uploads/2016/01/Multi-Method-Assessment-of-ISIL.pdf

Speckhard, Anne (2016, December-January): Brides of ISIS: The Internet Seduction of Western Females into ISIS. Homeland Security Today, 13(1), 38-40. URL: http://edition.pagesuite-professional.co.uk//launch.aspx?eid=0d492b24-092f-4b2c-8132-b3a895356fc8

Spitaletta, Jason A. (2015, September): ISIL’s Use of Ritualistic Decapitations as Psychological Warfare. In: Allison Astorino-Courtois et al. (Eds.): White Paper on SMA Support to SOCCENT: ISIL Influence and Resolve. (SMA Periodic Publication). Boston: NSI, 23-26. URL: http://nsiteam.com/social/wp-content/uploads/2016/01/ISIL-Influence-and-Resolve.pdf

Steckman, Laura (2014, December): Branding the Caliphate? Online Media Framing from a Self-Proclaimed State. In: Hriar Cabayan; Sarah Canna (Eds.): Multi-Method Assessment of ISIL. (SMA White Volume). Boston: NSI, 80-86. URL: http://nsiteam.com/social/wp-content/uploads/2016/01/Multi-Method-Assessment-of-ISIL.pdf

Stern, Jessica; Berger, J. M. (2015): The Electronic Brigades. In: ISIS: The State of Terror. New York: HarperCollins, 147-176.

Stockton, Paul N.; Golabek-Goldman, Michele (2014, June): Prosecuting Cyberterrorists: Applying Traditional Jurisdictional Frameworks to a Modern Threat. Stanford Law & Policy Review, 25(2), 211-268. URL: https://journals.law.stanford.edu/stanford-law-policy-review/print/volume-25/issue-2/prosecuting-cyberterrorists-applying-traditional-jurisdictional-frameworks

St-Pierre, Yan (2015, Fall): Re-Enforcing Radicalisation with Bad PR? The Nigerian Army’s Handling of Boko Haram. Journal for Deradicalization, 4, 44-70. URL: http://journals.sfu.ca/jd/index.php/jd/article/view/25

Sullivan, Rachel (2014): Live-Tweeting Terror: A Rhetorical Analysis of @HSMPress_ Twitter Updates during the 2013 Nairobi Hostage Crisis. Critical Studies on Terrorism, 7(3), 422-433. DOI: http://doi.org/10.1080/17539153.2014.955300

Tarabay, Jamie et al. (2015, March 20): To its Citizens, ISIS Shows a Softer Side. Vocativ. URL: http://www.vocativ.com/world/isis-2/to-its-citizens-isis-also-shows-a-softer-side

Taylor, Max (2015): Criminogenic Qualities of the Internet. Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide, 8(2), 97-106. DOI: http://doi.org/10.1080/17467586.2015.1065082

Tekwani, Shyam (2015): Media, Information Revolution, and Terrorism in Southeast Asia. In: Paul J. Smith (Ed.): Terrorism and Violence in Southeast Asia: Transnational Challenges to States and Regional Stability. Abingdon: Routledge, 227-248. (Original work published 2005)

Tinnes, Judith (2015, February): Although the (Dis-)Believers Dislike it: A Backgrounder on IS Hostage Videos – August - December 2014. Perspectives on Terrorism, 9(1), 76-94. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/403

Tombul, Fatih; Akdogan, Huseyin (2016, February): How Do Terrorist Organizations Use Information Technologies? Understanding Cyber Terrorism. Middle East Review of Public Administration (MERPA), 2(1). URL: https://merpa.scholasticahq.com/article/583-how-do-terrorist-organizations-use-information-technologies-understanding-cyber-terrorism

Torok, Robyn (2013, December): Developing an Explanatory Model for the Process of Online Radicalisation and Terrorism. Security Informatics, 2, Article 6. DOI: http://doi.org/10.1186/2190-8532-2-6

Torres-Soriano, Manuel R. (2016): The Caliphate Is not a Tweet away: The Social Media Experience of Al Qaeda in the Islamic Maghreb. Studies in Conflict & Terrorism, 39(11), 968-981. DOI: http://dx.doi.org/10.1080/1057610X.2016.1159430

Torres Soriano, Manuel R. (2016, March): The Limits of Cyberterrorism. In: Hedwig Giusto (Ed.): Daesh and the Terrorist Threat: From the Middle East to Europe. [e-Book]. Brussels; Rome: Foundation for European Progressive Studies (FEPS); Fondazione Italianieuropei, 108-114. URL: http://www.feps-europe.eu/en/publications/details/376

Trottier, Daniel (2015, December): Coming to Terms with Social Media Monitoring: Uptake and early Assessment. Crime, Media, Culture, 11(3), 317-333. DOI: http://doi.org/10.1177/1741659015593390

Tuitel, Ruben (2016): Defining Cyberterrorism. per Concordiam, 7(2), 10-17. URL: http://perconcordiam.com/perCon_V7N2_ENG.pdf

Udoh, Tommy Victor (2016): Online Extremism in Nigeria. per Concordiam, 7(2), 28-33. URL: http://perconcordiam.com/perCon_V7N2_ENG.pdf

van Munster, Rens (2015): Inside War: Counterinsurgency and the Visualization of Violence. In: Rens van Munster; Casper Sylvest (Eds.): Documenting World Politics: A Critical Companion to IR and Non-Fiction Film. (Popular Culture and World Politics). Abingdon: Routledge, 114-132.

Veerasamy, N.; Grobler, M. M. (2015): Logic Tester for the Classification of Cyberterrorism Attacks. International Journal of Cyber Warfare and Terrorism, 5(1), 30-46. DOI: http://doi.org/10.4018/IJCWT.2015010103

Veilleux-Lepage, Yannick (2016, January): Paradigmatic Shifts in Jihadism in Cyberspace: The Emerging Role of Unaffiliated Sympathizers in Islamic State’s Social Media Strategy. Journal of Terrorism Research, 7(1), 36-51. DOI: http://doi.org/10.15664/jtr.1183

Vergani, Matteo (2014): Neojihadism and Muslim–Christian Relations in the Mindanao Resistance Movement: A Study of Facebook Digital Narratives. Islam and Christian–Muslim Relations, 25(3), 357-372. DOI: http://doi.org/10.1080/09596410.2014.902182

Vergani, Matteo; Bliuc, Ana-Maria (2015): The Evolution of the ISIS’ Language: A Quantitative Analysis of the Language of the First Year of Dabiq Magazine. Sicurezza, Terrorismo e Società, 2, 7-20. URL: http://www.sicurezzaterrorismosocieta.it/wp-content/uploads/2015/12/Vergani-Bliuc_SicTerSoc_book-2.pdf

Vergani, Matteo; Zuev, Dennis (2015): Neojihadist Visual Politics: Comparing YouTube Videos of North Caucasus and Uyghur Militants. Asian Studies Review, 39(1), 1-22. DOI: http://doi.org/10.1080/10357823.2014.976171

Vidino, Lorenzo (2016, March): Keyboard Jihadism or Violent Militancy: The Phenomenon in Italy. In: Hedwig Giusto (Ed.): Daesh and the Terrorist Threat: From the Middle East to Europe. [e-Book]. Brussels; Rome: Foundation for European Progressive Studies (FEPS); Fondazione Italianieuropei, 135-143. URL: http://www.feps-europe.eu/en/publications/details/376

Volf, Irina (2015): Hizb ut-Tahrir in the Press II: Exploring Differences between Academic Discourses and Editorial Choices in Europe and Central Asia. conflict & communication online, 14(1). URL: http://www.cco.regener-online.de/2015_1/abstr_engl/volf2015_abstr_engl.html

Wadhwa, Pooja; Bhatia, M. P. S. (2015): An Approach for Dynamic Identification of Online Radicalization in Social Networks. Cybernetics and Systems, 46(8), 641-665. DOI: http://doi.org/10.1080/01969722.2015.1058665

Wadhwa, Pooja; Bhatia, M. P. S. (2015): Classification of Radical Messages on Twitter Using Security Associations. In: Biju Issac; Nauman Israr (Eds.): Case Studies in Secure Computing: Achievements and Trends. Boca Raton: CRC Press, 273-294.

Wadhwa, Pooja; Bhatia, M. P. S. (2015): Measuring Radicalization in Online Social Networks Using Markov Chains. Journal of Applied Security Research, 10(1), 23-47. DOI: http://doi.org/10.1080/19361610.2015.972265

Wadhwa, Pooja; Bhatia, M. P. S. (2016): New Metrics for Dynamic Analysis of Online Radicalization. Journal of Applied Security Research, 11(2), 166-184. DOI: http://doi.org/10.1080/19361610.2016.1137203

Walker, Clive; Conway, Maura (2015): Online Terrorism and Online Laws. Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide, 8(2), 156-175. DOI: http://doi.org/10.1080/17467586.2015.1065078

Weidmann, Nils B. (2015, September): On the Accuracy of Media-Based Conflict Event Data. Journal of Conflict Resolution, 59(6), 1129-1149. DOI: http://doi.org/10.1177/0022002714530431

Weimann, Gabriel (2015): Terror and the Internet. In: James D. Wright (Ed.): International Encyclopedia of the Social & Behavioral Sciences. (2nd ed.). Amsterdam: Elsevier, 227-236. DOI: http://doi.org/10.1016/B978-0-08-097086-8.95091-8

Weimann, Gabriel (2015, March): Terrorist Migration to Social Media. Georgetown Journal of International Affairs, 16(1), 180-187.

Weimann, Gabriel (2016): Going Dark: Terrorism on the Dark Web. Studies in Conflict & Terrorism, 39(3), 195-206. DOI: http://doi.org/10.1080/1057610X.2015.1119546

Weimann, Gabriel (2016): The Emerging Role of Social Media in the Recruitment of Foreign Fighters. In: Andrea de Guttry; Francesca Capone; Christophe Paulussen (Eds.): Foreign Fighters under International Law and beyond. The Hague: T.M.C. Asser Press/Springer, 77-96. DOI: http://doi.org/10.1007/978-94-6265-099-2_6

Weimann, Gabriel (2016, June): Terrorist Migration to the Dark Web. Perspectives on Terrorism, 10(3), 40-44. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/513

Weimann, Gabriel; Jost, Jannis (2015, July): Neuer Terrorismus und Neue Medien. Zeitschrift für Außen- und Sicherheitspolitik, 8(3), 369-388. DOI: http://doi.org/10.1007/s12399-015-0493-5

Wessler, Hartmut; Rinke, Eike Mark; Löb, Charlotte (2016, April): Should we Be Charlie? A Deliberative Take on Religion and Secularism in Mediated Public Spheres. Journal of Communication, 66(2), 314-327. DOI: http://doi.org/10.1111/jcom.12213 URL: http://mkw.uni-mannheim.de/prof_dr_hartmut_wessler/dr_eike_rinke/publikationen/Wessler_et_al-2016-Journal_of_Communication.pdf

Wild, Phoebe (2014): Sam Fisher and the “War on Terror”: An Analysis of Splinter Cell in a Post-9/11 Context. Critical Studies on Terrorism, 7(3), 434-445. DOI: http://doi.org/10.1080/17539153.2014.953309

Williams, Matthew L.; Burnap, Pete (2016): Cyberhate on Social Media in the Aftermath of Woolwich: A Case Study in Computational Criminology and Big Data. British Journal of Criminology, 56(2), 211-238. DOI: http://doi.org/10.1093/bjc/azv059

Williams, Michael J.; Horgan, John G.; Evans, William P. (2016): The Critical Role of Friends in Networks for Countering Violent Extremism: Toward a Theory of Vicarious Help-Seeking. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 45-65. DOI: http://dx.doi.org/10.1080/19434472.2015.1101147

Williams, Roy (2015): Fractured Narratives and Pop-up Diaspora: Re-Theorizing the Capillaries of Power, Terror and Intimacy. Dynamics of Asymmetric Conflict: Pathways toward terrorism and genocide, 8(2), 134-155. DOI: http://doi.org/10.1080/17467586.2015.1065074

Winter, Charlie (2015, June): Islamic State Propaganda: Key Elements of the Group’s Messaging. Terrorism Monitor, 13(12), 7-11. URL: http://www.jamestown.org/uploads/media/TerrorismMonitorVol13Issue12_03.pdf

Winter, Charlie (2015, October 6): Fishing and Ultraviolence: So-Called Islamic State is Known for its Brutality. But it’s also Hooking People in far Subtler Ways. BBC News. URL: http://www.bbc.co.uk/news/resources/idt-88492697-b674-4c69-8426-3edd17b7daed

Winter, Charlie (2016, March 23): ISIS is Using the Media against itself. The Atlantic. URL: http://www.theatlantic.com/international/archive/2016/03/isis-propaganda-brussels/475002

Winter, Charlie; Ingram, Haroro J. (2016, June 17): How ISIS Weaponized the Media after Orlando. The Atlantic. URL: http://www.theatlantic.com/international/archive/2016/06/isis-orlando-shooting/487574

Wright, Julia E.; Bachmann, Michael (2015, May): Inciting Criminal Violence: An Examination of Al Qaida’s Persuasive Devices in the Digital World. Journal of Terrorism Research, 6(2), 70-82. DOI: http://doi.org/10.15664/jtr.1156

Wright, Marie (2016, April): Domestic Terrorism, Cyber-Radicalization, and American College Students. The Forensic Examiner. URL: http://www.theforensicexaminer.com/2016/201604-domestic-terrorism.php

Wright, Shaun et al. (2016, May): Resurgent Insurgents: Quantitative Research into Jihadists who Get Suspended but Return on Twitter. Journal of Terrorism Research, 7(2), 1-13. DOI: http://doi.org/10.15664/jtr.1213

Wyszomierski, Lauren E. (2015): Boko Haram and the Discourse of Mimicry: A Critical Discourse Analysis of Media Explanations for Boko Haram’s Improved Video Propaganda Quality. Critical Studies on Terrorism, 8(3), 503-515. DOI: http://doi.org/10.1080/17539153.2015.1091657

Yanagizawa-Drott, David (2014): Propaganda and Conflict: Evidence from the Rwandan Genocide. The Quarterly Journal of Economics, 129(4), 1947-1994. DOI: http://doi.org/10.1093/qje/qju020 URL: http://web.natur.cuni.cz/~houdek3/papers/Yanagizawa%20et%20al%202014.pdf

Yarchi, Moran; Galily, Yair; Tamir, Ilan (2015): Rallying or Criticizing? Media Coverage of Authorities’ Reaction to Terror Attacks Targeting Sporting Events. Studies in Conflict & Terrorism, 38(12), 1008-1021. DOI: http://doi.org/10.1080/1057610X.2015.1076644

Yasin, Nur Azlin Mohamed (2015, May): Impact of ISIS’ Online Campaign in Southeast Asia. Counter Terrorist Trends and Analysis, 7(4), 26-32. URL: http://www.rsis.edu.sg/wp-content/uploads/2015/06/CTTA-May-2015.pdf

Yilmaz, Kamil; Güneştaş, Murat; Başibüyük, Oğuzhan (2016): Cyber Terrorism: Motivation and Method on Global Scale and the Situation in Turkey. In: Sıddık Ekici et al. (Eds.): Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism Operations. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 125). Amsterdam: IOS Press, 82-101. DOI: http://doi.org/10.3233/978-1-61499-613-2-82

Young, Robert (2015): Going Fifth Freedom: Fighting the War on Terror in the Splinter Cell: Blacklist Video Game. Critical Studies on Terrorism, 8(1), 147-162. DOI: http://doi.org/10.1080/17539153.2015.1009750

Yunos, Zahri; Ahmad, Rabiah; Sabri, Nor Amalina Mohd (2015): A Qualitative Analysis for Evaluating a Cyber Terrorism Framework in Malaysia. Information Security Journal: A Global Perspective, 24(1-3), 15-23. DOI: http://doi.org/10.1080/19393555.2014.998844

Yusha’u, Muhammad Jameel (2014, March): Nigerian or British: Muslim Identity and the Framing of Umar Farouk Abdulmutallab in the British Press. Journal of Arab & Muslim Media Research, 7(1), 75-92. DOI: http://doi.org/10.1386/jammr.7.1.75_1

Yusha’u, Muhammad Jameel (2015, June): Extremism or Terrorism: Communicating Islamophobia on YouTube in the Norwegian Attacks. Journal of Arab & Muslim Media Research, 8(2), 171-191. DOI: http://doi.org/10.1386/jammr.8.2.171_1

Zech, Steven T.; Kelly, Zane M. (2015, May): Off with their Heads: The Islamic State and Civilian Beheadings. Journal of Terrorism Research, 6(2), 83-93. DOI: http://doi.org/10.15664/jtr.1157

Zelin, Aaron Y. (2015, August): Picture or it didn’t Happen: A Snapshot of the Islamic State’s Official Media Output. Perspectives on Terrorism, 9(4), 85-97. URL: http://www.terrorismanalysts.com/pt/index.php/pot/article/view/445

Zelizer, Barbie (2005, Summer): Death in Wartime: Photographs and the “Other War” in Afghanistan. The International Journal of Press/Politics, 10(3), 26-55. DOI: http://doi.org/10.1177/1081180X05278370 URL: http://repository.upenn.edu/cgi/viewcontent.cgi?article=1072&context=asc_papers

Zholdoshbaev, Ruslan (2016): Assessing the Risks of Cyber Terrorism in Central Asian Countries. In: Sıddık Ekici et al. (Eds.): Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism Operations. (NATO Science for Peace and Security Series – E: Human and Societal Dynamics, Vol. 125). Amsterdam: IOS Press, 102-106. DOI: http://doi.org/10.3233/978-1-61499-613-2-102

Zollmann, Florian (2015, December): Bad News from Fallujah. Media, War & Conflict, 8(3), 345-367. DOI: http://doi.org/10.1177/1750635215585612

Zoto, Edval (2015, February): Factors for the Success of Jihadist Information Operations in Social Media. CTX, 5(1). URL: https://globalecco.org/factors-for-the-success-of-jihadist-information-operations-in-social-media

Zywietz, Bernd (2015, September): Islamistische Videopropaganda und die Relevanz ihrer Ästhetik. Die Kriminalpolizei, 9/2015. URL: http://www.kriminalpolizei.de/ausgaben/2015/september/detailansicht-september/artikel/islamistische-videopropaganda-und-die-relevanz-ihrer-aesthetik.html

Grey Literature

Abou-Khalil, Naji; Hargreaves, Laurence (2015, April): Libyan Television and its Influence on the Security Sector. (USIP Special Report 364). URL: http://www.usip.org/publications/2015/04/30/the-role-of-media-in-shaping-libyas-security-sector-narratives

Aday, Sean et al. (2010, September): Blogs and Bullets: New Media in Contentious Politics. (USIP Peaceworks, No. 65). URL: http://www.usip.org/publications/blogs-and-bullets-new-media-in-contentious-politics

Aday, Sean et al. (2012, July): Blogs and Bullets II: New Media and Conflict after the Arab Spring. (USIP Peaceworks, No. 80). URL: http://www.usip.org/publications/blogs-and-bullets-ii-new-media-and-conflict-after-the-arab-spring

Ahmed, Mubaraz; George, Fred Lloyd (2016, July): A War of Keywords: How Extremists are Exploiting the Internet and what to Do about it. (Centre on Religion & Geopolitics [CRG] / Digitalis Reputation Report). URL: http://tonyblairfaithfoundation.org/religion-geopolitics/reports-analysis/report/war-keywords

Ali, Rashad (2015, February): Blasphemy, Charlie Hebdo, and the Freedom of Belief and Expression: The Paris Attacks and the Reactions. (ISD Briefing Paper). URL: http://www.strategicdialogue.org/wp-content/uploads/2016/02/Freedom_of_expression_02_15_WEB_FINAL_VS3-FINAL.pdf

Alkhouri, Laith; Kassirer, Alex (2016, July): Tech for Jihad: Dissecting Jihadists’ Digital Toolbox. (Flashpoint Report). URL: https://www.flashpoint-intel.com/home/assets/Media/TechForJihad.pdf

Baker, Paul; McEnery, Tony (2015, December): The British Press and Radicalisation. (MEND Essay). URL: http://www.radicalisationresearch.org/debate/baker-british-press-and-radicalisation

Bartlett, Jamie; Krasodomski-Jones, Alex (2015, March): Online Anonymity: Islamic State and Surveillance. (DEMOS Report). URL: http://www.demos.co.uk/project/online-anonymity-islamic-state-and-surveillance

Bartlett, Jamie; Krasodomski-Jones, Alex (2015, October): Counter-Speech: Examining Content that Challenges Extremism Online. (DEMOS Report). URL: http://www.demos.co.uk/project/counter-speech

Bartlett, Jamie; Krasodomski-Jones, Alex (2016, June): Counter-Speech on Facebook: UK and France. (DEMOS Report). URL: http://www.demos.co.uk/project/counter-speech-on-facebook-uk-and-france

Bartlett, Jamie; Reynolds, Louis (2015, September): The State of the Art 2015: A Literature Review of Social Media Intelligence Capabilities for Counter-Terrorism. (DEMOS Report). URL: http://www.demos.co.uk/project/state-of-the-art-2015

Benjamin, S. (2016, July): The French-Language Media Entity Ansar At-Tawhid and its Role in ISIS Terror Activity – Part I: Operational Aspects, Indications of Influence on Larossi Abballa. (JTTM Report). URL: http://www.memrijttm.org/the-french-language-media-entity-ansar-at-tawhid-and-its-role-in-isis-terror-activity-part-i-operational-aspects-indications-of-influence-on-larossi-abballa.html

Bergen, Peter (2016, July): n.t. Testimony presented at the Homeland Security & Governmental Affairs Permanent Subcommittee on Investigations Hearing “ISIS Online: Countering Terrorist Radicalization & Recruitment on the Internet & Social Media”, July 6, 2016. URL: http://www.hsgac.senate.gov/download/bergen-testimony_psi-2016-07-05

Berger, J. M. (2016, August): Promoting Disengagement from Violent Extremism. (ICCT Policy Brief). DOI: http://dx.doi.org/10.19165/2016.2.05

Berger, J. M.; Morgan, Jonathon (2015, March): The ISIS Twitter Census: Defining and Describing the Population of ISIS Supporters on Twitter. (The Brookings Project on U.S. Relations with the Islamic World Analysis Paper No. 20). URL: http://www.brookings.edu/research/papers/2015/03/isis-twitter-census-berger-morgan

Berger, J. M.; Perez, Heather (2016, February): The Islamic State’s Diminishing Returns on Twitter: How Suspensions are Limiting the Social Networks of English-Speaking ISIS Supporters. (GW Program on Extremism Occasional Paper). URL: https://cchs.gwu.edu/sites/cchs.gwu.edu/files/downloads/Berger_Occasional%20Paper.pdf

Berton, Beatrice; Pawlak, Patryk (2015, January): Cyber Jihadists and their Web. (ISS Issue Brief). URL: http://www.iss.europa.eu/de/publikationen/detail/article/cyber-jihadists-and-their-web

Biagini, Raymond B. (2015, July): n.t. Testimony presented at the U.S. House of Representatives Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies Hearing “Promoting and Incentivizing Cybersecurity Best Practices”, July 28, 2015. URL: http://docs.house.gov/meetings/HM/HM08/20150728/103814/HHRG-114-HM08-Wstate-BiaginiR-20150728.pdf

Brown, Ian; Cowls, Josh (2015, November): Check the Web: Assessing the Ethics and Politics of Policing the Internet for Extremist Material. (VOX-Pol Report). URL: http://www.voxpol.eu/check-the-web

Bunzel, Cole (2016, July 18): “Come Back to Twitter”: A Jihadi Warning against Telegram. Jihadica. URL: http://www.jihadica.com/come-back-to-twitter/

Busher, Joel (2015, July): What Part do Social Networks Play in Radicalisation? (PACCS Briefing). URL: http://www.radicalisationresearch.org/debate/2015-radicalisation-briefings

Camstoll Group, The (2016, April): Use of Social Media by Terrorist Fundraisers & Financiers. (Report). URL: https://www.camstoll.com/research/terrorist-fundraisers-financiers-use-social-media

Canbegi, Halil Ibrahim (2016, April): Google Based Reactions to ISIS’s Attacks: A Statistical Analysis. (GLOBAL Policy Brief, No. 6). URL: http://globalpse.org/en/google-based-reactions-to-isis-attacks

Chen, Tomas M. et al. (2014, June): Cyberterrorism and the News Media – Final Report. (Cyberterrorism Project Research Report No. 3). URL: http://www.cyberterrorism-project.org/wp-content/uploads/2014/06/News-Media-Report.pdf

Dauber, Cori E.; Robinson, Mark (2015, July 6): ISIS and the Hollywood Visual Style. Jihadology. URL: http://jihadology.net/2015/07/06/guest-post-isis-and-the-hollywood-visual-style

Department for Education; Home Office, UK Government (2015, July): How Social Media is Used to Encourage Travel to Syria and Iraq: Briefing Note for Schools. URL: https://www.gov.uk/government/publications/the-use-of-social-media-for-online-radicalisation

Dorsey, James M. (2015, May): Soccer vs. Jihad: A Draw. (RSIS Working Paper, No. 292). URL: http://www.rsis.edu.sg/rsis-publication/rsis/wp292

Ducol, Benjamin et al. (2016, May): Assessment of the State of Knowledge: Connections between Research on the Social Psychology of the Internet and Violent Extremism. (TSAS Working Paper Series, No. 16-05). URL: http://tsas.ca/tsas_library_entry/tsas-wp16-05-assessment-of-the-state-of-knowledge-connections-between-research-on-the-social-psychology-of-the-internet-and-violent-extremism

El-Badawy, Emman; Comerford, Milo; Welby, Peter (2015, October): Inside the Jihadi Mind: Understanding Ideology and Propaganda. (Tony Blair Faith Foundation Report). URL: http://tonyblairfaithfoundation.org/religion-geopolitics/reports-analysis/report/inside-jihadi-mind

Elledge, Katrina; Patrikarakos, David; Winter, Charlie (2015, November): Cyber Propaganda: From how to Start a Revolution to how to Beat ISIS. (Legatum Institute “Beyond Propaganda” Series Report). URL: http:// www.li.com/activities/publications/cyber-propaganda-from-how-to-start-a-revolution-to-how-to-beat-isis

Fainberg, Alisa (2016, February): The Islamic State Speaks Russian – A New Market for ISIS Propaganda. (ICT JWMG Insights). URL: http://www.ict.org.il/Article/1598/The-Islamic-State-speaks-Russian

Fakude, Thembisa (2014, December): Arab World Journalism in a Post-Beheading Era. (Al Jazeera Center for Studies Report). URL: http://studies.aljazeera.net/en/reports/2014/12/2014121095622836950.html

Fakude, Thembisa (2016, April): Media Coverage of the Paris and Brussels Attacks – What was Different? (Al Jazeera Center for Studies Report). URL: http://studies.aljazeera.net/mritems/Documents/2016/4/3/7d56d2851cd04afbbd5d603fafaa1945_100.pdf

Fazli, Reza; Johnson, Casey; Cooke, Peyton (2015, September): Understanding and Countering Violent Extremism in Afghanistan. (USIP Special Report 379). URL: http://www.usip.org/publications/2015/09/03/understanding-and-countering-violent-extremism-in-afghanistan

Ferguson, Kate (2016, March): Countering Violent Extremism through Media and Communication Strategies: A Review of the Evidence. (PaCCS Report). URL: http://www.paccsresearch.org.uk/news/countering-violent-extremism-new-report

Fernandez, Alberto M. (2015, October): Here to Stay and Growing: Combating ISIS Propaganda Networks. (The Brookings Project on U.S. Relations with the Islamic World, U.S.-Islamic World Forum Papers 2015). URL: http://www.brookings.edu/research/papers/2015/10/combating-isis-propaganda-fernandez

Fernandez, Alberto M. (2016, May): Opportunity or Necessity? The Islamic State’s Cluster Video Strategy. (MEMRI Daily Brief No. 89). URL: http://www.memri.org/report/en/0/0/0/0/0/0/9191.htm

Fernandez, Alberto M. (2016, July): n.t. Testimony presented at the Homeland Security & Governmental Affairs Permanent Subcommittee on Investigations Hearing “ISIS Online: Countering Terrorist Radicalization & Recruitment on the Internet & Social Media”, July 6, 2016. URL: http://www.hsgac.senate.gov/download/fernandez-testimony_psi-2016-07-05

Fidler, David P. (2015, June): Countering Islamic State Exploitation of the Internet. (CFR Cyber Brief). URL: http://www.cfr.org/cybersecurity/countering-islamic-state-exploitation-internet/p36644

Finch, Brian E. (2015, July): n.t. Testimony presented at the U.S. House of Representatives Committee on Homeland Security, Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies Hearing “Promoting and Incentivizing Cybersecurity Best Practices”, July 28, 2015. URL: http://docs.house.gov/meetings/HM/HM08/20150728/103814/HHRG-114-HM08-Wstate-FinchB-20150728.pdf

Forcese, Craig; Roach, Kent (2015, January): Terrorist Babble and the Limits of the Law: Assessing a Prospective Canadian Terrorism Glorification Offense. (TSAS Working Paper Series, No. 15-02). URL: http://library.tsas.ca/entries/tsas-wp15-02terrorist-babble-and-the-limits-of-the-law-assessing-a-prospective-canadian-terrorism-glorifi-cation-offense

Frenett, Ross; Dow, Moli (2015, September): One to One Online Interventions: A Pilot CVE Methodology. (ISD / Curtin University Report). URL: http://www.strategicdialogue.org/wp-content/uploads/2016/04/One2One_Web_v9.pdf

Gambhir, Harleen K. (2014, August): Dabiq: The Strategic Messaging of the Islamic State. (ISW Backgrounder). URL: http://www.understandingwar.org/backgrounder/dabiq-strategic-messaging-islamic-state-0

Gemmerli, Tobias (2015, April): Extremism on the Internet: The Fight against Online Radicalisation Starts Offline. (DIIS Policy Brief). URL: http://en.diis.dk/en/research/campaigns-targeting-extremism-on-the-internet-no-documented-effect

Gill, Paul et al. (2015, November): What Are the Roles of the Internet in Terrorism? Measuring Online Behaviours of Convicted UK Terrorists. (VOX-Pol Report). URL: http://voxpol.eu/wp-content/uploads/2015/11/DCUJ3518_VOX_Lone_Actors_report_02.11.15_WEB.pdf

Harrow, Martin (2011, May): Video-Recorded Decapitations: A Seemingly Perfect Terrorist Tactic that did not Spread. (DIIS Working Paper 2011:08). URL: http://www.diis.dk/en/research/video-recorded-decapitations

Huey, Laura (2015, September): No Sandwiches here: Representations of Women in Dabiq and Inspire Magazines. (TSAS Working Paper Series, No. 15-04). URL: http://library.tsas.ca/entries/tsas-wp15-04-no-sandwiches-here-representations-of-women-in-dabiq-and-inspire-magazines

Huey, Laura; Peladeau, Hillary (2016, May): Cheering on the Jihad: An Exploration of Women’s Participation in Online Pro-Jihadist Networks. (TSAS Working Paper Series, No. 16-07). URL: http://tsas.ca/tsas_library_entry/tsas-wp16-07-cheering-on-the-jihad-an-exploration-of-womens-participation-in-online-pro-jihadist-networks

Hussain, Ghaffar; Saltman, Erin Marie (2014, May): Jihad Trending: A Comprehensive Analysis of Online Extremism and How to Counter it. (Quilliam Report). URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/jihad-trending-quilliam-report.pdf

Ingram, Haroro J. (2016, June): A Brief History of Propaganda during Conflict: Lessons for Counter-Terrorism Strategic Communications. (ICCT Research Paper). DOI: http://dx.doi.org/10.19165/2016.1.06

Ingram, Haroro J.; Reed, Alastair (2016, June): Lessons from History for Counter-Terrorism Strategic Communications. (ICCT Policy Brief). DOI: http://dx.doi.org/10.19165/2016.2.04

Institute for Policy Analysis of Conflict (IPAC) (2015, October): Online Activism and Social Media Usage among Indonesian Extremists. (IPAC Report No. 24). URL: http://www.understandingconflict.org/en/conflict/read/46/Online-Activism-and-Social-Media-Usage-Among-Indonesian-Extremists

International Association of Chiefs of Police (2014). Online Radicalization to Violent Extremism. (Awareness Brief). URL: www.theiacp.org/portals/0/pdfs/RadicalizationtoViolentExtremismAwarenessBrief.pdf

International Institute for Counter-Terrorism (ICT)’s Jihadi Websites Monitoring Group (JWMG) (2016, July): Al-Sumud Magazine – A Review. (ICT Articles). URL: https://www.ict.org.il/Article/1732/al-sumud-magazine-a-review

Joinson, Adam; McGinn, Irene (2015, July): Is the Internet an Incubator for Radicalisation? (PACCS Briefing). URL: http://www.radicalisationresearch.org/debate/2015-radicalisation-briefings

Katz, Rita (2014, June 26): Follow ISIS on Twitter: A Special Report on the Use of Social Media by Jihadists. inSITE Blog on Terrorism and Extremism. URL: http://news.siteintelgroup.com/blog/index.php/entry/192-follow-isis-on-twitter

Katz, Rita (2015, April 11): How the Islamic State is still Thriving on Twitter. inSITE Blog on Terrorism and Extremism. URL: http://news.siteintelgroup.com/blog/index.php/entry/377-how-the-islamic-state-is-still-thriving-on-twitter

Khayat, M. (2015, October): Jihadis Shift to Using Secure Communication App Telegram’s Channels Service. (MEMRI Inquiry & Analysis Series Report No.1198). URL: http://www.memri.org/report/en/0/0/0/0/0/0/8828.htm

King, Meg; Clary, Grayson (2015, May): Confronting Terror-Affiliated Hacktivists. (Wilson Briefs). URL: https://www.wilsoncenter.org/publication/confronting-terror-affiliated-hacktivists

LaGraffe, Meagen M. (2016, July): n.t. Testimony presented at the Homeland Security & Governmental Affairs Permanent Subcommittee on Investigations Hearing “ISIS Online: Countering Terrorist Radicalization & Recruitment on the Internet & Social Media”, July 6, 2016. URL: http://www.hsgac.senate.gov/download/lagraffe-testimony_psi-2016-07-05

Lia, Brynjar (2015, March 14): The Islamic State (IS) and its Mediatized Barbarism. The New Middle East Blog. URL: https://newmeast.wordpress.com/2015/03/14/the-islamic-state-is-and-its-mediatized-barbarism

Ligon, Gina et al. (2014, November): The Islamic State of Iraq and the Levant: Branding, Leadership Culture and Lethal Attraction. (Report to the Office of University Programs, Science and Technology Directorate, U.S. Department of Homeland Security). URL: https://www.start.umd.edu/pubs/START_ISIL%20Branding%20Leadership%20Culture%20and%20Lethal%20Attraction_Ligon_Nov2014.pdf

Lohlker, Rüdiger (2016, January): Telegrams against Wishful Thinking. (Arab Studies Occasional Papers, No. 7). URL: https://islamicstudiespapers.files.wordpress.com/2016/01/astop-7.pdf

Lynch, Marc; Freelon, Deen; Aday, Sean (2014, January): Blogs and Bullets III: Syria’s Socially Mediated Civil War. (USIP Peaceworks, No. 91). URL: http://www.usip.org/publications/syria-s-socially-mediated-civil-war

Macdonald, Stuart et al. (2014, June): Terrorists’ Use of the Internet: A Symposium – Final Report. (Cyberterrorism Project Research Report No. 4). URL: http://www.cyberterrorism-project.org/wp-content/uploads/2014/06/2014-Symposium-Report.pdf

Macdonald, Stuart et al. (2015, November): Online Terrorist Magazines: Preliminary Findings. (Cyberterrorism Project Research Report No. 5). URL: http://www.cyberterrorism-project.org/wp-content/uploads/2015/11/CTP-2015-Report-Nov-03.pdf

Maggioni, Monica; Magri, Paolo (2015, March): Twitter e jihad: La comunicazione dell’Isis. (ISPI Report). URL: http://www.ispionline.it/it/pubblicazione/twitter-e-jihad-la-comunicazione-dellisis-12842

Manning, Ruth; La Bau, Courtney (2015, August): “In and out of Extremism”: How Quilliam Helped 10 Former Far-Right and Islamists Change. (Quilliam Report). URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/in-and-out-of-extremism.pdf

Mueller, Hannes; Rauh, Christopher (2016, June): Reading between the Lines: Prediction of Political Violence Using Newspaper Text. (ESOC Working Paper No. 2). URL: https://esoc.princeton.edu/wp2

Mulligan, John (2015, June): n.t. Testimony presented at the House Committee on Homeland Security Hearing “Terrorism Gone Viral: The Attack in Garland, Texas and beyond”, June 3, 2015. URL: http://docs.house.gov/meetings/HM/HM00/20150603/103513/HHRG-114-HM00-Wstate-MulliganJ-20150603.pdf

Nissen, Thomas Elkjer (2007, December): The Taliban’s Information Warfare: A Comparative Analysis of NATO Information Operations (Info Ops) and Taliban Information Activities. (Royal Danish Defence College Brief). URL: http://forsvaret.dk/fak/documents/fak/publikationer/the_talibans_information_warfare.pdf

Nissen, Thomas Elkjer (2012, March): Black and White and the 256 Shades of Grey in between – Reflections on the Question of Attribution for Psychological Operations. (Royal Danish Defence College Brief). URL: http://fak.dk/publikationer/Documents/Black%20and%20White%20NET.pdf

Ozeren, Suleyman et al. (2016, February): ISIS in Cyberspace: Findings from Social Media Research. (GLOBAL Report No. 7). URL: http://globalpse.org/en/isis-in-cyberspace-findings-from-social-media-research

Peterson, Jillian K.; Densley, James (2016): Is Social Media a Gang? Toward a Selection, Facilitation, or Enhancement Explanation of Cyber Violence. (College of Liberal Arts All Faculty Scholarship Working Paper 5). URL: http://digitalcommons.hamline.edu/cla_faculty/5/

Prucha, Nico (2015, October 26): The “Islamic State’s” Networks of Influence. Jihadica. URL: http://www.jihadica.com/the-islamic-states-networks-of-influence/

Prucha, Nico; Fisher, Ali (2015, February 9): Turning the Volume up to 11 is not Enough: Why Counter-Strategies Have to Target Extremist Clusters. Jihadica. URL: http://www.jihadica.com/turning-the-volume-up-to-11-is-not-enough-why-counter-strategies-have-to-target-extremist-clusters/

Prucha, Nico; Fisher, Ali (2015, March 23): Turning the Volume up to 11 is not Enough (Part 2): Networks of Influence and Ideological Coherence. Jihadica. URL: http://www.jihadica.com/turning-the-volume-up-to-11-is-not-enough-part-2-networks-of-influence-and-ideological-coherence/

Pues, Viktoria (2016, February): The Islamic State on Tumblr – Recruiting Western Women. (ICT Paper). URL: http://www.ict.org.il/Article/1617/ISIS-on-Social-Media

Putra, Muhammad Deri Laksamana (2016): New Media and Terrorism: Role of the Social Media to Countering Cyber Terrorism and Cyber Extremism for Effective Response. (Working Paper, University of Indonesia). URL: http://ssrn.com/abstract=2754370

Quilliam Foundation; Terrorism Research & Analysis Consortium (TRAC) (2014, December): Detailed Analysis of Islamic State Propaganda Video: Although the Disbelievers Dislike it. URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/detailed-analysis-of-islamic-state-propaganda-video.pdf

Rao, Prabha (2016, July): Online Radicalisation: The Example of Burhan Wani. (IDSA Issue Brief). URL: http://www.idsa.in/issuebrief/online-radicalisation-burhan-wani_prao_160716

Ravich, Samantha F. (Ed.) (2015, August): Cyber-Enabled Economic Warfare: An Evolving Challenge. (Hudson Institute Research Report). URL: https://s3.amazonaws.com/media.hudson.org/files/publications/2015.08CyberEnabledEconomicWarfareAnEvolvingChallenge.pdf

Ravich, Samantha F. (Ed.) (2015, November): Cyber-Enabled Economic Warfare: An Evolving Challenge (Vol. 2): Conference Summary, Survey Results, and Policy Recommendations. (Hudson Institute Research Report). URL: http://www.hudson.org/research/11890-cyber-enabled-economic-warfare-an-evolving-challenge-vol-2

Rękawek, Kacper (2015, June): Ignore them at your Peril: The (Missing?) Strategic Narrative of ISIS. (PISM Strategic File No 12 [75]). URL: http://www.pism.pl/Publications/PISM-Strategic-Files/PISM-Strategic-File-no-12-75

Russell, Jonathan; Rafiq, Haras (2016, January): Countering Islamist Extremist Narratives: A Strategic Briefing. (Quilliam Briefing). URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/countering-islamist-extremist-narratives.pdf

Ryan, Michael W. S. (2014, August): Dabiq: What Islamic State’s New Magazine Tells us about their Strategic Direction, Recruitment Patterns and Guerrilla Doctrine. (The Jamestown Foundation Hot Issues). URL: http://www.jamestown.org/programs/hotissues/single-hot-issues/?tx_ttnews[tt_news]=42702&tx_ttnews[backPid]=61&cHash=e96be5e421a55fb15bec8cddb3117985

Saifudeen, Omer Ali (2014, November): The Cyber Extremism Orbital Pathways Model. (RSIS Working Paper No. 283). URL: http://www.rsis.edu.sg/rsis-publication/rsis/wp283-the-cyber-extremism-orbital-pathways-model

Saltman, Erin Marie; Dow, Moli; Bjornsgaard, Kelsey (2016): Youth Innovation Labs: A Model for Preventing and Countering Violent Extremism. (ISD / YouthCAN Report). URL: http://www.strategicdialogue.org/wp-content/uploads/2016/07/YouthCAN-Labs.pdf

Saltman, Erin Marie; Kirt, Jas (2016): Guidance for International Youth Engagement in PVE and CVE: Youth Responses to Resolution 2250 and the UN Plan of Action to Prevent Violent Extremism. (ISD / YouthCAN Report). URL: http://www.strategicdialogue.org/wp-content/uploads/2016/06/YouthCAN-UN-PVE-Survey.pdf

Schmid, Alex P. (2014, January): Al-Qaeda’s “Single Narrative” and Attempts to Develop Counter-Narratives: The State of Knowledge. (ICCT Research Paper). DOI: http://doi.org/10.19165/2014.1.01

Schmid, Alex P. (2015, June): Challenging the Narrative of the “Islamic State”. (ICCT Research Paper). URL: http://icct.nl/publication/challenging-the-narrative-of-the-islamic-state

Selim, George (2016, July): n.t. Testimony presented at the Homeland Security & Governmental Affairs Permanent Subcommittee on Investigations Hearing “ISIS Online: Countering Terrorist Radicalization & Recruitment on the Internet & Social Media”, July 6, 2016. URL: http://www.hsgac.senate.gov/download/selim-testimony_psi-2016-07-05

Semple, Michael (2011, March): Rhetoric of Resistance in the Taliban’s Rebel Ballads. (Carr Center Working Papers Collection). URL: http://carrcenter.hks.harvard.edu/files/carrcenter/files/semple_rhetoricofresistanceinthetalibanturanas.pdf

Semple, Michael (2014): Rhetoric, Ideology, and Organizational Structure of the Taliban Movement. (USIP Peaceworks No. 102). URL: http://www.usip.org/sites/default/files/PW102-Rhetoric-Ideology-and-Organizational-Structure-of-the-Taliban-Movement.pdf

Shay, Shaul (2015, March): Egypt’s Western Front Line in the Battle against the Islamic State (in Libya). (ICT Articles). URL: http://www.ict.org.il/Article/1358/Egypts-Western-Front-Line-in-the-Battle-against-the-Islamic-State

Shemesh, M. (2016, August): The Songs of the Islamic State, Part III – Songs of Derision for West Following Brussels, Paris Attacks. (MEMRI Inquiry & Analysis Series Report No.1262). URL: http://www.memri.org/report/en/0/0/0/0/0/0/9366.htm

Siegel, Alexandra (2015, December): Sectarian Twitter Wars: Sunni-Shia Conflict and Cooperation in the Digital Age. (Carnegie Endowment for International Peace Paper CP 262). URL: http://carnegieendowment.org/2015/12/20/sectarian-twitter-wars-sunni-shia-conflict-and-cooperation-in-digital-age/in6n

Silverman, Tanya et al. (2016): The Impact of Counter-Narratives: Insights from a Year-Long Cross-Platform Pilot Study of Counter-Narrative Curation, Targeting, Evaluation and Impact. (ISD / AVE Report). URL: http://www.strategicdialogue.org/wp-content/uploads/2016/08/Impact-of-Counter-Narratives_ONLINE_1.pdf

SITE Staff (2014, October 16): Jihad through Shakespeare: The Islamic State’s Outreach to the West. inSITE Blog on Terrorism and Extremism. URL: http://news.siteintelgroup.com/blog/index.php/entry/298-jihad-through-shakespeare-the-islamic-state%E2%80%99s-outreach-to-the-west

Speckhard, Anne (2016, April): The Hypnotic Power of ISIS Imagery in Recruiting Western Youth. (ICSVE Brief Report). URL: http://www.icsve.org/brief-reports/the-hypnotic-power-of-isis-imagery-in-recruiting-western-youth-2

Stalinsky, Steven; Sosnow, R. (2015, October): The Islamic State (ISIS) Establishes “Media Points” in Syria, Iraq, Libya to Indoctrinate Caliphate Citizens and Enhance its Cyber Activities on the Ground: A One-Year Review. (MEMRI Inquiry & Analysis Series No. 1190). URL: http://www.memrijttm.org/the-islamic-state-isis-establishes-media-points-in-syria-iraq-libya-to-indoctrinate-caliphate-citizens-and-enhance-its-cyber-activities-on-the-ground-a-one-year-review.html

Steinbach, Michael B. (2015, June): n.t. Testimony presented at the House Committee on Homeland Security Hearing “Terrorism Gone Viral: The Attack in Garland, Texas and beyond”, June 3, 2015. URL: http://docs.house.gov/meetings/HM/HM00/20150603/103513/HHRG-114-HM00-Wstate-SteinbachM-20150603.pdf

Steinbach, Michael B. (2016, July): n.t. Testimony presented at the Homeland Security & Governmental Affairs Permanent Subcommittee on Investigations Hearing “ISIS Online: Countering Terrorist Radicalization & Recruitment on the Internet & Social Media”, July 6, 2016. URL: http://www.hsgac.senate.gov/download/steinbach-testimony_psi-2016-07-05

Svetoka, Sanda (Project Director) et al. (2016, May): Social Media as a Tool of Hybrid Warfare. (NATO StratCom COE Report). URL: http://www.stratcomcoe.org/social-media-tool-hybrid-warfare

Swiss Institute of Comparative Law (SICL); Council of Europe (2015, December): Filtering, Blocking and Take-Down of Illegal Content on the Internet. URL: http://www.coe.int/en/web/freedom-expression/study-filtering-blocking-and-take-down-of-illegal-content-on-the-internet

Taylor, Francis X. (2015, June): n.t. Testimony presented at the House Committee on Homeland Security Hearing “Terrorism Gone Viral: The Attack in Garland, Texas and beyond”, June 3, 2015. URL: http://docs.house.gov/meetings/HM/HM00/20150603/103513/HHRG-114-HM00-Wstate-TaylorF-20150603.pdf

Taylor, Peter (Chair) (2015, June): ISIS: Marketing Terror. (Chatham House Panel). [Video]. URL: https://www.chathamhouse.org/event/isis-marketing-terror

Vallee, Charles (2015, Summer): Digital Jihad: Al-Qaeda and the Islamic State: Dabiq vs. Inspire. (ICT Articles). URL: http://www.ict.org.il/Article/1440/Digital-Jihad-Al-Qaeda-and-the-Islamic-State-Dabiq-Inspire

Van Ginkel, Bibi T. (2015, March): Responding to Cyber Jihad: Towards an Effective Counter Narrative. (ICCT Research Paper). http://doi.org/10.19165/2015.1.02

Vidino, Lorenzo; Hughes, Seamus (2015, December): ISIS in America: From Retweets to Raqqa. (GW Program on Extremism Report). URL: https://cchs.gwu.edu/isis-in-america

Vidino, Lorenzo et al. (2015, May): Terrorist Chatter: Understanding what Terrorists Talk about. (NPSIA Working Paper Series, No. 03). URL: http://carleton.ca/npsia/wp-content/uploads/Abstract-Terrorist-Chatter.pdf

Vitale, Heather Marie; Keagle, James M. (2014, October): A Time to Tweet, as well as a Time to Kill: ISIS’s Projection of Power in Iraq and Syria. (CTNSP Defense Horizons, No 77). URL: http://ctnsp.dodlive.mil/2014/11/17/dh-077-a-time-to-tweet-as-well-as-a-time-to-kill-isiss-projection-of-power-in-iraq-and-syria

Weimann, Gabriel (2015, Winter): From Theaters to Cyberspace: Mass-Mediated Terrorism. (Worldviews for the 21st Century: A Monograph Series, Vol. 13, No. 1). URL: http://ucfglobalperspectives.org/main/wp-content/uploads/2015/03/13.1-Weimann-Monograph.pdf

Williams, Lauren (2016, February): Islamic State Propaganda and the Mainstream Media. (Lowy Institute Analysis). URL: http://www.lowyinstitute.org/publications/islamic-state-propaganda-and-mainstream-media

Winter, Charlie (2015, July): The Virtual “Caliphate”: Understanding Islamic State’s Propaganda Strategy. (Quilliam Report). URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/publications/free/the-virtual-caliphate-understanding-islamic-states-propaganda-strategy.pdf

Winter, Charlie (2015, October): Documenting the Virtual “Caliphate”. (Quilliam Report). URL: http://www.quilliamfoundation.org/wp/wp-content/uploads/2015/10/FINAL-documenting-the-virtual-caliphate.pdf

Winter, Charlie (2016, April): An Integrated Approach to Islamic State Recruitment. (ASPI Special Report). URL: https://www.aspi.org.au/publications/an-integrated-approach-to-islamic-state-recruitment

Wiskind, Claire (2016, Summer): Lone Wolf Terrorism and Open Source Jihad: An Explanation and Assessment. (ICT Articles). URL: https://www.ict.org.il/Article/1760/lone-wolf-terrorism-and-open-source-jihad-an-explanation-and-assessment

Wood, Paul (2016, July): The Pen and the Sword: Reporting ISIS. (Shorenstein Center on Media, Politics and Public Policy Discussion Paper Series, #D-101). URL: http://shorensteincenter.org/reporting-isis-paul-wood/

Zelin, Aaron Y. (2015, December): The Decline in Islamic State Media Output. (ICSR Insight). URL: http://icsr.info/2015/12/icsr-insight-decline-islamic-state-media-output

Note for the Reader

Whenever retrievable, URLs for freely available versions of subscription-based publications have been provided. Thanks to the Open Access movement, self-archiving of publications in institutional repositories or on author homepages for free public use (so-called Green Open Access) has become more common. Please note, that the content of Green Open Access documents is not necessarily identical to the officially published versions (e.g., in case of pre-prints); it might therefore not have passed through all editorial stages publishers employ to ensure quality control (peer review, copy and layout editing etc.). In some cases, articles may only be cited after getting consent by the author(s).

About the Compiler: Judith Tinnes, Ph.D., is a Professional Information Specialist. Since 2011, she works for the Leibniz Institute for Psychology Information (ZPID). Additionally, she serves as Information Resources Editor to ‘Perspectives on Terrorism’. In her editorial role, she regularly compiles bibliographies and other resources for Terrorism Research. She wrote her doctoral thesis on Internet usage of Islamist terrorists and insurgents (focus: media-oriented hostage takings). E-mail: [email protected]



Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

ENHANCING SECURITY THROUGH COLLABORATIVE RESEARCH

Perspectives on Terrorism is  a journal of the Terrorism Research Initiative and the Center for Terrorism and Security Studies

ISSN  2334-3745 (Online)

Disclaimer, Terms and Conditions