All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Role of internet in lone wolf terrorism

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F60162694%3AG42__%2F17%3A00534815" target="_blank" >RIV/60162694:G42__/17:00534815 - isvavai.cz</a>

  • Result on the web

    <a href="http://jssidoi.org/jssi/papers/papers/view/261" target="_blank" >http://jssidoi.org/jssi/papers/papers/view/261</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.9770/jssi.2017.7.2(1)" target="_blank" >10.9770/jssi.2017.7.2(1)</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Role of internet in lone wolf terrorism

  • Original language description

    For the last two decades, lone wolf terrorists in Western countries have been significantly changing their modus operandi. Part of these changes and possibly even one of their causes is the increasing use of the internet by lone wolves. This article reviews the role of the internet in the preparation of a terrorist attack as well as during the process of radicalisation of lone wolves. The possibilities and methodical flaws of lone wolf identification on the internet are also discussed. Based on current knowledge, it can be said that the Internet still has a limited role for lone wolves during the preparation of their terrorist attacks. However, it has been demonstrated, that as an efficient communication tool, the internet is of considerable importance in the process of lone wolf radicalisation. The internet is also a place where lone wolves may leak indications of their future actions. These leakages may be utilised for the identification of future lone wolf terrorists on discussion forums or radical websites using semi-automatic methods. However, the biggest drawbacks of these methods is their inability to distinguish between future lone wolf terrorists and common radical authors with no real intention on committing any terrorist act.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>SC</sub> - Article in a specialist periodical, which is included in the SCOPUS database

  • CEP classification

  • OECD FORD branch

    50902 - Social sciences, interdisciplinary

Result continuities

  • Project

  • Continuities

    S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2017

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Journal of Security and Sustainability Issues

  • ISSN

    2029-7017

  • e-ISSN

  • Volume of the periodical

    7

  • Issue of the periodical within the volume

    2

  • Country of publishing house

    LT - LITHUANIA

  • Number of pages

    8

  • Pages from-to

    185-192

  • UT code for WoS article

  • EID of the result in the Scopus database

    2-s2.0-85045006363