Terrorist and extremist groups and their sympathizers have found a costeffective resource to advance their courses by posting high-impact Websites with short shelf-lives. Because of their evanescent nature, terrorism research communities require unrestrained access to digitally archived Websites to mine their contents and pursue various types of analyses. Organizations that specialize in capturing, archiving, and analyzing Jihad terrorist Websites employ different, manual-based analysis techniques that are ‘hidden’ from the research communities. This chapter proposes the development of automated or semi-automated procedures and systematic methodologies for capturing Jihad terrorist Website data and its subsequent analyses. By analyzing the content of hyperlinked terrorist Websites and constructing visual social network maps, our study is able to generate an integrated approach to the study of Jihad terrorism, their network structure, component clusters, and cluster affinity.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
K. Albertsen, “The Paradigma Web Harvesting Environment,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.
A. Anderson, “Risk, Terrorism, and the Internet,” Knowledge, Technology & Policy, 16:2, 24-33, Summer 2003.
J. Arquilla, D.F. Ronfeldt, Advent of Netwar, Rand Report, 1996. http://www.rand.org/
C. L. Borgman, J. Furner, “Scholarly Communication and Bibliometrics,” Annual Review of Information Science and Technology, ed. B. Cronin. Information Today, Inc, 2002.
G. R. Bunt, Islam In The Digital Age E-Jihad, Online Fatwas and Cyber Islamic Environments, Pluto Press, London, 2003.
K. M. Carley, J. Reminga and N. Kamneva, “Destabilizing Terrorist Networks,” NAACSOS Conference Proceedings, Pittsburgh, PA, 2003.
Y. Carmon, “Assessing Islamist Web Site Reports Of Imminent Terror Attacks In The U.S.,” MEMRI Inquiry & Analysis Series #156, 2003.
C. C. Demchak, C. Friis, T. M. La Porte, “Webbing Governance: National Differences in Constructing the Face of Public Organizations,” Handbook of Public Information Systems, G. David Garson, ed., New York: Marcel Dekker Publishers, 2000.
W. Elison, “Netwar: Studying Rebels on the Internet,” The Social Studies, 91:127-131 May/June 2000.
D. Gibson, J. Kleinberg, P. Raghavan, “Inferring Web Communities from Link Topology,” Proceedings of the 9th ACM Conference on Hypertext and Hypermedia, ACM, 1998.
Institute for Security Technology Studies, “Examining the Cyber Capabilities of Islamic Terrorist Groups.” Report, ISTS, 2004. http://www.ists.dartmouth.edu/
B.M. Jenkins, “World Becomes the Hostage of Media-Savvy Terrorists: Commentary,” USA Today. August 22, 2004. http://www.rand.org/
R.Kay,“Web Harvesting”,Computerworld,June21,2004 http://www.computerworld.com.
A.R. Kenney, N.Y. McGovern, P. Botticelli, R. Entlich, C. Lagoze, & S. Payette, “Preservation Risk Management for Web Resources: Virtual Remote Control in Cornell’s Project Prism,” D-Lib Magazine, 8:1, 2002.
E. O. F. Reid, “Identifying a Company’s Non-Customer Online Communities: a Proto-typology,” Proceedings of the 36th Hawaii International Conference on System Sciences, 2003.
B. Reilly, G. Tuchel, J. Simon, C. Palaima, K. Norsworthy, Leslie Myrick, “Political Communications Web Archiving: Addressing Typology and Timing for Selection, Preservation and Access,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.
Research Community. PRISM. The Project for the Research of Islamist Movements. http://www.e-prism.org. MEMRI: Jihad and Terrorism Studies Project. The Middle East Research Institute (MEMRI). http://www.memri.org/jihad.html/ SITE Institute, http://www.siteinstitute.org/mission.html.
S.M. Schneider, K. Foot, M. Kimpton, & G. Jones, “Building thematic web collections: challenges and experiences from the September 11 Web Archive and the Election 2002 Web Archive,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.
S. Tekwani, “Cyberterrorism: Threat and Response,” Institute of Defence and Strategic Studies, Workshop on the New Dimensions of Terrorism, 21-22, Singapore, March 2002.
The 9/11 commission report: http://www.gpoaccess.gov/911/
Y. Tsfati, G. Weimann,“www.terrorism.com: Terror on the Internet,” Studies in Conflict & Terrorism, 25:317-332, 2002.
G. Weimann, “www.terrorism.net: How Modern Terrorism Uses the Internet,” Special Report 116, U.S. Institute of Peace, 2004. http://usip.org/pubs/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Chen, H., Qin, J., Reid, E., Zhou, Y., Sageman, M. (2008). Case Study of Jihad on the Web. In: Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds) Terrorism Informatics. Integrated Series In Information Systems, vol 18. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71613-8_11
Download citation
DOI: https://doi.org/10.1007/978-0-387-71613-8_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-71612-1
Online ISBN: 978-0-387-71613-8
eBook Packages: Business and EconomicsBusiness and Management (R0)