Skip to main content

Case Study of Jihad on the Web

A Web Mining Approach

  • Chapter

Part of the book series: Integrated Series In Information Systems ((ISIS,volume 18))

Terrorist and extremist groups and their sympathizers have found a costeffective resource to advance their courses by posting high-impact Websites with short shelf-lives. Because of their evanescent nature, terrorism research communities require unrestrained access to digitally archived Websites to mine their contents and pursue various types of analyses. Organizations that specialize in capturing, archiving, and analyzing Jihad terrorist Websites employ different, manual-based analysis techniques that are ‘hidden’ from the research communities. This chapter proposes the development of automated or semi-automated procedures and systematic methodologies for capturing Jihad terrorist Website data and its subsequent analyses. By analyzing the content of hyperlinked terrorist Websites and constructing visual social network maps, our study is able to generate an integrated approach to the study of Jihad terrorism, their network structure, component clusters, and cluster affinity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   89.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Albertsen, “The Paradigma Web Harvesting Environment,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.

    Google Scholar 

  2. A. Anderson, “Risk, Terrorism, and the Internet,” Knowledge, Technology & Policy, 16:2, 24-33, Summer 2003.

    Article  Google Scholar 

  3. J. Arquilla, D.F. Ronfeldt, Advent of Netwar, Rand Report, 1996. http://www.rand.org/

  4. C. L. Borgman, J. Furner, “Scholarly Communication and Bibliometrics,” Annual Review of Information Science and Technology, ed. B. Cronin. Information Today, Inc, 2002.

    Google Scholar 

  5. G. R. Bunt, Islam In The Digital Age E-Jihad, Online Fatwas and Cyber Islamic Environments, Pluto Press, London, 2003.

    Google Scholar 

  6. K. M. Carley, J. Reminga and N. Kamneva, “Destabilizing Terrorist Networks,” NAACSOS Conference Proceedings, Pittsburgh, PA, 2003.

    Google Scholar 

  7. Y. Carmon, “Assessing Islamist Web Site Reports Of Imminent Terror Attacks In The U.S.,” MEMRI Inquiry & Analysis Series #156, 2003.

    Google Scholar 

  8. C. C. Demchak, C. Friis, T. M. La Porte, “Webbing Governance: National Differences in Constructing the Face of Public Organizations,” Handbook of Public Information Systems, G. David Garson, ed., New York: Marcel Dekker Publishers, 2000.

    Google Scholar 

  9. W. Elison, “Netwar: Studying Rebels on the Internet,” The Social Studies, 91:127-131 May/June 2000.

    Article  Google Scholar 

  10. D. Gibson, J. Kleinberg, P. Raghavan, “Inferring Web Communities from Link Topology,” Proceedings of the 9th ACM Conference on Hypertext and Hypermedia, ACM, 1998.

    Google Scholar 

  11. Institute for Security Technology Studies, “Examining the Cyber Capabilities of Islamic Terrorist Groups.” Report, ISTS, 2004. http://www.ists.dartmouth.edu/

  12. B.M. Jenkins, “World Becomes the Hostage of Media-Savvy Terrorists: Commentary,” USA Today. August 22, 2004. http://www.rand.org/

  13. R.Kay,“Web Harvesting”,Computerworld,June21,2004 http://www.computerworld.com.

  14. A.R. Kenney, N.Y. McGovern, P. Botticelli, R. Entlich, C. Lagoze, & S. Payette, “Preservation Risk Management for Web Resources: Virtual Remote Control in Cornell’s Project Prism,” D-Lib Magazine, 8:1, 2002.

    Article  Google Scholar 

  15. E. O. F. Reid, “Identifying a Company’s Non-Customer Online Communities: a Proto-typology,” Proceedings of the 36th Hawaii International Conference on System Sciences, 2003.

    Google Scholar 

  16. B. Reilly, G. Tuchel, J. Simon, C. Palaima, K. Norsworthy, Leslie Myrick, “Political Communications Web Archiving: Addressing Typology and Timing for Selection, Preservation and Access,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.

    Google Scholar 

  17. Research Community. PRISM. The Project for the Research of Islamist Movements. http://www.e-prism.org. MEMRI: Jihad and Terrorism Studies Project. The Middle East Research Institute (MEMRI). http://www.memri.org/jihad.html/ SITE Institute, http://www.siteinstitute.org/mission.html.

  18. S.M. Schneider, K. Foot, M. Kimpton, & G. Jones, “Building thematic web collections: challenges and experiences from the September 11 Web Archive and the Election 2002 Web Archive,” 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.

    Google Scholar 

  19. S. Tekwani, “Cyberterrorism: Threat and Response,” Institute of Defence and Strategic Studies, Workshop on the New Dimensions of Terrorism, 21-22, Singapore, March 2002.

    Google Scholar 

  20. The 9/11 commission report: http://www.gpoaccess.gov/911/

  21. Y. Tsfati, G. Weimann,“www.terrorism.com: Terror on the Internet,” Studies in Conflict & Terrorism, 25:317-332, 2002.

    Article  Google Scholar 

  22. G. Weimann, “www.terrorism.net: How Modern Terrorism Uses the Internet,” Special Report 116, U.S. Institute of Peace, 2004. http://usip.org/pubs/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Chen, H., Qin, J., Reid, E., Zhou, Y., Sageman, M. (2008). Case Study of Jihad on the Web. In: Chen, H., Reid, E., Sinai, J., Silke, A., Ganor, B. (eds) Terrorism Informatics. Integrated Series In Information Systems, vol 18. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-71613-8_11

Download citation

Publish with us

Policies and ethics