Abstract
The Internet which has enabled global businesses to flourish has become the very same channel for mushrooming ‘terrorist news networks.’ Terrorist organizations and their sympathizers have found a cost-effective resource to advance their courses by posting high-impact Websites with short shelf-lives. Because of their evanescent nature, terrorism research communities require unrestrained access to digitally archived Websites to mine their contents and pursue various types of analyses. However, organizations that specialize in capturing, archiving, and analyzing Jihad terrorist Websites employ different, manualbased analyses techniques that are inefficient and not scalable. This study proposes the development of automated or semi-automated procedures and systematic methodologies for capturing Jihad terrorist Website data and its subsequent analyses. By analyzing the content of hyperlinked terrorist Websites and constructing visual social network maps, our study is able to generate an integrated approach to the study of Jihad terrorism, their network structure, component clusters, and cluster affinity.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Albertsen, K.: The Paradigma Web Harvesting Environment. In: 3rd ECDL Workshop on Web Archives, Trondheim, Norway (2003)
Anderson, A.: Risk, Terrorism, and the Internet. Knowledge, Technology & Policy 16(2), 24–33 (2003)
Arquilla, J., Ronfeldt, D.F.: Advent of Netwar. Rand Report (1996), http://www.rand.org/
Borgman, C.L., Furner, J.: Scholarly Communication and Bibliometrics. In: Cronin, B. (ed.) Annual Review of Information Science and Technology, Information Today, Inc. (2002)
Bunt, G.R.: Islam In The Digital Age: E-Jihad. In: Online Fatwas and Cyber Islamic Environments. Pluto Press, London (2003)
Carley, K.M., Reminga, J., Kamneva, N.: Destabilizing Terrorist Networks. In: NAACSOS Conference Proceedings, Pittsburgh, PA (2003)
Carmon, Y.: Assessing Islamist Web Site Reports of Imminent Terror Attack. In: The U.S. MEMRI Inquiry & Analysis Series #156 (2003)
Demchak, C.C., Friis, C., La Porte, T.M.: Webbing Governance: National Differences in Constructing the Face of Public Organizations. In: David Garson, G. (ed.) Handbook of Public Information Systems. Marcel Dekker Publishers, New York (2000)
Elison, W.: Netwar: Studying Rebels on the Internet. The Social Studies 91, 127–131 (2000)
Gibson, D., Kleinberg, J., Raghavan, P.: Inferring Web Communities from Link Topology. In: Proceedings of the 9th ACM Conference on Hypertext and Hypermedia (1998)
Institute for Security Technology Studies: Examining the Cyber Capabilities of Islamic Terrorist Groups. Report, ISTS (2004), http://www.ists.dartmouth.edu/
Jenkins, B.M.: World Becomes the Hostage of Media-Savvy Terrorists: Commentary. USA Today (2004), http://www.rand.org/
Kay, R.: Web Harvesting. Computerworld (2004), http://www.computerworld.com
Kenney, A.R., McGovern, N.Y., Botticelli, P., Entlich, R., Lagoze, C., Payette, S.: Preservation Risk Management for Web Resources: Virtual Remote Control in Cornell’s Project Prism. D-Lib Magazine 8(1) (2002)
Reid, E.O.F.: Identifying a Company’s Non-Customer Online Communities: a Proto-typology. In: Proceedings of the 36th Hawaii International Conference on System Sciences (2003)
Reilly, B., Tuchel, G., Simon, J., Palaima, C., Norsworthy, K., Myrick, L.: Political Communications Web Archiving: Addressing Typology and Timing for Selection, Preservation and Access. In: 3rd ECDL Workshop on Web Archives, Trondheim, Norway (2003)
Research Community PRISM.: The Project for the Research of Islamist Movements. MEMRI: Jihad and Terrorism Studies Project (2003), http://www.e-prism.org
SITE Institut: Report (2003), http://www.siteinstitute.org/mission.html
Schneider, S.M., Foot, K., Kimpton, M., Jones, G.: Building thematic web collections: challenges and experiences from the September 11 Web Archive and the Election 2002 Web Archive. In: 3rd ECDL Workshop on Web Archives, Trondheim, Norway (2003)
Tekwani, S.: Cyberterrorism: Threat and Response. Institute of Defence and Strategic Studies. In: Workshop on the New Dimensions of Terrorism, Singapore (2002)
The 9/11 commission report (2004), http://www.gpoaccess.gov/911/
Tsfati, Y., Weimann, G.: Terror on the Internet. Studies in Conflict & Terrorism 25, 317–332 (2002), http://www.terrorism.com
Weimann, G.: www.terrorism.net: How Modern Terrorism Uses the Internet. Special Report 116, U.S. Institute of Peace (2004), http://usip.org/pubs/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Reid, E. et al. (2005). Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites. In: Kantor, P., et al. Intelligence and Security Informatics. ISI 2005. Lecture Notes in Computer Science, vol 3495. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11427995_35
Download citation
DOI: https://doi.org/10.1007/11427995_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25999-2
Online ISBN: 978-3-540-32063-0
eBook Packages: Computer ScienceComputer Science (R0)