ABSTRACT
This article focuses on the ongoing challenge of countering the use of the Internet by terrorist and extremist organizations. The article considers, in particular, the methodology of the Web content monitoring that aims to address the above issue as well as the first results obtained during its approbation at the Chair of Financial Monitoring of the NRNU MEPHI. The prospects for the utilization of the results are also provided.
- Use of Internet for Terrorist Purposes. United Nations Office on Drugs and Crime. - URL: http://www.unodc.org/documents/terrorism/Publications/Use_of_Internet_for_Ter.Google Scholar
- European Convention on Suppression of Terrorism ETS N 090 (Strasbourg, 27 January, 1977) - DOI: http://constitution.garant.ru/act/right/megdunar/2541141/Google Scholar
- ComputerCrimeInfo. Michael Bazzel. - DOI: http://computercrimeinfo.com.Google Scholar
- Kutovenko A. Professionalny poisk v seti Internet {Professional search on the Internet} / St. Petersburg - Piter - 2011. - 360 p.Google Scholar
- European Convention on Suppression of Terrorism ETS N 090 (Strasbourg, 27 January, 1977) - DOI: http://constitution.garant.ru/act/right/megdunar/2541141/Google Scholar
- The Journal of International Security Affairs. Gabriel Weimann. How Modern Terrorism Uses the Internet. -- DOI: http://www.securityaffairs.org/issues/2005/08/weimann.php.Google Scholar
- Official website of the Ministry of Justice of the Russian Federation. The Federal List of Extremist Materials - DOI: http://minjust.ru/ru/extremist-materials.Google Scholar
- Official website of the Federal Financial Monitoring Service (Rosfinmonitoring). The list of organizations and physical persons in respect of which there is information on their involvement in terrorist or extremist activity. - DOI: http://www.fedsfm.ru/documents/terr-listGoogle Scholar
- Spector, A. Z. 1989. Achieving application requirements. In Distributed Systems, S. Mullender, Ed. ACM Press Frontier Series. ACM, New York, NY, 19--33. DOI= http://doi.acm.org/10.1145/90417.90738. Google ScholarDigital Library
Index Terms
- Approbation of the methodology for web monitoring of terrorism- and extremism-related content
Recommendations
US Domestic Extremist Groups on the Web: Link and Content Analysis
US domestic extremist groups have increased in numbers and are using the Internet intensively as a tool to share resources and members with limited regard for geographic, legal, or other obstacles. Researchers find that monitoring extremist and hate ...
Uncovering the dark Web: A case study of Jihad on the Web
While the Web has become a worldwide platform for communication, terrorists share their ideology and communicate with members on the “Dark Web”—the reverse side of the Web used by terrorists. Currently, the problems of information overload and ...
Monitoring web browsing behavior with differential privacy
WWW '14: Proceedings of the 23rd international conference on World wide webMonitoring web browsing behavior has benefited many data mining applications, such as top-K discovery and anomaly detection. However, releasing private user data to the greater public would concern web users about their privacy, especially after the ...
Comments