ID | 112608 |
Title Proper | Vulnerabilities of online terrorism |
Language | ENG |
Author | Soriano, Manuel R Torres |
Publication | 2012. |
Summary / Abstract (Note) | Jihadist terrorism has discovered in the Internet a valuable instrument to strengthen its activities. However, in using this technology the terrorists are exposed to new vulnerabilities. The Internet plays a leveling role: each new advantageous use it brings is accompanied by a new opportunity to weaken terrorist groups. The present article examines the main vulnerabilities of radical groups who have accorded the Internet a central role in their strategy, namely, less anonymity and security, a loss of content visibility, a major credibility problem, and an undermining of the legitimacy of the terrorist discourse as a consequence of their use of Web 2.0. |
`In' analytical Note | Studies in Conflict and Terrorism Vol. 35, No.4; Apr 2012: p.263-277 |
Journal Source | Studies in Conflict and Terrorism Vol. 35, No.4; Apr 2012: p.263-277 |
Key Words | Online Terrorism ; Jihadist Terrorism ; Technology ; Terrorists ; Web 2.0 ; Terrorism |