Query Result Set
Skip Navigation Links
   ActiveUsers:1245Hits:18685538Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
WEIMANN, GABRIEL (10) answer(s).
 
SrlItem
1
ID:   107644


Cyber-Fatwas and terrorism / Weimann, Gabriel   Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract In 1989, the term fatwa became globally known, following Ayatollah Khomeini's death-fatwa issued on Salman Rushdie for his novel, Satanic Verses. Today, the Internet has become a useful platform for posting of fatwas and interpretations of fatwas. The present article highlights the use of jihadist fatwas, and especially online fatwas, as a major instrument in bridging the current wave of terrorism and religion. The analysis, based on a database collected in a 12-year-long project of monitoring thousands of terrorist websites, illustrates how cyber-fatwas are related to key issues in promoting terrorism: justifying the use of suicide terrorism, the killing of innocents, the killing of children and women, the killing of Muslims or the use of various weapons (including weapons of mass destruction and cyberterrorism). There are two implications of the trends documented in this study: First, the analysis of the online fatwas and the fatwa wars may provide insight about the terrorists, their motivations, their doubts and fears and, secondly, it may guide countercampaigns.
        Export Export
2
ID:   060660


Cyberterrorism: the sum of all fears? / Weimann, Gabriel Mar-Apr 2005  Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Publication Mar-Apr 2005.
Summary/Abstract Cyberterrorism conjures up images of vicious terrorists unleashing catastrophic attacks against computer networks, wreaking havoc, and paralyzing nations. This is a frightening scenario, but how likely is it to occur? Could terrorists cripple critical military, financial, and service computer systems? This article charts the rise of cyberangst and examines the evidence cited by those who predict imminent catastrophe. Psychological, political, and economic forces have combined to promote the fear of cyberterrorism. From a psychological perspective, two of the greatest fears of modern time are combined in the term “cyberterrorism.” The fear of random, violent victimization segues well with the distrust and outright fear of computer technology. Many of these fears, the report contends, are exaggerated: not a single case of cyberterrorism has yet been recorded, hackers are regularly mistaken for terrorists, and cyberdefenses are more robust than is commonly supposed. Even so, the potential threat is undeniable and seems likely to increase, making it all the more important to address the danger without inflating or manipulating it.
Key Words Terrorism  Cyberterrorism 
        Export Export
3
ID:   094844


E-Marketing strategy of Hamas / Mozes, Tomer; Weimann, Gabriel   Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract Given the growth of Internet research in recent years, it is rather surprising that research of online terrorism and countermeasures has been lacking theoretical and conceptual frameworks. The present study suggests applying the concepts and models taken from e-marketing to the study of terrorist websites. This work proves that when Hamas builds an array of sites in the Internet, it complies with the same rules that the Western business world follows. Chaffey et al. (2000) constructed a model comprised of eight decision points in the process of building a business-oriented Internet site. Although the model was developed for commercial purposes, the present study demonstrates how it could be used as an analytic framework to study terrorist websites. As shown, most of the decision points in the model were relevant to the Palestinian Information Center group of websites. Understanding the e-marketing strategy of Hamas will allow the construction of a competing marketing strategy in order to market rival ideological consumer products.
        Export Export
4
ID:   144870


Going dark: terrorism on the dark web / Weimann, Gabriel   Article
Weimann, Gabriel Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The terms Deep Web, Deep Net, Invisible Web, or Dark Web refer to the content on the World Wide Web that is not indexed by standard search engines. One can describe the Internet as composed of layers: the “upper” layer, or the Surface Web, can easily be accessed by regular searches. However, “deeper” layers, the content of the Deep Web, have not been indexed by traditional search engines such as Google. Michael K. Bergman who wrote the seminal paper on the Deep Web, compared searching the Internet to dragging a net across the surface of the ocean: a great deal may be caught in the net, but there is a wealth of information that is deeper and therefore missed. In fact, most of the Web's information is buried far down on sites, and standard search engines are unable to access it.
Key Words Terrorism  Dark Web  Deep Web  Deep Net  Invisible Web 
        Export Export
5
ID:   191473


Research Note: Spreading Hate on TikTok / Weimann, Gabriel; Masri, Natalie   Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract TikTok is the fastest-growing application today, attracting a huge audience of 1.5 billion active users, mostly children and teenagers. Recently, the growing presence of extremist’s groups on social media platforms became more prominent and massive. Yet, while most of the scholarly attention focused on leading platforms like Twitter, Facebook or Instagram, the extremist immigration to other platforms like TikTok went unnoticed. This study is a first attempt to find the Far-right’s use of TikTok: it is a descriptive analysis based on a systematic content analysis of TikTok videos, posted in early 2020. Our findings reveal the disturbing presence of Far-right extremism in videos, commentary, symbols and pictures included in TikTok’s postings. While similar concerns were with regard to other social platforms, TikTok has unique features to make it more troublesome. First, unlike all other social media TikTok’ s users are almost all young children, who are more naïve and gullible when it comes to malicious contents. Second, TikTok is the youngest platform thus severely lagging behind its rivals, who have had more time to grapple with how to protect their users from disturbing and harmful contents. Yet, TikTok should have learned from these other platforms’ experiences and apply TikTok’s own Terms of Service that does not allow postings that are deliberately designed to provoke or antagonize people, or are intended to harass, harm, hurt, scare, distress, embarrass or upset people or include threats of physical violence.
Key Words TikTok 
        Export Export
6
ID:   103793


Strength of weak terrorist ties / Kennedy, Jonathan; Weimann, Gabriel   Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract The current age of technology, mass communication, and globalization makes networks analysis an especially useful tool for understanding cell-based terrorism. Some concepts from traditional networks analysis may be especially relevant. The Strength of Weak Ties hypothesis (SWT) is particularly promising and will be used here to demonstrate the usability of traditional networks analysis for studying modern terrorism. The findings suggest that the strength of weak terrorist ties may improve Al Qaeda's operational capabilities despite the group's decentralization following the U.S.-led military campaign in Afghanistan beginning in 2001.
Key Words Terrorism  Internet  Al Qaeda  Social Networks  Facebook  Terrorist Communication 
Weak Ties 
        Export Export
7
ID:   078302


Terror on the internet: the new arena, the new challenges / Weimann, Gabriel 2006  Book
Weimann, Gabriel Book
0 Rating(s) & 0 Review(s)
Publication Washington, DC, United States Institute of Peace Press, 2006.
Description xv, 309p.
Standard Number 9781929223718
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
052453363.325/WEI 052453MainOn ShelfGeneral 
8
ID:   075043


Virtual disputes: the use of the internet for terrorist debates / Weimann, Gabriel   Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Summary/Abstract Terrorists are using the Internet for various purposes. Most of the attempts to monitor and study terrorist presence on the Net focused on the practical and communicative uses of this channel by modern terrorists. Yet, not much attention has been paid to the use of the Net as a medium for terrorist debates and disputes. This descriptive article presents this less noticed facet of terrorism on the Net by providing examples of virtual debates among and within terrorist groups. The analysis of the online controversies, disputes, and debates may say a lot about the mindsets of terrorists, their motivations, their doubts and fears. In many ways, it allows the researcher to open a window to a world about which so little is known. It may also serve counterterrorism: by learning the inner cleavages and debates one can find practical ways to support the voices against terror, to broaden gaps within these dangerous communities, and to channel the discourse to nonviolent forms of action.
        Export Export
9
ID:   186052


When the theatre of terror emerged / Weimann, Gabriel   Journal Article
Weimann, Gabriel Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract What began as the 1972 Munich Olympic Games quickly became a global media event, a live broadcast of a deadly terrorist attack that changed the future of modern terrorism. Broadcast to an audience of over 900 million, the event was a game changer that changed the relationships within the triangle terrorism-media-public. The ‘new’ terrorism, following the Munich massacre, has adapted the new rules of the game, the rules of media-oriented actions. Media-oriented terrorism is the use of pre-planned attacks that are wittingly designed to get media attention and coverage and consequently to reach the general public and decision makers. This article presents two powerful concepts in communication and terrorism paradigm that emerged from this tragic event: the notion of The Theatre of Terror and the notion of Coercive Media Events. Finally, it examines post-Munich trends and especially how terrorists’ migration to social media and online platforms has preserved and refined their lessons from the Munich attack.
        Export Export
10
ID:   022728


www.terrorism.com: terror on the internet / Tsfati, Yariv; Weimann, Gabriel Sept-Oct 2002  Article
Tsfati Yariv Article
0 Rating(s) & 0 Review(s)
Publication 2002.
Description 317-332
Key Words Terrorism  WMD  International terrorism  Internet 
        Export Export