Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Preoccupation with the effort to fight extremist propaganda in an increasingly complex information environment has produced an overwhelming amount of literature from professors, practitioners, policymakers, and pundits. The problem of... more
    • by 
    •   10  
      Strategic CommunicationCommunication StrategiesCounter RadicalizationCountering Violent Extremism
    • by 
    •   18  
      AtherosclerosisElasticityHeart FailureHumans
Since the terror attacks of September 11, 2001, media sources have instilled a fear of Muslims in Western countries by portraying them as a homogenous, irrational group that can be triggered into extreme violence. Such narratives on... more
    • by 
    •   17  
      LawLiteratureInternational LawInterdisciplinarity
    • by 
    •   10  
      Inorganic ChemistryIrEXAFSDBA
General anesthesia and regional anesthesia have both been shown to be suitable techniques for patients undergoing lower thoracic and lumbar spine surgery; however, GA is the most frequently used method. The purpose of this study was to... more
    • by 
    •   25  
      Treatment OutcomeHRLumbar spineProspective studies
This article seeks to examine the impact of the global war on terror around two main issues: the (mis)use of the war on terror rhetoric by politicians and the impact this has on Islamically associated activism. Instead of encouraging... more
    • by 
    •   5  
      War on TerrorBalkansTransitionDisciplinary Boundaries
    • by 
    •   9  
      Collaborative Virtual EnvironmentsUser InterfaceFacial expressionFacial expressions
    • by 
    •   11  
      Educational MeasurementBiomedical informaticsBiological SciencesLBS
    • by 
    •   7  
      Educational TechnologyAutismSocial CompetenceAutism Spectrum Conditions
    • by 
    •   5  
      Virtual RealityVisualisationDatabaseDegree of Freedom
    • by 
    •   19  
      RegenerationSkeletal muscle biologyVibrationBiopsy
    • by 
    • CVE
We present our experience with a usability evaluation of two prototype CVE applications being developed by the COVEN project. The applications are a teleconferenci ng system aimed at future business users of CVEs, and a holiday planning... more
    • by 
    •   7  
      Collaborative Virtual EnvironmentsSystem DesignTelemedicine Applications and e-Health SystemsUsability Evaluation
    • by 
    •   14  
      Electrical EngineeringCollaborative Virtual EnvironmentsImmersive Virtual Learning EnvironmentVirtual Space
    • by 
    •   6  
      New TechnologyVirtual EnvironmentMPEGCosmos
    • by 
    •   3  
      Big DataVisualisationCVE
    • by 
    •   3  
      First Person ShooterFPSCVE
    • by 
    •   3  
      Collaborative Virtual EnvironmentsLarge ScaleCVE
    • by 
    •   11  
      DesignMolecular BiologyHuman ResourceCollaborative Learning
    • by 
    •   9  
      Treatment OutcomeHumansFemaleMale
    • by 
    •   17  
      Kidney transplantationRenal transplantationHumansFemale
The quality of studies drawing primary data from terrorists and violent extremist respondents varies substantially, with this body of literature exhibiting a variety of repeating methodological issues. For instance, researchers often... more
    • by 
    •   5  
      Political Violence and TerrorismPreventing violent extremismCountering Violent ExtremismPve
Despite the military efforts of the Kenyan, Ethiopian, and Somali Federal governments, the collaboration of the African Union Mission in Somalia (AMISOM) forces with US and coalition forces, and despite the enormous tactical and strategic... more
    • by 
    •   10  
      Youth StudiesTerrorismRace and EthnicityKenya
In this paper we will give a short overview of the areas where VRML —the Virtual Reality Modelling Lan- guage— has to be extended in order to support collaborative virtual environments on the Internet. We will present extensions which... more
    • by 
    •   5  
      Collaborative Virtual EnvironmentsVirtual WorldsNetwork ArchitectureNetwork Traffic
Since the September 11 terrorist attacks in the United States, there has been greater interest in countering violent extremism. Due to the U.S.-led " War on Terror, " madrassas in Pakistan have received international attention for... more
    • by 
    •   5  
      PakistanPeace EducationPreventing violent extremismCountering Violent Extremism
American national security is a priority that crosses partisan lines. Americans of all races, ethnicities, and religions are equally concerned with ensuring our country is safe from violence – whether politically motivated terrorism,... more
    • by 
    •   8  
      Surveillance StudiesCivil RightsNational Security LawMuslim Minorities
Many have pointed out families to play a crucial role, both as a risk and protective factor, in radicalization leading to violence phenomena. Over the past few years, researchers and practitioners have recognized the importance of... more
    • by  and +1
    •   13  
      TerrorismPolitical Violence and TerrorismPolitical Extremism/Radicalism/PopulismFamily
SQL injections attacks have been rated as the most dangerous vulnerability of web-based systems over more than a decade by OWASP top ten. Though different static, runtime and hybrid approaches have been proposed to counter SQL injection... more
    • by 
    •   5  
      Database SecurityCVESqliaInjection Attack
Monitoring software vulnerability information requires an important financial and human effort in order to track all the scattered sources publishing the last news about software vulnerabilities, patches and exploits. We noticed that in... more
    • by  and +1
    •   8  
      Information SystemsComputer ScienceSocial MediaSoftware Vulnerabilities
Our nation has a unique, long-cherished commitment to religious freedom. Indeed, the first wave of immigrants came seeking refuge from religious persecution in Europe. The free exercise of religion, regardless of one’s religious beliefs,... more
    • by 
    •   9  
      ReligionTerrorismIslamic StudiesMuslim Minorities
Messaging has been an important aspect of the public outreach of the violent extremist organisation commonly known as Boko Haram. While significant attention has been given to what Boko Haram has done in terms of violent attacks, less has... more
    • by 
    •   5  
      NigeriaBoko HaramLake Chad BasinMessaging
    • by 
    •   9  
      TerrorismPolitical Extremism/Radicalism/PopulismRadicalizationRadicalisation
Syftet med min avhandling är att utifrån teoribildningen om sociala representationer söka förståelse för hurudana självrepresentationer unga muslimer som rest till Syrien under konflikten och återvänt har av sig själva samt hur de... more
    • by 
    •   10  
      TerrorismSyriaRadicalisationPreventing violent extremism
    • by 
    •   5  
      TerrorismRadicalizationJihadismCVE
Scholars have critiqued the incorporation of gender into counterterrorism and countering violent extremism programs, noting they have instrumentalized the Women Peace and Security (WPS) agenda toward state-centric goals and essentialized... more
    • by 
    •   6  
      GenderCounterterrorism (CT)Boko HaramWomen, Peace & Security
One of the biggest challenges to conducting research on radicalization to violent extremism is how to further knowledge in the absence of easy access to radical individuals. This lack of access makes it particularly difficult to fulfill... more
    • by 
    •   4  
      TerrorismResearch MethodologyGenderCVE
In many cases of jihadist radicalisation, the direct environment perceived signs and/or knew about the plans of the individual to join a terrorist group (Gill et al., 2014, p. 429). Yet, it can be assumed that only a small number of these... more
    • by 
    •   5  
      NetworksPreventionGatekeepersCountering Violent Extremism
Despite much talk about infiltration of ISIS into Latin America and participation from Latino Muslims, there is no concrete evidence yet. Latin America still represents the safest continent on the earth from ISIS threat. When we look at... more
    • by 
    •   9  
      Latin American StudiesRadicalizationLatin AmericaLos Turcos
As the United States and its coalition partners work to dismantle remnants of Da’esh in Mosul, the question we all need to be asking is what comes next? What exactly do groups like Da’esh offer in place of state-supported governance, and... more
    • by  and +2
    •   25  
      Peace and Conflict StudiesConflictWar StudiesGovernance
    • by 
    •   2  
      Pakistan StudiesCVE
This research provides a preliminary evidence base to understand the extent to which violent extremist narratives have a wider resonance with men in Victoria, Australia. It identifies key sites and points at which the construction of... more
    • by 
    •   12  
      SociologyGender StudiesPolitical Violence and TerrorismMasculinity
For over two decades, preventing and countering violent extremism (P/CVE) has proven a daunting challenge for foreign assistance policy makers and implementers. The challenges are rooted in its rapid emergence, continuous and uneven... more
    • by 
    •   8  
      TerrorismInsurgency/Counterinsurgency(COIN)Preventing violent extremismPublic Administration and Policy
Violent extremism has become the global concern especially after the beginning of 21st Century. Therefore, understanding the various aspects of violent extremism particularly multifaceted communication strategies which will be fit to... more
    • by 
    •   14  
      CommunicationTerrorismPolitical Violence and TerrorismPakistan
    • by  and +3
    •   2  
      Terrorism and CounterterrorismCVE
The objectives of this study are firstly to promote a preventive approach in intervention strategies and projects when it comes to radicalisation leading to violence, and then to gather information concerning conceptualization, trends and... more
    • by  and +1
    •   7  
      RadicalizationReligious ExtremismPreventionLeft Wing Extremism
Nowadays there are an increasing evolution of technological solutions providing the virtual collaboration among people geographically distributed to obtain some common goals. At the same time virtual collaborative environments are often... more
    • by 
    •   3  
      E-learningMetaphorCVE
My paper entitled "The Complex Ecology of Islamic Narratives and Movements in Bosnia and Herzegovina"
in this excellent publication.
    • by 
    •   4  
      Political Extremism/Radicalism/PopulismIslamic StudiesJihadism and Radical IslamismCVE
The terrorist organization, Daesh, also known as the so-called ‘Islamic State/IS/ISIS/ISIL’, has launched an extremely sophisticated information campaign targeting a wide range of audiences around the world to gain support for its... more
    • by 
    •   8  
      TerrorismInfluencePropagandaStrategic Communication