{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:13:14Z","timestamp":1763467994215},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540259992"},{"type":"electronic","value":"9783540320630"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11427995_35","type":"book-chapter","created":{"date-parts":[[2010,7,13]],"date-time":"2010-07-13T23:27:06Z","timestamp":1279063626000},"page":"402-411","source":"Crossref","is-referenced-by-count":17,"title":["Collecting and Analyzing the Presence of Terrorists on the Web: A Case Study of Jihad Websites"],"prefix":"10.1007","author":[{"given":"Edna","family":"Reid","sequence":"first","affiliation":[]},{"given":"Jialun","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Yilu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Guanpi","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Sageman","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Weimann","sequence":"additional","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Albertsen, K.: The Paradigma Web Harvesting Environment. In: 3rd ECDL Workshop on Web Archives, Trondheim, Norway (2003)","key":"35_CR1"},{"issue":"2","key":"35_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s12130-003-1023-7","volume":"16","author":"A. Anderson","year":"2003","unstructured":"Anderson, A.: Risk, Terrorism, and the Internet. Knowledge, Technology & Policy\u00a016(2), 24\u201333 (2003)","journal-title":"Knowledge, Technology & Policy"},{"unstructured":"Arquilla, J., Ronfeldt, D.F.: Advent of Netwar. Rand Report (1996), http:\/\/www.rand.org\/","key":"35_CR3"},{"doi-asserted-by":"crossref","unstructured":"Borgman, C.L., Furner, J.: Scholarly Communication and Bibliometrics. In: Cronin, B. (ed.) Annual Review of Information Science and Technology, Information Today, Inc. (2002)","key":"35_CR4","DOI":"10.1002\/aris.1440360102"},{"key":"35_CR5","volume-title":"Online Fatwas and Cyber Islamic Environments","author":"G.R. Bunt","year":"2003","unstructured":"Bunt, G.R.: Islam In The Digital Age: E-Jihad. In: Online Fatwas and Cyber Islamic Environments. Pluto Press, London (2003)"},{"unstructured":"Carley, K.M., Reminga, J., Kamneva, N.: Destabilizing Terrorist Networks. In: NAACSOS Conference Proceedings, Pittsburgh, PA (2003)","key":"35_CR6"},{"unstructured":"Carmon, Y.: Assessing Islamist Web Site Reports of Imminent Terror Attack. In: The U.S. MEMRI Inquiry & Analysis Series #156 (2003)","key":"35_CR7"},{"key":"35_CR8","volume-title":"Handbook of Public Information Systems","author":"C.C. Demchak","year":"2000","unstructured":"Demchak, C.C., Friis, C., La Porte, T.M.: Webbing Governance: National Differences in Constructing the Face of Public Organizations. In: David Garson, G. (ed.) Handbook of Public Information Systems. Marcel Dekker Publishers, New York (2000)"},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1080\/00377990009602455","volume":"91","author":"W. Elison","year":"2000","unstructured":"Elison, W.: Netwar: Studying Rebels on the Internet. The Social Studies\u00a091, 127\u2013131 (2000)","journal-title":"The Social Studies"},{"doi-asserted-by":"crossref","unstructured":"Gibson, D., Kleinberg, J., Raghavan, P.: Inferring Web Communities from Link Topology. In: Proceedings of the 9th ACM Conference on Hypertext and Hypermedia (1998)","key":"35_CR10","DOI":"10.1145\/276627.276652"},{"unstructured":"Institute for Security Technology Studies: Examining the Cyber Capabilities of Islamic Terrorist Groups. Report, ISTS (2004), http:\/\/www.ists.dartmouth.edu\/","key":"35_CR11"},{"unstructured":"Jenkins, B.M.: World Becomes the Hostage of Media-Savvy Terrorists: Commentary. USA Today (2004), http:\/\/www.rand.org\/","key":"35_CR12"},{"unstructured":"Kay, R.: Web Harvesting. Computerworld (2004), http:\/\/www.computerworld.com","key":"35_CR13"},{"doi-asserted-by":"crossref","unstructured":"Kenney, A.R., McGovern, N.Y., Botticelli, P., Entlich, R., Lagoze, C., Payette, S.: Preservation Risk Management for Web Resources: Virtual Remote Control in Cornell\u2019s Project Prism. D-Lib Magazine\u00a08(1) (2002)","key":"35_CR14","DOI":"10.1045\/january2002-kenney"},{"doi-asserted-by":"crossref","unstructured":"Reid, E.O.F.: Identifying a Company\u2019s Non-Customer Online Communities: a Proto-typology. In: Proceedings of the 36th Hawaii International Conference on System Sciences (2003)","key":"35_CR15","DOI":"10.1109\/HICSS.2003.1174575"},{"unstructured":"Reilly, B., Tuchel, G., Simon, J., Palaima, C., Norsworthy, K., Myrick, L.: Political Communications Web Archiving: Addressing Typology and Timing for Selection, Preservation and Access. In: 3rd ECDL Workshop on Web Archives, Trondheim, Norway (2003)","key":"35_CR16"},{"unstructured":"Research Community PRISM.: The Project for the Research of Islamist Movements. MEMRI: Jihad and Terrorism Studies Project (2003), http:\/\/www.e-prism.org","key":"35_CR17"},{"unstructured":"SITE Institut: Report (2003), http:\/\/www.siteinstitute.org\/mission.html","key":"35_CR18"},{"unstructured":"Schneider, S.M., Foot, K., Kimpton, M., Jones, G.: Building thematic web collections: challenges and experiences from the September 11 Web Archive and the Election 2002 Web Archive. In: 3rd ECDL Workshop on Web Archives, Trondheim, Norway (2003)","key":"35_CR19"},{"unstructured":"Tekwani, S.: Cyberterrorism: Threat and Response. Institute of Defence and Strategic Studies. In: Workshop on the New Dimensions of Terrorism, Singapore (2002)","key":"35_CR20"},{"unstructured":"The 9\/11 commission report (2004), http:\/\/www.gpoaccess.gov\/911\/","key":"35_CR21"},{"key":"35_CR22","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1080\/10576100290101214","volume":"25","author":"Y. Tsfati","year":"2002","unstructured":"Tsfati, Y., Weimann, G.: Terror on the Internet. Studies in Conflict & Terrorism\u00a025, 317\u2013332 (2002), http:\/\/www.terrorism.com","journal-title":"Studies in Conflict & Terrorism"},{"unstructured":"Weimann, G.: www.terrorism.net: How Modern Terrorism Uses the Internet. Special Report 116, U.S. Institute of Peace (2004), http:\/\/usip.org\/pubs\/","key":"35_CR23"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11427995_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:56:47Z","timestamp":1605643007000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11427995_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540259992","9783540320630"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11427995_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}