{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:14:41Z","timestamp":1743059681116,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_24","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:02:50Z","timestamp":1545994970000},"page":"429-440","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into Extremism"],"prefix":"10.1007","author":[{"given":"Yeslam","family":"Al-Saggaf","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"issue":"4","key":"24_CR1","first-page":"12","volume":"6","author":"Y Al-Saggaf","year":"2016","unstructured":"Al-Saggaf, Y.: Understanding online radicalisation using data science. Int. J. Cyber Warf. Terror. (IJCWT) 6(4), 12\u201327 (2016)","journal-title":"Int. J. Cyber Warf. Terror. (IJCWT)"},{"key":"24_CR2","unstructured":"Bergin, A.: The internet as a platform for radicalisation. In: Proceedings of the Strategic Policy Forum, 5 May 2009, pp. 1\u20132. Australian Strategic Policy Institute, Perth (2009)"},{"key":"24_CR3","doi-asserted-by":"crossref","unstructured":"Bermingham, A., Conway, M., McInerney, L., O\u2019Hare, N., Smeaton, A.F.: Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. In: International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009, pp. 231\u2013236. IEEE, July 2009","DOI":"10.1109\/ASONAM.2009.31"},{"issue":"5","key":"24_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1080\/03071847.2013.847714","volume":"158","author":"C Edwards","year":"2013","unstructured":"Edwards, C., Gribbon, L.: Pathways to violent extremism in the digital era. RUSI J. 158(5), 40\u201347 (2013)","journal-title":"RUSI J."},{"issue":"3","key":"24_CR5","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1080\/17539153.2012.723447","volume":"5","author":"T Reynolds","year":"2012","unstructured":"Reynolds, T.: Ethical and legal issues surrounding academic research into online radicalisation: a UK experience. Crit. Stud. Terror. 5(3), 499\u2013513 (2012)","journal-title":"Crit. Stud. Terror."},{"issue":"11","key":"24_CR6","doi-asserted-by":"publisher","first-page":"2461","DOI":"10.1109\/TIFS.2015.2464775","volume":"10","author":"JR Scanlon","year":"2015","unstructured":"Scanlon, J.R., Gerber, M.S.: Forecasting violent extremist cyber recruitment. IEEE Trans. Inf. Forensics Secur. 10(11), 2461\u20132470 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"24_CR7","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1080\/1057610X.2014.986979","volume":"38","author":"R Spaaij","year":"2015","unstructured":"Spaaij, R., Hamm, M.S.: Key issues and research agendas in lone wolf terrorism. Stud. Confl. Terror. 38(3), 167\u2013178 (2015)","journal-title":"Stud. Confl. Terror."},{"key":"24_CR8","unstructured":"Torok, R.: Discourses of terrorism: the role of Internet technologies (social media and online propaganda) on Islamic radicalisation, extremism and recruitment post 9\/11. Unpublished PhD Thesis. Edith Cowan University (2016)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Wadhwa, P., Bhatia, M.P.S.: Tracking on-line radicalization using investigative data mining. In: 2013 National Conference on Communication (NCC), pp. 1\u20135. IEEE, February 2013","DOI":"10.1109\/NCC.2013.6488046"},{"key":"24_CR10","unstructured":"Aly, A.: Online radicalisation and the Muslim Diaspora. In: Proceedings of the Strategic Policy Forum, pp. 7\u20138. Australian Strategic Policy Institute, Perth, Australia, 5 May 2009"},{"issue":"3","key":"24_CR11","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1080\/09546550802073367","volume":"20","author":"C McCauley","year":"2008","unstructured":"McCauley, C., Moskalenko, S.: Mechanisms of political radicalization: pathways toward terrorism. Terror. Politi. Violence 20(3), 415\u2013433 (2008)","journal-title":"Terror. Politi. Violence"},{"issue":"4","key":"24_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.5038\/1944-0472.4.4.1","volume":"4","author":"R Borum","year":"2011","unstructured":"Borum, R.: Radicalization into violent extremism I: a review of social science theories. J. Strat. Secur. 4(4), 7\u201336 (2011). \n                    https:\/\/doi.org\/10.5038\/1944-0472.4.4.1","journal-title":"J. Strat. Secur."},{"issue":"2","key":"24_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.15664\/jtr.1155","volume":"6","author":"MA Upal","year":"2015","unstructured":"Upal, M.A.: Confronting Islamic Jihadist movements. J. Terror. Res. 6(2), 57\u201369 (2015)","journal-title":"J. Terror. Res."},{"issue":"1","key":"24_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2190-8532-3-1","volume":"3","author":"JR Scanlon","year":"2014","unstructured":"Scanlon, J.R., Gerber, M.S.: Automatic detection of cyber-recruitment by violent extremists. Secur. Inf. 3(1), 1\u201310 (2014)","journal-title":"Secur. Inf."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Kernot, D., Bossomaier, T., Bradbury, R.: Novel text analysis for investigating properties of self: did Shakespeare and Thomas Kyd write Edward III? (2017)","DOI":"10.5121\/ijnlc.2017.6601"},{"key":"24_CR16","first-page":"1","volume":"8","author":"D Kernot","year":"2017","unstructured":"Kernot, D., Bossomaier, T., Bradbury, R.: Stylometric techniques for multiple author clustering: Shakespeare\u2018s authorship in the Passionate Pilgrim. Int. J. Adv. Comput. Sci. Appl. 8, 1\u20138 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"24_CR17","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1080\/09296174.2017.1304049","volume":"24","author":"D Kernot","year":"2017","unstructured":"Kernot, D., Bossomaier, T., Bradbury, R.: Novel text analysis for investigating personality: identifying the dark lady in Shakespeare\u2019s Sonnets. J. Quant. Linguist. 24, 255\u2013272 (2017)","journal-title":"J. Quant. Linguist."},{"key":"24_CR18","doi-asserted-by":"publisher","first-page":"8","DOI":"10.4236\/ojml.2017.71002","volume":"7","author":"D Kernot","year":"2017","unstructured":"Kernot, D., Bossomaier, T., Bradbury, R.: The impact of depression and apathy on sensory language. Open J. Modern Linguist. 7, 8\u201332 (2017)","journal-title":"Open J. Modern Linguist."},{"key":"24_CR19","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1126\/science.1225244","volume":"338","author":"M Scheffer","year":"2012","unstructured":"Scheffer, M., et al.: Anticipating critical transitions. Science 338, 344\u2013348 (2012)","journal-title":"Science"},{"key":"24_CR20","unstructured":"Al-Saggaf, Y., Kharabsheh, R.: Political online communities in Saudi Arabia: the major players. In: Hongladarom, S. (ed.) Proceedings of the Third Asia Pacific Computing and Philosophy Conference, pp. 27\u201347. The Center for Ethics of Science and Technology, Chulalongkorn University, Bangkok (2009)"},{"key":"24_CR21","first-page":"557","volume-title":"Encyclopaedia of Developing Regional Communities with ICT","author":"Y Al-Saggaf","year":"2006","unstructured":"Al-Saggaf, Y., Weckert, J.: Political online communities (POCs) in Saudi Arabia. In: Marshall, S., Taylor, W., Yu, X. (eds.) Encyclopaedia of Developing Regional Communities with ICT, pp. 557\u2013563. Idea Group Reference, Hershey (2006)"},{"key":"24_CR22","first-page":"13","volume-title":"Computing and Philosophy in Asia","author":"Y Al-Saggaf","year":"2007","unstructured":"Al-Saggaf, Y.: Exploring political online forums in Saudi Arabia through thematic content analysis. In: Hongladarom, S. (ed.) Computing and Philosophy in Asia, pp. 13\u201330. Cambridge Scholars Publishing, Newcastle (2007)"},{"key":"24_CR23","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.techfore.2014.08.013","volume":"95","author":"Y Al-Saggaf","year":"2015","unstructured":"Al-Saggaf, Y., Simmons, P.: Social media in Saudi Arabia: exploring its use during two natural disasters. Technol. Forecast. Soc. Chang. 95, 3\u201315 (2015). \n                    https:\/\/doi.org\/10.1016\/j.techfore.2014.08.013","journal-title":"Technol. Forecast. Soc. Chang."},{"key":"24_CR24","unstructured":"SproutSocial. \n                    https:\/\/sproutsocial.com\/insights\/facebook-stats-for-marketers\n                    \n                  \/"},{"issue":"1","key":"24_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/2190-8532-2-1","volume":"2","author":"R Torok","year":"2013","unstructured":"Torok, R.: Developing an explanatory model for the process of online radicalisation and terrorism. Secur. Inf. 2(1), 1\u201310 (2013)","journal-title":"Secur. Inf."},{"issue":"3","key":"24_CR26","doi-asserted-by":"publisher","first-page":"554","DOI":"10.1073\/pnas.1517441113","volume":"113","author":"M Vicario Del","year":"2016","unstructured":"Del Vicario, M., et al.: The spreading of misinformation online. PNAS Early Ed. 113(3), 554\u2013559 (2016)","journal-title":"PNAS Early Ed."},{"key":"24_CR27","unstructured":"Ramswell, P.Q.: The utilization and leveraging of grievance as a recruitment tool and justification for terrorist acts committed by Islamic extremists. Small Wars J. (2014). \n                    http:\/\/smallwarsjournal.com\/jrnl\/art\/the-utilization-and-leveraging-of-grievance-as-a-recruitment-tool-and-justification-for-ter"},{"key":"24_CR28","first-page":"379","volume-title":"Terrorists\u2019 use of the internet: assessment and response","author":"R Bradbury","year":"2017","unstructured":"Bradbury, R., Bossomaier, T., Kernot, D.: Predicting the emergence of self-radicalisation through social media: a complex systems approach. In: Conway, M., Jarvis, L., Lehane, O., Macdonald, S., Nouri, L. (eds.) Terrorists\u2019 use of the internet: assessment and response, pp. 379\u2013389. IOS Press, Amsterdam (2017)"},{"key":"24_CR29","doi-asserted-by":"publisher","DOI":"10.1080\/09296174.2017.1405719","author":"D Kernot","year":"2017","unstructured":"Kernot, D., Bossomaier, T., Bradbury, R.: The stylometric impacts of ageing and life events on identity. J. Quant. Linguist. (2017). \n                    https:\/\/doi.org\/10.1080\/09296174.2017.1405719","journal-title":"J. Quant. Linguist."},{"key":"24_CR30","unstructured":"AFP: Fighting terrorism (2018). \n                    https:\/\/www.afp.gov.au\/what-we-do\/crime-types\/fighting-terrorism"},{"issue":"3","key":"24_CR31","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1177\/1745691612442904","volume":"7","author":"RE Wilson","year":"2012","unstructured":"Wilson, R.E., Gosling, S.D., Graham, L.T.: A review of Facebook research in the social sciences. Perspect. Psychol. Sci. 7(3), 203\u2013220 (2012)","journal-title":"Perspect. Psychol. Sci."},{"key":"24_CR32","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1080\/0305724022014322","volume":"31","author":"A Bandura","year":"2002","unstructured":"Bandura, A.: Selective moral disengagement in the exercise of moral agency. J. Moral Educ. 31, 101\u2013119 (2002)","journal-title":"J. Moral Educ."},{"key":"24_CR33","unstructured":"Al-Saggaf, Y., Chutikulrungsee, T.T.: Twitter usage in Australia and Saudi Arabia and influence of culture: an exploratory cross-country comparison. In: Paterno, D., Bourk, M., Matheson, D. (eds.) Refereed proceedings of the Australian and New Zealand Communication Association Conference: Rethinking communication, space and identity (2015). \n                    http:\/\/www.anzca.net\/conferences\/past-conferences\/"},{"issue":"2","key":"24_CR34","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1108\/14779960810888329","volume":"6","author":"Y Al-Saggaf","year":"2008","unstructured":"Al-Saggaf, Y., Himma, K., Kharabsheh, R.: Political online communities in Saudi Arabia: the major players. J. Inf. Commun. Eth. Soc. 6(2), 127\u2013140 (2008)","journal-title":"J. Inf. Commun. Eth. Soc."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,22]],"date-time":"2019-12-22T02:12:51Z","timestamp":1576980771000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_24","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"29 December 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}