{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:56:59Z","timestamp":1757620619940,"version":"3.44.0"},"publisher-location":"Cham","reference-count":68,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031971143"},{"type":"electronic","value":"9783031971150"}],"license":[{"start":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T00:00:00Z","timestamp":1754092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T00:00:00Z","timestamp":1754092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97115-0_14","type":"book-chapter","created":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T06:02:25Z","timestamp":1754028145000},"page":"210-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Virtualization of Terrorism and its Consequences for Counterterrorism"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1301-5186","authenticated-orcid":false,"given":"Nicolas","family":"Stockhammer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,2]]},"reference":[{"key":"14_CR1","first-page":"464","volume-title":"The Cambridge Handbook of Disaster Risk Reduction and International Law","author":"WL Waugh","year":"2019","unstructured":"Waugh, W.L.: Terrorism as Disaster. In: Handbook of Disaster Research. Handbooks of Sociology and Social Research. Springer, New York (2007). doi: 10.1007\/978-0-387-32353-4_22, last accessed 2025\/04\/7. See also: Samuel, K.L.H., Banks, W.C., Richemond-Barak, D.: \u201cImproving Disaster Risk Mitigation: Towards a \u2018Multi-Hazard\u2019 Approach to Terrorism.\u201d In: Samuel, K.L.H., Aronsson-Storrier, M., Bookmiller, K.N. (eds.) The Cambridge Handbook of Disaster Risk Reduction and International Law, pp. 464\u2013498. Cambridge University Press, Cambridge (2019)"},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"107","DOI":"10.7312\/gart19524-005","volume-title":"Enemies Near and Far: How Jihadist Groups Strategize, Plot, and Learn (Columbia Studies in Terrorism and Irregular Warfare)","author":"D Gartenstein-Ross","year":"2022","unstructured":"Gartenstein-Ross, D., Joscelyn, T.: Enemies Near and Far: How Jihadist Groups Strategize, Plot, and Learn (Columbia Studies in Terrorism and Irregular Warfare), pp. 107\u2013164. Columbia University Press, New York (2022)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Horgan, J.: Terrorist Minds: The Psychology of Violent Extremism from Al-Qaeda to the Far Right (Columbia Studies in Terrorism and Irregular Warfare). Columbia University Press, New York, pp. 163\u2013180 (2023)","DOI":"10.7312\/horg19838"},{"key":"14_CR4","unstructured":"Byman, D.: Terrorism and the Threat to Democracy, Brookings Policy Brief (2019) https:\/\/www.brookings.edu\/articles\/terrorism-and-the-threat-to-democracy. Accessed 4 Jul 2025"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Warnes, R.: Human Factors in Effective Counter-Terrorism: A Comparative Study, 1st ed., Routledge, London (2024). More general on prevention: Schmid, A.P.: Handbook of Terrorism Prevention and Preparedness. ICCT Press, The Hague (2021)","DOI":"10.4324\/9781003375661"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"National Academies of Sciences, Engineering, and Medicine: Countering Terrorism: Lessons Learned from Natural and Technological Disasters. Washington, DC The National Academies Press (2002). https:\/\/doi.org\/10.17226\/10414. Accessed 4 Jul 2025","DOI":"10.17226\/10414"},{"key":"14_CR7","unstructured":"CONTEST. The United Kingdom\u2019s Strategy for Countering Terrorism, UK Government Publishing (2023). https:\/\/assets.publishing.service.gov.uk\/media\/650b1b8d52e73c000d54dc82\/CONTEST_2023_English_updated.pdf. Accessed 4 Jul 2025"},{"key":"14_CR8","unstructured":"Gabriel, A., et al.: Process modelling of physical and cyber terrorist attacks on networks of public transportation infrastructure. In: Aur\u00e9lie Montarnal, A., et al.(eds.), Proceedings of the 14th International Conference on Information Systems for Crisis Response and Management, pp. 390\u2013399. Albi, France: Iscram (2017)"},{"key":"14_CR9","doi-asserted-by":"publisher","DOI":"10.7312\/katz20350","volume-title":"Saints and Soldiers: Inside Internet-Age Terrorism, From Syria to the Capitol Siege","author":"R Katz","year":"2022","unstructured":"Katz, R.: Saints and Soldiers: Inside Internet-Age Terrorism, From Syria to the Capitol Siege. Columbia Studies in Terrorism and Irregular Warfare) Columbia University Press, New York (2022)"},{"key":"14_CR10","unstructured":"Awan, A.N.: The Virtual Jihad: an Increasingly Legitimate Form of Warfare. CTC Sentinel 3(5) (2010). https:\/\/ctc.westpoint.edu\/wp-content\/uploads\/2010\/08\/CTCSentinel-Vol3Iss5-art3.pdf. Accessed 4 Jul 2025"},{"key":"14_CR11","unstructured":"Dass, R.: Islamic State-Khorasan Province\u2019s Virtual Planning. Lawfare (2024). https:\/\/www.lawfaremedia.org\/article\/islamic-state-khorasan-province-s-virtual-planning. Accessed 4 Jul 2025"},{"key":"14_CR12","unstructured":"Ingram, H.J.: Learning from ISIS\u2019s Virtual Propaganda War for Western Muslims: A Comparison of Inspire and Dabiq (2017). https:\/\/www.icct.nl\/publication\/learning-isiss-virtual-propaganda-war-western-muslims-comparison-inspire-and-dabiq. Accessed 4 Jul 2025"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Stockhammer, N.: Introduction. In: Nicolas Stockhammer (ed.): Routledge Handbook of Transnational Terrorism, Routledge, Abingdon, Oxon; New York (2023)","DOI":"10.4324\/9781003326373"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1177\/00223433221123360","volume":"61","author":"P Nesser","year":"2024","unstructured":"Nesser, P.: Introducing the Jihadi Plots in Europe Dataset (JPED). J. Peace Res. 61(2), 317\u2013329 (2024)","journal-title":"J. Peace Res."},{"key":"14_CR15","unstructured":"Stockhammer, N.: Tr\u00fcgerische Ruhe. Der Anschlag von Wien und die terroristische Bedrohung in Europa. Amalthea, Vienna (2023), p. 30. Also refer to Dass, R.: Islamic State-Khorasan Province\u2019s Virtual Planning. Lawfare (2024). https:\/\/www.lawfaremedia.org\/article\/islamic-state-khorasan-province-s-virtual-planning. Accessed 4 Jul 2025"},{"key":"14_CR16","unstructured":"Weimann, G., Dimant, R.: The Metaverse and Terrorism: Threats and Challenges. In: Perspectives on Terrorism, 17(2), (2023). https:\/\/pt.icct.nl\/sites\/default\/files\/2023-06\/PT%20-%20Vol%20XVII%2C%20Issue%20II%20-%20June%202023%20A5.pdf. Accessed 4 Jul 2025"},{"issue":"2","key":"14_CR17","first-page":"2","volume":"14","author":"C Winter","year":"2020","unstructured":"Winter, C., et al.: Online extremism: research trends in internet activism, radicalization, and counter-strategies. Int. J. Conflict Violence 14(2), 2 (2020)","journal-title":"Int. J. Conflict Violence"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"See mutatis mutandis, ual Radicalization: The Making of Jihad in Chechnya. In: Hughes, J.: \u201cFrom Nationalism to Jihad\u201d, Philadelphia, pp. 94\u2013127 (2007). https:\/\/doi.org\/10.9783\/9780812202311.94. Accessed 4 Jul 2025","DOI":"10.9783\/9780812202311.94"},{"key":"14_CR19","unstructured":"The Soufan Center IntelBrief: he Evolution of the Online Violent Extremist Landscap (2022). https:\/\/thesoufancenter.org\/intelbrief-2022-october-20. Accessed 4 Jul 2025"},{"key":"14_CR20","doi-asserted-by":"publisher","unstructured":"Chen, H.: Exploring extremism and terrorism on the web: the dark web project. In: Yang, C.C., et al.: Intelligence and Security Informatics. PAISI 2007. Lecture Notes. In: Computer Science, 4430. Berlin (2007). https:\/\/doi.org\/10.1007\/978-3-540-71549-8_1. Accessed 4 Jul 2025","DOI":"10.1007\/978-3-540-71549-8_1"},{"key":"14_CR21","unstructured":"Malik, N.: Terror in the Dark: How Terrorists use Encryption, the Darknet, and Cryptocurrencies. In: The Henry Jackson Society Henry Jackson Society (2018). https:\/\/henryjacksonsociety.org\/wp-content\/uploads\/2018\/04\/Terror-in-the-Dark.pdf. Accessed 4 Jul 2025"},{"key":"14_CR22","doi-asserted-by":"crossref","unstructured":"Anderson, D.: Attacks in London and Manchester March-June 2017 SSRN (2017). https:\/\/ssrn.com\/abstract=4833522. Accessed 4 Jul 2025","DOI":"10.2139\/ssrn.4833522"},{"key":"14_CR23","unstructured":"Manchester Arena Inquiry Volume 3: Radicalisation and Preventability. Report of the Public Inquiry into the Attack on Manchester Arena on 22nd May 2017, UK Government Publishing (2023). https:\/\/assets.publishing.service.gov.uk\/media\/63ff865ae90e0740dc92d1d8\/MAI_Final_PDF_Volume_3.pdf. Accessed 4 Jul 2025"},{"key":"14_CR24","unstructured":"Benedek, E., Simon, N.: The 2017 Manchester Bombing and the British-Libyan Jihadi Nexus\u201d. CTC Sentinel, 13(5), 28\u201339 (2020). https:\/\/ctc.westpoint.edu\/wp-content\/uploads\/2020\/05\/CTC-SENTINEL-052020.pdf. Accessed 4 Jul 2025"},{"key":"14_CR25","unstructured":"Koehler, D.: The Halle, Germany, Synagogue Attack and the Evolution of the Far-Right Terror Threat. CTC Sentinel, 12(11), 14\u201321 CTC (2019). https:\/\/ctc.westpoint.edu\/wp-content\/uploads\/2020\/02\/CTC-SENTINEL-112019.pdf. Accessed 4 Jul 2025"},{"key":"14_CR26","doi-asserted-by":"publisher","unstructured":"Hartleb, F.: Das Ph\u00e4nomen des virtualisierten rechten Terrors. SIAK-Journal \u2013 Zeitschrift f\u00fcr Polizeiwissenschaft und polizeiliche Praxis (4), 17\u201327 (2022). https:\/\/doi.org\/10.7396\/2022_4_B. Accessed 4 Jul 2025","DOI":"10.7396\/2022_4_B"},{"key":"14_CR27","unstructured":"Pozzoli, N.: POV: Wearable Cameras and the Gamification of Lone-Actor Terrorist Violence. GNET Insights (2024). https:\/\/gnet-research.org\/2024\/02\/28\/pov-wearable-cameras-and-the-gamification-of-lone-actor-terrorist-violence. Accessed 4 Jul 2025"},{"key":"14_CR28","unstructured":"Basra, R.: The Future is Now: The Use of 3D-Printed Guns by Extremists and Terrorists. GNET Insights (2022). https:\/\/gnet-research.org\/2022\/06\/23\/the-future-is-now-the-use-of-3d-printed-guns-by-extremists-and-terrorists. Accessed 4 Jul 2025"},{"key":"14_CR29","unstructured":"Basra, R.: Behind the Mask: Uncovering the Extremist Messages of a 3D\u2010Printed Gun Designer. ICSR London (2023). https:\/\/icsr.info\/wp-content\/uploads\/2023\/10\/ICSR-Report-Behind-the-Mask-Uncovering-the-Extremist-Messages-of-a-3D%E2%80%91Printed-Gun-Designer.pdf. Accessed 4 Jul 2025"},{"key":"14_CR30","unstructured":"Chase, R. J., LaPorte, G. (2018): The Next Generation of Crime Tools and Challenges: 3D Printing. NIJ Journal 279 (2018). https:\/\/nij.gov\/journals\/279\/Pages\/next-generation-of-crime-tools-and-challenges-3d-printing.aspx. Accessed 4 Jul 2025"},{"key":"14_CR31","unstructured":"Europol.: European Union Terrorism Situation and Trend Report (2023). https:\/\/www.europol.europa.eu\/cms\/sites\/default\/files\/documents\/European%20Union%20Terrorism%20Situation%20and%20Trend%20report%202023.pdf. Accessed 4 Jul 2025"},{"key":"14_CR32","unstructured":"Among other sources refer to Global Terrorism Database (https:\/\/www.start.umd.edu\/gtd); \u201cGlobal Terrorism Index\u201c (https:\/\/www.economicsandpeace.org\/wp-content\/uploads\/2024\/02\/GTI-2024-web-290224.pdf); \u201cRAND Database of Worldwide Terrorism Incidents\u201d (https:\/\/www.rand.org\/nsrd\/projects\/terrorism-incidents.html); C-REX \u201cRTV Report\u201d (https:\/\/www.sv.uio.no\/c-rex\/english\/groups\/rtv-dataset\/2023-rtv-trend-report.pdf); FFI Jihadi Plots in Europe Dataset (https:\/\/www.prio.org\/journals\/jpr\/replicationdata); Hacker, Erik (2023): Jihadi Attacks in Europe. Trends and Features 2014 \u2013 2022, Scenor (2023). https:\/\/www.scenor.at\/_files\/ugd\/ff9c7a_7e48f92a024e46f582ee0556c80fe0ce.pdf. Accessed 4 Jul 2025"},{"key":"14_CR33","unstructured":"The European Trend Report on Terrorism 2025 report is expected to be published in the first quarter of (2025)"},{"key":"14_CR34","unstructured":"Graham, R.: How Terrorists Use Encryption. CTC Sentinel, 9(6), (2016). https:\/\/ctc.westpoint.edu\/wp-content\/uploads\/2016\/06\/CTC-SENTINEL_Vol9Iss614.pdf. Accessed 4 Jul 2025"},{"key":"14_CR35","unstructured":"Clifford, B., Powell, H.: Encrypted Extremism. Inside The English-Speaking Islamic State Ecosystem on Telegram. Program on Extremism (GWU) (2019), GWU Program on Extremism. https:\/\/extremism.gwu.edu\/sites\/g\/files\/zaxdzs5746\/files\/EncryptedExtremism.pdf. Accessed 4 Jul 2025"},{"issue":"5","key":"14_CR36","first-page":"50","volume":"100","author":"T Hegghammer","year":"2021","unstructured":"Hegghammer, T.: Resistance is futile: the war on terror supercharged state power. Foreign Aff. 100(5), 50 (2021)","journal-title":"Foreign Aff."},{"key":"14_CR37","unstructured":"Gartenstein-Ross, D., Blackman. M.: ISIL\u2019s Virtual Planners: A Critical Terrorist Innovation. War on the Rocks (2017). https:\/\/warontherocks.com\/2017\/01\/isils-virtual-planners-a-critical-terrorist-innovation. Accessed 4 Jul 2025"},{"key":"14_CR38","unstructured":"Mueller, J.: The Cybercoaching of Terrorists: Cause for Alarm? CTC Sentinel, 10 (9), 29\u201335 (2017). https:\/\/ctc.westpoint.edu\/wp-content\/uploads\/2017\/10\/CTC-Sentinel_Vol10Iss9-21.pdf. Accessed 4 Jul 2025"},{"key":"14_CR39","unstructured":"Stockhammer, N., Clarke, C.P.: Learning from Islamic State-Khorasan Province\u2019s Recent Plots. Lawfare (2024). https:\/\/www.lawfaremedia.org\/article\/learning-from-islamic-state-khorasan-province-s-recent-plots. Accessed 4 Jul 2025"},{"key":"14_CR40","doi-asserted-by":"publisher","unstructured":"Hoffman, B.: Terrorist targeting: Tactics, trends, and potentialities. Terrorism and Political Violence 5(2), 12\u201329 (2024). https:\/\/doi.org\/10.1080\/09546559308427205 Brooks, R.: How Community Ties Influence Terrorist Targeting of Civilians. National Consortium for the Study of Terrorism and Responses to Terrorism (2013)","DOI":"10.1080\/09546559308427205"},{"key":"14_CR41","doi-asserted-by":"publisher","unstructured":"Marchment, Z., Gill, P.: Spatial Decision Making of Terrorist Target Selection: Introducing the TRACK Framework. Studies in Conflict & Terrorism,\u00a045(10), 862\u2013880 (2020). https:\/\/doi.org\/10.1080\/1057610X.2020.1711588. Accessed 4 Jul 2025","DOI":"10.1080\/1057610X.2020.1711588"},{"key":"14_CR42","doi-asserted-by":"crossref","unstructured":"Goertz, S., Stockhammer, N.: Terrorismusbek\u00e4mpfung und Extremismuspr\u00e4vention. Springer, Wiesbaden, p.235 (2023)","DOI":"10.1007\/978-3-658-41954-7"},{"key":"14_CR43","unstructured":"Neumann, P.R.: Substack Channel Die Terrorlage\u201c- \u201e5 Punkte zur Terrorismusbek\u00e4mpfung. https:\/\/prneumann.substack.com\/p\/5-punkte-zur-terrorismusbekampfung. Accessed 4 Jul 2025"},{"key":"14_CR44","unstructured":"The Soufan Center IntelBrief: TikTok Jihad: Terrorists Leverage Modern Tools to Recruit and Radicalize (2024). https:\/\/thesoufancenter.org\/intelbrief-2024-august-9. Accessed 4 Jul 2025"},{"key":"14_CR45","unstructured":"Schlegel, L.: As You Like It: User Types in Digital Gamified Radicalisation Processes. GNET Insights (2021). https:\/\/gnet-research.org\/2021\/09\/01\/as-you-like-it-user-types-in-digital-gamified-radicalisation-processes. Accessed 4 Jul 2025"},{"key":"14_CR46","doi-asserted-by":"publisher","unstructured":"Gunton, K.: The Impact of the Internet and Social Media Platforms on Radicalisation to Terrorism and Violent Extremism. In: Montasari, R., Carroll, F., Mitchell, I., Hara, S., Bolton-King, R. (eds.): Privacy, Security and Forensics in the Internet of Things (IoT). Cham. (2022). https:\/\/doi.org\/10.1007\/978-3-030-91218-5_8. Accessed 4 Jul 2025","DOI":"10.1007\/978-3-030-91218-5_8"},{"key":"14_CR47","doi-asserted-by":"publisher","unstructured":"Binder, J., Kenyon, J.: Terrorism and the internet: How dangerous is online radicalization? Front Psychol. 13, 997390 (2022). https:\/\/doi.org\/10.3389\/fpsyg.2022.997390. Accessed 4 Jul 2025","DOI":"10.3389\/fpsyg.2022.997390"},{"key":"14_CR48","unstructured":"Stockhammer, N., Clarke, C.P.: The August 2024 Taylor Swift Vienna Concert Plot. CTC Sentinel 18(1), 8\u201318 (2025). https:\/\/ctc.westpoint.edu\/wp-content\/uploads\/2025\/01\/CTC-SENTINEL-012025.pdf. Accessed 4 Jul 2025"},{"key":"14_CR49","unstructured":"CNN: These TikTok videos are concerning counterterrorism experts. Here\u2019s why, (2024). https:\/\/edition.cnn.com\/2024\/08\/15\/world\/video\/abul-baraa-tiktok-islamist-radicalization-digvid. Accessed 4 Jul 2025"},{"key":"14_CR50","unstructured":"Ayad, M.: The original sounds of terrorist leaders: A TikTok feature enables terrorist content to flourish. Institute for Strategic Dialogue (ISD) (2024). https:\/\/www.isdglobal.org\/digital_dispatches\/the-original-sounds-of-terrorist-leaders-a-tiktok-feature-enables-terrorist-content-to-flourish. Accessed 4 Jul 2025"},{"key":"14_CR51","unstructured":"EUROPOL: Europol and TikTok collaborate to bolster efforts against terrorist content. https:\/\/www.europol.europa.eu\/media-press\/newsroom\/news\/europol-and-tiktok-collaborate-to-bolster-efforts-against-terrorist-content. Accessed 4 Jul 2025"},{"key":"14_CR52","unstructured":"Guhl, J., Comerford, M.: Understanding the Salafi Online Ecosystem: A Digital Snapshot, Institute for Strategic Dialogue (ISD) (2021). https:\/\/www.isdglobal.org\/wp-content\/uploads\/2021\/11\/Snapshot-study.pdf. Accessed 4 Jul 2025"},{"key":"14_CR53","doi-asserted-by":"publisher","unstructured":"Sorgenfrei, S.: Branding Salafism: Salafi Missionaries as Social Media Influencers. Method & Theory in the Study of Religion 34(3), 211\u2013237 (2021). https:\/\/doi.org\/10.1163\/15700682-12341515. Accessed 4 Jul 2025","DOI":"10.1163\/15700682-12341515"},{"key":"14_CR54","unstructured":"United Nations Office for Disarmament Affairs: Open Consultations on the Comprehensive Review of the Status of Implementation of Resolution 1540, (2004). https:\/\/www.un.org\/en\/sc\/1540\/documents\/ODA%20HR%201540%20OC%20Remarks%202022.pdf. Accessed 4 Jul 2025"},{"key":"14_CR55","unstructured":"Larter, D.B.: SOCOM commander: Armed ISIS drones were 2016\u2019s most daunting problem. Defense News (2016). https:\/\/www.defensenews.com\/digital-show-dailies\/sofic\/2017\/05\/16\/socom-commander-armed-isis-drones-were-2016s-most-daunting-problem. Accessed 4 Jul 2025"},{"key":"14_CR56","unstructured":"Pledger, T.G.: The Role of Drones in Future Terrorist Attacks. Land Warfare Paper (137), (2021). https:\/\/www.ausa.org\/sites\/default\/files\/publications\/LWP-137-The-Role-of-Drones-in-Future-Terrorist-Attacks_0.pdf. Accessed 4 Jul 2025"},{"key":"14_CR57","unstructured":"Gabriel, A., et al.: Process modelling of physical and cyber terrorist attacks on networks of public transportation infrastructure. In: Montarnal, A., et al (eds.): Proceedings of the 14th International Conference on Information Systems for Crisis Response and Management, pp. 390\u2013399. Albi, France (2017). https:\/\/idl.iscram.org\/files\/alexandergabriel\/2017\/2028_AlexanderGabriel_etal2017.pdf. Accessed 4 Jul 2025"},{"key":"14_CR58","unstructured":"Jenkins, B., Butterworth, B: Train Wrecks and Track Attacks: An Analysis of Attempts by Terrorists and Other Extremists to Derail Trains or Disrupt Rail Transportation. Maleta Transportation Institute (2018). https:\/\/transweb.sjsu.edu\/sites\/default\/files\/1794_Jenkins_Train-Wrecks-Train-Attacks.pdf. Accessed 4 Jul 2025\u2014\u2014\u2014: How Sophisticated Are Terrorist Attacks on Passenger Rail Transportation. https:\/\/transweb.sjsu.edu\/sites\/default\/files\/SP0520-Jenkins-Terrorist-Attacks-Passenger-Rail-Transportation.pdf. Accessed 4 Jul 2025"},{"key":"14_CR59","unstructured":"Blanchard, A., Hall, J.K.C: Terrorism and Autonomous Weapon Systems: Future Threat or Science Fiction?, Centre for Emerging Technology and Security (CETaS) Expert Analysis (2023). https:\/\/cetas.turing.ac.uk\/sites\/default\/files\/2023-06\/cetas_expert_analysis_-_terrorism_and_autonomous_weapon_systems_-_future_threat_or_science_fiction.pdf. Accessed 4 Jul 2025"},{"key":"14_CR60","unstructured":"Schmid, A.P.: Handbook of Terrorism Prevention and Preparedness. The Hague, ICCT Press, 2020\/21. https:\/\/icct.nl\/handbook-of-terrorism-prevention-and-preparedness. Accessed 4 Jul 2025"},{"key":"14_CR61","first-page":"90","volume-title":"Counterterrorism","author":"R Crelinsten","year":"2009","unstructured":"Crelinsten, R.: Counterterrorism, pp. 90\u201394. CUP, Cambridge (2009)"},{"key":"14_CR62","doi-asserted-by":"publisher","unstructured":"Coaffee, J.: From Counterterrorism to Resilience. The European Legacy, 11(4) 389\u2013403 (2006). https:\/\/doi.org\/10.1080\/10848770600766094. Accessed 4 Jul 2025","DOI":"10.1080\/10848770600766094"},{"issue":"6","key":"14_CR63","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1017\/S1049023X2000103X","volume":"35","author":"M Court","year":"2020","unstructured":"Court, M., et al.: Counter-terrorism medicine: creating a medical initiative mandated by escalating asymmetric attacks\u201d. Prehosp. Disaster Med. 35(6), 595\u2013598 (2020)","journal-title":"Prehosp. Disaster Med."},{"key":"14_CR64","doi-asserted-by":"publisher","unstructured":"Hardy, K.: Resilience in UK Counter-Terrorism. Theoretical Criminology 19(1), 77\u201394 (2015). https:\/\/doi.org\/10.1177\/1362480614542119. Accessed 4 Jul 2025","DOI":"10.1177\/1362480614542119"},{"key":"14_CR65","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206784","volume-title":"Leaderless Jihad: Terror Networks in the Twenty-First Century","author":"M Sageman","year":"2008","unstructured":"Sageman, M.: Leaderless Jihad: Terror Networks in the Twenty-First Century. University of Pennsylvania Press, Philadelphia (2008)"},{"key":"14_CR66","volume-title":"Nexus: A Brief History of Information Networks from the Stone Age to AI","author":"YN See Harari","year":"2024","unstructured":"See Harari, Y.N.: Nexus: A Brief History of Information Networks from the Stone Age to AI. Random House, London (2024)"},{"key":"14_CR67","unstructured":"Schori-Liang, C.: Terrorist Digitalis: Preventing Terrorists from Using Emerging Technologies. Global Terrorism Index 2023 Report, 72\u201375 (2023). https:\/\/www.visionofhumanity.org\/preventing-terrorists-from-using-emerging-technologies; further: https:\/\/www.visionofhumanity.org\/wp-content\/uploads\/2023\/03\/GTI-2023-web-170423.pdf. Accessed 4 Jul 2025"},{"key":"14_CR68","unstructured":"Siegel, D., Doty, M.B.: Weapons of Mass Disruption: Artificial Intelligence and the Production of Extremist Propaganda. Global Network on Extremism and Technology (GNET) Insights (2023). https:\/\/gnet-research.org\/2023\/02\/17\/weapons-of-mass-disruption-artificial-intelligence-and-the-production-of-extremist-propaganda. Accessed 4 Jul 2025"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97115-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T09:58:25Z","timestamp":1757325505000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97115-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,2]]},"ISBN":["9783031971143","9783031971150"],"references-count":68,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97115-0_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025,8,2]]},"assertion":[{"value":"2 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krems an der Donau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itdrr.org\/conference\/itdrr2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}