{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T03:23:15Z","timestamp":1770434595686,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540898993","type":"print"},{"value":"9783540899006","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89900-6_13","type":"book-chapter","created":{"date-parts":[[2008,11,26]],"date-time":"2008-11-26T13:24:21Z","timestamp":1227705861000},"page":"108-118","source":"Crossref","is-referenced-by-count":52,"title":["Jihadi Video and Auto-radicalisation: Evidence from an Exploratory YouTube Study"],"prefix":"10.1007","author":[{"given":"Maura","family":"Conway","sequence":"first","affiliation":[]},{"given":"Lisa","family":"McInerney","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Bergen, P.: Al Qaeda\u2019s New Tactics. New York Times (November 15, 2002)"},{"key":"13_CR2","unstructured":"Ranstorp, M.: Al-Qaida in Cyberspace: Future Challenges of Terrorism in an Information Age. In: Nicander, L., Ranstorp, M. (eds.) Terrorism in the Information Age: New Frontiers? Stockholm, National Defence College (2004)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Conway, M.: Terrorism and the Internet: New Media, New Threat? Parliamentary Affairs 59 (2006)","DOI":"10.1093\/pa\/gsl009"},{"key":"13_CR4","unstructured":"Kimmage, D., Ridolfo, K.: Iraqi Insurgent Media: The War of Ideas and Images. Washington DC, Radio Free Europe (2007), http:\/\/realaudio.rferl.org\/online\/OLPDFfiles\/insurgent.pdf"},{"key":"13_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_66","volume-title":"Intelligence and Security Informatics","author":"A. Salem","year":"2006","unstructured":"Salem, A., Reid, E., Chen, H.: Content Analysis of Jihadi Extremist Groups\u2019 Videos. In: Mehrotra, S., Zeng, D.D., Chen, H., Thuraisingham, B., Wang, F.-Y. (eds.) ISI 2006. LNCS, vol.\u00a03975. Springer, Heidelberg (2006)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Salem, A., Reid, E., Chen, H.: Multimedia Content Coding and Analysis: Unravelling the Content of Jihadi Extremist Groups\u2019 Videos. Studies in Conflict & Terrorism 31 (2007)","DOI":"10.1080\/10576100802144072"},{"key":"13_CR7","unstructured":"European Union Counter-Terrorism Strategy (2005), http:\/\/register.consilium.eu.int\/pdf\/en\/05\/st14\/st14469-re04.en05.pdf"},{"key":"13_CR8","unstructured":"European Union Strategy for Combating Radicalisation and Recruitment to Terrorism (2005), http:\/\/register.consilium.europa.eu\/pdf\/en\/05\/st14\/st14781-re01.en05.pdf"},{"key":"13_CR9","unstructured":"United Nations Counterterrorism Strategy (2006), http:\/\/www.un.org\/terrorism\/strategy-counter-terrorism.html#plan"},{"key":"13_CR10","unstructured":"Call for projects on radicalisation and violence by the UK Economic and Social Research Council in conjunction with the UK Foreign and Commonwealth Office (2007), http:\/\/www.esrc.ac.uk\/ESRCInfoCentre\/opportunities\/current_funding_opportunities\/New_Security_Challenges.aspx?ComponentId=18575&SourcePageId=5433"},{"key":"13_CR11","unstructured":"Call for projects on the prevention of and response to violent radicalisation by the European Commission (2007), http:\/\/ec.europa.eu\/justice_home\/funding\/2004_2007\/radicalisation\/funding_radicalisation_en.htm"},{"key":"13_CR12","unstructured":"Hoffman, B.: The Myth of Grass-Roots Terrorism. Foreign Affairs 87 (2008)"},{"key":"13_CR13","doi-asserted-by":"publisher","DOI":"10.9783\/9780812206784","volume-title":"Leaderless Jihad","author":"M. Sageman","year":"2008","unstructured":"Sageman, M.: Leaderless Jihad. University of Pennsylvania Press, Philadelphia (2008)"},{"key":"13_CR14","unstructured":"YouTube Factsheet (2008), http:\/\/www.youtube.com\/t\/fact_sheet"},{"key":"13_CR15","unstructured":"Madden, M.: Online Video. Pew Internet and American Life Project, Washington DC (2007), http:\/\/www.pewinternet.org\/pdfs\/PIP_Online_Video_2007.pdf"},{"key":"13_CR16","unstructured":"Yen, Y.: YouTube Looks for the Money Clip. CNNMoney.com (March 25, 2008)"},{"key":"13_CR17","unstructured":"Gomes, L.: Will All of Us Get Our 15 Minutes on YouTube? Wall Street Journal (August 30, 2006), http:\/\/online.wsj.com\/public\/article\/SB115689298168048904-5wWyrSwyn6RfVfz9NwLk774VUWc_20070829.html?mod=rss_free"},{"key":"13_CR18","unstructured":"Wikipedia entry for \u2018YouTube\u2019, http:\/\/en.wikipedia.org\/wiki\/Youtube#cite_note-Moneyclip-3"},{"key":"13_CR19","unstructured":"YouTube Community Guidelines, http:\/\/www.youtube.com\/t\/community_guidelines"},{"key":"13_CR20","unstructured":"CASOS Institute, Carnegie Mellon University, http:\/\/www.casos.cs.cmu.edu\/"},{"key":"13_CR21","unstructured":"Editorial. The Refugee Crisis; Helping Iraqis Who Helped Us. The Washington Post (August 12, 2007)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89900-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T15:28:25Z","timestamp":1557934105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89900-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540898993","9783540899006"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89900-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}