{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,4]],"date-time":"2026-05-04T10:09:36Z","timestamp":1777889376556,"version":"3.51.4"},"reference-count":79,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2012,8,9]],"date-time":"2012-08-09T00:00:00Z","timestamp":1344470400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Poiesis Prax"],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1007\/s10202-012-0108-3","type":"journal-article","created":{"date-parts":[[2012,8,8]],"date-time":"2012-08-08T13:15:34Z","timestamp":1344431734000},"page":"163-176","source":"Crossref","is-referenced-by-count":5,"title":["Cyberspace as a new arena for terroristic propaganda: an updated examination"],"prefix":"10.1007","volume":"9","author":[{"given":"Elizabeth","family":"Minei","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jonathan","family":"Matusitz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2012,8,9]]},"reference":[{"issue":"1","key":"108_CR1","first-page":"28","volume":"74","author":"J Aaviksoo","year":"2008","unstructured":"Aaviksoo J (2008) Cyber-terrorism. Vital Speeches Day 74(1):28\u201332","journal-title":"Vital Speeches Day"},{"key":"108_CR2","volume-title":"Practice of war: production, reproduction and communication of armed violence","author":"R Aparna","year":"2008","unstructured":"Aparna R, Bolli M, Bock M (2008) Practice of war: production, reproduction and communication of armed violence. Berghahn Books, New York"},{"key":"108_CR100","unstructured":"Army Field Manual (1956) Department of the Army. Washington, DC"},{"key":"108_CR3","volume-title":"Networks and netwars: the future of terror, crime, and militancy","author":"J Arquilla","year":"2001","unstructured":"Arquilla J, Ronfeldt D (2001a) Networks and netwars: the future of terror, crime, and militancy. RAND, Santa Monica"},{"issue":"10","key":"108_CR4","first-page":"1","volume":"6","author":"J Arquilla","year":"2001","unstructured":"Arquilla J, Ronfeldt DR (2001b) Networks, netwars, and the fight for the future. First Monday 6(10):1\u201325","journal-title":"First Monday"},{"key":"108_CR5","first-page":"39","volume-title":"Countering the new terrorism","author":"J Arquilla","year":"1999","unstructured":"Arquilla J, Ronfeldt D, Zanini M (1999) Networks, netwar and information-age terrorism. In: Lesser IO, Hoffman B, Arquilla J, Ronfeldt DF, Zanini M, Jenkins BM (eds) Countering the new terrorism. RAND, Santa Monica, pp 39\u201388"},{"key":"108_CR6","volume-title":"Violence goes to the Internet: avoiding the snare of the net","author":"EM Axelrod","year":"2009","unstructured":"Axelrod EM, Nicoletti J (2009) Violence goes to the Internet: avoiding the snare of the net. Charles C. Thomas Publisher, Springfield, IL"},{"key":"108_CR7","volume-title":"The spirit of terrorism and the requiem for the Twin Towers","author":"J Baudrillard","year":"2002","unstructured":"Baudrillard J (2002) The spirit of terrorism and the requiem for the Twin Towers. Verso, New York"},{"key":"108_CR8","first-page":"117","volume":"95","author":"G Benford","year":"1998","unstructured":"Benford G (1998) A scientist\u2019s notebook. Fantasy Sci Fict 95:117\u2013128","journal-title":"Fantasy Sci Fict"},{"key":"108_CR9","volume-title":"Signs in contemporary culture","author":"A Berger","year":"1989","unstructured":"Berger A (1989) Signs in contemporary culture. Sheffield, Salem, WI"},{"key":"108_CR10","volume-title":"Propaganda","author":"E Bernays","year":"2004","unstructured":"Bernays E, Miller MC (2004) Propaganda. Ig Publishing, Brooklyn, NY"},{"key":"108_CR11","volume-title":"Banal nationalism","author":"M Billig","year":"1995","unstructured":"Billig M (1995) Banal nationalism. Sage, Thousand Oaks, CA"},{"issue":"1","key":"108_CR12","first-page":"179","volume":"47","author":"D Brown","year":"2006","unstructured":"Brown D (2006) A proposal for an international convention to regulate the use of information systems in armed conflict. Harvard Int Law J 47(1):179\u2013221","journal-title":"Harvard Int Law J"},{"key":"108_CR13","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780198251583.001.0001","volume-title":"International law and the use of force by states","author":"I Brownlie","year":"1963","unstructured":"Brownlie I (1963) International law and the use of force by states. Clarendon Press, Oxford"},{"key":"108_CR14","volume-title":"Virtually Islamic","author":"G Bunt","year":"1999","unstructured":"Bunt G (1999) Virtually Islamic. University of Wales Press, Cardiff"},{"key":"108_CR15","volume-title":"Islam in the digital age","author":"G Bunt","year":"2003","unstructured":"Bunt G (2003) Islam in the digital age. Pluto Press, London"},{"key":"108_CR16","first-page":"A1","volume-title":"Criminal network: to catch crooks in cyberspace","author":"BL Cassell","year":"2006","unstructured":"Cassell BL (2006) Criminal network: to catch crooks in cyberspace. Wall St J\u2014Eastern Edition, p A1"},{"key":"108_CR17","doi-asserted-by":"crossref","DOI":"10.4324\/9780203166277","volume-title":"Semiotics: the basics","author":"D Chandler","year":"2002","unstructured":"Chandler D (2002) Semiotics: the basics. Routledge, New York"},{"key":"108_CR18","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1525\/curh.2002.101.659.436","volume":"2","author":"M Conway","year":"2002","unstructured":"Conway M (2002) What is cyberterrorism? Curr Hist 2:436\u2013440","journal-title":"Curr Hist"},{"issue":"1","key":"108_CR19","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s11127-006-9051-y","volume":"128","author":"T Cowen","year":"2006","unstructured":"Cowen T (2006) Terrorism as theater: analysis and policy implications. Public Choice 128(1):233\u2013244","journal-title":"Public Choice"},{"issue":"1","key":"108_CR20","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1162\/isec.2006.31.1.7","volume":"31","author":"AK Cronin","year":"2006","unstructured":"Cronin AK (2006) How al-Qaida ends: the decline and demise of terrorist groups. Int Secur 31(1):7\u201348","journal-title":"Int Secur"},{"issue":"2","key":"108_CR21","first-page":"1","volume":"81","author":"C Deal","year":"2001","unstructured":"Deal C, Gage A, Schueneman R (2001) Viral contagia in cyberspace. Milit Rev 81(2):1\u201317","journal-title":"Milit Rev"},{"key":"108_CR23","volume-title":"Basics of semiotics","author":"J Deely","year":"1990","unstructured":"Deely J (1990) Basics of semiotics. Tartu University Press, Tartu"},{"key":"108_CR24","volume-title":"Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives","author":"DE Denning","year":"1999","unstructured":"Denning DE (1999) Cyberterrorism. Testimony before the Special Oversight Panel on Terrorism Committee on Armed Services U.S. House of Representatives. Georgetown Town University, Washington, DC"},{"issue":"1","key":"108_CR25","first-page":"10","volume":"1","author":"DE Denning","year":"2000","unstructured":"Denning DE (2000) Hacktivism: an emerging threat to diplomacy. Foreign Serv J 1(1):10\u201317","journal-title":"Foreign Serv J"},{"issue":"4","key":"108_CR26","first-page":"385","volume":"70","author":"KC Desouza","year":"2003","unstructured":"Desouza KC, Hensgen T (2003) Technological forecasting and social change. Sci Direct 70(4):385\u2013396","journal-title":"Sci Direct"},{"key":"108_CR27","volume-title":"Managing information in complex organizations: semiotics and signals, complexity and chaos","author":"KC Desouza","year":"2005","unstructured":"Desouza KC, Hensgen T (2005) Managing information in complex organizations: semiotics and signals, complexity and chaos. M. E. Sharpe, Armonk, NY"},{"key":"108_CR28","volume-title":"Statement before the US Senate Governmental Affairs Committee","author":"JM Deutsch","year":"1996","unstructured":"Deutsch JM (1996) Statement before the US Senate Governmental Affairs Committee. Permanent Subcommittee on Investigations, Washington, DC"},{"key":"108_CR29","first-page":"10","volume":"108","author":"JM Deutsch","year":"1997","unstructured":"Deutsch JM (1997) Terrorism. Foreign Policy 108:10\u201322","journal-title":"Foreign Policy"},{"key":"108_CR30","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511817182","volume-title":"The conduct of hostilities under the law of international armed conflict","author":"Y Dinstein","year":"2004","unstructured":"Dinstein Y (2004) The conduct of hostilities under the law of international armed conflict. Cambridge University Press, Cambridge"},{"key":"108_CR31","doi-asserted-by":"crossref","DOI":"10.4324\/9780203323212","volume-title":"Introduction to communication studies","author":"J Fiske","year":"1982","unstructured":"Fiske J (1982) Introduction to communication studies. Methuen, New York"},{"issue":"16","key":"108_CR32","first-page":"1","volume":"163","author":"DA Fulghum","year":"2005","unstructured":"Fulghum DA (2005) Aviation. Week Space Technol 163(16):1","journal-title":"Week Space Technol"},{"key":"108_CR33","volume-title":"Propaganda analysis: a study of inferences made from Nazi propaganda in World War II","author":"AL George","year":"1959","unstructured":"George AL (1959) Propaganda analysis: a study of inferences made from Nazi propaganda in World War II. Row, Peterson & Co., Evanston, IL"},{"key":"108_CR34","unstructured":"Glasser SB, Coll S (2005) The web as weapon. Washington Post, p A10"},{"issue":"7","key":"108_CR35","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1016\/S0167-4048(02)01116-1","volume":"21","author":"S Gordon","year":"2002","unstructured":"Gordon S, Ford R (2002) Cyberterrorism? Comput Secur 21(7):636\u2013647","journal-title":"Comput Secur"},{"key":"108_CR36","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1016\/S1361-3723(07)70021-0","volume":"2","author":"M Gorge","year":"2007","unstructured":"Gorge M (2007) Cyberterrorism: hype or reality? Comput Fraud Secur 2:9\u201312","journal-title":"Comput Fraud Secur"},{"issue":"6","key":"108_CR37","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/BF02687512","volume":"42","author":"R Gunaratna","year":"2005","unstructured":"Gunaratna R (2005) The prospect of global terrorism. Society 42(6):31\u201335","journal-title":"Society"},{"key":"108_CR38","volume-title":"Terrorism today","author":"CC Harmon","year":"2001","unstructured":"Harmon CC (2001) Terrorism today. Frank Cass Publishers, London"},{"key":"108_CR39","first-page":"427","volume":"26","author":"B Hoffman","year":"2003","unstructured":"Hoffman B (2003) Al Qaeda, trends in terrorism, and future potentialities: an assessment. Stud Confl Terrorism 26:427\u2013440","journal-title":"Stud Confl Terrorism"},{"issue":"184","key":"108_CR40","first-page":"1","volume":"97","author":"N Hoopes","year":"2005","unstructured":"Hoopes N (2005) New focus on cyber-terrorism. Christ Sci Monitor 97(184):1","journal-title":"Christ Sci Monitor"},{"key":"108_CR41","doi-asserted-by":"crossref","DOI":"10.1201\/9781420091281","volume-title":"Cyber fraud: tactics, techniques and procedures","author":"R Howard","year":"2009","unstructured":"Howard R (2009) Cyber fraud: tactics, techniques and procedures. Auerbach, New York"},{"key":"108_CR42","volume-title":"International terrorism","author":"B Jenkins","year":"1975","unstructured":"Jenkins B (1975) International terrorism. Crescent Publication, Los Angeles"},{"key":"108_CR43","volume-title":"Propaganda and persuasion","author":"G Jowell","year":"2006","unstructured":"Jowell G, O\u2019Donnell V (2006) Propaganda and persuasion. Sage, Thousand Oaks, CA"},{"key":"108_CR44","doi-asserted-by":"crossref","DOI":"10.5949\/UPO9781846310201","volume-title":"Varieties of world making: beyond globalization","author":"N Karagiannis","year":"2007","unstructured":"Karagiannis N, Wagner P (2007) Varieties of world making: beyond globalization. Liverpool University Press, Liverpool"},{"key":"108_CR45","volume-title":"Faces of the enemy: reflections of the hostile imagination","author":"S Keen","year":"1991","unstructured":"Keen S (1991) Faces of the enemy: reflections of the hostile imagination. Harper Collins, London"},{"issue":"1","key":"108_CR46","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1177\/107769900207900102","volume":"79","author":"S Kim","year":"2002","unstructured":"Kim S, Scheufele DA, Shanahan JE (2002) Agenda-setting, priming, framing and second-levels in local politics. Journal Mass Commun Q 79(1):7\u201325","journal-title":"Journal Mass Commun Q"},{"issue":"5","key":"108_CR47","doi-asserted-by":"crossref","first-page":"115","DOI":"10.2307\/20032074","volume":"85","author":"EF Kohlmann","year":"2006","unstructured":"Kohlmann EF (2006) The real online terrorist threat. Foreign Affairs 85(5):115\u2013124","journal-title":"Foreign Affairs"},{"key":"108_CR48","volume-title":"The content an analysis reader","author":"K Krippendorff","year":"2008","unstructured":"Krippendorff K, Bock MA (2008) The content an analysis reader. Sage, Thousand Oaks, CA"},{"key":"108_CR49","volume-title":"No end to war: terrorism in the twenty-first century","author":"W Laqueur","year":"2006","unstructured":"Laqueur W (2006) No end to war: terrorism in the twenty-first century. Continuum, New York"},{"key":"108_CR50","volume-title":"Propaganda technique in world war","author":"HD Lasswell","year":"1971","unstructured":"Lasswell HD (1971) Propaganda technique in world war. MIT Press, Cambridge, MA"},{"issue":"5","key":"108_CR51","first-page":"15","volume":"174","author":"R Lenzner","year":"2007","unstructured":"Lenzner R, Vardi N (2007) The next threat. Forbes 174(5):15\u201321","journal-title":"Forbes"},{"key":"108_CR52","volume-title":"Assessing the risks of cyberterrorism, cyber war, and other cyber threats","author":"J Lewis","year":"2002","unstructured":"Lewis J (2002) Assessing the risks of cyberterrorism, cyber war, and other cyber threats. Center for Strategic and International Studies (CSIS), Washington, DC"},{"key":"108_CR53","volume-title":"Cyberdeterrence and cyberwar","author":"MC Libicki","year":"2009","unstructured":"Libicki MC (2009) Cyberdeterrence and cyberwar. RAND, Santa Monica"},{"key":"108_CR54","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511543364","volume-title":"Semiotics in information systems engineering","author":"K Liu","year":"2000","unstructured":"Liu K (2000) Semiotics in information systems engineering. Cambridge University Press, Cambridge"},{"key":"108_CR55","first-page":"82","volume":"23","author":"BJ Luskin","year":"1996","unstructured":"Luskin BJ (1996) Toward an understanding of media psychology. T H E J 23:82\u201385","journal-title":"T H E J"},{"key":"108_CR56","doi-asserted-by":"crossref","DOI":"10.4324\/9780203453155","volume-title":"Transnational Muslim politics: reimagining the ummah","author":"P Mandaville","year":"2001","unstructured":"Mandaville P (2001) Transnational Muslim politics: reimagining the ummah. Routledge, London"},{"key":"108_CR57","first-page":"9","volume":"2","author":"G Mathieu","year":"2007","unstructured":"Mathieu G (2007) Cyberterrorism: hype or reality? Comput Fraud Secur 2:9\u201312","journal-title":"Comput Fraud Secur"},{"issue":"4","key":"108_CR58","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1080\/19393550802397033","volume":"17","author":"J Matusitz","year":"2008","unstructured":"Matusitz J (2008a) Cyberterrorism: postmodern state of chaos. Inf Secur J Glob Perspect 17(4):179\u2013187","journal-title":"Inf Secur J Glob Perspect"},{"issue":"1","key":"108_CR59","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1080\/15567280701723901","volume":"2","author":"J Matusitz","year":"2008","unstructured":"Matusitz J (2008b) Postmodernism and networks of cyberterrorists. J Digit Forensic Pract 2(1):17\u201326","journal-title":"J Digit Forensic Pract"},{"key":"108_CR60","first-page":"A11","volume":"7","author":"T McGirk","year":"1999","unstructured":"McGirk T (1999) Wired for warfare. Time Int 7:A11","journal-title":"Time Int"},{"issue":"6","key":"108_CR61","first-page":"1","volume":"118","author":"S Misra","year":"2003","unstructured":"Misra S (2003) High-tech terror. Am City Cty 118(6):1","journal-title":"Am City Cty"},{"key":"108_CR62","volume-title":"Handbook of semiotics","author":"W N\u00f6th","year":"1995","unstructured":"N\u00f6th W (1995) Handbook of semiotics. Indiana University Press, Bloomington, IN"},{"key":"108_CR63","doi-asserted-by":"crossref","DOI":"10.5040\/9798400670176","volume-title":"Information operations: doctrine and practice","author":"C Paul","year":"2008","unstructured":"Paul C (2008) Information operations: doctrine and practice. Praeger, Westport CT"},{"key":"108_CR64","volume-title":"Collected papers: volume V. Pragmatism and pragmaticism","author":"CS Peirce","year":"1934","unstructured":"Peirce CS (1934) Collected papers: volume V. Pragmatism and pragmaticism. Harvard University Press, Cambridge, MA"},{"key":"108_CR65","first-page":"72","volume-title":"Terrorist, victims, and society: psychological perspectives on terrorism and its consequence","author":"M Rogers","year":"2003","unstructured":"Rogers M (2003) The psychology of cyber-terrorism. In: Silke A (ed) Terrorist, victims, and society: psychological perspectives on terrorism and its consequence. John Wiley, London, pp 72\u201392"},{"key":"108_CR66","volume-title":"Signs: an introduction to semiotics","author":"TA Sebeok","year":"1994","unstructured":"Sebeok TA (1994) Signs: an introduction to semiotics. University of Toronto Press, Toronto"},{"key":"108_CR67","first-page":"939","volume":"37","author":"MR Shulman","year":"1999","unstructured":"Shulman MR (1999) Discrimination in the laws of information warfare. Columbia J Transnational Law 37:939\u2013967","journal-title":"Columbia J Transnational Law"},{"key":"108_CR68","volume-title":"A study in political violence: the Indonesian experience","author":"S Sloan","year":"1981","unstructured":"Sloan S (1981) A study in political violence: the Indonesian experience. University of Oklahoma Press, Norman, OK"},{"key":"108_CR69","volume-title":"Terrorism: the present threat in context","author":"S Sloan","year":"2006","unstructured":"Sloan S (2006) Terrorism: the present threat in context. Berg Publishers, Oxford"},{"issue":"4","key":"108_CR70","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1177\/0022002700044004005","volume":"44","author":"M Slone","year":"2000","unstructured":"Slone M (2000) Response to media coverage of terrorism. J Conflict Resolut 44(4):508\u2013522","journal-title":"J Conflict Resolut"},{"key":"108_CR71","doi-asserted-by":"crossref","DOI":"10.5771\/9780739130315","volume-title":"At war with metaphor: media, propaganda, and racism in the war on terror","author":"E Steuter","year":"2009","unstructured":"Steuter E, Wills D (2009) At war with metaphor: media, propaganda, and racism in the war on terror. Lexington Books, Landham, MD"},{"issue":"4","key":"108_CR72","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/45.969588","volume":"20","author":"SR Subramanya","year":"2001","unstructured":"Subramanya SR, Lakshminarasimhan N (2001) Computer viruses. IEEE Potentials 20(4):16\u201319","journal-title":"IEEE Potentials"},{"key":"108_CR73","first-page":"46","volume":"1","author":"D Talbot","year":"2005","unstructured":"Talbot D (2005) Terror\u2019s server. Technology Review 1:46\u201352","journal-title":"Technology Review"},{"key":"108_CR74","volume-title":"Communicating terror: the rhetorical dimensions of terrorism","author":"JS Tuman","year":"2003","unstructured":"Tuman JS (2003) Communicating terror: the rhetorical dimensions of terrorism. Sage, Thousand Oaks, CA"},{"issue":"5","key":"108_CR75","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1080\/10576100290101214","volume":"25","author":"Y Tzfati","year":"2002","unstructured":"Tzfati Y, Weimann G (2002) www.terrorism.com : Terror on the Internet. Stud Confl Terrorism 25(5):317\u2013332","journal-title":"Stud Confl Terrorism"},{"key":"108_CR76","volume-title":"Black ice: the invisible threat of cyber-terrorism","author":"D Verton","year":"2003","unstructured":"Verton D (2003) Black ice: the invisible threat of cyber-terrorism. McGraw-Hill, New York"},{"issue":"2","key":"108_CR77","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1080\/10576100590905110","volume":"48","author":"G Weimann","year":"2005","unstructured":"Weimann G (2005) Cyberterrorism: the sum of all fears? Stud Confl Terrorism 48(2):129\u2013149","journal-title":"Stud Confl Terrorism"},{"key":"108_CR78","volume-title":"Terror on the internet: the new arena, the new challenges","author":"G Weimann","year":"2006","unstructured":"Weimann G (2006) Terror on the internet: the new arena, the new challenges. USIP Press Books, Washington, DC"},{"key":"108_CR79","volume-title":"Terrorist propaganda: the red army faction and the provisional IRA","author":"J Wright","year":"1991","unstructured":"Wright J (1991) Terrorist propaganda: the red army faction and the provisional IRA. St. Martin\u2019s Press, New York"}],"container-title":["Poiesis &amp; Praxis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10202-012-0108-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10202-012-0108-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10202-012-0108-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T17:59:43Z","timestamp":1743962383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10202-012-0108-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8,9]]},"references-count":79,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["108"],"URL":"https:\/\/doi.org\/10.1007\/s10202-012-0108-3","relation":{},"ISSN":["1615-6609","1615-6617"],"issn-type":[{"value":"1615-6609","type":"print"},{"value":"1615-6617","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,8,9]]}}}