{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T05:06:13Z","timestamp":1747199173855},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,3,23]],"date-time":"2013-03-23T00:00:00Z","timestamp":1363996800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Secur Inform"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1186\/2190-8532-2-9","type":"journal-article","created":{"date-parts":[[2013,3,23]],"date-time":"2013-03-23T15:14:01Z","timestamp":1364051641000},"source":"Crossref","is-referenced-by-count":18,"title":["A psychological perspective on virtual communities supporting terrorist &amp; extremist ideologies as a tool for recruitment"],"prefix":"10.1186","volume":"2","author":[{"given":"Lorraine","family":"Bowman-Grieve","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,23]]},"reference":[{"key":"27_CR1","first-page":"81","volume-title":"Terrorism: Roots, impact, responses","author":"N Friedland","year":"1992","unstructured":"Friedland N: Becoming a terrorist: Social and individual antecedents. In Terrorism: Roots, impact, responses. Edited by: Howard L. Praeger, New York; 1992:81\u201394."},{"key":"27_CR2","first-page":"7","volume-title":"Origins of terrorism: Psychologies, ideologies, theologies, states of mind","author":"M Crenshaw","year":"1990","unstructured":"Crenshaw M: The logic of terrorism: Terrorist behaviour as a product of strategic choice. In Origins of terrorism: Psychologies, ideologies, theologies, states of mind. Edited by: Reich W. Cambridge University Press, Cambridge; 1990:7\u201324."},{"key":"27_CR3","doi-asserted-by":"publisher","DOI":"10.4324\/9780203496961","volume-title":"The Psychology of Terrorism","author":"J Horgan","year":"2005","unstructured":"Horgan J: The Psychology of Terrorism. Routledge, Oxon; 2005."},{"key":"27_CR4","first-page":"259","volume-title":"Social movements and violence: Participation in underground organizations","author":"Dd Porta","year":"1992","unstructured":"Porta Dd: Political socialization in left-wing underground organizations: Biographies of Italian and German militants. In Social movements and violence: Participation in underground organizations. Edited by: Porta Dd. JAI Press, Greenwich, CT; 1992:259\u2013290."},{"issue":"1","key":"27_CR5","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1080\/09546550312331293007","volume":"15","author":"J Post","year":"2003","unstructured":"Post J, Sprinzak E, Denny L: The terrorists in their own words: Interviews with 35 incarcerated Middle Eastern Terrorists. Terrorism & Political Violence 2003, 15(1):171\u2013184. 10.1080\/09546550312331293007","journal-title":"Terrorism & Political Violence"},{"key":"27_CR6","doi-asserted-by":"crossref","DOI":"10.9783\/9780812206791","volume-title":"Understanding terrorist networks","author":"M Sageman","year":"2004","unstructured":"Sageman M: Understanding terrorist networks. University of Pennsylvania Press, Philadelphia; 2004."},{"key":"27_CR7","volume-title":"Socialization, recruitment, and the structure\/agency gap","author":"F Passy","year":"2011","unstructured":"F Passy, Socialization, recruitment, and the structure\/agency gap. A specification of the impact of networks on participation in social movements, 2000. Retrieved June 20th, 2011 from http:\/\/www.nd.edu\/~dmyers\/lomond\/passy.pdf"},{"issue":"6","key":"27_CR8","doi-asserted-by":"publisher","first-page":"1376","DOI":"10.1086\/227169","volume":"85","author":"R Starks","year":"1980","unstructured":"Starks R, Sims Bainbridge W: Networks of faith: Interpersonal bonds and recruitment to cults and sects. The American Journal of Sociology 1980, 85(6):1376\u20131395. 10.1086\/227169","journal-title":"The American Journal of Sociology"},{"issue":"4","key":"27_CR9","doi-asserted-by":"publisher","first-page":"628","DOI":"10.1080\/01419870220136664","volume":"25","author":"L Back","year":"2002","unstructured":"Back L: Aryans reading Adorno: Cyber-culture and twenty-first century Racism. Ethnic & Racial Studies 2002, 25(4):628\u2013651. 10.1080\/01419870220136664","journal-title":"Ethnic & Racial Studies"},{"key":"27_CR10","volume-title":"Cybersociety: Computer Mediated Communication and Community","author":"S Jones","year":"1995","unstructured":"Jones S: Cybersociety: Computer Mediated Communication and Community. Sage Publications, Thousand Oaks; 1995."},{"issue":"11","key":"27_CR11","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1080\/10576100903259951","volume":"32","author":"L Bowman-Grieve","year":"2009","unstructured":"Bowman-Grieve L: Exploring Stormfront: The Virtual Community of the Radical Right. Studies in Conflict & Terrorism 2009, 32(11):989\u20131007. 10.1080\/10576100903259951","journal-title":"Studies in Conflict & Terrorism"},{"key":"27_CR12","volume-title":"GE Marsh II, Recruitment by extremist groups on the Internet","author":"B Ray","year":"2011","unstructured":"B Ray, & GE Marsh II, Recruitment by extremist groups on the Internet. (Electronic version) First Monday, 6 (2), 2001. Retrieved June 20th, 2011 from http:\/\/firstmonday.org\/htbin\/cgiwrap\/bin\/ojs\/index.php\/fm\/article\/view\/834\/743"},{"issue":"2","key":"27_CR13","first-page":"22","volume":"4","author":"L Bowman-Grieve","year":"2010","unstructured":"Bowman-Grieve L: Irish Republicanism and the Internet: Support for new wave dissidents. Perspectives on Terrorism 2010, 4(2):22\u201334.","journal-title":"Perspectives on Terrorism"},{"key":"27_CR14","volume-title":"The racist mind","author":"R Ezekiel","year":"1995","unstructured":"Ezekiel R: The racist mind. Viking, New York; 1995."},{"issue":"2","key":"27_CR15","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1080\/09546559908427509","volume":"11","author":"JM Cotter","year":"1999","unstructured":"Cotter JM: Sounds of Hate: White Power rock and roll and the Neo-Nazi Skinhead subculture. Terrorism and Political Violence 1999, 11(2):111\u2013140. 10.1080\/09546559908427509","journal-title":"Terrorism and Political Violence"},{"key":"27_CR16","unstructured":"Anti-Defamation League. Racist Groups Using Computer Gaming to Promote Violence against Blacks, Latinos and Jews, 2002. Retrieved June 20th, 2011 from http:\/\/www.adl.org\/videogames\/default.asp"}],"container-title":["Security Informatics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-2-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/2190-8532-2-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/2190-8532-2-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,24]],"date-time":"2020-07-24T08:34:06Z","timestamp":1595579646000},"score":1,"resource":{"primary":{"URL":"https:\/\/security-informatics.springeropen.com\/articles\/10.1186\/2190-8532-2-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,23]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["27"],"URL":"https:\/\/doi.org\/10.1186\/2190-8532-2-9","relation":{},"ISSN":["2190-8532"],"issn-type":[{"value":"2190-8532","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,23]]},"article-number":"9"}}