Reference Hub2
Psychological and Behavioral Examinations of Online Terrorism

Psychological and Behavioral Examinations of Online Terrorism

Sheryl Prentice, Paul J. Taylor
Copyright: © 2018 |Pages: 21
ISBN13: 9781522540533|ISBN10: 1522540539|EISBN13: 9781522540540
DOI: 10.4018/978-1-5225-4053-3.ch009
Cite Chapter Cite Chapter

MLA

Prentice, Sheryl, and Paul J. Taylor. "Psychological and Behavioral Examinations of Online Terrorism." Psychological and Behavioral Examinations in Cyber Security, edited by John McAlaney, et al., IGI Global, 2018, pp. 151-171. https://doi.org/10.4018/978-1-5225-4053-3.ch009

APA

Prentice, S. & Taylor, P. J. (2018). Psychological and Behavioral Examinations of Online Terrorism. In J. McAlaney, L. Frumkin, & V. Benson (Eds.), Psychological and Behavioral Examinations in Cyber Security (pp. 151-171). IGI Global. https://doi.org/10.4018/978-1-5225-4053-3.ch009

Chicago

Prentice, Sheryl, and Paul J. Taylor. "Psychological and Behavioral Examinations of Online Terrorism." In Psychological and Behavioral Examinations in Cyber Security, edited by John McAlaney, Lara A. Frumkin, and Vladlena Benson, 151-171. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4053-3.ch009

Export Reference

Mendeley
Favorite

Abstract

It has long been recognised that terrorists make use of the internet as one of many means through which to further their cause. This use of the internet has fuelled a large number of studies seeking to understand terrorists' use of online environments. This chapter provides an overview of current understandings of online terrorist behavior, coupled with an outline of the qualitative and quantitative approaches that can and have been adopted to research this phenomenon. The chapter closes with a discussion of the contentious issue of ethics in online terrorism research. The aim of the chapter is to equip readers with the necessary knowledge and skills to conduct their own research into terrorists' online behavior, taking best ethical practices into consideration when doing so.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.