Narratives of Risk: Assessing the Discourse of Online Extremism and Measures Proposed to Counter It

Inhaltsverzeichnis

Bibliographische Infos


Cover der Ausgabe: S&F Sicherheit und Frieden Jahrgang 34 (2016), Heft 4
Vollzugriff

S&F Sicherheit und Frieden

Jahrgang 34 (2016), Heft 4


Autor:innen:
Verlag
Nomos, Baden-Baden
Copyrightjahr
2016
ISSN-Online
0175-274x
ISSN-Print
0175-274X

Kapitelinformationen


Vollzugriff

Jahrgang 34 (2016), Heft 4

Narratives of Risk: Assessing the Discourse of Online Extremism and Measures Proposed to Counter It


Autor:innen:
ISSN-Print
0175-274X
ISSN-Online
0175-274x


Kapitelvorschau:

Literaturverzeichnis


  1. Amoore, L. (2008). “Consulting, Culture, the Camp: On the Economies of Exception.” In Risk and the War on Terror, edited by L. Amoore and M. de Goede, 112–129. London: Routledge Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  2. Amoore, L. and M. de Goede. (2008). Risk and the War on Terror. New York: Routledge. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  3. Aradau, C., and R. van Munster. (2008). “Taming the Future: The Dispositif of Risk in the War on Terror.” In Risk and the War on Terror, edited by L. Amoore and M. de Goede, 23–40. London: Routledge Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  4. Archetti , C. (2013). Understanding Terrorism in the Age of Global Media: A Communication Approach, Basingstoke: Palgrave Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  5. Argomaniz, J. (2015). European Union responses to terrorist use of the Internet. Cooperation and Conflict, 50(2), 250-268. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  6. Bartlett, J. and A. Krasodomski-Jones. (2015). “Counter-speech: examining content that challenges extremism online.” Demos. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  7. Beck, U. (1992). Risk Society: Towards a New Modernity. New Delhi: Sage. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  8. Benson, D. (2014). “Why the Internet is Not Increasing Terrorism,” Security Studies 23(2), 293–328 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  9. Briggs, R. (2011). “Radicalisation: The Role of the Internet”, Institute for Strategic Dialogue: A working paper of the PPN Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  10. Bruns, A. et al. (2016). The Routledge Companion to Social Media and Politics. New York: Routledge Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  11. Carter, J., S. Maher, P. Neumann. (2014). #Greenbirds: Measuring Importance and Influence in Syrian Foreign Fighter Networks. London: ICSR Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  12. Castells, M. (2013). Networks of outrage and Hope. London: Polity Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  13. Christensen, C. (2011). “Twitter Revolutions? Addressing Social Media and Dissent”, Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  14. The Communication Review. 14: 155-157 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  15. Coleman, P.T. (2003). ‘Characteristics of Protracted, Intractable Conflict: Toward the Development of Metaframework-1’, Peace and Conflict: Journal of Peace Psychology 9:1: 1-37. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  16. Coleman, P.T. (2004). ‘Paradigmatic Framing of Protracted Intractable Conflict: Toward the Development of a Meta Framework-ii’, Peace and Conflict: Journal of Peace Psychology 10(3): 197-235. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  17. Coleman, P.T. (2006). ‘Characteristics of Protracted, Intractable Conflict: Toward the Development of Metaframework-1’, Peace and Conflict: Journal of Peace Psychology 12(4): 325-348. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  18. Conway, M. (2016). ‘Determining the Role of the Internet in Violent Extremism and Terrorism: Six Suggestions for Progressing Research, Studies in Conflict & Terrorism,’, Studies in Conflict and Terrorism. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  19. Couldry, N. (2010). ‘Theorising Media as Practice’, in B. Bräuchler and J. Postill) Theorising Media and Practice. New York: Berghann Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  20. Council of the European Union. (2015a). Europol to Standing Committee on operational cooperation on internal security, EU Internet Referral Unit at Europol – Concept note, 7266/15, Brussels, 16 March Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  21. Council of the European Union. (2015b). EU Counter-Terrorism Coordinator to Delegations, EU CTC input for the preparation of the informal meeting of Justice and Home Affairs Ministers in Riga on 29 January 2015, DS 1035/15, Brussels, 17 January Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  22. Council of the European Union. (2005). Presidency and CT Coordinator to Council/European Council, The European Union Counter-Terrorism Strategy, 144469/4/05, Brussels, 30 November Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  23. De Goede, M., and S. Simon. (2013). “Governing Future Radicals in Europe.” Antipode 45 (2): 315–335 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  24. Edwards, C., and L. Gribbon. (2013). “Pathways to violent extremism in the digital era.” The RUSI Journal 158(5), 40-47 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  25. Ericson, R. (2008). “The state of preemption: Managing terrorism risk through counter law” in Risk and the War on Terror. New York: Routledge Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  26. Europol. (2015). TE-SAT 2015: EU Terrorism Situation and Trend Report. Europol Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  27. Europol. (2014). TE-SAT 2014: EU Terrorism Situation and Trend Report. Europol Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  28. Europol. (2013). TE-SAT 2013: EU Terrorism Situation and Trend Report. Europol Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  29. Ferguson, K. (2016). “Countering violent extremism through media and communication strategies: a review of the evidence.” Partnership for Conflict, Crime and Security Research Report. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  30. Gerbaudo, P. (2012). Tweets and Streets: Social Media and Contemporary Acitivism. London: Pluto Press. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  31. Grusin, R. (2010). Premediation: Affect and Mediality After 9/11. New York: Palgrave McMillan. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  32. Ghonim, W. (2012). Revolution 2.0: the Power of the People is Greater Than the People in Power: a Memoir. New York: Houghton Mifflin Harcourt Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  33. Giddens, A. (1999). “Risk and Responsibility” Modern Law Review 62(1): 1-10 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  34. Gill, P. et al. (2015). What Are the Roles of the Internet in Terrorism. VOX-Pol Network of Excellence. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  35. Gray, D and A. Head. (2009). “The Importance of the Internet to the Post-modern Terrorist and its Role as a Form of Safe Haven,” European Journal of Scientific Research 25(3) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  36. Grusin, R. (2010). Premediation: Affect and Mediality After 9/11. New York: Palgrave McMillan. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  37. Hobart, M. (2010). ‘What Do We Mean By Media Practices?’, p. 55-77 in B. Bräuchler and J. Postill (s) Theorising Media and Practice. New York: Bergham Books Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  38. Johnson, A.G, B. Tudor, H. Nuserbeigh. (2013). “140 Characters or Less: How is the Twitter Medisacape Influencing the Egyptian Revolution.” Middle East Journal of Culture and Communication. 6. 126-148 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  39. Laclau, E. and C. Mouffe. (1985). Hegemony & Socialist Strategy. London: Routledge. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  40. Macquire, T. (2011). ‘New Media and Islamism in the Arab Winter: a Case Study of Huda Tv in Pre-revolutionary Egypt’, Journal of Arab and Muslim Media Research Volume 4, No 2&3: 237-252 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  41. Massumi, B. (2007). “Potential Politics and the Primacy of Pre-Emption.” Theory & Event 10 (2) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  42. Martin, T. (2014). ‘Governing an Unknowable Future: the Politics of Britain’s Prevent Policy’, Critical Studies on Terrorism 7:1: 62-78. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  43. Morozov, E. (2012). The Net Delusion: the Dark Side of Internet Freedom. Reprint. edition. PublicAffairs Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  44. Mosco, V. (2005). The Digital Sublime: Myth, Power, and Cyberspace. The MIT Press Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  45. Neumann, P. (2012). “Countering Online Radicalization in America”, Bipartisan Policy Center, Homeland Security Project, USA Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  46. Nouri, L. and A. Whiting. (2014). ‘Prevent and the internet’. In: Baker-Beall, C., C. Heath-Kelly, and L. Jarvis (eds.). Counter-radicalisation: Critical perspectives. London: Routledge, 175-189.Oh, O., Eom, C., and H. R. Rao, (2015). “Research note – Role of social media in social change: An analysis of collective sensemaking during the 2011 Egypt revolution.” Information Systems Research, 26(1), 210–223 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  47. Pauwels, L., and N. Schils. (2016). “Differential online exposure to extremist content and political violence: testing the relative strength of social learning and competing perspectives.” Terrorism and Political Violence 28(1), 1-29 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  48. Wojcieszak, M. (2010). “‘Don’t talk to me’: effects of ideologically homogeneous online groups and politically dissimilar offline ties on extremism”, New Media and Society Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  49. Von Behr, I., A. Reding, C. Edwards, and L. Gribbon. (2013). Radicalisation in the digital era: The use of the Internet in 15 cases of terrorism and extremism. Brussels: Rand Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-236
  50. Bachner, Jennifer; Lynch, Jennifer (2016): Is Predictive Policing the Law-Enforcement Tactic of the Future? Wall Street Journal Online http://www.wsj.com/articles/is-predictive-policing-the-law-enforcement-tactic-of-the-future-1461550190 (retrieved August 15th, 2016) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  51. Bijker, Wiebe (2001): Understanding Technological Culture through a Constructivist View of Science, Technology and Society. In: Cutliffe, Stephen; Mitcham, Carl (eds.):Visions of STS: Counterpoints in Science, Technology, and Society Studies, State University of New York Press, Albany, pp.19-34 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  52. Boyd, Danah, Crawford, K. (2012) Critical Questions for Big Data. Information, Communication & Society 15:5, 662-679 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  53. Brooks, David (2013): The Philosophy of Data. New York Times Onlinehttp://www.nytimes.com/2013/02/05/opinion/brooks-the-philosophy-of-data.html?_r=0 (retrieved August 18th, 2016) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  54. Buzan, Barry, Wæver, Ole, de Wilde, Jaap(1998): Security. A new framework for Analysis. Rienner, Boulder Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  55. Ceyhan, Ayse (2008): Technologization of Security: Management of Uncertainty and Risk in the Age of Biometrics. In: Surveillance & Society 5(2): 102-123 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  56. COPS (2013): Social Media and Tactical Considerations for Law Enforcement. Washington, D.C. http://www.policeforum.org/assets/docs/Free_Online_Documents/Technology/social%20media%20and%20tactical%20considerations%20for%20law%20enforcement%202013.pdf (retrieved May 21st, 2016) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  57. COPS(2015): After-Action Assessment of the Police Response to the August 2014 Demonstrations in Ferguson, Missouri. COPS Office Critical Response Initiative. Washington, DC: Office of Community Oriented Policing Services. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  58. Couch, Neil/ Robins, Bill (2013): Big Data for Defence and Security. RUSI Occasional Paper Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  59. Cukier, Kenneth; Mayer-Schoenberger, Viktor (2013a): The Rise of Big Data. How It’s Changing the Way We Think About the World. In: Foreign Affairs 92(3), pp. 28-40 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  60. Cukier, Kenneth; Mayer-Schoenberger, Viktor (2013b): Big Data. A Revolution That Will Transform How We Live, Work and Think. John Murray, London Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  61. Davis III, Edward; Alves, Alejandro; Sklansky, David (2014): Social Media and Police Leadership: Lessons from Boston. New Perspectives in Policing Bulletin, U.S. Department of Justice Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  62. Earl, Jennifer/ Soule, Sarah A./ McCarthy, John D. (2003): Protest under Fire? Explaining the Policing of Protest. In: American Sociological Review 68(4), pp. 581-606 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  63. Fenton, Natalie (2016): Left out? Digital media, radical politics and social change. In: Information, Communication and Society 19(3), pp. 346-361 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  64. Freelon, Deen/ Mcilwain, Charlton/ Clark, Meredith (2016): Beyond the Hashtag. Ferguson, Black Lives Matter and the Struggle for Online Justice. Center for Media and Social Impact.http://archive.cmsimpact.org/sites/default/files/beyond_the_hashtags_2016.pdf (retrieved May 24th, 2016) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  65. HM Government (2014): Emerging Technologies: Big Data. HM Government Horizon Scanning Programme https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/389095/Horizon_Scanning_-_Emerging_Technologies_Big_Data_report_1.pdf (retrieved August 15th, 2016) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  66. HMIC (2011): The rules of engagement. A review of the August 2011 disorders. https://www.justiceinspectorates.gov.uk/hmic/media/a-review-of-the-august-2011-disorders-20111220.pdf (retrieved May 20th, 2016) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  67. Joh, Elizabeth (2014): Policing by Numbers: Big Data and the Fourth Amendment. In: Washington Law Review 89(35), pp. 35-68 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  68. Lim, Kevjn (2016): Big Data and Strategic Intelligence. In: Intelligence and National Security 31(4), pp. 619-635 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  69. McPhail, Clark/ Schweingruber, David/ McCarthy, John (1998): Policing Protest in the United States: 1960-1995 In: della Porta, Donatella/ Reiter, Herbert (eds.): Policing Protest: The Control of Mass Demonstrations in Western Democracies. University of Minnesota Press, Minneapolis, pp. 49-69 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  70. Omand, Sir David/ Bartlett, Jamie/ Miller, Carl (2012): Introducing Social Media Intelligence (SOCMINT). In: Intelligence and National Security 27(6), pp. 801-823 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  71. Panagiotopolous, Panagiotis/ Bigdeli, Alinaghi Ziaee/ Sams, Steven (2014): Citizen-government collaboration on social media: The case of Twitter in the 2011 riots in England. In: Government Information Quaterly 31, pp. 349-357 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  72. Perry, Walter et al. (2013): Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations. RAND Corporation Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  73. Scott, Len/ Jackson, Peter (2008): The Study of Intelligence in Theory and Practice. In: Johnson, Loch/ Wirtz, James (eds.): Intelligence and National Security. Oxford University Press, Oxford, pp. 21-37 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  74. Shirky, Clay (2011): The Political Power of Social Media. In: Foreign Affairs January/February 2011 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  75. Trottier, Daniel (2012): Policing Social Media. In: Canadian Review of Sociology 49(4), pp. 411-425 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  76. Trottier, Daniel (2015): Open Source Intelligence, social media and law enforcement: Visions, constraints and critiques. In: European Journal of Cultural Studies 18(4-5), pp. 530-547 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  77. Tucker, Joshua (2014): Tweeting Ferguson: how social media can (and cannot) facilitate protest. Washington Post <https://www.washingtonpost.com/blogs/monkey-cage/wp/2014/11/25/tweeting-ferguson-how-social-media-can-and-can-not-facilitate-protest/”> (retrieved May 22nd, 2016) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  78. Tufekci, Zeynep/ Wilson, Christopher (2012): Social Media and the Decision to Participate in Political Protest: Observations from Tahrir Square. In: Journal of Communication 62, pp. 363-379 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  79. Ulbricht, Lena; von Grafenstein, Maximilian (2016): Big Data: Big Power Shifts? In: Internet Policy Review 5:1 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  80. Wæver, Ole (1995): Securitization and Desecuritization. In: Lipschutz, Ronnie (ed.): On Security, Columbia University Press, New York, pp. 46-86 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  81. Williams, Matthew L. et al. (2013): Policing cyber-neighbourhoods: Tension monitoring and social media networks. In: Policing and Society 23(4), pp. 461-481 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  82. Williams, Michael (2003): Words, Images, Enemies: Securitization and International Politics. International Studies Quarterly 47, pp. 511-531 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-242
  83. Advisory Council on International Affairs, 1st Initial. (2014). The Internet. A global free space with limited state control, Advisory Council on International Affairs to the Royal Dutch Foreign Ministery, report 92, available at http://www.ivir.nl/syscontent/pdfs/83. [Accessed: May 5th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  84. American Civil Liberties Union. (2013). You are being track. How License Plate Readers Are Being Used To Record Americans’ Movements, available at https://www.aclu.org/files/assets/071613-aclu-alprreport-opt-v05.pdf, [Accessed: May 7th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  85. Anceschi, L. (2015).The Persistence of Media Control Under Consolidated Authoritarianism: Containing Kazakhstan’s Digital Media., Demokratizatsiya: The Journal of Post-Soviet Democratization, vol. 23 no 3, pp. 277-295 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  86. Bailly, J. (2012). The impact of Social Media on Social Movements: A Case Study of the 2009 Iranian Green Movement and the 2011 Egyptian Revolution , MA thesis, Washington State University. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  87. Bankston, K.S. and Soltani, A. (2014). Tiny Constables and the Cost of Surveillance: Making Cents Out of United States v. Jones, in The Yale Law Journal, Volume 123, available at http://www.yalelawjournal.org/forum/tiny-constables-and-the-cost-of-surveillance-making-cents-out-of-united-states-v-jones, [Accessed: May 9th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  88. Benjamin, C. (2002). Shot Spotter and FaceIt: The Tools of Mass Monitoring. , UCLA Journal of Law and Technology, vol. 6. , pp.1-24. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  89. Best, R. & Begg, R. (2006). Overview of Movement Analysis and Gait Features. In Begg, Rezaul, Palaniswami & Marimuthu, Computational Intelligence for Movement Sciences: Neural Networks and Other Emerging Techniques. Idea Group Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  90. Brey, P. (2004). Ethical Aspects of Face Recognition Systems in Public Places, Journal of Information, Communication & Ethics in Society, 2:2, 97-109. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  91. Burel, G.; Quinquis, A.; Azou, S. (2002). Interception and furtivity of digital transmissions, Paper presented at the IEEE Communications conference, December 5-7, Bucharest, Romania Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  92. Caragliano , D. (2013). Why China’s ‘Real Name’ Internet Policy Doesn’t Work, The Atlantic. Available at http://www.theatlantic.com/china/archive/2013/03/why-chinas-real-name-internet-policy-doesnt-work/274373/ [Accessed: Jun 1st, 2016]. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  93. Chen, B.; Liao, D.; Wu, H. (2014). The Logic of Communitive1 Action: A Case Study of Taiwan’s Sunflower Movement, Available at http://ipp.oii.ox.ac.uk/sites/ipp/files/documents/IPP2014_Chen.pdf Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  94. China ipr sme helpdesk. (2015). Registering and Protecting Chinese Domain Names, Available at http://www.china-iprhelpdesk.eu/sites/all/docs/publications/China_IPR_SME_Helpdesk-domain_name_Guide.pdf [Accessed: May 12th, 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  95. Cohen, D.F. (2014). It Costs the Government Just 6.5 Cents an Hour to Spy on You, Politico (online), available at http://www.politico.com/magazine/story/2014/02/nsa-surveillance-cheap-103335 [Accessed: Sept 12th, 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  96. Creemers, R. (2014). Planning Outline for the Construction of a Social Credit System (2014-2020), Available at https://chinacopyrightandmedia.wordpress.com/2014/06/14/planning-outline-for-the-construction-of-a-social-credit-system-2014-2020 [Accessed: Jun 6th, 2016]. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  97. Diamond, L. (2010). Liberation Technology, Journal of Democracy, vol. 21, issue3, pp.69-83. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  98. Denyer, S. (2016). China’s scary lesson to the world: Censoring the Internet works, Washington Post, May 23th, available at https://www.washingtonpost.com/world/asia_pacific/chinas-scary-lesson-to-the-world-censoring-the-internet-works/2016/05/23/413afe78-fff3-11e5-8bb1-f124a43f84dc_story.html [Accessed: Jul 11th, 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  99. Dutta, A.; Hasan, R., 1st Initial. (2013). How Much Does Storage Really Cost? – Towards a Full Cost Accounting Model for Data Storage , pp. 29-43., in Proceedings of the 10th International Conference, GECON 2013, Zaragoza, Spain, September 18-20. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  100. Eltahawy, M. (2010). Facebook, YouTube, and Twitter Are the New Tools of Protest in the Arab World, The Washington Post, available at http://www.washingtonpost.com/wpdyn/content/article/2010/08/06/AR2010080605094.html [Accessed: Nov 15th, 2015] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  101. Freedom House, Silencing the Messenger: Communication Apps Under Pressure, online report, available at https://www.freedomhouse.org/report/freedom-net/freedom-net-2016, (accessed 7th December 2016) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  102. Fielder, J. (2012). Dissent in digital: the Internet and dissent in authoritarian states, PhD (Doctor of Philosophy) thesis, University of Iowa, Iowa Research Online. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  103. Freedom house. (2015). Freedom of the Net 2015: Privatizing Censorship, Eroding Privacy, Available at https://freedomhouse.org/sites/default/files/FOTN%202015%20Full%20Report.pdf [Accessed: Jun 1st, 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  104. Gallagher, R. (2013), NSA Can Reportedly Track Phones Even When They’re Turned Off, report for Slate magazine, online, available at http://www.slate.com/blogs/future_tense/2013/07/22/nsa_can_reportedly_track_cellphones_even_when_they_re_turned_off.html [Accessed: 7th December 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  105. GSMA. (2013). The Mandatory Registration of Prepaid SIM Card Users, White Paper, available at http://www.gsma.com/publicpolicy/wp-content/uploads/2013/11/GSMA_White-Paper_Mandatory-Registration-of-Prepaid-SIM-Users_32pgWEBv3.pdf, [Accessed: May 10th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  106. Goldstein, J. (2007). The Role of Digital Networked Technologies in the Ukrainian Orange Revolution, Berkman Center Research Publication 14. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  107. Howard, P.; Agarwal, S.; Hussain, M. ( 2011). The Dictators’ Digital Dilemma: When Do States Disconnect Their Digital Networks?, Issues in Technology Innovation, Issue 13 The Center for Technology Innovation at Brookings. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  108. Hsu, S. (2015). China’s New Social Credit System, The Diplomat. Available at http://thediplomat.com/2015/05/chinas-new-social-credit-system/ [Accessed: Jun 2, 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  109. Introna, L.; Wood, D. (2004). Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems , Surveillance & Society, vol. 2. 3, pp. 177-198. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  110. International Telecommunications Union. (2015). ICT facts and figures 2015, available at https://www.itu.int/en/ITU-D/Statistics/Documents/facts/ICTFactsFigures2015.pdf, [Accessed: May 8th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  111. Jiang, M. (2016). The co-evolution of the Internet, (un)civil society and authoritarianism in China, In deLisle, J. ,Goldstein A. & Yang, G. (eds.), The Internet, Social Media, and a Changing China (pp. 28-48). Philadelphia, PA: University of Pennsylvania Press. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  112. Kalathil,S & Boas. T.C. (2001). The Internet and state control in authoritarian regimes: China, Cuba, and the counterrevolution, First Monday, Volume 6, Number 8, available at http://firstmonday.org/ojs/index.php/fm/article/view/876/785, [Accessed: May 18th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  113. Kalathil, S. & Boas, C. (2003). Open Networks Closed Regimes The Impact of the Internet on Authoritarian Rule, Carnegie Endowment for International Peace,Washington D.C. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  114. Kavanaugh, A.; Yang, S.; Sheetz, S.; Li, L.T.; Fox, E.A. (2011). Between a rock and a cell phone: Social Media Use during Mass Protests in Iran, Tunisia and Egypt. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  115. Kenney, M. (2001). The Growth and Development of the Internet in the United States. Brie Working Paper 145, available at https://escholarship.org/uc/item/05z7r9mt, [Accessed: May 25th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  116. King, G.; Pan, J.; Roberts, M.E. (2013). How Censorship in China Allows Government Criticism but Silences Collective Expression, in American Political Science Review, Volume 107, Issue 2, pages 1-18. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  117. Klitou, D. (2014). Privacy-Invading Technologies and Privacy by Design: Safeguarding Privacy, Liberty and Security in the 21st Century, Springer. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  118. Kushner, D. (2016). Fear this man, Foreign Policy (online), available at https://foreignpolicy.com/2016/04/26/fear-this-man-cyber-warfare-hacking-team-david-vincenzetti/ [Accessed: Jun 3rd, 2016]. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  119. Langfitt, F. (2013). In China, Beware: A Camera May Be Watching You. Available at http://www.npr.org/2013/01/29/170469038/in-china-beware-a-camera-may-be-watching-you [Accessed: Jun 6th, 2016]. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  120. Lee, J.; Liu, C., 1st Initial. (2016). Real-Name Registration Rules and the Fading Digital Anonymity in China, Washington International Law Journal,, vol. 25. 1, pp. 1-35. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  121. Mackinnon, R. (2011). China’ s Networked Authoritarianism., Journal of Democarcy, vol. 2. 2, pp.32-46. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  122. MacKinnon, R. (2012). Consent of the Networked: The Worldwide Struggle for Internet Freedom, Basic Books Press, New York City, USA. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  123. Meyer, R. (2015). How the Government Surveils Cellphones: A Primer. The Atlantic (online). Available at http://www.theatlantic.com/technology/archive/2015/09/how-the-government-surveils-cell-phones-a-primer/404818/, [Accessed: Sep 28th, 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  124. Mornin, J.D. (2014). NSA Metadata Collection and the Fourth Amendment, in Berkeley Technology Law Journal, Volume 29, Issue 4, Pages 985-1006. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  125. Owsley, B. (2015). Spies in the skies: Dirtboxes and airplane surveillance, Michigan Law Review First Impressions, vol. 113. 75, pp. 75-84. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  126. Pearce, K. E. & Guliyev, F. (2016). Digital knives are still knives: The affordances of social media for a repressed opposition against an entrenched authoritarian regime in Azerbaijan on panel Opposition 2.0: Challenging authoritarianism in the 21st century. Paper presented to the Association for the Study of Nationalities Conference, New York, NY. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  127. Pearce , K. & Kendzior, S. (2012). Networked Authoritarianism and Social Media in Azerbaijan, Journal of Communication , vol. 62. , pp.283–298. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  128. Rushkoff, Douglas, (2002). Renaissance Now! Media Ecology and the New Global Narrative. Hampton Press. pp. 26–28. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  129. Steiner-Threlkeld, Z.; Mocanu, D.; Vespignani, A. & Fowler, A. (2015). Online social networks and offline protest, EPJ Data Science, vol. 4. 19, pp. 1-9. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  130. Suh-Young , Y. (2012). Online real-name system unconstitutional, Korea Times, Aug 23, available at http://www.koreatimes.co.kr/www/news/nation/2012/08/117_118115.html [Accessed: May 7th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  131. Tkacheva, T.; Schwartz, L.; Libicki, M. (2013). Internet freedom and political space, RAND research report, available at https://www.rand.org/content/dam/rand/pubs/research_reports/RR200/RR295/RAND_RR295.sum.pdf, [Accessed: May 19th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  132. Van dijk, J. (2013). Digital Democracy: Vision and Reality, in I. Snellen & W. van de Donk Public Administration in the Information Age: Revisited. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  133. Villasenor, J. (2011). Recording Everything: Digital Storage as an Enabler of Authoritarian Governments, Center for Technology Innovation at Brookings research paper, available at ttp://www.brookings.edu/~/media/research/files/papers/2011/12/14-digital-storage-illasenor/1214_digital_storage_villasenor.pdf, [Accessed: May 12th 2016] Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  134. Zheng, Y. (2007). Technological Empowerment The Internet, State, and Society in China, Edition of book, Stanford University Press, Stanford, CA. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-248
  135. Allenby, Braden R. “Are New Technologies Undermining the Laws of War?” Bulletin of the Atomic Scientists 70.1 (2014): 21-31. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  136. Blom, John David. Unmanned Aerial Systems: A Historical Perspective. Vol. 45 Citeseer, 2010. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  137. Brukman, Olga, Shlomi Dolev et al. “Self-* Programming: Run-Time Parallel Control Search for Reflection Box.” Evolving Systems 6.1 (2015): 23-40. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  138. Bunker, Robert J. “Terrorist and Insurgent Unmanned Aerial Vehicles: Use, Potentials, and Military Implications.” (2015) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  139. Cartwright, Jon. “Rise of the Robots and the Future of War.” The Observer 2010, sec 21. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  140. Cavoukian, Ann. Privacy and Drones: Unmanned Aerial Vehicles. Ontario, Canada: Information and Privacy Commissioner of Ontario, Canada, 2012. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  141. Cevik, Polat, Ibrahim Kocaman et al. “The Small and Silent Force Multiplier: A Swarm Uav—electronic Attack.” Journal of Intelligent & Robotic Systems 70.1-4 (2013): 595-608. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  142. Chlestil, Ch., E. Leitgeb et al. “Reliable Optical Wireless Links Within Uav Swarms.” 2006 International Conference on Transparent Optical Networks 4 IEEE, 2006. 39-42. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  143. Clouet, Louis-Marie. “Drones as Future Air Power Assets: The Dawn of Aviation 2.0.” Power in the 21st Century. Springer, 2012. 177-92. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  144. Earley, Jason W. “The Effect of Adversary Unmanned Aerial Systems on the Us Concept of Air Superiority.” (2014) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  145. Garcia, Denise. Small Arms and Security: New Emerging International Norms. Abingdon: Routledge, 2006. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  146. Gilam, A. “The Technology of Air Power During the Great War.” Computers Mathematical Applications 26.6 (1993): 149-52. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  147. Gilli, Andrea, and Mauro Gilli. “The Diffusion of Drone Warfare? Industrial, Organizational, and Infrastructural Constraints.” Security Studies 25.1 (2016): 50-84. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  148. Libel, Tamir, and Emily Boulter. “Unmanned Aerial Vehicles in the Israel Defense Forces: A Precursor to a Military Robotic Revolution.” The RUSI Journal 160.2 (2015): 68-75. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  149. Miasnikov, Eugene. Threat of Terrorism Using Unmanned Aerial Vehicles: Technical Aspects. Moscow, Russia: Center for Arms Control, Energy, and Environmental Studies, Moscow Institute of Physics and Technology, 2005. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  150. Moreno, Jacqueline Hellman, and Raquel Regueiro Dubra. “Targeted Killings of Suspected Terrorists in the Light of the Right of Self-Defence.” Paix et sécurité internationales: revue maroco-espagnole de droit international et relations internationales 3 (2015): 143-64. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  151. Newdick, Thomas. 2014. “Israel Swaps Killer Copters for Killer Drones” War is Boring. https://warisboring.com/israel-swaps-killer-copters-for-killer-drones-ff55a5db9a17#.4sbea41ga. Accessed 8 October 2016. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  152. O’Gorman, Rob, and Chris Abbott. Remote Control War: Unmanned Combat Air Vehicles in China, India, Iran, Israel, Russia and Turkey. London: Open Briefing, 2013. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  153. Oudes, Cor, and Wim Zwijnenburg. “Does Unmanned Make Unacceptable.” Exploring the Debate on Using Drones and Robots in Warfare. Utrecht: IKV Pax Christi (2011). Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  154. Peabody, Charles, and Jennifer Seitzer. “Gef: A Self-Programming Robot Using Grammatical Evolution.” AAAI (2015): 4194-95. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  155. Phythian, Mark. “Ethics and Intelligence: The Implications of the Rise of the Armed Drone.” 7th Global Conference on War and Peace, Prague, 30 April 2010. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  156. Ruegamer, Alexander, and Dirk Kowalewski (2015): 17-21. “Jamming and Spoofing of GNSS Signals – An Underestimated Risk?” The Wisdom of the Ages to the Challenges of the Modern World. Sophia, Bulgaria: 2015. 17-21. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  157. Sagranoso, Domitilla. “The Proliferation of Small Arms and Light Weapons in and Around the European Union: Instability, Organized Crime and Terrorist Groups.” Small arms and security in EU Associate countries (2001): 1-55. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  158. Schmitt, Michael N. “Unmanned Combat Aircraft Systems (Armed Drones) and International Humanitarian Law: Simplifying the Oft Benighted Debate.” (2012) Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  159. Shashank, Joshi, and Aaron Stein. “Emerging Drone Nations.” Survival 55(5) (2013): 53-78. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  160. Sheckley, Robert. 1953. “Watchbird”, Galaxy February 1953. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  161. Strawser, Bradley Jay. Killing By Remote Control: The Ethics of an Unmanned Military. Oxford: Oxford University Press, 2013. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  162. Thompson, Mark. 2013. “Costly Flight Hours” Time.com. April 02, 2013. http://nation.time.com/2013/04/02/costly-flight-hours/. Accessed 10 October 2016. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  163. Zhou, Guoqing, and Deyan Zang. “Civil UAV System for Earth Observation.” 2007 IEEE International Geoscience and Remote Sensing Symposium IEEE, 2007. 5319-22. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-257
  164. Aggestam, Lisbeth & Christopher Hill. 2008. The Challenge of Multiculturalism in European Foreign Policy. International Affairs 84 (1): 97-114. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  165. Amghar, Samir. 2009. “L’Europe, terre d’influence des Frères Musulmans”. Politique Etrangère 2: 377-388. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  166. Archer, Toby. 2009. « Welcome to the Ummah: The British State and its Muslim Citizens Since 9/11 ». Cooperation and Conflict 44: 329- 347. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  167. Assemblée Nationale. 2015. Rapport fait au nom de la Commission d’Enquete sur la surveillance des filières et des individus jihadistes. N. 2828. 2 June. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  168. Atwan, Abdel Bari. 2015. Islamic State: The Digital Caliphate. University of California Press. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  169. Bakker, Edwin and Seran de Leede. 2015. European Female Jihadists in Syria: Exploring an Under-researched Topic. International Center for Counter-Terrorism (ICCT)- The Hague. April. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  170. BBC. 2014. “Analysis: Deradicalising Brits in Syria”, 21 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  171. Al Monitor. 2014. “Syria Pulse, Islamic State’s female bloggers draw European women to Syria”, 23 December. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  172. BBC. 2014. “Syria: Can UK learn from deradicalisation scheme?”, 9 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  173. BBC.com. 2015. “Prevent Strategy: Is it failing to stop radicalisation?” 6 March. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  174. Birt, Yahya. 2006. “Between Nation and Umma: Muslim Loyalty in a Globalizing World”. Islam 21 40: 6-11. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  175. Bonner, Michael. 2006. Jihad in Islamic History. Princeton University Press. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  176. Briggs Obe and Silverman. 2014. Western Foreign Fighters-Innovations in Responding to the Threat. Institute for Strategic Dialogue. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  177. Bunzel, Cole. 2015. From Paper State to Caliphate: The Ideology of the Islamic State. The Brookings Project on U.S. Relations with the Islamic World. Analysis Paper No. 19, March. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  178. Carter, Joseph A., Shiraz Maher and Peter R. Neumann. 2014. Green Birds: Measuring Importance and Influence in Syrian Foreign Fighter Networks. International Centre for the Study of Radicalization. King’s College, London. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  179. Césari, Jocelyne. 2009. « Islam in the West: From Immigration to Global Islam ». Harvard Middle Eastern and Islamic Review 8: 148-175. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  180. CNN. 2014. “Why are so many young french people turning to Jihad?”, 2 October. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  181. The Daily Beast. “The ISIS online campaign luring western girls to jihad”, 6 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  182. Les Echos. 2014. « État Islamique en Irak : comment un groupe terroriste est devenu une organisation militaire ». 8 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  183. Evans Peter B., Harold K. Jacobson & Robert Putnam. 1992. Double-edged Diplomacy: Domestic Politics and International Relations. Berkeley: University of California Press. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  184. L’Express. 2014. « Humour de djihadistes: la guerre sainte a aussi ses lolcats », 17 June. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  185. L’Express. 2014. « Le djihad 3.0 des Français partis en Syrie », 21 June. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  186. Fait-religieux.com. 2014. « Grande-Bretagne : appels aux musulmanes pour empêcher le djihad en Syrie », 5 May. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  187. Frégosi, Franck. 2009. « Formes de mobilisation collective des musulmans en France et en Europe ». Revue internationale de politique comparée 16 (1) : 41-61. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  188. France 24. 2015. «‘Djihadistan’ syrien, une bombe à retardement pour l’Europe », 18 January. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  189. France 24. 2014. « France’s ‘anti-jihad’ hotline gets results », 8 May. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  190. France 24. 2014. « Mourir affamé ou tué par les djihadstes, l’impossible chois des Yazidis » 6 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  191. Geneva Academy of International Humanitarian Law and Human Rights. 2014. Foreign Fighters under International Law. Academy Briefing n. 7- October. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  192. Le Figaro. 2014. « Des recrues de Daech demandent à leur avocats de préparer leur retour en France », 30 November. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  193. Fiscal Times. 2014. “ISIS is growing its terror army of global Jihadists”, 4 December. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  194. Gallup. 2009. The Gallup Coexist Index 2009: A Global Study of Interfaith Relations. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  195. Gulf News. 2014. “Militants attacks in Iraq kill 5,042 in November”, 11 December. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  196. The Guardian. 2014. “ISIS: a portrait of the menace that is sweeping my homeland”, 16 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  197. The Guardian. 2014. “Jihad in a social media age: how can the west win an online war?”, 23 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  198. The Guardian. 2014. “When Schoolgirls dream of Jihad, society has a problem. Look at France”, 3 October. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  199. Hegghammer, Thomas. 2010. “The Rise of Muslim Foreign Fighters”. International Security 35(3): 53-94. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  200. Hill, Christopher. 2007. Bringing War Home: Foreign-Policy making in Multicultural Societies. International Relations 21 (3): 259-283. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  201. Home Office. 2011. Prevent Strategy. June. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  202. Home Office. 2015. Prevent Duty Guidance. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  203. Hoyle, Carolyn, Alexandra Bradford and Ross Frenett. 2014. Becoming Mulan? Female Western Migrants to ISIS. Institute for Strategic Dialogue. October. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  204. Hussain, Ghaffar and Erin Saltman. 2014. Jihad Trending. Quilliam Foundation. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  205. I 24 news. 2014. « Syrie : les djihadistes de Daech bouclent Raqqa », 30 June. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  206. The Independent. 2014. “Jihad isn’t all it’s cracked up to be, say disgrunteled Isis recruits”,1 December. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  207. Jacinto, Leela. 2014. “The Regretful Jihadists of the Islamic State”, Foreign Policy Journal. 23 October. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  208. Le Journal du Dimanche. 2014. « Djihad en Syrie : sept Strasbourgeois incarcérés », 18 May. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  209. Johnston & al. 2016. Foundations of the Islamic State. RAND. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  210. Kastoryano, Riva. 2006. French Secularism and Islam: France’s Headscarf Affair in Modood, Tariq, Anna Triandafyllidou & Ricard Zapata-Barrero (Eds). 2006. Mulituclturalism, Muslims and Citizenship. London,/ New York: Routledge: 57-69. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  211. Khosrokhavar, Farhad. 2004. L’Islam dans les prisons. Jacob Duvernet Editions. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  212. Klausen, Jytte. 2015. “Tweeting the Jihad: Social Media Networks of Western Foreign Fighters in Syria and Iraq”. Studies in Conflict & Terrorism 38(1): 1-22. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  213. Laurence, Jonathan & Justin Vaïsse. 2006. Integrating Islam. Washington DC: Brookings Institution Press. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  214. LINFO.RE. 2015. « Entre 3000 et 5000 Européens sont partis pour le djihad ». 18 January. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  215. Lister, Charles. 2015. Returning Foreign Fighters: Criminalization or Reintegration. Brookings Doha Center. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  216. Maréchal, Brigitte. 2009. Les Frères musulmans en Europe, Racines et discours. Presses Universitaires de France. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  217. MCB. 2007. The Conservative Party’s Group on National and International Security –‘Uniting the Country: Interim Report on National Cohesion’, A response from the MCB, Annex 1. 2 May. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  218. MCB. 2014. Alan Henning’s Murder a Despicable Act, Offensive to Muslim.10 March. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  219. MCB. 2014. British Muslims Hope for Peace in Iraq and Syria. 26 September. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  220. MCB. 2014. Islam Channel: Discussion on British Muslims and the Islamic State. 14 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  221. MCB. 2014. Muslims condemn muder of David Haines. 14 September. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  222. MCB. 2014. Not in our Name: British Muslims Condemn the Barbarity of ISIS. 20 August. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  223. MCB. 2014. Talha Ahmad Speaks to Channel 5 News about New Terror Powers.17 November. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  224. Milton, Daniel. 2016. Communication Breakdown: Unraveling the Islamic State’s Media Efforts. West Point Combating Terrorism Center. October. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  225. Modood Tariq, Anna Triandafyllidou & Ricard Zapata-Barrero (Eds). 2006. Mulituclturalism, Muslims and Citizenship. London/New York: Routledge. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  226. Le Monde. 2014. « Comment le djihad recrute des jeunes Européens », 11 December. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  227. Le Monde. 2014. « Djihad en Syrie : Nos enfants sont des adolescents manipulés, sous le joug de prédateurs terroristes », 2 May. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  228. Le Monde. 2014. « Twitter, l’outil de prédilection du djihad 2.0 de l’EIIL », 18 June. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  229. Le Monde. 2015. « Ce que l’on sait sur la radicalisation des frères Kouachi », 9 January. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  230. Neumann, Peter. 2014. The New Jihadism, A Global Snapshot. The International Centre for the Study of Radicalisation and Political Violence (ICSR). Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  231. Le Nouvel Observateur. 2014. « Plan anti-jihad : numéro vert activé, 285 Français en Syrie selon Cazeneuve », 30 April. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  232. La Presse. 2014. « Danemark : tendre la main aux jeunes radicaux », 14 December. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  233. Pedziwiatr, Konrad. 2007. Muslims in Europe: Demography and Organisations. In: Samad, Yunas & Katsuri Sen (Eds). Islam in the European Union Transnationalism, Youth and the War on Terror. Oxford: Oxford University Press. 26-59. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  234. Putnam, Robert. 1988. Diplomacy and Domestic Politics: the Logic of Two-Level Games. International Organisation 42 (3): 427-460. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  235. RTSInfo. 2014. « Des djihadistes lourdement condamés en Angleterre et en Allemagne », 5 December. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  236. Saltman, Erin and Charlie Winter. 2014. The Changing Face of Modern Jihadism. Quilliam Foundation. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  237. Salvatore, Armando. 2004. « Making Public Space: Opportunities and Limits of Collective Action Among Muslims in Europe ». Journal of Ethnic and Migration Studies 30 (5): 1013-1031. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  238. Savage Timothy M. 2004. « Europe and Islam: Crescent Waxing, Cultures Clashing ». The Washington Quarterly 27 (3): 25-50. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  239. Schmid, A. P. and J. Tinnes “Foreign (Terrorist) Fighters with IS: A European Perspective”, The International Centre for Counter-Terrorism – The Hague 6, no. 8 (2015). Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  240. Schoppa, Leonard J. 1993. « Two-Level Games and Bargaining Outcomes: Why Gaiatsu Succeeds in Japan in some cases but not others ». International Organization 47 (3): 353-386. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  241. Stern, Eric K. 2003. « Crisis Studies and Foreign Policy Analysis: Insights, Synergies, and Challenge ». International Studies Review 5 (2): 183-191. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  242. Triandafyllidou, Anna. 2015. European Muslins: Caught between Local integration challenges and Global Terrorism Discourses. Instituto Affari Internazionali. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  243. UN News Centre. 2015. « Foreign terrorist fighters pose ‘significant and evolving’ global threat, warns new UN report ». 6 October. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  244. United Nations. 2015. Report of the Office of the United Nations High Commissioner for Human Rights on the human rights situation in Iraq in the light of abuses committed by the so-called Islamic State in Iraq and the Levant and associated groups. A/HRC/28/18. 13 March. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  245. UOIF. 2014. Appel des musulmans de France. 15 September. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  246. UOIF. 2014. Le discours de l EI ne peut prendre que chez ceux aui n ont aucune culture musulmane-interview de JP Filiu. 19 November. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  247. UOIF. 2014. Tous unis contre la barbarie. 26 September. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  248. UOIF. 2015. Assassinat ignoble d’un humanitaire. 15 September. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  249. UOIF. 2015. Destruction d’un patrimoine exceptionnel. 28 February. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  250. UOIF. 2015. Exécution de deux otages japonais. 2 March. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  251. USA Today. 2014. “Jihadist Jane: Islamic State seeking out women”, 1 November. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  252. Van Ginkel, Bibi and Eva Entenmann (Eds.). 2016. The Foreign Fighters Phenomenon in the European Union. International Centre for Counter-Terrorism (IICT)- The Hague. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  253. Vidino, Lorenzo. 2010. The New Muslim Brotherhood in the West. Columbia University Press. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  254. La Vie. 2014. « Comment le goût du djihad vient aux filles », 3 June. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  255. Vowles Erica. 2015. What history teaches us about foreign fighters. 31 July. http://www.abc.net.au/radionational/programs/rearvision/what-we-can-learn-from-history-about-foreign-fighters/6662712 Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  256. Washington Post. 2014. “How ISIS persuaded thousands of westerners to fight its war of extremism”, 17 June. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263
  257. Zehgal, Malika. 2005. « La constitution du Conseil Français du Culte Musulman : reconnaissance politique d’un Islam français ? » Archives de sciences sociales des religions 129 (janvier-mars): 97-113. Google Scholar öffnen doi.org/10.5771/0175-274X-2016-4-263

Zitation


Download RIS Download BibTex