Downloads: 164 | Views: 306
Review Papers | Computer Science & Engineering | Malaysia | Volume 7 Issue 12, December 2018 | Popularity: 6.2 / 10
Online Radicalization: An Overview
Mohammad Zahid Mateen, Jamaludin Ibrahim
Abstract: The Internet is a medium where the entire world exists in the form of 1s and 0s. This world as we know it today is constantly in a dynamic state of war with those who want to use technology to misuse and exploit it for spreading their propaganda and worldview among the masses. This paper looks into cyber-warfare, cyber-terrorism and its rise, and at the same time it also focuses on the Islamic State which is conducting a modern and sophisticated cyberwar online. The paper also discusses as to what exactly constitutes online radicalization and what leads to this. The rise of whistle-blowers and organizations like WikiLeaks has caused damages in the millions to people and even governments. This paper aims to investigate as to where do we draw the line between organizations like WikiLeaks and ISIS in terms of cyber-terrorism.
Keywords: Cyber Terrorism, Targeted attacks, Cyber Security, Online Radicalization, ISIS, WikiLeaks, Data Breach, Cyber-War
Edition: Volume 7 Issue 12, December 2018
Pages: 268 - 277
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 1058 - 1062Comprehensive Research on Cyber - Attacks and Cyber Security
Sonam Khatri
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 832 - 839Leveraging Artificial Intelligence for Enhanced Cybersecurity: A Systematic Approach
Mohammed Saleem Sultan, Mohammed Shahid Sultan
Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 2571 - 2575Enhancing IoT Cybersecurity with Graph Neural Networks: Advanced Anomaly Detection and Threat Mitigation
Harish Narne
Downloads: 4 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 723 - 730A Study: Use of Machine Learning for Cyber Security
Nidhi Kataria Chawla, Monika Gaur
Downloads: 5 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 213 - 217An Automated Data Deletion: A Secure Method for Multi-Cloud Security with Intrusion Detection System
Jashanbir Singh, Dr. Gurjit Singh Bhathal