Information control and terrorism: Tracking the Mumbai terrorist attack through twitter
暂无分享,去创建一个
H. Raghav Rao | Manish Agrawal | Onook Oh | M. Agrawal | H. Rao | Onook Oh
[1] Mica R. Endsley,et al. Toward a Theory of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[2] John Walker,et al. The digital imprimatur: How big brother and big media can put the internet genie back in the bottle , 2003 .
[3] Lech J. Janczewski,et al. Cyber Warfare and Cyber Terrorism , 2007 .
[4] Ashish Khetan,et al. 26/11 Mumbai Attacked , 2009 .
[5] Klaus Krippendorff,et al. Content Analysis: An Introduction to Its Methodology , 1980 .
[6] Hsinchun Chen,et al. Analyzing terror campaigns on the internet: Technical sophistication, content richness, and Web interactivity , 2007, Int. J. Hum. Comput. Stud..
[7] Y. Tsfati,et al. www.terrorism.com: Terror on the Internet , 2002 .
[8] Sanford B. Ehrlich,et al. Small Groups: Key Readings , 2006 .
[9] Rajiv Kishore,et al. Determinants of Sourcing During Technology Growth and Maturity: An Empirical Study of e-Commerce Sourcing , 2004, J. Manag. Inf. Syst..
[10] Laura D. Strater,et al. Measures of Platoon Leader Situation Awareness in Virtual Decision-Making Exercises , 2001 .
[11] Andrew McAfee,et al. Enterprise 2.0: the dawn of emergent collaboration , 2006, IEEE Engineering Management Review.
[12] K. A. Taipale. Destabilizing Terrorist Networks: Disrupting and Manipulating Information Flows in the Global War on Terrorism , 2005 .
[13] William Hutchinson,et al. Information Warfare and Deception , 2006, Informing Sci. Int. J. an Emerg. Transdiscipl..
[14] JinKyu Lee,et al. Web 2.0 Emergency Applications: How Useful Can Twitter be for Emergency Response? , 2009 .
[15] William E. Lee. "Security Review" and the First Amendment , 2002 .
[16] Daniel C. Hallin,et al. The uncensored war , 1993 .
[17] Mica R. Endsley,et al. Measurement of Situation Awareness in Dynamic Systems , 1995, Hum. Factors.
[18] Reto E. Haeni. Information Warfare an introduction , 1997 .
[19] A. Anderson. Risk, terrorism, and the internet , 2003 .
[20] G. Weimann. www.terror.net – How Modern Terrorism Uses the Internet , 2004 .