Skip to main content

2012 | OriginalPaper | Buchkapitel

8. Dark Web Attribute System

verfasst von : Hsinchun Chen

Erschienen in: Dark Web

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Terrorists and extremists are increasingly utilizing Internet technology to enhance their ability to influence the outside world. Due to the lack of multilingual and multimedia terrorist/extremist collections and advanced analytical methodologies, our empirical understanding of their Internet usage is still very limited. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist web contents. We also propose a Dark Web Attribute System (DWAS) to enable quantitative Dark Web content analysis from three perspectives: technical sophistication, content richness, and web interactivity. Using the proposed methodology, we identified and examined the Internet usage of major Middle Eastern terrorist/extremist groups. More than 200,000 multimedia web documents were collected from 86 Middle Eastern multilingual terrorist/extremist web sites. In our comparison of terrorist/extremist web sites to US government web sites, we found that terrorist/extremist groups exhibited levels of web knowledge similar to that of US government agencies. Moreover, terrorists/extremists had a strong emphasis on multimedia usage, and their web sites employed significantly more sophisticated multimedia technologies than government web sites. We also found that the terrorist/extremist groups are as effective as the US government agencies in terms of supporting communications and interaction using web technologies. Advanced Internet-based communication tools such as online forums and chat rooms are used much more frequently in terrorist/extremist web sites than government web sites. Based on our case study results, we believe that the DWAS is an effective tool to analyze the technical sophistication of terrorist/extremist groups’ Internet usage and could contribute to an evidence-based understanding of the applications of web technologies in the global terrorism phenomena.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Armstrong, H. L. and Forde, P. J., “Internet Anonymity Practices in Computer Crime,” Information Management and Computer Security, 11(5), pp. 209–215, 2003.CrossRef Armstrong, H. L. and Forde, P. J., “Internet Anonymity Practices in Computer Crime,” Information Management and Computer Security, 11(5), pp. 209–215, 2003.CrossRef
Zurück zum Zitat Arquilla, J. and Ronfeldt, D., “Cyber War Is Coming!” Comparative Strategy, 12(2), 1993.CrossRef Arquilla, J. and Ronfeldt, D., “Cyber War Is Coming!” Comparative Strategy, 12(2), 1993.CrossRef
Zurück zum Zitat Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., Lai, G., Bonillas, A. A. and Sageman, M., “The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web,” In Proc. of International IEEE Conference on Intelligent Transportation Systems, 2004. Chen, H., Qin, J., Reid, E., Chung, W., Zhou, Y., Xi, W., Lai, G., Bonillas, A. A. and Sageman, M., “The Dark Web Portal: Collecting and Analyzing the Presence of Domestic and International Terrorist Groups on the Web,” In Proc. of International IEEE Conference on Intelligent Transportation Systems, 2004.
Zurück zum Zitat Chou, C., “Interactivity and Interactive Functions in Web-based Learning Systems: A Technical Framework for Designers,” British Journal of Educational Technology, 34(3), pp. 265–279, 2003.CrossRef Chou, C., “Interactivity and Interactive Functions in Web-based Learning Systems: A Technical Framework for Designers,” British Journal of Educational Technology, 34(3), pp. 265–279, 2003.CrossRef
Zurück zum Zitat Coll, S. and Glasser, S. B., “Terrorists Turn to the Web as Base of Operations,” Washington Post, Aug 7, 2005. Coll, S. and Glasser, S. B., “Terrorists Turn to the Web as Base of Operations,” Washington Post, Aug 7, 2005.
Zurück zum Zitat Demchak, C., Friis, C., and La Porte, T. M., “Webbing Governance: National Differences in Constructing the Face of Public Organizations,” Handbook of Public Information Systems. G. D. Garson. NYC, Marcel Dekker, 2000. Demchak, C., Friis, C., and La Porte, T. M., “Webbing Governance: National Differences in Constructing the Face of Public Organizations,” Handbook of Public Information Systems. G. D. Garson. NYC, Marcel Dekker, 2000.
Zurück zum Zitat Elison, W., “Netwar: Studying Rebels on the Internet,” The Social Studies, 91, pp. 127–131, 2000.CrossRef Elison, W., “Netwar: Studying Rebels on the Internet,” The Social Studies, 91, pp. 127–131, 2000.CrossRef
Zurück zum Zitat FBIS, “Arab Afghans Said to Launch Worldwide Terrorist War,” Paris al-Watan al-’Arabi, FBIS-TOT-96–010-L, pp.22–24, December 1, 1995. FBIS, “Arab Afghans Said to Launch Worldwide Terrorist War,” Paris al-Watan al-’Arabi, FBIS-TOT-96–010-L, pp.22–24, December 1, 1995.
Zurück zum Zitat Hillman, D. C. A., Willis, D. J., and Gunawardena, C. N., “Learner-interface Interaction in Distance Education: An Extension of Contemporary Models and Strategies for Practitioners,” The American Journal of Distance Education, 8(2), pp. 30–42, 1994.CrossRef Hillman, D. C. A., Willis, D. J., and Gunawardena, C. N., “Learner-interface Interaction in Distance Education: An Extension of Contemporary Models and Strategies for Practitioners,” The American Journal of Distance Education, 8(2), pp. 30–42, 1994.CrossRef
Zurück zum Zitat Jackson, Brian J., Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption, Studies in Conflict and Terrorism, vol. 24, pp. 183–213, 2001.CrossRef Jackson, Brian J., Technology Acquisition by Terrorist Groups: Threat Assessment Informed by Lessons from Private Sector Technology Adoption, Studies in Conflict and Terrorism, vol. 24, pp. 183–213, 2001.CrossRef
Zurück zum Zitat Jesdanun, A., “WWW: Terror’s Channel of Choice,” CBS News, June 20, 2004. Jesdanun, A., “WWW: Terror’s Channel of Choice,” CBS News, June 20, 2004.
Zurück zum Zitat Nunnally, J., Psychometric Theory. McGraw Hill, New York, 1978. Nunnally, J., Psychometric Theory. McGraw Hill, New York, 1978.
Zurück zum Zitat Palmer, J. W. and Griffith, D. A., “An Emerging Model of Web Site Design for Marketing,” Communications of the ACM, 41(3), pp. 45–51, 1998.CrossRef Palmer, J. W. and Griffith, D. A., “An Emerging Model of Web Site Design for Marketing,” Communications of the ACM, 41(3), pp. 45–51, 1998.CrossRef
Zurück zum Zitat Preece, J., Online Communities: Designing Usability, Supporting Sociability., New York City, Wiley, 2000. Preece, J., Online Communities: Designing Usability, Supporting Sociability., New York City, Wiley, 2000.
Zurück zum Zitat Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M., and Chen H., “Terrorism Knowledge Discovery Project: a Knowledge Discovery Approach to Addressing the Threats of Terrorism,” in Proc. of 2nd Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, 2004. Reid, E., Qin, J., Chung, W., Xu, J., Zhou, Y., Schumaker, R., Sageman, M., and Chen H., “Terrorism Knowledge Discovery Project: a Knowledge Discovery Approach to Addressing the Threats of Terrorism,” in Proc. of 2nd Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, Arizona, 2004.
Zurück zum Zitat Schneider, S. M., Foot, K., Kimpton, M., and Jones, G., “Building Thematic Web Collections: Challenges and Experiences from the September 11 Web Archive and the Election 2002 Web Archive,” in Proc. of the 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003. Schneider, S. M., Foot, K., Kimpton, M., and Jones, G., “Building Thematic Web Collections: Challenges and Experiences from the September 11 Web Archive and the Election 2002 Web Archive,” in Proc. of the 3rd ECDL Workshop on Web Archives, Trondheim, Norway, August 2003.
Zurück zum Zitat Tekwani, S., “Cyberterrorism: Threat and Response,” Institute of Defence and Strategic Studies, in Proc. of the Workshop on the New Dimensions of Terrorism, 21–22, Singapore, 2002. Tekwani, S., “Cyberterrorism: Threat and Response,” Institute of Defence and Strategic Studies, in Proc. of the Workshop on the New Dimensions of Terrorism, 21–22, Singapore, 2002.
Zurück zum Zitat Thomas, T. L., “Al Qaeda and the Internet: The Danger of ‘Cyberplanning,’” Parameters, Spring 2003, pp. 112–23, available at http://carlisle-www.army.mil/usawc/ Parameters/03spring/thomas.htm. Thomas, T. L., “Al Qaeda and the Internet: The Danger of ‘Cyberplanning,’” Parameters, Spring 2003, pp. 112–23, available at http://​carlisle-www.​army.​mil/​usawc/​ Parameters/03spring/thomas.htm.
Zurück zum Zitat Trevino, L. K., Lengel, R. H., and Daft, R. L., “Media Symbolism, Media Richness, and Media Choice in Organizations: A Symbolic Interactionist Perspective,” Communication Research, 14(5), pp. 553–574, 1987.CrossRef Trevino, L. K., Lengel, R. H., and Daft, R. L., “Media Symbolism, Media Richness, and Media Choice in Organizations: A Symbolic Interactionist Perspective,” Communication Research, 14(5), pp. 553–574, 1987.CrossRef
Zurück zum Zitat Zhou, Y., Reid, E., Qin, J., Chen, H., and Lai, G., “U.S. Domestic Extremist Groups on the Web: Link and Content Analysis,” IEEE Intelligent Systems Special Issue on Homeland Security, 20(5), pp. 44–51, 2005.CrossRef Zhou, Y., Reid, E., Qin, J., Chen, H., and Lai, G., “U.S. Domestic Extremist Groups on the Web: Link and Content Analysis,” IEEE Intelligent Systems Special Issue on Homeland Security, 20(5), pp. 44–51, 2005.CrossRef
Metadaten
Titel
Dark Web Attribute System
verfasst von
Hsinchun Chen
Copyright-Jahr
2012
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-1557-2_8

Premium Partner