ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
9
views
0
references
Top references
cited by
4
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
5,492
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
The YouTube jihadists: a social network analysis of Al-Muhajiroun’s propaganda campaign
Author(s):
J Klausen
,
ET Barbieri
,
A. Reichlin-Melnick
,
AY Zelin
,
Klausen
,
E. Tschaen Barbieri
,
A Zelin
Publication date:
2012
Journal:
Perspect. Terrorism
Read this article at
ScienceOpen
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electronic Workshops in Computing (eWiC)
Data availability:
ScienceOpen disciplines:
Graphics & Multimedia design
Comments
Comment on this article
Sign in to comment
Similar content
5,492
Automatic Detection of Online Jihadist Hate Speech
Authors:
Guy De Pauw
,
Tom De Smedt
,
Pieter Van Ostaeyen
Identifying risk factors for Jihadist terrorist offenders committing homicide: An explorative analysis using the European Database of Terrorist offenders
Authors:
Daphne L. Alberda
,
Nils Duits
,
Kees van den Bos
…
The Hofstadgroup Revisited: Questioning its Status as a “Quintessential” Homegrown Jihadist Network
Authors:
Bart Schuurman
,
Quirine Eijkman
,
Edwin Bakker
See all similar
Cited by
4
The four dimensions of social network analysis: An overview of research methods, applications, and software tools
Authors:
David Camacho
,
Ángel Panizo-LLedot
,
Gema Bello-Orgaz
…
Cross-platform information spread during the January 6th capitol riots
Authors:
Lynnette Hui Xian Ng
,
Iain J. Cruickshank
,
Kathleen M Carley
La violencia terrorista como espectáculo en internet: una aproximación criminológica
Authors:
Miguel Cano-Paños
See all cited by