References
- Abrams, F. (2012). On American hate speech law. In M. Herz & P. Molnar (Eds.), The content and context of hate speech: Rethinking regulation and responses (pp. 116–128). Cambridge: Cambridge University Press.
- Anti-Defamation League. (2002). Racist groups using computer gaming to promote violence against Blacks, Latinos, and Jews. New York, NY: Anti-Defamation League. Retrieved from http://www.adl.org/videogames/default.asp.
- Ayers, J. M. (1999). From the streets to the Internet: The cyber-diffusion of contention. The ANNALS of the American Academy of Political and Social Science, 566, 132–143.
- Benford, R. D., & Snow, D. A. (2000). Framing processes and social movements: An overview and assessment. Annual Review of Sociology, 26, 611–639.
- Bjorgo, T., & Horgan, J. (Eds.). (2009). Leaving terrorism behind: Individual and collective disengagement. New York, NY: Routledge.
- Brennan, R. (2015). The growing strategic threat of radical Islamist ideology. Testimony presented before the House Foreign Affairs Committee on February 12, 2015. Retrieved from http://www.rand.org/pubs/testimonies/CT422.html.
- Brenner, S. W. (2011). Defining cybercrime: A review of federal and state law. In R. D. Clifford (Ed.), Cybercrime: The investigation, prosecution, and defense of a computer-related crime (3rd ed., pp. 15–104). Raleigh, NC: Carolina Academic Press.
- Brown, J. (2008, July 11). Woman funneled funds for Khawaja, trial told. The Canadian Press. Retrieved from http://www.theglobeandmail.com/news/national/woman-funneled-funds-for-khawaja-trial-told/article1057364/.
- Britz, M. J. (2010). Terrorism and technology: Operationalizing cyberterrorism and identifying concepts. In T. J. Holt (Ed.), Crime correlates, causes, and context (pp. 193–220). Raleigh, NC: Carolina Academic Press.
- Caldwell, C. (2006, June 25). After Londonistan. New York Times. Retrieved from http://www.nytimes.com/2006/06/25/magazine/25london.html?pagewanted = print&_r = 0.
- Castle, T. (2011). The women of Stormfront: An examination of white nationalist discussion threads on the Internet. Internet Journal of Criminology. Retrieved from http://www.internetjournalofcriminology.com/Castle_Chevalier_The_Women_of_Stormfront_An_Examination_of_White_Nationalist_Discussion_Threads.pdf.
- Chadwick, A. (2007). Digital network repertoires and organizational hybridity. Political Communication, 24, 283–301.
- Chermak, S., Freilich, J. D., & Suttmoeller, M. (2013). The organizational dynamics of far-right hate groups in the United States: Comparing violent to non-violent organizations. Studies in Conflict and Terrorism, 36(3), 193–218.
- Corb, A. (2011). Into the minds of mayhem: White supremacy, recruitment and the Internet. A report commissioned for Google Ideas.
- Earl, J., & Schussman, A. (2003). The new site of activism: On-line organizations, movement entrepreneurs and the changing location of social movement decision-making. In P. G. Coy (Ed.), Consensus decision making, Northern Ireland and indigenous movements (pp. 155–187). London: JAI Press.
- Foltz, B. C. (2004). Cyberterrorism, computer crime, and reality. Information Management & Computer Security, 12, 154–166.
- Forest, J. J. (2009). Influence warfare: How terrorists and governments struggle to shape perceptions in a war of ideas. Westport, CT: Praeger.
- Gerstenfeld, P. B., Grant, D. R., & Chiang, C. P. (2003). Hate online: A content analysis of extremist Internet sites. Analyses of Social Issues and Public Policy, 3(1), 29–44.
- Gruen, M. (2005). Innovative recruitment and indoctrination tactics by extremists: Video games, hip hop, and the World Wide Web. In J. J. Forest (Ed.), The making of a terrorist (pp. 11–22). Westport, CT: Praeger.
- Holt, T. J. (2012). Exploring the intersections of technology, crime and terror. Terrorism and Political Violence, 24, 337–354.
- Hummel, M. L. (2008). Internet terrorism. The Homeland Security Review, 2, 117–130.
- Jacobs, A. (2015, January 29). China further tightens grip on the Internet. New York Times. Retrieved from http://www.nytimes.com/2015/01/30/world/asia/china-clamps-down-still-harder-on-internet-access.html?_r = 0.
- Jennings, K. M., & Zeitner, V. (2003). Internet use and civic engagement: A longitudinal analysis. Public Opinion Quarterly, 67, 311–334.
- Jipson, A. (2007). Influence of hate rock. Popular Music and Society, 30, 449–451.
- Leuprecht, C., Hataley, T., Moskalenko, S., & McCauley, C. (2010). Narratives and counter-narratives for global jihad: Opinion versus action. In E. Kessels (Ed.), Countering violent extremist narratives (pp. 58–71). Breda, Netherlands: National Coordinator for Counter Terrorism (NCTb). Retrieved from http://english.nctb.nl/Images/Countering%20Violent%20Extremist%20Narratives_tcm92-259489.pdf?cp=92&cs=25496.
- Levy, B. H. (2003). Who killed Daniel Pearl? Brooklyn, NY: Melville House.
- martinlutherking.org. (2013). Retrieved from http://martinlutherking.org.
- McCauley, C., & Moskalenko, S. (2011). Friction: How radicalization happens to them and us. New York, NY: Oxford University Press.
- McCauley, C., & Moskalenko, S. (2014). Toward a profile of lone wolf terrorists: What moves an individual from radical opinion to radical action? Terrorism and Political Violence, 26, 69–85.
- McCauley, T. (2015). The war of ideas on the internet: An asymmetric conflict in which the strong become weak. Dynamics of Asymmetric Conflict, 8(1), 79–90.
- Mendel, T. (2012). Does international law provide for consistent rules on hate speech. In M. Herz & P. Molnar (Eds.), The content and context of hate speech: Rethinking regulation and responses (pp. 417–429). Cambridge: Cambridge University Press.
- Pew Research Center. (2007). Muslim Americans: Middle class and mostly mainstream. Retrieved from http://pewresearch.org/files/old-assets/pdf/muslim-americans.pdf.
- Pew Research Center. (2011). Muslim Americans: No signs of growth in alienation or support for extremism. Retrieved from http://www.people-press.org/2011/08/30/muslim-americans-no-signs-of-growth-in-alienation-or-support-for-extremism/.
- Pisoiu, D. (2015). Subcultural theory applied to jihadi and right-wing radicalization in Germany. Terrorism and Political Violence, 27(1), 9–28.
- Quiggin, T. (2010). Contemporary jihadist narratives: The case of Momin Khawaja. In E. Kessels (Ed.), Countering violent extremist narratives (pp. 84–93). Breda, Netherlands: National Coordinator for Counter Terrorism (NCTb). Retrieved from http://english.nctb.nl/Images/Countering%20Violent%20Extremist%20Narratives_tcm92-259489.pdf?cp=92&cs=25496.
- Qin, A. (2015, January 26). China to force authors to provide real names when publishing online. New York Times Sinosphere. Retrieved from http://sinosphere.blogs.nytimes.com/2015/01/26/china-to-force-authors-to-provide-real-names-when-publishing-online/.
- Sageman, M. (2008). Leaderless jihad: Terror networks in the twenty-first century. Philadelphia: University of Pennsylvania Press.
- Schmid, A. P. (2004). Frameworks for conceptualising terrorism. Terrorism and Political Violence, 16, 197–221.
- Schmitt, E. (2015, February 15). U.S. intensifies effort to blunt ISIS' message. New York Times. pp. A1, A6.
- Seymour, A. (2008, July 16). Ex-fiancee unlikely to testify at Khawaja trial. Ottawa Citizen. Retrieved from http://www.canada.com/ottawacitizen/story.html?id = fdd66b08-35ab-477a-b2bb-2b8f539de51b.
- Shiffman, J. (2012, 7 December). Jane's jihad. Reuter's Special Report. p. 6. Retrieved from http://graphics.thomsonreuters.com/12/12/JihadJaneAll.pdf.
- Silber, M. D., & Bhatt, A. (2007). Radicalization in the West: The homegrown threat. Retrieved from http://www.nypdshield.org/public/SiteFiles/documents/NYPD_Report-Radicalization_in_the_West.pdf.
- Simi, P., & Futrell, R. (2006). White power cyberculture: Building a movement. The Public Eye Magazine, (Summer), 69–72.
- Stepanova, E. (2011). The role of information communications technology in the “ArabSpring”: Implications beyond the region. PONARS Eurasia Policy Memo No. 159. Retrieved from http://www.gwu.edu/∼ieresgwu/assets/docs/ponars/pepm_159.pdf.
- Taylor, M., & Ramsey, G. (2010). Violent radical content and the relationship between ideology and behaviour: Do counter-narratives matter?. In E. Kessels (Ed.), Countering Violent Extremist Narratives (pp. 94–110). Breda, Netherlands: National Coordinator for Counter Terrorism (NCTb). Retrieved from http://english.nctb.nl/Images/Countering%20Violent%20Extremist%20Narratives_tcm92-259489.pdf?cp=92&cs=25496.
- Van Laer, J. (2010). Activists online and offline: The Internet as an information channel for protest demonstrations. Mobilization: An International Journal, 15, 347–366.
- Wall, D. S. (2001). Cybercrimes and the Internet. In D. S. Wall (Ed.), Crime and the Internet (pp. 1–17). New York, NY: Routledge.
- Watson, L. (2013, March 4). Al Qaeda releases guide on how to torch cars and make bombs as it names 11 public figures it wants ‘dead or alive’ in latest edition of its glossy magazine. Daily Mail. Retrieved from http://www.dailymail.co.uk/news/article-2287003/Al-Qaeda-releases-guide-torch-cars-make-bombs-naming-11-public-figures-wants-dead-alivelatest-edition-glossy-magazine.html.
- Weimann, G. (2005). How terrorists use the Internet. Journal of International Security Affairs, 8, 91–105.
- Weimann, G. (2011). Cyber-fatwas and terrorism. Studies in Conflict & Terrorism, 34(10), 765–781.
- White House. (2011). Empowering local partners to prevent violent extremism in the United States. Washington, DC. Retrieved from http://www.whitehouse.gov/sites/default/files/empowering_local_partners.pdf.