As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
The cyber world is integrated into the reality. There is a rapid technological change in weapons systems and the international security studies must focus on developing effective policies to avoid or diminish the economic and social harm of the cyber-attacks. With gradual encouragement, the users seek answers to their questions and become more and more entangled in terrorist related discussions. This is the way of personal indoctrination that occurs in the cyber space, often through the use of secure software. Through online platforms, terrorist organizations are also increasingly distributing propaganda aimed at encouraging extremism. The research paper aims to emphasize the most important tools for terrorist recruitment in the Cyber world and it provides some legal instruments and practices to fight against it. The study shows how cyber systems can be secured and thus become safe for the cyber world environment. The first section offers a short description of terrorism, its origins, the meaning and the general perspectives on cyber terrorism. The second section describes the most important terrorist groups and their recruitment activity in the cyber world. The next section provides a short perspective of the methods for counter-terrorism recruitment activity in the cyber world. The work ends with conclusions and gives suggestions for future research.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.