Lawrence Peter Ampofo



Download 1.29 Mb.
Page58/62
Date19.10.2016
Size1.29 Mb.
#4199
1   ...   54   55   56   57   58   59   60   61   62
[Accessed 19 July 2010].
Warren, D., & Rainey, D., (1980). Terrorism as Communication. The Speech Communication Association National Convention.
Watkins, M. Edwards, M. and Thakrar, U. 2001. Winning the Influence Game. What Every Business Leader Should Know about Government. John Wiley & Sons Inc. 
Webb, A., (2008). Public Diplomacy: Meeting New Challenges. Report on Wilton Park Conference 902.
Wei, C., (2007). ‘Capturing Mobile Phone Usage: Research Methods for Mobile Phones’, Professional Communications Conference.
Weimann, G. (2004). www.terror.net: How Modern Terrorism Uses the Internet.

Washington DC: United States Institute of Peace.


Weimann, G. (2005). How Modern Terrorism Uses the Internet, Journal of International Security Affairs, Spring 2005, No. 8
Weimann, G. (2006). Terror on the Internet: The New Arena, the New Challenges. Haifa University.
Wells, T., (2006). The Read-Write Executable Web Search Engine News, [Online] Available at: [Accessed May 2010].
Wendt, A. (1992) Anarchy is What States Make of It: The Social Construction of Power Politics. International Organization, Vol. 46, No.2 (Spring, 1992), pp. 391-425.
Wenger, E. (1998) Communities of Practice – Learning, Meaning and Identity, Cambridge University Press, Cambridge, MA.
Western, B., & Jackman, S. (1994). Bayesian Inference for Comparative Research. The American Political Science Review, Vol. 88, No. 2, (Jun 1994), pp.412-433.
Whitefield, S., (2006). Behavioural and Institutional Approaches to Political Science. Department of Politics and International Relations, University of Oxford.
Whitworth, D., (2008). ‘Facebook Users Hit by Virus’, BBC News. [online] [Accessed 20 July 2010].
Widgren, J., Jandl, M., Hofmann, M. (2005), Migration and Security in Europe after the Madrid Bombings. Migraciones, No. 17, June 2005.
Wilson, T., Wiebe, J., & Hoffmann, P., (2005). Recognizing Contextual Polarity in Phase-Level Sentiment Analysis. Proceedings of Human Language Technology Conference and Conference on Empirical Methods in Natural Language Processing (HLT/EMNLP), pages 347-354. Vancouver, October 2005.
Williams, C., (2008). BT and Phorm Secretly Tracked 18,000 Customers in 2006. The Register, [online] Available at: [Accessed April 2008].
Williams, M., (2003). Words, Images, Enemies: Securitization and International Politics. International Studies Quarterly (2003) 47, 511-531.
Wilkinson, P., (1997). The Media and Terrorism: A Reassessment. Terrorism and Political Violence, Vol. 9, No. 2, (Summer 1997) pp.51-64.
Wilton Park, (2011). Tackling Online Jihad: Understanding the Issues and how to Respond? United Kingdom 31 January to 2 February 2011.
Winer, D., (2002). ‘What is the Real-Time Web?’ Scripting. [online] Available at [Accessed 11 August 2010].
Winner, L. (1993). Upon Opening the Black Box and Finding it Empty: Social Constructivism and the Philosophy of Technology. Science, Technology and Human Values, Vol. 18, No. 3, (Summer 1993), pp. 362-378.
Witt, A. (2005), Challenges in the Area of Immigration, Integration and Security, Center for International Relations, May 2005.
Wiseman, G. (2004). “Polylateralism” and New Modes of Global Dialogue. Discussion papers No. 59 (Leicester: Leicester Diplomatic Studies Programme, 1999).
Witker, J. (Date Unknown). Globalización y Delitos Económicos. Instituto de Investigaciónes Jurídicas
Wood, D., (2007). Spain Struggles for New ETA Plan. BBC News [Online). Available at http://news.bbc.co.uk/1/hi/world/europe/6228201.stm [Accessed 28 December 2008]
Woodward, J.D., (2005), Using Biometrics to Achieve Identity Dominance in the Global War on Terrorism. Rand Corporation, National Security Research Division, October 2005
World Paddle Sport Foundation, (2011). Diplomacy & Leadership Through Paddle Sports. [online] Available at [Accessed 06 April 2011].
Wu, J, Wang, S., (2004). ‘What Drives Mobile Commerce? An Empirical Evaluation of the Revised Technology Acceptance Model’, Information and Management 42, pp. 719-729.
Xenitidou, M., & Gilbert, N., (2009). Innovations in Social Science Research Methods. ESRC National Centre for Research Methods. University of Surrey.
Xu, J., Chen, H., Zhou, Y., & Qin, J. (2006). On the Topology of Dark Web Terrorist Groups. ISI 2006, LNCS, pp. 367-376.
Yang, C.C., & Ng, T.D. (2007). Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualisation. Department of Systems Engineering and Engineering Management at the Chinese University of Hong Kong.
Zhou, Y., Qin, J., Lai, G., Reid, E. & Chen, H. (2005). Building Knowledge Management System for Researching Terrorist Groups on the Web. Proceedings of the Eleventh Americas Conference on Information Systems, Omaha, NE, USA August 11th-14th 2005.
Zhou, Y., Reid, E., Qin, J., Chen, H., & Lai, G. (Date unknown). U.S. Domestic Extremist Groups on the Web: Link and Content Analysis. The University of Tuscon, Arizona.
Zittrain, J., (2007), The Future of the Internet and How to Stop It, Yale University Press.
Zunzunegui, S., (2008). El Ciberterrorismo: Una Perspectiva Legal y Judicial. Eguzkilore, Numero 22, San Sebastían, Diciembre 2008, 169-187.


1 “Internet” is often spelled with a capital “I.” In keeping with other works in contemporary internet studies and for the purpose of this thesis, the author will spell with the lower case “i.” Capitalising suggests that the “internet” is a proper noun and implying that either it is a being, or a place. Both metaphors suggest that the internet has agency and power that are better granted to its users and developers.

2 See Glossary of Terms.

3 ‘Terrorismo exterior es el terrorismo que actúa fuera de las fronteras de los Estados de origen o bien dentro de ellas pero contra intereses de otros países, entendiendo por “actuación” la realización de acciones armadas (atentados, sabotajes, asesinatos, secuestros). Existen otros aspectos ligados al terrorismo internacional que deben ser tenidos en cuenta. La existencia de mercenarios y de material bélico muy sofisticado, procedente del periodo de la Guerra Fría, así como las posibilidades que ofrecen las nuevas tecnologías para obtener información sobre material susceptible de ser empleado en actos terroristas, añaden un factor de inestabilidad al fenómeno terrorista. Terrorismo interior: Es aquel que nace dentro de un Estado y actúa contra dicho Estado. Este terrorismo puede mantener lazos internacionales para apoyarse entre grupos, emplear campos de adiestramiento o refugiarse en santuarios, pero tiene otra naturaleza distinta. España conoce bien esta lacra, que constituye el principal problema al que se enfrenta nuestra sociedad.’ (2003). Revisión Estratégica de la Defensa, Gobierno Español.

4 See Glossary of Terms.

6 Interview with Giles Tremlett, Spain Correspondent, The Guardian. Telephone Interview, 12 November 2010

7 See Glossary of Terms

8 See Glossary of Terms.

9 See Glossary of Terms

10 See Glossary of Terms

11 See Glossary of Terms

12 See Glossary of Terms

13 See Glossary of Terms

14 See Glossary of Terms

15 Interview with Justin Webster, JWP Productions, Telephone interview, 29 November 2010.

16 Interview with Robert Imre, Deputy Head Politics and International Relations. Newcastle Business School. Telephone Interview, 21 July 2010.

17 Interview with Jamie Barlett, Head of Violence and Extremism for DEMOS. London, 28 April 2011.

18 Interview with Justin Webster, JWP Productions, Telephone interview, 29 November 2010.

19 Interview with John Postill, Sheffield Hallam University. Barcelona, Spain, 02 August 2010.

20 ‘Sin embargo, en la segunda mitad de la década de los 90 las redes yihadistas comenzaron a dirigir su propaganda y reclutamiento hacia la creciente comunidad islámica inmigrada. Sin caer en la simpleza de criminalizar la inmigración, es indudable que este hecho ha complicado las labores de vigilancia policial y de inteligencia, y ha ampliado la cantera de potenciales candidatos entre los inmigrantes que llegan radicalizados o entre aquellos, que una vez en España, se aproximan a la órbita de captación yihadista.’ Jordán, J., 2005. El yihadismo en España: situación actual, Real Instituto Elcano de Estudios Internacionales y Estratégicas, [Online]. Available at:


Download 1.29 Mb.

Share with your friends:
1   ...   54   55   56   57   58   59   60   61   62




The database is protected by copyright ©ininet.org 2024
send message

    Main page