Terrorist activities and internet government with focus on importance of prevention within a family

Spalevic, Ž., Počuča, M., & Bjelajac, Ž. (2013). Terrorist activities and internet government with focus on importance of prevention within a family, TTEM - Technics Technologies Education Management, 8(1), pp. 195-203, https://ttem.ba/2013/03/01/volume-8-number-1/

 

PDF

 

References
1. WSIS Action Plan, World Summit on the Information Society, Geneva, 12 Decembar 03, document WSIS-03/GENEVA/DOC/5-E; www.itu.int/wsis/docs/geneva/official/poa.html, paragraph 13b.

  1. Besic Carisa, Sedlak Otilija, Grubor Aleksandar, Ciric Zoran, “Measurement model for assessing the diffusion of e-business and e-marketing”, TTEM journal, ISSN 1840-1503, 2011; 6(3): 651-656.
  2. Milicevic Vladimir, Popovic Marko, Savic Zoran, “Business rule aproach as basis of e- bills payment system Development”, TTEM journal, ISSN 1840-1503, 2011; 6(1):26-34.
  3. Gelbstein Eduardo, Kurbalija Jovan , “Internet Governance: Issues, Actors and Divides”, Geneva, Diplo Foundation and Global Knowledge Partnership, www.diplomacy.edu/isl/ig, 2005; pp. 10–12.
  4. Klein Hans,”ICANN and Internet Governance: Leveraging Technical Coordination to Realize Global Public Policy”, The Information Society, 2002; 18(3):194–195.
  5. Report from the Working Group on Internet Governance, dokument WSIS-II/PC-3/DOC/5-E, 3 August 2005; paragraph 10.
  6. Eedle Paul, “Al Qaeda’s Super-Weapon: The Internet”, International Conference “Al-Qaeda 2.0: Transnational Terrorism After 9/11”, Washington, DC, 1–2 Decembar 2004.
  7. Video “Abu Musab al-Zarqawi Shown Slaughtering an American”; www.globalsecurity.org/military/world/ para/zarqawi.htm.
  8. Additional Protocol to the Convention on Cybercrime, Starzbur, www.conventions.coe.int/Treaty/EN/Treaties/Html/189.htm. 28. January 2003.
  9. Proposal for a Council Framework Decision on Combating Racism and Xenophobia, Official Journal of the European Communities 2002/C 75/E17, 26 March 2002.
  10. Petrović Slobodan R. ,,Kiber-terorizam – realnost ili fikcija?”, Bezbednost, Beograd, 2000; 42(5-6): 643-675.
  11. Bockstette Carsten, “ Strategic communica-tions management techniques used by jihadi terrorists”, Military Act, 2010 ; 62 ( 1): 326-353.
  12. Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act). 2001.
  13. United States of America v. Babar Ahmad and Azzam Publications, Indictment, United States District Court, District of Connecticut; www.usdoj.gov/usao/ct/Documents/AHMAD%20indictment.pdf.
  14. “British Man Arrested on Several Terrorism-related Charges”, Press Release, United States Attorney’s Office District of Connecticut, www.usdoj.gov/usao/ct/Press2004/20040806.html. 6 August 2004.
  15. Clarke Charles , “In House of Commons Debates”, Hansard, 20 July 2005; 436: Column 1255.
  16. Quoted in John Lasker, “Watchdogs Sniff Out Terror Sites”, Wired News, 25 February 2005.
  17. Bunt Gary, “Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environments”, London, Pluto Press, 2003; pp. 24 and 93.
  18. Elovici Y. et al., “Using Data Mining Techniques for Detecting Teror – Related Activities on the Web”, Journal of Information Warfare 2004; 3(1): rr. 17-29.
  19. Johnson Douglas B., Martin John. P. u Cyganov Viktor ,”Media-terrorizm:Terrorizm i sredstva massovoj informacyi”, Nika-Centr, Kijev, 2004; pp. 20.
  20. Geljman Marat , “Russkij sposob-Terrorism i massmedia v tretjem tysjachiletiyi”, Guelman, Moskva, 2004.
  21. Boccara Marie-Hélene, “Islamist Websites and Their Hosts Part I: Islamist Teror Organizations”, MEMRI (The Middle East Media Research Institute), Washington D.C., 2004.
  22. P. Alex, De Graaf Schmid and Janny, “Violence as Communication: Insurgent Terrorism and the Western News Media”, London, Sage, pp. 170, 1982.