Terrorist activities and internet government with focus on importance of prevention within a family
Spalevic, Ž., Počuča, M., & Bjelajac, Ž. (2013). Terrorist activities and internet government with focus on importance of prevention within a family, TTEM - Technics Technologies Education Management, 8(1), pp. 195-203, https://ttem.ba/2013/03/01/volume-8-number-1/
References
1. WSIS Action Plan, World Summit on the Information Society, Geneva, 12 Decembar 03, document WSIS-03/GENEVA/DOC/5-E; www.itu.int/wsis/docs/geneva/official/poa.html, paragraph 13b.
- Besic Carisa, Sedlak Otilija, Grubor Aleksandar, Ciric Zoran, “Measurement model for assessing the diffusion of e-business and e-marketing”, TTEM journal, ISSN 1840-1503, 2011; 6(3): 651-656.
- Milicevic Vladimir, Popovic Marko, Savic Zoran, “Business rule aproach as basis of e- bills payment system Development”, TTEM journal, ISSN 1840-1503, 2011; 6(1):26-34.
- Gelbstein Eduardo, Kurbalija Jovan , “Internet Governance: Issues, Actors and Divides”, Geneva, Diplo Foundation and Global Knowledge Partnership, www.diplomacy.edu/isl/ig, 2005; pp. 10–12.
- Klein Hans,”ICANN and Internet Governance: Leveraging Technical Coordination to Realize Global Public Policy”, The Information Society, 2002; 18(3):194–195.
- Report from the Working Group on Internet Governance, dokument WSIS-II/PC-3/DOC/5-E, 3 August 2005; paragraph 10.
- Eedle Paul, “Al Qaeda’s Super-Weapon: The Internet”, International Conference “Al-Qaeda 2.0: Transnational Terrorism After 9/11”, Washington, DC, 1–2 Decembar 2004.
- Video “Abu Musab al-Zarqawi Shown Slaughtering an American”; www.globalsecurity.org/military/world/ para/zarqawi.htm.
- Additional Protocol to the Convention on Cybercrime, Starzbur, www.conventions.coe.int/Treaty/EN/Treaties/Html/189.htm. 28. January 2003.
- Proposal for a Council Framework Decision on Combating Racism and Xenophobia, Official Journal of the European Communities 2002/C 75/E17, 26 March 2002.
- Petrović Slobodan R. ,,Kiber-terorizam – realnost ili fikcija?”, Bezbednost, Beograd, 2000; 42(5-6): 643-675.
- Bockstette Carsten, “ Strategic communica-tions management techniques used by jihadi terrorists”, Military Act, 2010 ; 62 ( 1): 326-353.
- Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (USA PATRIOT Act). 2001.
- United States of America v. Babar Ahmad and Azzam Publications, Indictment, United States District Court, District of Connecticut; www.usdoj.gov/usao/ct/Documents/AHMAD%20indictment.pdf.
- “British Man Arrested on Several Terrorism-related Charges”, Press Release, United States Attorney’s Office District of Connecticut, www.usdoj.gov/usao/ct/Press2004/20040806.html. 6 August 2004.
- Clarke Charles , “In House of Commons Debates”, Hansard, 20 July 2005; 436: Column 1255.
- Quoted in John Lasker, “Watchdogs Sniff Out Terror Sites”, Wired News, 25 February 2005.
- Bunt Gary, “Islam in the Digital Age: E-Jihad, Online Fatwas and Cyber Islamic Environments”, London, Pluto Press, 2003; pp. 24 and 93.
- Elovici Y. et al., “Using Data Mining Techniques for Detecting Teror – Related Activities on the Web”, Journal of Information Warfare 2004; 3(1): rr. 17-29.
- Johnson Douglas B., Martin John. P. u Cyganov Viktor ,”Media-terrorizm:Terrorizm i sredstva massovoj informacyi”, Nika-Centr, Kijev, 2004; pp. 20.
- Geljman Marat , “Russkij sposob-Terrorism i massmedia v tretjem tysjachiletiyi”, Guelman, Moskva, 2004.
- Boccara Marie-Hélene, “Islamist Websites and Their Hosts Part I: Islamist Teror Organizations”, MEMRI (The Middle East Media Research Institute), Washington D.C., 2004.
- P. Alex, De Graaf Schmid and Janny, “Violence as Communication: Insurgent Terrorism and the Western News Media”, London, Sage, pp. 170, 1982.









