Abstract

At present, the number of terrorist attacks carried out by lone terrorists under the influence of propaganda and extremist ideology, as well as by organized terrorist communities with a network and poorly connected structure, is increasing. The main means of information exchange, recruitment and promotion for such structures is the Internet, namely web resources, social networks and e-mail. In this regard, the task of detecting, identifying topics of communication, connections, as well as monitoring the behavior and forecasting of threats emanating from individual users, groups and network communities that generate and distribute terrorist and extremist information on the Internet arises.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.