참고문헌
- Aly, A. (2010). Proceedings of the 1st Australian Counter Terrorism Conference. Terrorism.
- Andre, V., and Harris-Hogan, S. (2013). Mohamed merah: From petty criminal to neojihadist. Politics, Religion & Ideology. https://doi.org/10.1080/21567689.2013.792655
- Atran, S. (2008). Who becomes a terrorist today? Perspectives on Terrorism, 2(5), 1-6.
- Baker-Beall, C., Heath-Kelly, C., and Jarvis, L. (2014). Counter-radicalisation: Critical perspectives. Counter - Radicalisation: Critical Perspectives. https://doi.org/10.4324/9781315773094
- Baran, Z. (2005). Fighting the war of ideas. Foreign Affairs. https://doi.org/10.2139/ssrn.677403
- Bartlet, J., and Miller, C. (2012). The edge of violence: Towards telling the difference between violent and non-violent radicalization. Terrorism and Political Viol ence, 24(1), 1-21. https://doi.org/10.1080/09546553.2011.594923
- Bartlett, J., and Miller, C. (2011). Truth, lies and the internet a report into young people's digital fluency. Demos, (September), 1-59. Retrieved from http://www.demos.co.uk/files/Truth_-_web.pdf
- Bergin, A., Osman, S. B., Ungerer, C., and Yasin, N. A. M. (2009). ASPI special report: Countering internet radicalisation in Southeast Asia. ASPI Special Report.
- Bermingham, A., Conway, M., Mclnerney, L., O'Hare, N., and Smeaton, A. F. (2009). Combining social network analysis and sentiment analysis to explore the potential for online radicalisation. Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, ASONAM 2009, 231-236. https://doi.org/10.1109/ASONAM.2009.31
- Bjelopera, J., and Randol, M. (2010). American jihadist terrorism: Combating a complex threat. Congressional Research Service.
- Blanchard, D. A., and Rambo, L. R. (1994). Understanding religious conversion. Contemporary Sociology. https://doi.org/10.3171/2014.3.PEDS13381
- Blanchard, D. A., and Rambo, L. R. (1994). Understanding religious conversion. Contemporary Sociology. https://doi.org/10.2307/2074335
- Borum, R. (2011). Rethinking radicalization. Journal of Strategic Security, 4(4), 1-6. Retrieved from http://scholarcommons.usf.edu/jss
- Briggs, R., and Strugnell, A. (2011). Radicalisation: The role of the internet. Institute for Strategic Dialogue, 1-12. https://doi.org/10.1093/ajae/aau104
- Chen, C.-W., and Lin, C.-S. (2014). Building a sense of virtual community: The role of the features of social networking sites. Cyberpsychology, Behavior, and Social Networking, 17(7), 460-465. https://doi.org/10.1089/cyber.2013.0530
- Cogburn, D. L., and Espinoza-Vasquez, F. K. (2011). From networked nominee to networked nation: Examining the impact of web 2.0 and social media on political participation and civic engagement in the 2008 obama campaign. Journal of Political Marketing, 10(1-2), 189-213. https://doi.org/10.1080/15377857.2011.540224
- Conway, M. (2012). From al-Zarqawi to al-Awlaki: The emergence and development of an online radical milieu. CTX: Combating Terrorism Exchange.
- Conway, M. (2014a). From "cyberterrorism" to "online radicalism." Exchanging Terrorism Oxygen for Media Airwaves. https://doi.org/10.4018/978-1\-4666-5776-2.ch014
- Conway, M. (2014b). Reality check: Assessing the (un)likelihood of cyberterrorism. In Cyberterrorism: Understanding, Assessment, and Response. https://doi.org/10.1007/978-1-4939-0962-9_6
- Conway, M. (2016). Determining the role of the internet in violent extremism and terrorism: Six suggestions for progressing research. Studies in Conflict & Terrorism, 40(1), 77-98. https://doi.org/10.1080/1057610X.2016.1157408
- Diehl, T., Weeks, B. E., and Gil de Zunga, H. (2016). Political persuasion on social media: Tracing direct and indirect effects of news use and social interaction. New Media and Society, 18(9), 1875-1895. https://doi.org/10.1177/1461444815616224
- Dozier, D. M., Shen, H., Sweetser, K. D., and Barker, V. (2016a). Demographics and internet behaviors as predictors of active publics. Public Relations Review. https://doi.org/10.1016/j.pubrev.2015.11.006
- Dozier, D. M., Shen, H., Sweetser, K. D., and Barker, V. (2016b). Public relations review demographics and internet behaviors as predictors of active publics. Public Relations Review, 42(1), 82-90. https://doi.org/10.1016/j.pubrev.2015.11.006
- Gray, D. H., and Head, A. (2009). The importance of the internet to the post-modern terrorist and its role as a form of safe haven. European Journal of Scientific Research, 25(3), 396-404.
- Gueorguieva, V. (2008). Voters, MySpace, and You Tube. Social Science Computer Review, 26(3), 288-300. https://doi.org/10.1177/0894439307305636
- Hafez, M., and Mullins, C. (2015). The radicalization puzzle: A theoretical synthesis of empirical approaches to homegrown extremism. Studies in Conflict & Terrorism. https://doi.org/10.1080/1057610X.2015.1051375
- Haythornthwaite, C. (2005). Social networks and internet connectivity effects. Information Communication and Society. https://doi.org/10.1080/13691180500146185
- Helfstein, S. (2012). Edges of radicalization: Ideas, individuals and networks in violent extremism. Retrieved from http://www.dtic.mil/docs/citations/ADA556711
- Homeland Security Institute. (2009). The internet as a terrorist tool for recruitment & radicalization of youth. Science and Technology Directorate.
- Horgan, J. (2008). From profiles to pathways and roots to routes: Perspectives from psychology on radicalization into terrorism. Annals of the American Academy of Political and Social Science. https://doi.org/10.1177/0002716208317539
- Hoskins, A., and O'Loughlin, B. (2015). Arrested war: The third phase of mediatization. Information Communication and Society. https://doi.org/10.1080/1369118X.2015.1068350
- John, H., and Braddock, K. (2010). Rehabilitating the terrorists?: Challenges in assessing the effectiveness of de-radicalization programs. Terrorism and Political Violence, 22(2), 267-291. https://doi.org/10.1080/09546551003594748
- Kao, D. T., Chuang, S.-C., Wang, S.-M., and Zhang, L. (2013). Message framing in social networking sites. Cyberpsychology, Behavior, and Social Networking, 16(10), 753-760. https://doi.org/10.1089/cyber.2011.0605
- Karpf, D. (2010). Online political mobilization from the advocacy group's perspective: Looking beyond clicktivism. Policy & Internet, 2(4), 7-41. https://doi.org/10.2202/1944-2866.1098
- Kruglanski, A. W., Gelfand, M. J., Beanger, J. J., Sheveland, A., Hetiarachchi, M., and Gunaratna, R. (2014). The psychology of radicalization and deradicalization: How significance quest impacts violent extremism. Political Psychology, 35(Suppl.1), 69-93. https://doi.org/10.1111/pops.12163
- Langman, L. (2017). From virtual public spheres to global justice : A critical theory of internetworked social movements author (s): lauren langman Published by : American Sociological Association Stable URL : http://www.jstor.org/stable/4148893 From Virtual Public Spheres, 23(1), 42-74.
- Magouirk, J., Atran, S., and Sageman, M. (2008). Connecting terrorist networks. Studies in Conflict and Terrorism. https://doi.org/10.1080/10576100701759988
- Marie, A., Sulaiman, A., and Ismawati, N. (2014). Computers in human behavior Facebook : The enabler of online civic engagement for activists. Computers in Human Behavior, 32, 284-289. https://doi.org/10.1016/j.chb.2013.12.017
- McCauley, C., and Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward terrorism. Terrorism and Political Violence, 20(3), 415-433. https://doi.org/10.1080/09546550802073367
- Mcgarty, C., Thomas, E. F., Lala, G., Smith, L. G. E., and Bliuc, A. M. (2014). New technologies, new identities, and the growth of mass opposition in the arab spring. Political Psychology. https://doi.org/10.1111/pops.12060
- Moghaddam, F. M. (2009). De-Radicalization and the staircase from terrorism. In The Faces of Terrorism: Multidisciplinary Perspectives (pp. 277-292). https://doi.org/10.1002/9780470744499.ch16
- Moskalenko, S., and Mccauley, C. (2009). Terrorism and political violence measuring political mobilization: The distinction between activism and radicalism measuring political mobilization. The Distinction Between Activism and Radicalism, 21(2), 239-260. https://doi.org/10.1080/09546550902765508
- Naji, A. B. (2004). The management of savagery: The most critical stage through which the Umma Will Pass. John M. Olin Institute for Strategic Studies at Harvard University. https://doi.org/http://hdl.handle.net/10066/6849
- Neumann, A., Vilata, I., Len, X., Garcia, P. E., Navarro, L., and Lopez, E. (2012). Community-lab: Architecture of a community networking testbed for the future internet. International Conference on Wireless and Mobile Computing, Networking and Communications, 620-627. https://doi.org/10.1109/WiMOB.2012.6379141
- Neumann, P., and Kleinmann, S. (2013). How rigorous is radicalization research? Democracy and Security, 9(4), 360-382. https://doi.org/10.1080/17419166.2013.802984
- Pantucci, R. (2011). A typology of lone wolves : Preliminary analysis of lone islamist terrorists dditorial assistants. Developments in Radicalisation and Political Violence, (March), 1-23. https://doi.org/http://icsr.info/2011/04/a\-typology-of-lone-wolves-preliminary-analysis-of-lone-islamist-terrorists/ https://doi.org/http://icsr.info/2011/04/a\-typology-of-lone-wolves-preliminary-analysis-of-lone-islamist-terrorists/
- Porta, D. Della, and LaFree, G. (2012). Guest editorial: Processes of radicalization and de-radicalization. International Journal of Conflict and Violence, 6(1), 4-10.
- Precht, T. (2007). Home grown terrorism and Islamist radicalisation in Europe. From conversion to terrorism. https://doi.org/10.1007/978-94-007-4978-8
- Ramakrishna, K. (2015). Islamist terrorism and militancy in Indonesia: The power of the manichean mindset. Islamist Terrorism and Militancy in Indonesia: The Power of the Manichean Mindset. https://doi.org/10.1007/978-981-287-194-7
- Rambo, L. R. (1999). Theories of conversion: Understanding and interpreting religious change. Social Compass, 46(3), 259-271. https://doi.org/10.1177/003776899046003003
- Rambo, L. R., and Bauman, S. C. (2012). Psychology of conversion and spiritual transformation. Pastoral Psychology, 61(5-6), 879-894. https://doi.org/10.1007/s11089-011-0364-5
- Ranstorp, M., and Hyllengren, P. (2013). Prevention of violent extremism in third countries. Center for Assymetric Threats Studies.
- Schmid, A. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. Terrorism and Counter-Terrorism Studies. https://doi.org/10.19165/2013.1.02
- Schmid, A. P. (2016). Research on radicalisation: Topics and themes. Perspectives on Terrorism, 10(3), 26-32.
- Sedgwick, M. (2010). The concept of radicalization as a source of confusion. Terrorism and Political Violence, 22(4), 479-494. https://doi.org/10.1080/09546553.2010.491009
- Shetret, L. (2011). The use of the internet for educational purposes. Procedia \-Social and Behavioral Sciences, 28(February), 606-611. https://doi.org/10.1016/j.sbspro.2011.11.115
- Silber, M. D., and Bhatt, A. (2007). Radicalization in the west: The homegrown threat, 1-90. https://doi.org/10.1177/036354659001800501
- Silverman, T., Stewart, C. J., and Birdwell, J. (2016). The impact of counter-narratives. Institute of Strategic Dialogue.
- Stevens, T. (2009). Regulating the 'dark web': How a two-fold approach can tackle peer-to-peer radicalisation. RUSI Journal, 154(2), 28-33. https://doi.org/10.1080/03071840902965687
- Suyin, Y., and Park, J. (2010). Countering internet radicalisation: A holistic approach. RSIS Commentaries. Retrieved from http://hdl.handle.net/10220/6657
- Sweetser, K. D., and Kelleher, T. (2011). A survey of social media use, motivation and leadership among public relations practitioners. Public Relations Review, 37(4), 425-428. https://doi.org/10.1016/j.pubrev.2011.08.010
- Tausch, N., Becker, J. C., Spears, R., Christ, O., Saab, R., Singh, P., and Siddiqui, R. N. (2011). Explaining radical group behavior: Developing emotion and efficacy routes to normative and nonnormative collective action. Journal of Personality and Social Psychology. https://doi.org/10.1037/a0022728
- Torok, R. (2010). "Make a bomb in your mums kitchen": Cyber recruiting and socialisation of 'white moors' and home grown jihadists. Proceedings of the 1st Australian Counter Terrorism Conference, (November), 54-61. Retrieved from http://ro.ecu.edu.au/act/6
- von Behr, I., Reding, A., Edwards, C., and Gribbon, L. (2013). Radicalisation in the digital era: The use of the internet in 15 cases of terrorism and extremism. Rand, 76. https://doi.org/10.1214/07-EJS057
- Weimann, G. (2007). Virtual terrorism. The Internet and Governance in Asia: A Critical Reader, 1-22.
- Zhao, Y., Liu, J., Tang, J., and Zhu, Q. (2013). Conceptualizing perceived affordances in social media interaction design. Aslib Proceedings: New Information Perspectives. https://doi.org/10.1108/00012531311330656