The strategic importance of the Internet for armed insurgent groups in modern warfare

2007 ◽  
Vol 89 (868) ◽  
pp. 857-878 ◽  
Author(s):  
Wael Adhami

AbstractIn modern times the Internet has become the only tool which can be used to spread information instantaneously and free of charge to anyone in the world who has an Internet connection. The ability to spread information is vital for any party engaged in an armed conflict. This article will show that groups engaged in a jihad have made the Internet their main outlet to the world. It will further examine the content of Islamic and jihadi websites, their main objectives and the communication strategies used. However, and with a particular focus on Iraq, the author will argue that the Internet does not serve as a platform of recruitment for jihad but is rather the most effective way for armed insurgent groups to win the “hearts and minds” of Muslims worldwide.

Author(s):  
Дмитрий Викторович Кияйкин ◽  
Екатерина Андреевна Дворецкая

В статье раскрываются особенности сущностного понимания религиозного экстремизма и организационно-правовой профилактики данного явления. Обращено внимание на важность профилактической работы в рамках предупреждения антиобщественного (девиантного) поведения. Авторами рассматриваются причины и условия формирования религиозного экстремизма и наполнения им сети Интернет. Интернет-сообщество сталкивается с массовой информационной угрозой со стороны экстремистских организаций. Это связано с катастрофически быстрым распространением радикальных идеологий, всеобщей компьютеризацией и информатизацией общественных процессов, что облегчает процесс распространения материалов, носящих экстремистский характер. Религиозный экстремизм является источником вооруженных конфликтов во всем мире. Жертвами этого страшного явления, как правило, являются дети, подростки, молодые люди, кого легко заманить в сети идеологического обмана. Религиозный экстремизм опасен не только разрушением социальных объектов и ценностей, убийствами, террором. Гораздо опаснее сама идеология экстремизма, которая искажает мировоззрение и психику человека. В этих условиях эффективным является проведение профилактических мероприятий с молодым поколением, доведение до людей важности вопроса, осуществление контроля за неблагополучными семьями, обучение молодых лиц толерантности и уважению к окружающим людям. В работе определены направления работы правоохранительных органов по вопросу совершенствования механизма противодействия распространению экстремистской информации. Определена важность международного сотрудничества. The article reveals the features of the essential understanding of religious extremism and organizational and legal prevention of this phenomenon. Attention is drawn to the importance of preventive work as part of the prevention of antisocial (deviant) behavior. The authors consider the reasons and conditions for the formation of religious extremism and the filling of the Internet. The online community is facing a massive information threat from extremist organizations. This is due to the catastrophically lightning-fast spread of radical ideologies, the general computerization and informatization of social processes, which facilitates the process of distributing materials of an extremist nature. Religious extremism is a source of armed conflict throughout the world. The victims of this terrible phenomenon, as a rule, are children, adolescents, young people and girls - whom it is easy to lure into networks of ideological deception. Religious extremism is dangerous not only the destruction of social objects and values, murders, terror. The ideology of extremism itself, which distorts the worldview and the human psyche, is much more dangerous. Religious extremism is a source of armed conflict throughout the world. The victims of this terrible phenomenon, as a rule, are children, adolescents, young people and girls - whom it is easy to lure into networks of ideological deception. Religious extremism is dangerous not only the destruction of social objects and values, murders, terror. The ideology of extremism itself, which distorts the worldview and the human psyche, is much more dangerous.


Author(s):  
Maria E. Velásquez ◽  
Luis A. Velásquez

Abstract A system named Tool Trial System (TTS), which is capable of collating and disseminating information relating to tool trials amongst a variety of user groups, has been developed. In the context of tooling engineers TTS has provided a platform from which it is possible to submit and retrieve highly specific technical tooling data on the World Wide Web. TTS has been developed under a distributed philosophy and it can be downloaded by remote users in the form of Java applets, through any computer with Internet connection and using conventional Java enabled browsers without the requirements of using middle tiers software or hardware between clients and server sides. TTS uses a 100% pure Java driver for remote database access and it was developed using PowerJ, which is a graphical programming tool able to speed up the creation of Java projects. This work demonstrated not only the suitability of the Internet as a distributed computing resource, but more importantly it was possible to look at the ways in which approved data could be analyzed and then applied to cutting data selection within the Process Planning arena.


2011 ◽  
pp. 2009-2018
Author(s):  
C. C. Ko ◽  
Ben M. Chen ◽  
C. D. Cheng

From the angle of computer-based education, the Internet extends the power of the personal computer (PC) from being a standalone machine to one that is connected to the world with uncountable resources. Applications such as library access, information search, educational material download, online tutorials, and even examinations can now be routinely carried out by a low-cost PC with an Internet connection at anytime from practically everywhere.


Author(s):  
Rohit Ramesh Jadhav ◽  
Parth Sandeep Sheth

Virtual Private Networks (VPN) gives anonymity and online security whilst using the web by creating a private network from our public internet connection. VPNs cloak Internet Protocol addresses such that our online activities cannot be traced. Initially, VPNs were only being utilized by huge corporate organizations, which could bear its cost, to safely and privately share records between workplaces situated in various parts of the world. Currently in 2020, now over a quarter of the world's population uses VPN to access the internet anonymously. This paper presents an introduction to VPN technology, its working, its types, some of the VPN Protocols, comparison between free and paid VPN services, and security issues associated with VPN use.


2021 ◽  
Vol 3 (2) ◽  
pp. 176-187
Author(s):  
Dawi Yanti

The educational system across the world has been affected due to outbreak of Covid-19 pandemic, this new phenomenon forced teachers and students to do teaching and learning process from home. The purpose of writing this study was to investigate the students' perceptions of online learning has been implemented and the factors that influenced these perceptions. Therefore, this survey asked 60 students in Sekolah Tinggi Teknologi Migas Balikpapan to convey their perception on the effect of online during Covid-19. The finding of this study revealed that students positively accepted this new learning system although they’ve found some problems such as difficulty in using application and lack of the internet connection, etc.


1995 ◽  
Vol 35 (308) ◽  
pp. 550-564
Author(s):  
Ameur Zemmali

Water, life-giving and bounteous, the symbol of fertility and purity, is also a source of fear, risk and danger, of covetousness and conflict. Serving many purposes, all equally necessary, it constitutes a vital resource of which man has always tried to regulate the use and management. But unlike peacetime legislation, reflected in the customs and practices of the most ancient societies as well as in the domestic and international legal instruments of modern times, the law of armed conflicts has devoted only few of its provisions expressly — and belatedly — to water. This is not so much a criticism as an observation and may be explained by the fact that water is indispensable in all circumstances. Apart from the consequences of natural disasters, when water may be either threatening or threatened, some human activities can harm the environment and impair the population's means of survival, of which water is the most essential. The effects of pollution or armed conflict are a case in point. The experience of modern warfare has shown, alas, that the civilian population and civilian objects are exposed to military operations and that in some cases thirst can prove to be more deadly than weapons. The only remedy lies in respect for the universally recognized rules, and in the following article attention will be drawn to the provisions of humanitarian law which apply to the protection of water in wartime (I).


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


2011 ◽  
Vol 23 (4) ◽  
pp. 186-191 ◽  
Author(s):  
Malini Ratnasingam ◽  
Lee Ellis

Background. Nearly all of the research on sex differences in mass media utilization has been based on samples from the United States and a few other Western countries. Aim. The present study examines sex differences in mass media utilization in four Asian countries (Japan, Malaysia, South Korea, and Singapore). Methods. College students self-reported the frequency with which they accessed the following five mass media outlets: television dramas, televised news and documentaries, music, newspapers and magazines, and the Internet. Results. Two significant sex differences were found when participants from the four countries were considered as a whole: Women watched television dramas more than did men; and in Japan, female students listened to music more than did their male counterparts. Limitations. A wider array of mass media outlets could have been explored. Conclusions. Findings were largely consistent with results from studies conducted elsewhere in the world, particularly regarding sex differences in television drama viewing. A neurohormonal evolutionary explanation is offered for the basic findings.


Author(s):  
Shankar Chaudhary

Despite being in nascent stage m-commerce is gaining momentum in India. The explosive growth of smart-phone users has made India much loved business destination for whole world. Indian internet user is becoming the second largest in the world next to China surpassing US, which throws open plenty of e-commerce opportunities, not only for Indian players, offshore players as well. Mobile commerce is likely to overtake e-commerce in the next few years, spurred by the continued uptrend in online shopping and increasing use of mobile apps.The optimism comes from the fact that people accessing the Internet through their mobiles had jumped 33 per cent in 2014 to 173 million and is expected to grow 21 per cent year-on-year till 2019 to touch 457 million. e-Commerce brands are eyeing on the mobile app segment by developing user-friendly and secure mobile apps offering a risk-free and easy shopping experience to its users. Budget 4G smart phones coupled with affordable plans, can very well drive 4G growth in India.


GIS Business ◽  
2019 ◽  
Vol 14 (6) ◽  
pp. 597-606
Author(s):  
Dr. Maha Mustafa Omer Abdalaziz

The study aims at the technological developments that are taking place in the world and have impacted on all sectors and fields and imposed on the business organizations and commercial companies to carry out their marketing and promotional activities within the electronic environment. The most prominent of these developments is the emergence of the concept of electronic advertising which opened a wide range of companies and businessmen to advertise And to promote their products and their work easily through the Internet, which has become full of electronic advertising, and in light of that will discuss the creative strategy used in electronic advertising;


Sign in / Sign up

Export Citation Format

Share Document