@prefix config: . @prefix meta: . @prefix rdf: . @prefix rdfs: . @prefix xsd: . @prefix owl: . @prefix dc: . @prefix dcmitype: . @prefix dcterms: . @prefix foaf: . @prefix geo: . @prefix om: . @prefix locn: . @prefix schema: . @prefix skos: . @prefix dbpedia: . @prefix p: . @prefix yago: . @prefix units: . @prefix geonames: . @prefix prv: . @prefix prvTypes: . @prefix doap: . @prefix void: . @prefix ir: . @prefix ou: . @prefix teach: . @prefix time: . @prefix datex: . @prefix aiiso: . @prefix vivo: . @prefix bibo: . @prefix fabio: . @prefix vcard: . @prefix swrcfe: . @prefix frapo: . @prefix org: . @prefix ei2a: . @prefix pto: . ou:bibtex "@Inbook{Rawat2024,author={Rawat, Romil and D{\\'i}az-{\\'A}lvarez, Josefa and Ch{\\'a}vez, Francisco},editor={Alzoubi , Haitham M. and Alshurideh, Muhammad Turki and Vasudevan, Srinidhi},title={Systematic Literature Review and Assessment for Cyber Terrorism Communication and Recruitment Activities},bookTitle={Technology Innovation for Business Intelligence and Analytics (TIBIA): Techniques and Practices for Business Intelligence Innovation},year={2024},publisher={Springer Nature Switzerland},address={Cham},pages={83--108},abstract={Terrorist Network Analysis has been one of the most commonly discussed ways for safeguarding Online Social Network accessing and transmission through decentralized, trustless, peer-to-peer networks since Gabriel Weimann's research paper on Cyberterrorism published in 2005. This study analyzes peer-reviewed literature attempting to use Terrorist Network Analysis for Cybercrime and gives a comprehensive analysis of the most often used Terrorist Network Analysis Security applications. The Proposed Finding recommends Malicious activities (Messages and Post relating to Terrorist events on Social Networking) for alerting users, so that they could cut away his/her communication from Malicious Actors and also help Security Agencies to identify possible Attacks and Vulnerabilities on modern Online Social Network, their main reasons and countermeasures. This systematic study also offers light on future directions in Terrorist Network Analysis and Cybercrime research, education, and practices, such as Terrorist Network Analysis security in Online Social Network, Security for Machine Learning and automated techniques.},isbn={978-3-031-55221-2},doi={10.1007/978-3-031-55221-2_5},url={https://doi.org/10.1007/978-3-031-55221-2_5}}"; vivo:identifier "2024-6863"; dcterms:publisher "Technology Innovation for Business Intelligence and Analytics (TIBIA): Techniques and Practices for Business Intelligence Innovation"; bibo:doi "10.1007/978-3-031-55221-2_5"; dcterms:contributor "Rawat, Romil\nand Díaz-Álvarez, Josefa\nand Chávez, Francisco; Alzoubi\t, Haitham M.\nand Alshurideh, Muhammad Turki\nand Vasudevan, Srinidhi"; ou:tipoPublicacion "Book Chapter"; dcterms:title "Systematic Literature Review and Assessment for Cyber Terrorism Communication and Recruitment Activities"; bibo:isbn "9783031552212"; ou:urlOrcid ; a ou:Publicacion; fabio:hasPublicationYear "2024". ou:tienePublicacion .