<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Vase Rusumanov</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">The Use of the Internet by Terrorist Organizations</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">communication</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber attacks</style></keyword><keyword><style  face="normal" font="default" size="100%">cyberterrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">Internet</style></keyword><keyword><style  face="normal" font="default" size="100%">propaganda</style></keyword><keyword><style  face="normal" font="default" size="100%">Terrorism</style></keyword><keyword><style  face="normal" font="default" size="100%">terrorist organizations</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">137-150</style></pages><abstract><style face="normal" font="default" size="100%">Human life progress has successfully defined multiple epochs’ evolution with specific peculiarities. Today we live in the modern digital era, numerous computer devices, services and networks are actually significant. At the same time, these new science and technology achievements are rated both as good and bad for their users. The digital progress is however visible and of utility for terrorist organizations. This article focuses on selected illustrations of Internet technologies used by terrorist organizations. Special discussion emphases are given to uses towards (i) terrorist organizations radicalization of young people; (ii) spreading propaganda; (iii) internal communication, training, planning, coordination and committing terrorist acts.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">137</style></section></record></records></xml>