Chapter 35

Investigating Radicalized Individual Profiles through Fuzzy Cognitive Maps

Babak Akhgar1, Fahimeh Tabatabayi2, Petra Saskia Bayerl3, Samir M.R. Nasserzadeh4 and Andrew Staniforth5,    1Sheffield Hallam University, Sheffield, UK,    2MehrAlborz University, Tehran, Iran,    3Erasmus University, Rotterdam, The Netherlands,    4University of Tehran, Tehran, Iran,    5North East Counter Terrorism Unit, West Yorkshire Police, West Yorkshire, UK

The use of cyberspace to disseminate radical materials and messages has become the predominant method used by extremists to recruit and radicalize individuals to their cause. The phenomenon of online radicalization is increasing, presenting pressing security concerns. In direct response to the emerging ...

Get Emerging Trends in ICT Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.