Internet and terrorism

Results: 152



#Item
141SAS / Internet culture / Computing / Counter-terrorism / Special Air Service / Web conferencing / SAS Institute / Military organization / 4GL / Business intelligence

In-House and Local SAS® Users Groups - Best Practices This document is to be used as a resource for helping to sustain and grow your registered local or inhouse SAS users group. Below are best practices from some experi

Add to Reading List

Source URL: www.sesug.org

Language: English - Date: 2013-08-24 12:51:08
142Science / Data mining / Data collection / Human rights / Policy appliances / Internet privacy / K. A. Taipale / Privacy / Multistate Anti-Terrorism Information Exchange / Ethics / Data analysis / Data management

Testimony of Kim Taipale, Executive Director Center for Advanced Studies in Science and Technology Policy www.advancedstudies.com Before the United States Senate Committee on the Judiciary

Add to Reading List

Source URL: www.global-info-society.org

Language: English - Date: 2007-01-10 14:09:32
143Terrorism / Al-Qaeda / Taliban / Fear / United Nations Office on Drugs and Crime / Definitions of terrorism / Richard Barrett / State terrorism / Al-Qaida and Taliban Sanctions Committee / National security / Counter-terrorism / Security

The use of the Internet for terrorist purposes In collaboration with the United Nations Counter-Terrorism Implementation Task Force

Add to Reading List

Source URL: www.unodc.org

Language: English - Date: 2012-10-22 08:15:23
144107th United States Congress / Privacy law / Information Sharing Environment / Fusion center / Patriot Act / Intelligence Reform and Terrorism Prevention Act / Internet privacy / Surveillance / United States Department of Homeland Security / National security / Government / Law

Delaware Information and Analysis Center

Add to Reading List

Source URL: dsp.delaware.gov

Language: English - Date: 2011-03-08 12:45:05
145Finance / Financial regulation / MIPS architecture / Electronic commerce / Money laundering / Terrorism financing / Bank / Factoring / Credit risk / Business / Economics / Payment systems

Wolfsberg Guidance on Mobile and Internet Payment Services (MIPS[removed]Preamble

Add to Reading List

Source URL: www.wolfsberg-principles.com

Language: English - Date: 2014-02-17 12:14:31
146Terrorism / Law enforcement in the United States / National Consortium for the Study of Terrorism and Responses to Terrorism / Gary LaFree / Global Terrorism Database / Counter-terrorism / September 11 attacks / Definitions of terrorism / State terrorism / National security / Security / Public safety

Editor’s Note: Hot Spots of Terrorism and Other Crimes in the United States, 1970 to[removed]July 5, [removed]Current articles and postings on the Internet have mischaracterized the conclusions of the START report “Hot

Add to Reading List

Source URL: www.start.umd.edu

Language: English - Date: 2013-03-22 13:14:36
147107th United States Congress / Privacy law / Information Sharing Environment / Fusion center / Patriot Act / Intelligence Reform and Terrorism Prevention Act / Internet privacy / Surveillance / United States Department of Homeland Security / National security / Government / Law

Delaware Information and Analysis Center

Add to Reading List

Source URL: www.dsp.delaware.gov

Language: English - Date: 2011-03-08 12:45:05
148Politics / Terrorism / American Muslims / Islamist groups / Palestinian nationalism / Council on American-Islamic Relations / Nihad Awad / Hamas / Holy Land Foundation for Relief and Development / Islam / Islam and antisemitism / Anti-Zionism

Top Internet Disinformation About CAIR

Add to Reading List

Source URL: www.investigativeproject.org

Language: English - Date: 2010-02-02 12:38:10
149Information Sharing Environment / Internet privacy / Personally identifiable information / Information privacy / United States Department of Homeland Security / Intelligence Reform and Terrorism Prevention Act / Ethics / Privacy / Government

ARIZONA COUNTER TERRORISM INFORMATION CENTER PRIVACY POLICY AND PROCEDURES GUIDE

Add to Reading List

Source URL: www.azactic.gov

Language: English - Date: 2011-06-10 14:57:43
150Jane Harman / Homegrown terrorism / Dave Reichert / Radicalization / Cyberterrorism / Definitions of terrorism / Government / National security / Rita Katz / Terrorism / Violent Radicalization and Homegrown Terrorism Prevention Act / Islamic terrorism

USING THE WEB AS A WEAPON: THE INTERNET AS A TOOL FOR VIOLENT RADICALIZATION AND HOMEGROWN TERRORISM

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2009-12-02 10:04:51
UPDATE