IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol

Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol
View Sample PDF
Author(s): D. Elaine Pressman (Carleton University, Canada & International Centre for Counter-Terrorism (ICCT) – The Hague, The Netherlands)and Cristina Ivan (Mihai Viteazul National Intelligence Academy, Romania)
Copyright: 2016
Pages: 19
Source title: Combating Violent Extremism and Radicalization in the Digital Era
Source Author(s)/Editor(s): Majeed Khader (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Loo Seng Neo (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Gabriel Ong (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore), Eunice Tan Mingyi (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore)and Jeffery Chin (Home Team Behavioural Sciences Centre, Ministry of Home Affairs, Singapore)
DOI: 10.4018/978-1-5225-0156-5.ch019

Purchase

View Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol on the publisher's website for pricing and purchasing information.

Abstract

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.

Related Content

N. L. Swathi, Achukutla Kumar. © 2024. 17 pages.
Gurwinder Singh, Anshika Thakur. © 2024. 21 pages.
Ashok Singh Gaur, Hari Om Sharan, Rajeev Kumar. © 2024. 16 pages.
Sabyasachi Pramanik. © 2024. 17 pages.
Geetha Manoharan, Abdul Razak, C. V. Guru Rao, Sunitha Purushottam Ashtikar, M. Nivedha. © 2024. 28 pages.
Roop Kamal, Manpreet Kaur, Jaspreet Kaur, Shivani Malhan. © 2024. 10 pages.
Anu Sharma. © 2024. 8 pages.
Body Bottom