Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol

Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol

D. Elaine Pressman, Cristina Ivan
Copyright: © 2019 |Pages: 19
ISBN13: 9781522579120|ISBN10: 1522579125|EISBN13: 9781522579137
DOI: 10.4018/978-1-5225-7912-0.ch011
Cite Chapter Cite Chapter

MLA

Pressman, D. Elaine, and Cristina Ivan. "Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol." National Security: Breakthroughs in Research and Practice, edited by Information Resources Management Association, IGI Global, 2019, pp. 231-249. https://doi.org/10.4018/978-1-5225-7912-0.ch011

APA

Pressman, D. E. & Ivan, C. (2019). Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol. In I. Management Association (Ed.), National Security: Breakthroughs in Research and Practice (pp. 231-249). IGI Global. https://doi.org/10.4018/978-1-5225-7912-0.ch011

Chicago

Pressman, D. Elaine, and Cristina Ivan. "Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol." In National Security: Breakthroughs in Research and Practice, edited by Information Resources Management Association, 231-249. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7912-0.ch011

Export Reference

Mendeley
Favorite

Abstract

This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as CYBERA. The risk indicators of CYBERA are elaborated and the application of CYBERA, conjointly with the VERA-2 risk assessment protocol, is described. The combined use of the two tools provides (1) a robust and cyber-focused risk assessment intended to provide early warning indicators of violent extremist action, (2) provides consistency and reliability in risk and threat assessments, (3) determines risk trajectories of individuals, and (4) assists intelligence and law enforcement analysts in their national security investigations. The tools are also relevant for use by psychologists, psychiatrists, communication analysts and provide relevant information that supports Terrorism Prevention Programs (TPP) and countering violent extremism (CVE) initiatives.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.