×
Receive a 20% Discount on All Purchases Directly Through IGI Global's Online Bookstore.
Additionally, libraries can receive an extra 5% discount.
Learn More
Shopping Cart
Login
Register
Language:
English
All Products
All Products
Books
Journals
Videos
Book Chapters
Journal Articles
Video Lessons
Teaching Cases
Special Offers
Subscribe to the latest research through IGI Global's new InfoSci-OnDemand Plus
InfoSci®-OnDemand Plus, a subscription-based service, provides researchers the ability to access full-text content from over 93,000+ peer-reviewed book chapters and 24,000+ scholarly journal articles covering 11 core subjects. Users can select articles or chapters that meet their interests and gain access to the full content permanently in their
personal online InfoSci-OnDemand Plus library
.
Subscribe
Purchase the Encyclopedia of Information Science and Technology, Fourth Edition
and Receive Complimentary E-Books of Previous Editions
When ordering directly through IGI Global's Online Bookstore, receive the complimentary e-books for the first, second, and third editions with the purchase of the Encyclopedia of Information Science and Technology, Fourth Edition e-book.
Purchase
Create a Free IGI Global Library Account to Receive a 25% Discount on All Purchases
Exclusive benefits include one-click shopping, flexible payment options, free COUNTER 4 and MARC records, and a 25% discount on all titles as well as the award-winning InfoSci
®
-Databases.
Sign Up Now!
InfoSci
®
-Journals Annual Subscription Price for New Customers: As Low As US$ 4,080*
This collection of over 185 e-journals offers unlimited access to highly-cited, forward-thinking content in full-text PDF and HTML with no DRM. There are no platform or maintenance fees and a guarantee of no more than 5% increase annually.
Learn More
Discounted Titles Only Available through IGI Global’s Online Bookstore
Take 20% off all publications purchased directly through the IGI Global Online Bookstore.
Shop Now
Books
Journals
InfoSci
®
-Databases
Articles/Chapters
Publish
with Us
Resources
Librarians
InfoSci
®
-Databases
Book Title List
Journal Title List
Video Title List
Consortia Partnerships
Library and Publisher Collaborations
Product Distributors
Catalogs
Library Account Program
Instructors
Course Adoption
Teaching Cases
Researchers
Browse Books
Browse Journals
Streaming Videos
OnDemand Downloads
Webinars
Authors and Editors
eEditorial Discovery
®
System
Peer Review Process
Ethics and Malpractice
Fair Use Policy
Copy Editing Service
FAQ
Distributors
Distributor Resources
Book Distributors
Journal Subscription Agencies
E-Resource Partners
Catalogs
About Us
Newsroom
Bookstore Search
Reset
Total results: 66
Sort by:
Relevancy
Title (asc)
Title (desc)
Copyright Year (asc)
Copyright Year (desc)
Sample PDF
Violent Extremism: Breakthroughs in Research and Practice
Information Resources Management Association. © 2019. 541 pages.
Advances in digital and other technologies have provided ample positive impacts to modern society; however, in addition to such benefits, these innovations have inadvertently created a new venue for terrorist activities. Examining violent extremism through a critical and academic perspective can lead...
Reference Book
Sample PDF
Post-Narratology Through Computational and Cognitive Approaches
Takashi Ogata, Taisuke Akimoto. © 2019. 521 pages.
Studying narratives is an ideal method to gain a good understanding of how various aspects of human information are organized and integrated. The concept and methods of a narrative, which have been explored in narratology and literary theories, are likely to be connected with contemporary information...
Reference Book
Sample PDF
Utilization of New Technologies in Global Terror: Emerging Research and Opportunities
Emily B. Stacey. © 2019. 140 pages.
As the internet and its applications grow more sophisticated and widespread, so too do the strategies of modern terrorist groups. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. It is necessary to...
Reference Book
Sample PDF
Biotechnology: Concepts, Methodologies, Tools, and Applications
Information Resources Management Association. © 2019. 2250 pages.
Biotechnology can be defined as the manipulation of biological process, systems, and organisms in the production of various products. With applications in a number of fields such as biomedical, chemical, mechanical, and civil engineering, research on the development of biologically inspired materials...
Reference Book
Sample PDF
Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism
Arif Sari. © 2019. 350 pages.
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence...
Reference Book
Sample PDF
International Journal of Translation, Interpretation, and Applied Linguistics (IJTIAL)
Wei Zhao, Ying Cui. © 2019.
The International Journal of Translation, Interpretation, and Applied Linguistics (IJTIAL) is a biannual innovative forum for researchers and practitioners from any part of the world to disseminate the latest trends, techniques, and practical solutions in the growing fields of translation...
Journal
Sample PDF
A Cyber-Psychological and Behavioral Approach to Online Radicalization
Reyhan Topal. © 2019. 12 pages.
This chapter attempts to synthesize the mainstream theories of radicalization and the cyber-psychological and behavioral approaches with a view to identifying individuals' radicalization online. Based on the intersections of those two fields, this chapter first elaborates how radical groups use...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Internet Use and Violent Extremism: A Cyber-VERA Risk Assessment Protocol
D. Elaine Pressman, Cristina Ivan. © 2019. 19 pages.
This chapter introduces a new approach to the risk assessment for violent extremism that is focused on cyber-related behaviour and content. The Violent Extremist Risk Assessment (VERA-2) protocol, used internationally, is augmented by an optional cyber-focused risk indicator protocol referred to as...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
An Internet-Mediated Pathway for Online Radicalisation: RECRO
Loo Seng Neo. © 2019. 28 pages.
This chapter proposes an Internet-mediated radicalisation model, RECRO. It consists of five phases: (1) the Reflection phase details the triggers, needs, and vulnerabilities that an individual may have which increase one's receptiveness towards alternative belief systems; (2) the Exploration phase...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Western Female Migrants to ISIS: Propaganda, Radicalisation, and Recruitment
Erin Marie Saltman. © 2019. 23 pages.
Women have long been a blind spot for security, academic and think tank sectors in relation to the growing threat of global extremism. The recent spike in female recruitment to the terrorist organisation, Islamic State in Iraq and Syria (ISIS), is a strong indicator of this dangerous trend. While often...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Beyond the Precautionary Principle: Is Terrorism a Real Risk?
Maximiliano E. Korstanje. © 2019. 20 pages.
This chapter centers on the discussion around terrorism. While some scholars emphasize on terrorism as a risk, others alert on the limitations of thinking terrorism within the field of risk. This does not mean that terrorism does not exist, it is a big problem for urbanized contexts, but it escapes to...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Supporter, Activist, Rebel, Terrorist: Children in Syria
Bulut Gurpinar. © 2019. 14 pages.
Children have always been a part of the war for millennia but child soldiering is often portrayed as something rather new, as a side product of the Post-Cold War in most of the fragile states in the world. Underdevelopment is a feature of the fragile state and especially political violence is a common...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Developing Discourse and Tools for Alternative Content to Prevent Terror
Marina Shorer-Zeltser, Galit Margalit Ben-Israel. © 2019. 16 pages.
Within context of multiculturalism and openness in Western countries, the work of terrorist activity recruiters can become easier and simple. In this framework, it's important to analyze techniques used by terrorists to manipulate support and good intentions of people inclined to sustain justice...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Tackling Islamic Terrorism and Radicalism in Indonesia by Increasing the Sense of Humanity and Friendship
Idhamsyah Eka Putra, Dimas Okto Danamasi, Any Rufaedah, Reisa Suci Arimbi, Sapto Priyanto. © 2019. 22 pages.
In regard to the rise of Islamic terrorism and fundamentalism, this paper aims to (1) explore the ways in changing jihadists' mind and behavior; that is, by guiding them away from “war situation” and by persuading them to conduct good deeds and to relate Islam to daily life such as by giving...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Hashtag Activism and the Transnationalization of Nigerian-Born Movements Against Terrorism: A Critical Appraisal of the #BringBackOurGirls Campaign
Floribert Patrick C. Endong. © 2019. 15 pages.
This chapter describes how the Nigeria-based civil society initiatives have, of late, deployed digital activism in a bid to mobilize both endogenous and exogenous institutions against the terrorist group, Boko Haram. One of these anti-terrorism movements is the #BringBackOurGirls campaign which was...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Biometric Technology Solutions to Countering Today's Terrorism
Israel Fianyi, Tanveer A Zia. © 2019. 14 pages.
The purpose of this paper is to examine the relevance of biometric technologies in increasing the fight against terrorism and other related border security challenges such as identity dominance. Since the 11th September, 2001 catastrophe in USA the need for biometrics technology for identification...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
Comparing the Socio-Political Ethics of Fighting Terrorism With Extreme Self-Defense in USA: An Exploratory Insight
Maximiliano E. Korstanje, Kenneth David Strang. © 2019. 21 pages.
In this study the authors adopted a post-positivist research design philosophy to explore the likelihood that Americans would support extreme self-defense policies like torture, reducing human rights or banning Muslims to fight against global terrorism, especially after 9/11 and in light of the Trump...
Source:
Violent Extremism: Breakthroughs in Research and Practice
Sample PDF
A Computational, Cognitive, and Narratological Approach to Narrative Generation
Takashi Ogata. © 2019. 84 pages.
This chapter surveys and discusses interdisciplinary approaches to primarily artificial intelligence (AI)-based computational narrative or story generation systems by way of introducing cognitive science, and narratology and related literary theories. The first part of this chapter provides a general...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
Toward a Post-Narratology or the Narratology of Narrative Generation
Takashi Ogata. © 2019. 58 pages.
This new enhanced book, which includes this chapter, explores new possibilities and directions of narrative-related technologies and theories, as well as their implications for the innovative design, development, and creation of future media and contents such as automatic narrative generation systems;...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
Consideration of Fundamental Methods and Principles for Human-Computer Co-Creation of Narratives
Taisuke Akimoto, Takashi Ogata. © 2019. 28 pages.
The authors propose the conceptual design of a co-creative narrative generation system that co-creates a collection of diverse narratives from a narrative generation program and people. The long-term goal of this study is to vitalize humans' narrative creation by developing generative narrative...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
An Attempt of the Commercial Film Production Support System Based on the Image Rhetoric of Commercial Film
Yoji Kawamura. © 2019. 26 pages.
This chapter describes the concepts behind a commercial film production support system (CFPSS) in terms of related studies in the areas of advertising, image techniques and rhetoric, cognitive science, and information engineering. The chapter then analyzes the structure of commercial films to establish...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
Can Computers Understand Picture Books and Comics?
Miki Ueno, Kiyohito Fukuda, Naoki Mori. © 2019. 33 pages.
The objective of this chapter is to develop a method for generating and analyzing creative work by using computers. In this chapter, picture books and comics are considered representative creative work because they contain multi-modal information represented by natural language and pictures. These...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
Taking Perspectives in Digital Storytelling on Business Planning
Yoko Takeda. © 2019. 23 pages.
Digital storytelling for business planning has the narrative mode and the logical scientific mode. This chapter explores how the structure of the digital storytelling work affects its effectiveness and how the storyteller's reflection influences the improvement of the work. It is critical to...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
The Potentiality of First-Person Views: Analyzing Narratives During Art Appreciation
Kotone Tadaki, Akinori Abe. © 2019. 22 pages.
The aim of this chapter is to suggest the possible use of first-person views to evaluate and improve museum facilities. The authors attempt to explain possible ways to analyze this type of data by conducting an experiment as an example. First, the authors introduce their experiment to determine the...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Sample PDF
Elegant and Efficient Communication by Haiku-Like Concise Sentences
Yoshihiko Nitta. © 2019. 20 pages.
Poetic fragmental sentences such as Haiku are often free from grammatical constraint while maintaining full message transmitting power. The author takes Haiku, a classical Japanese concise poetic sentence, as an elegant and efficient communication language for a digital signal system. By using the...
Source:
Post-Narratology Through Computational and Cognitive Approaches
Page
/
3