Online Behavior Patterns of Terrorists: Past and Present

  • Dhanashree DeshpandeEmail author
  • Shrinivas Deshpande
  • Vilas Thakare
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1037)


Terrorists have shifted their activities of planning and coordination of attacks to internet by using web technologies. They are educated enough to create their websites, communicate through apps. They use online technologies to fulfill their objectives such as distribution of materials, overcome obstacles, communication, recruitment, fundraising, coordination, publicity, etc. Terrorists recruit required people through social media, websites, video games, etc. It has become easier for them to prepare for attacks with the help of modern form of terrorism. The paper explained various behavior patterns of terrorists from past to present. They have increased their number of activities since 1970 till the date. The activities are represented from year 1970 to 2016. The records are collected from Kaggle site. It is studied and analyzed. The terrorism affected badly in every country and its activities increase day by day. In this paper, the efforts took place to identify terrorist’s way of online behavior.


Behavior patterns Terrorism Online behavior Cyber terrorism Old and new terrorism 


  1. 1.
    The use of internet for terrorist purposes, UNODC, New York, pp. 1–158 (2012)Google Scholar
  2. 2.
    Neumann, P.R.: Terrorism in the 21st Century, The Rule of Law as a Guideline for German policy, Friedrich-Ebert-Stiftung, Compass 2020, pp. 1–16, December 2008Google Scholar
  3. 3.
    Heickero, R.: Terrorism online and the change of modus operandi Google Scholar
  4. 4.
    Mannik, E.: Terrorism: its past, present and future prospects, pp. 151–171 (2007)Google Scholar
  5. 5.
    Weimann, G.: How modern terrorism uses the internet. Special report of United States Institute of Peace, pp. 1–12 (2004)Google Scholar
  6. 6.
    Cohen-Almagor, R.: Jihad online: how do terrorists use the internet? In: Campos Freire, F., Rúas Araújo, X., Martínez Fernández, V.A., López García, X. (eds.) Media and Metamedia Management. AISC, vol. 503, pp. 55–66. Springer, Cham (2017). Scholar
  7. 7.
    Qin, J., Zhou, Y., Reid, E., Lai, G., Chen, H.: Analyzing terror campaigns on the internet: technical sophistication, content richness, and web interactivity. Int. J. Hum. Comput. Stud. 65, 71–84 (2006)CrossRefGoogle Scholar
  8. 8.
    Goth, G.: Terror on the internet: a complex issue, and getting harder. IEEE Distrib. Syst. Online 9(3), no. 0803, 1–4 (2008)CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Dhanashree Deshpande
    • 1
    Email author
  • Shrinivas Deshpande
    • 2
  • Vilas Thakare
    • 3
  1. 1.SGBAUAmravatiIndia
  2. 2.Department of Computer Science and TechnologyDCPEAmravatiIndia
  3. 3.Department of Computer Science and EngineeringSGBAUAmravatiIndia

Personalised recommendations