<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="article">
  <front>
    <journal-meta>
      <journal-id journal-id-type="publisher-id">jssi</journal-id>
      <journal-title-group>
        <journal-title>Journal of Security and Sustainability Issues</journal-title>
      </journal-title-group>
      <issn pub-type="epub">2029-7017</issn>
      <issn pub-type="ppub">2029-7017</issn>
      <publisher>
        <publisher-name>LKA</publisher-name>
      </publisher>
    </journal-meta>
    <article-meta>
      <article-id pub-id-type="publisher-id">JSSI721</article-id>
      <article-id pub-id-type="doi">10.9770/jssi.2017.7.2(1)</article-id>
      <article-categories>
        <subj-group subj-group-type="heading">
          <subject>Article</subject>
        </subj-group>
      </article-categories>
      <title-group>
        <article-title>Role of Internet in Lone Wolf Terrorism</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <name>
            <surname>Zeman</surname>
            <given-names>Tomáš</given-names>
          </name>
          <email xlink:href="mailto:tomas.zeman2@unob.cz">tomas.zeman2@unob.cz</email>
          <xref ref-type="aff" rid="j_jssi_aff_000"/>
        </contrib>
        <aff id="j_jssi_aff_000">University of Defence in Brno, Faculty of Military Leadership, Department of Emergency Management, Brno, Czech Republic</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Břeň</surname>
            <given-names>Jan</given-names>
          </name>
          <email xlink:href="mailto:jan.bren@unob.cz">jan.bren@unob.cz</email>
          <xref ref-type="aff" rid="j_jssi_aff_001"/>
        </contrib>
        <aff id="j_jssi_aff_001">University of Defence in Brno, Faculty of Military Leadership, Department of Emergency Management, Brno, Czech Republic</aff>
        <contrib contrib-type="author">
          <name>
            <surname>Urban</surname>
            <given-names>Rudolf</given-names>
          </name>
          <email xlink:href="mailto:rudolf.urban@unob.cz">rudolf.urban@unob.cz</email>
          <xref ref-type="aff" rid="j_jssi_aff_002"/>
        </contrib>
        <aff id="j_jssi_aff_002">University of Defence in Brno, Faculty of Military Leadership, Department of Emergency Management, Brno, Czech Republic</aff>
      </contrib-group>
      <volume>7</volume>
      <issue>2</issue>
      <fpage>185</fpage>
      <lpage>192</lpage>
      <pub-date pub-type="ppub">
        <day>22</day>
        <month>12</month>
        <year>2017</year>
      </pub-date>
      <pub-date pub-type="epub">
        <day>22</day>
        <month>12</month>
        <year>2017</year>
      </pub-date>
      <permissions>
        <ali:free_to_read xmlns:ali="http://www.niso.org/schemas/ali/1.0/"/>
      </permissions>
      <abstract>
        <p>For the last two decades, lone wolf terrorists in Western countries have been significantly changing their modus operandi. Part of these changes and possibly even one of their causes is the increasing use of the internet by lone wolves. This article reviews the role of the internet in the preparation of a terrorist attack as well as during the process of radicalisation of lone wolves. The possibilities and methodical flaws of lone wolf identification on the internet are also discussed. Based on current knowledge, it can be said that the Internet still has a limited role for lone wolves during the preparation of their terrorist attacks. However, it has been demonstrated, that as an efficient communication tool, the internet is of considerable importance in the process of lone wolf radicalisation. The internet is also a place where lone wolves may leak indications of their future actions. These leakages may be utilised for the identification of future lone wolf terrorists on discussion forums or radical websites using semi-automatic methods. However, the biggest drawbacks of these methods is their inability to distinguish between future lone wolf terrorists and common radical authors with no real intention on committing any terrorist act.</p>
      </abstract>
      <kwd-group>
        <label>Keywords</label>
        <kwd>terrorism</kwd>
        <kwd>lone wolf</kwd>
        <kwd>identification</kwd>
        <kwd>radicalisation</kwd>
        <kwd>Internet</kwd>
        <kwd>communication</kwd>
      </kwd-group>
      <kwd-group kwd-group-type="JEL">
        <label>JEL</label>
        <kwd>Q3</kwd>
      </kwd-group>
    </article-meta>
  </front>
</article>
